id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 36
232
⌀ |
---|---|---|---|---|---|---|---|---|
CVE-2020-7552
|
A CWE-787: Out-of-bounds Write vulnerability exists in IGSS Definition (Def.exe) version 14.0.0.20247, that could cause Remote Code Execution when malicious CGF (Configuration Group File) file is imported to IGSS Definition.
|
[
"cpe:2.3:a:schneider-electric:interactive_graphical_scada_system:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | 6.8 | null |
|
CVE-2025-48246
|
WordPress The Events Calendar <= 6.11.2.1 - Broken Access Control Vulnerability
|
Missing Authorization vulnerability in The Events Calendar The Events Calendar allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects The Events Calendar: from n/a through 6.11.2.1.
|
[] | null | 5.4 | null | null | null |
GHSA-hv29-c4x3-8863
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Realtyna Realtyna Provisioning allows Reflected XSS. This issue affects Realtyna Provisioning: from n/a through 1.2.2.
|
[] | null | 7.1 | null | null | null |
|
CVE-2013-3602
|
SQL injection vulnerability in admindocumentworker.jsp in Coursemill Learning Management System (LMS) 6.6 allows remote authenticated users to execute arbitrary SQL commands via the docID parameter.
|
[
"cpe:2.3:a:trivantis:coursemill_learning_management_system:6.6:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-hm32-9qcf-v83q
|
Improper Authorization vulnerability in McAfee Data Loss Prevention (DLP) ePO extension prior to 11.5.3 allows authenticated remote attackers to change the configuration when logged in with view only privileges via carefully constructed HTTP post messages.
|
[] | null | 6.3 | null | null | null |
|
CVE-2017-13782
|
An issue was discovered in certain Apple products. macOS before 10.13.1 is affected. The issue involves the "Kernel" component. It allows attackers to bypass intended memory-read restrictions via a /dev/dtracehelper attack involving the dtrace_dif_variable and dtrace_getarg functions.
|
[
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
] | null | null | 5.5 | 4.3 | null |
|
GHSA-c8pq-jfx6-w9cv
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Ays Pro Quiz Maker allows SQL Injection. This issue affects Quiz Maker: from n/a through 6.6.8.7.
|
[] | null | 8.2 | null | null | null |
|
RHSA-2012:1088
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Miscellaneous memory safety hazards (rv:14.0/ rv:10.0.6) (MFSA 2012-42) Mozilla: Incorrect URL displayed in addressbar through drag and drop (MFSA 2012-43) Mozilla: Gecko memory corruption (MFSA 2012-44) Mozilla: Gecko memory corruption (MFSA 2012-44) Mozilla: Gecko memory corruption (MFSA 2012-44) Mozilla: Gecko memory corruption (MFSA 2012-44) Mozilla: Spoofing issue with location (MFSA 2012-45) Mozilla: Improper filtering of javascript in HTML feed-view (MFSA 2012-47) Mozilla: use-after-free in nsGlobalWindow::PageHidden (MFSA 2012-48) Mozilla: Same-compartment Security Wrappers can be bypassed (MFSA 2012-49) Mozilla: X-Frame-Options header ignored when duplicated (MFSA 2012-51) Mozilla: JSDependentString:: undepend string conversion results in memory corruption (MFSA 2012-52) Mozilla: Content Security Policy 1.0 implementation errors cause data leakage (MFSA 2012-53) Mozilla: Clickjacking of certificate warning page (MFSA 2012-54) Mozilla: feed: URLs with an innerURI inherit security context of page (MFSA 2012-55) Mozilla: XSS and code execution through data: URLs (MFSA 2012-46) Mozilla: Code execution through javascript: URLs (MFSA 2012-56)
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null | null |
CVE-2023-1750
|
CVE-2023-1750
|
The listed versions of Nexx Smart Home devices lack proper access control when executing actions. An attacker with a valid NexxHome deviceId could retrieve device history, set device settings, and retrieve device information.
|
[
"cpe:2.3:o:getnexx:nxal-100_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:getnexx:nxal-100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:getnexx:nxg-100b_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:getnexx:nxg-100b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:getnexx:nxpg-100w_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:getnexx:nxpg-100w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:getnexx:nxg-200_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:getnexx:nxg-200:-:*:*:*:*:*:*:*"
] | null | 7.1 | null | null | null |
GHSA-wjv8-g39f-34gp
|
A Denial Of Service vulnerability exists when Connected User Experiences and Telemetry Service fails to validate certain function values.An attacker who successfully exploited this vulnerability could deny dependent security feature functionality.To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application.The security update addresses the vulnerability by correcting how the Connected User Experiences and Telemetry Service validates certain function values., aka 'Connected User Experiences and Telemetry Service Denial of Service Vulnerability'. This CVE ID is unique from CVE-2020-1123.
|
[] | null | null | null | null | null |
|
GHSA-9rhw-cvp7-ccfc
|
IBM Security ReaQta 3.12 allows a privileged user to upload or transfer files of dangerous types that can be automatically processed within the product's environment.
|
[] | null | 4.7 | null | null | null |
|
GHSA-q7q6-cpgr-8rcw
|
Delta Electronics DIALink versions 1.2.4.0 and prior is vulnerable to cross-site scripting because an authenticated attacker can inject arbitrary JavaScript code into the parameter name of the API devices, which may allow an attacker to remotely execute code.
|
[] | null | null | null | null | null |
|
GHSA-45rg-4qh3-jxp9
|
The Photospace Responsive plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘psres_button_size’ parameter in versions up to, and including, 2.1.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
|
[] | null | 4.4 | null | null | null |
|
CVE-2006-5421
|
WSN Forum 1.3.4 and earlier allows remote attackers to execute arbitrary PHP code via a modified pathname in the pathtoconfig parameter that points to an avatar image that contains PHP code, which is then accessed from prestart.php. NOTE: this issue has been labeled remote file inclusion, but that label only applies to the attack, not the underlying vulnerability.
|
[
"cpe:2.3:a:wsn_forum:wsn_forum:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-q4wq-xr94-wjhg
|
Unspecified vulnerability in Justsystem Ichitaro 2006, 2006 trial version, and Government 2006 allows remote attackers to execute arbitrary code via a modified document, possibly because of a buffer overflow, a different vulnerability than CVE-2006-4326.
|
[] | null | null | null | null | null |
|
RHSA-2022:7021
|
Red Hat Security Advisory: thunderbird security update
|
expat: a use-after-free in the doContent function in xmlparse.c
|
[
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 8.1 | null | null | null |
GHSA-mx7j-chvh-fpcf
|
The price oracle in PriceOracle.sol in Compound Finance Compound Price Oracle 1.0 through 2.0 allows a price poster to set an invalid asset price via the setPrice function, and consequently violate the intended limits on price swings.
|
[] | null | null | null | null | null |
|
CVE-2023-37337
|
Kofax Power PDF JP2 File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability
|
Kofax Power PDF JP2 File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Kofax Power PDF. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of JP2 files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-20393.
|
[
"cpe:2.3:a:kofax:power_pdf:5.0.0.19:*:*:*:*:*:*:*"
] | null | null | 7.8 | null | null |
CVE-2018-5717
|
Memory write mechanism in NCR S2 Dispenser controller before firmware version 0x0108 allows an unauthenticated user to upgrade or downgrade the firmware of the device, including to older versions with known vulnerabilities.
|
[
"cpe:2.3:o:ncr:s2_dispenser_controller_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ncr:s2_dispenser_controller:-:*:*:*:*:*:*:*"
] | null | null | 7.5 | 7.8 | null |
|
GHSA-6436-xf58-6mvp
|
An information disclosure vulnerability exists when Microsoft Edge improperly handles objects in memory, aka "Microsoft Edge Information Disclosure Vulnerability." This affects Microsoft Edge. This CVE ID is unique from CVE-2018-8289, CVE-2018-8297, CVE-2018-8324.
|
[] | null | null | 4.3 | null | null |
|
ICSA-17-180-01A
|
ICSA-17-180-01A_Siemens SIMATIC Industrial PCs, SINUMERIK Panel Control Unit, and SIMOTION P320 (Update A)
|
Unprivileged local or remote attackers can gain system privileges to provisioned Intel manageability SKUs: Intel Active Management Technology (AMT), Intel Standard Manageability (ISM) and Intel Small Business Technology (SBT).CVE-2017-5689 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
|
[] | null | null | 9.8 | null | null |
CVE-2025-2813
|
HTTP Service DoS Vulnerability
|
An unauthenticated remote attacker can cause a Denial of Service by sending a large number of requests to the http service on port 80.
|
[] | null | 7.5 | null | null | null |
cisco-sa-voip-phone-flood-dos-YnU9EXOv
|
Cisco IP Phone TCP Packet Flood Denial of Service Vulnerability
|
A vulnerability in the TCP packet processing functionality of Cisco IP Phones could allow an unauthenticated, remote attacker to cause the phone to stop responding to incoming calls, drop connected calls, or unexpectedly reload.
The vulnerability is due to insufficient TCP ingress packet rate limiting. An attacker could exploit this vulnerability by sending a high and sustained rate of crafted TCP traffic to the targeted device. A successful exploit could allow the attacker to impact operations of the phone or cause the phone to reload, leading to a denial of service (DoS) condition.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
|
[] | null | 7.5 | null | null | null |
GHSA-gx58-6vgh-h446
|
SQL injection vulnerability in Site Sift Listings allows remote attackers to execute arbitrary SQL commands via the id parameter in a detail action to index.php. NOTE: this issue might be site-specific.
|
[] | null | null | null | null | null |
|
GHSA-77jp-2rxw-vqvq
|
Cross-site scripting (XSS) vulnerability in the Download Monitor plugin before 3.3.5.9 for WordPress allows remote attackers to inject arbitrary web script or HTML via the dlsearch parameter to the default URI.
|
[] | null | null | null | null | null |
|
CVE-2017-5795
|
A Local Arbitrary File Download vulnerability in HPE Intelligent Management Center (IMC) version PLAT 7.2 E0403P06 was found.
|
[
"cpe:2.3:a:hp:intelligent_management_center:7.2:e0403p06:*:*:*:*:*:*"
] | null | null | 6.5 | 7.1 | null |
|
CVE-2015-5494
|
Cross-site scripting (XSS) vulnerability in the Webform Matrix Component module 7.x-4.x before 7.x-4.13 for Drupal allows remote authenticated users with certain permissions to inject arbitrary web script or HTML via unspecified vectors.
|
[
"cpe:2.3:a:webform_matrix_component_project:webform_matrix_component:*:*:*:*:*:drupal:*:*"
] | null | null | null | 3.5 | null |
|
RHSA-2022:0482
|
Red Hat Security Advisory: Red Hat Ansible Ansible Tower 3.8 security update
|
ansible-tower: Privilege escalation via job isolation escape
|
[
"cpe:/a:redhat:ansible_automation_platform:3.8::el7",
"cpe:/a:redhat:ansible_automation_platform:3.8::el8"
] | null | 8.8 | null | null | null |
CVE-2024-43960
|
WordPress Web and WooCommerce Addons for WPBakery Builder plugin <= 1.4.6 - Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Page Builder Addons Web and WooCommerce Addons for WPBakery Builder allows Stored XSS.This issue affects Web and WooCommerce Addons for WPBakery Builder: from n/a through 1.4.6.
|
[
"cpe:2.3:a:pagebuilderaddons:web_and_woocommerce_addons_for_wpbakery_builder:*:*:*:*:*:wordpress:*:*"
] | null | 5.9 | null | null | null |
GHSA-cxh5-gxxc-xcc4
|
The Theme and plugin translation for Polylang is vulnerable to authorization bypass in versions up to, and including, 3.2.16 due to missing capability checks in the process_polylang_theme_translation_wp_loaded() function. This makes it possible for unauthenticated attackers to update plugin and theme translation settings and to import translation strings.
|
[] | null | 5.3 | null | null | null |
|
GHSA-3fxq-98r3-r3g2
|
A DNS rebinding vulnerability in Freebox HD before 1.5.29.
|
[] | null | 9.6 | null | null | null |
|
CVE-2023-31200
|
PTC Vuforia Studio Cross-Site Request Forgery
|
PTC Vuforia Studio does not require a token; this could allow an
attacker with local access to perform a cross-site request forgery
attack or a replay attack.
|
[
"cpe:2.3:a:ptc:vuforia_studio:*:*:*:*:*:*:*:*"
] | null | 5.7 | null | null | null |
GHSA-9hpr-5xf7-5cmq
|
IBM Emptoris Strategic Supply Management Platform 10.0 and 10.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 116755.
|
[] | null | null | 5.4 | null | null |
|
CVE-2008-5861
|
Directory traversal vulnerability in source.php in FreeLyrics 1.0 allows remote attackers to read arbitrary files via directory traversal sequences in the p parameter. NOTE: some of these details are obtained from third party information.
|
[
"cpe:2.3:a:freelyrics:freelyrics:1.0:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-v529-q2r7-535c
|
Unspecified vulnerability in the Oracle Internet Directory component for Oracle Database 9.2.0.8 and 9.2.0.8DV; Application Server 9.0.4.3, 10.1.2.0.2, and 10.1.2.2; and Collaboration Suite 10.1.2 has unknown impact and remote attack vectors, aka OID01.
|
[] | null | null | null | null | null |
|
CVE-2023-26553
|
mstolfp in libntp/mstolfp.c in NTP 4.2.8p15 has an out-of-bounds write when copying the trailing number. An adversary may be able to attack a client ntpq process, but cannot attack ntpd.
|
[
"cpe:2.3:a:ntp:ntp:4.2.8:p15:*:*:*:*:*:*"
] | null | 5.6 | null | null | null |
|
CVE-2024-38910
|
Open Robotics Robotic Operating System 2 (ROS2) and Nav2 humble version was discovered to contain a use-after-free in the nav2_amcl process. This vulnerability is triggered via sending a request to change dynamic parameters.
|
[
"cpe:2.3:o:open_robotics:ros2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:open_robotics:nav2_humble:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
|
GHSA-xc66-h8vr-gh7j
|
The distribution of Zen Cart 1.1.4 before patch 2 includes certain debugging code in the Admin password retrieval functionality, which allows attackers to gain administrative privileges via password_forgotten.php.
|
[] | null | null | null | null | null |
|
GHSA-4ch8-9r52-j78v
|
A vulnerability in an API of Cisco ISE could allow an authenticated, remote attacker to execute arbitrary commands as the root user on an affected device.This vulnerability is due to insecure deserialization of user-supplied Java byte streams by the affected software. An attacker could exploit this vulnerability by sending a crafted serialized Java object to an affected API. A successful exploit could allow the attacker to execute arbitrary commands on the device and elevate privileges.
Note: To successfully exploit this vulnerability, the attacker must have valid read-only administrative credentials. In a single-node deployment, new devices will not be able to authenticate during the reload time.
|
[] | null | 9.9 | null | null | null |
|
GHSA-h7h7-f9wh-xhj8
|
VMware Tools contains a SAML token signature bypass vulnerability. A malicious actor with man-in-the-middle (MITM) network positioning between vCenter server and the virtual machine may be able to bypass SAML token signature verification, to perform VMware Tools Guest Operations.
|
[] | null | 7.5 | null | null | null |
|
CVE-2011-0752
|
The extract function in PHP before 5.2.15 does not prevent use of the EXTR_OVERWRITE parameter to overwrite (1) the GLOBALS superglobal array and (2) the this variable, which allows context-dependent attackers to bypass intended access restrictions by modifying data structures that were not intended to depend on external input, a related issue to CVE-2005-2691 and CVE-2006-3758.
|
[
"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:2.0b10:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:3.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:3.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:3.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:3.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:3.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:3.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:3.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:3.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:3.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:3.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:3.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:3.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:3.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:3.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0:beta_4_patch1:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.8:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.9:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.10:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.11:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.4.9:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.11:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.12:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.13:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-3r2h-q88m-pxmp
|
Out of bound read in adm call back function due to incorrect boundary check for payload in command response in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in APQ8053, APQ8098, MDM9206, MDM9207C, MDM9607, MDM9640, MDM9650, MSM8905, MSM8909W, MSM8917, MSM8953, QCS605, SDA660, SDA845, SDM429, SDM429W, SDM439, SDM670, SDM710, SDM845, SDX20, SDX24
|
[] | null | null | null | null | null |
|
CVE-2017-16860
|
The invalidRedirectUrl template in Atlassian Application Links before version 5.2.7, from version 5.3.0 before version 5.3.4 and from version 5.4.0 before version 5.4.3 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the redirectUrl parameter link in the redirect warning message.
|
[
"cpe:2.3:a:atlassian:application_links:*:*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 | null |
|
CVE-2013-3471
|
The captive portal application in Cisco Identity Services Engine (ISE) allows remote attackers to discover cleartext usernames and passwords by leveraging unspecified use of hidden form fields in an HTML document, aka Bug ID CSCug02515.
|
[
"cpe:2.3:a:cisco:identity_services_engine_software:-:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
CVE-2008-7048
|
Multiple cross-site scripting (XSS) vulnerabilities in NatterChat 1.12 allow remote attackers to inject arbitrary web script or HTML via the (1) txtUsername parameter to registerDo.asp, as invoked from register.asp, or (2) txtRoomName parameter to room_new.asp. NOTE: these issues might be resultant from XSS in SQL error messages.
|
[
"cpe:2.3:a:natterchat:natterchat:1.12:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
CVE-2025-32072
|
HTML injection in feed output from i18n message
|
Improper Encoding or Escaping of Output vulnerability in The Wikimedia Foundation Mediawiki Core - Feed Utils allows WebView Injection.This issue affects Mediawiki Core - Feed Utils: from 1.39 through 1.43.
|
[] | 6.9 | null | null | null | null |
GHSA-78mf-rxgw-mx64
|
Multiple cross-site scripting (XSS) vulnerabilities in thumbnails.asp in Uapplication Uphotogallery 1.1 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) s and (2) block parameters.
|
[] | null | null | null | null | null |
|
CVE-2024-35775
|
WordPress Slider by Soliloquy plugin <= 2.7.6 - Broken Access Control to XSS vulnerability
|
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting'), Improper Authentication vulnerability in Soliloquy Team Slider by Soliloquy allows Cross-Site Scripting (XSS).This issue affects Slider by Soliloquy: from n/a through 2.7.6.
|
[] | null | 5.9 | null | null | null |
CVE-2021-21843
|
Multiple exploitable integer overflow vulnerabilities exist within the MPEG-4 decoding functionality of the GPAC Project on Advanced Content library v1.0.1. A specially crafted MPEG-4 input can cause an integer overflow due to unchecked arithmetic resulting in a heap-based buffer overflow that causes memory corruption. After validating the number of ranges, at [41] the library will multiply the count by the size of the GF_SubsegmentRangeInfo structure. On a 32-bit platform, this multiplication can result in an integer overflow causing the space of the array being allocated to be less than expected. An attacker can convince a user to open a video to trigger this vulnerability.
|
[
"cpe:2.3:a:gpac:gpac:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*"
] | null | null | 8.8 | null | null |
|
CVE-2024-52585
|
Autolab has HTML Injection Vulnerability
|
Autolab is a course management service that enables auto-graded programming assignments. There is an HTML injection vulnerability in version 3.0.1 that can affect instructors and CAs on the grade submissions page. The issue is patched in version 3.0.2. One may apply the patch manually by editing line 589 on `gradesheet.js.erb` to take in feedback as text rather than html.
|
[] | 1.2 | null | null | null | null |
GHSA-3632-grrp-f8wr
|
Fossil 2.18 on Windows allows attackers to cause a denial of service (daemon crash) via an XSS payload in a ticket. This occurs because the ticket data is stored in a temporary file, and the product does not properly handle the absence of this file after Windows Defender has flagged it as malware.
|
[] | null | 5.5 | null | null | null |
|
ICSA-22-249-04
|
Hitachi Energy TXpert Hub CoreTec 4
|
A vulnerability in the application authentication and authorization mechanism in the affected product depends on a token validation of the session identifier. The vulnerability allows an unauthorized modified message to be executed in the server, enabling an attacker to change an existing user 's password, and gain authorized access into the system.CVE-2021-35530 has been assigned to this vulnerability. A CVSS v3 base score of 6.0 has been assigned; the CVSS vector string is (AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:L). An Improper Input Validation vulnerability in a particular configuration setting field of the affected product allows an attacker, who has access to an authorized user with ADMIN or ENGINEER role rights, to inject an operating system (OS) command; this command will then be executed by the system.CVE-2021-35531 has been assigned to this vulnerability. A CVSS v3 base score of 6.0 has been assigned; the CVSS vector string is (AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:L). A vulnerability exists in the file upload validation component of the affected product. The vulnerability allows an attacker to gain access to the system and obtain an account with sufficient privilege to then upload a malicious firmware to the product.CVE-2021-35532 has been assigned to this vulnerability. A CVSS v3 base score of 6.0 has been assigned; the CVSS vector string is (AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:L).
|
[] | null | null | 6 | null | null |
GHSA-4377-g9q2-3wh5
|
Silverpeas 6.4.2 contains a stored cross-site scripting (XSS) vulnerability in the event management module. An authenticated user can upload a malicious SVG file as an event attachment, which, when viewed by an administrator, executes embedded JavaScript in the admin's session. This allows attackers to escalate privileges by creating a new administrator account. The vulnerability arises from insufficient sanitization of SVG files and weak CSRF protections.
|
[] | null | 5.4 | null | null | null |
|
CVE-2009-3563
|
ntp_request.c in ntpd in NTP before 4.2.4p8, and 4.2.5, allows remote attackers to cause a denial of service (CPU and bandwidth consumption) by using MODE_PRIVATE to send a spoofed (1) request or (2) response packet that triggers a continuous exchange of MODE_PRIVATE error responses between two NTP daemons.
|
[
"cpe:2.3:a:ntp:ntp:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.0.72:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.0.73:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.0.90:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.0.91:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.0.92:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.0.93:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.0.94:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.0.95:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.0.96:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.0.97:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.0.98:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.0.99:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.2.2p1:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.2.2p2:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.2.2p3:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.2.5:*:*:*:*:*:*:*"
] | null | null | null | 6.4 | null |
|
GHSA-v4qm-pgvq-h44p
|
Unknown vulnerability in hztty 2.0 and earlier allows local users to execute arbitrary commands.
|
[] | null | null | null | null | null |
|
CVE-2017-11571
|
FontForge 20161012 is vulnerable to a stack-based buffer overflow in addnibble (parsettf.c) resulting in DoS or code execution via a crafted otf file.
|
[
"cpe:2.3:a:fontforge:fontforge:20161012:*:*:*:*:*:*:*"
] | null | null | 7.8 | 6.8 | null |
|
GHSA-m56r-f6p2-qgw5
|
The pluto IKE daemon in libreswan before 3.15 and Openswan before 2.6.45, when built with NSS, allows remote attackers to cause a denial of service (assertion failure and daemon restart) via a zero DH g^x value in a KE payload in a IKE packet.
|
[] | null | null | null | null | null |
|
GHSA-cc8r-2q55-6c87
|
The (1) Service Provider (SP) and (2) Identity Provider (IdP) in PicketLink before 2.7.0 does not ensure that the Destination attribute in a Response element in a SAML assertion matches the location from which the message was received, which allows remote attackers to have unspecified impact via unknown vectors. NOTE: this identifier was SPLIT from CVE-2015-0277 per ADT2 due to different vulnerability types.
|
[] | null | null | null | null | null |
|
cisco-sa-20170927-nat
|
Cisco IOS Software Network Address Translation Denial of Service Vulnerability
|
A vulnerability in the implementation of Network Address Translation (NAT) functionality in Cisco IOS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.
The vulnerability is due to the improper translation of H.323 messages that use the Registration, Admission, and Status (RAS) protocol and are sent to an affected device via IPv4 packets. An attacker could exploit this vulnerability by sending a crafted H.323 RAS packet through an affected device. A successful exploit could allow the attacker to cause the affected device to crash and reload, resulting in a DoS condition.
Cisco has released software updates that address this vulnerability. There is a workaround that addresses this vulnerability.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-nat ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-nat"]
This advisory is part of the September 27, 2017, release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication, which includes 12 Cisco Security Advisories that describe 13 vulnerabilities. For a complete list of the advisories and links to them, see Cisco Event Response: September 2017 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication ["https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-63410"].
|
[] | null | null | 8.6 | null | null |
GHSA-pc2w-jhrj-hpff
|
Vulnerability in the Oracle Outside In Technology component of Oracle Fusion Middleware (subcomponent: Outside In Filters). Supported versions that are affected are 8.5.3 and 8.5.4. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Outside In Technology. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Outside In Technology as well as unauthorized update, insert or delete access to some of Oracle Outside In Technology accessible data. Note: Outside In Technology is a suite of software development kits (SDKs). The protocol and CVSS score depend on the software that uses the Outside In Technology code. The CVSS score assumes that the software passes data received over a network directly to Outside In Technology code, but if data is not received over a network the CVSS score may be lower. CVSS 3.0 Base Score 8.2 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H).
|
[] | null | null | null | null | null |
|
CVE-2012-4199
|
template/en/default/bug/field-events.js.tmpl in Bugzilla 3.x before 3.6.12, 3.7.x and 4.0.x before 4.0.9, 4.1.x and 4.2.x before 4.2.4, and 4.3.x and 4.4.x before 4.4rc1 generates JavaScript function calls containing private product names or private component names in certain circumstances involving custom-field visibility control, which allows remote attackers to obtain sensitive information by reading HTML source code.
|
[
"cpe:2.3:a:mozilla:bugzilla:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.2:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.2:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.4:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.4.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.4.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.4.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.4.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.4.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.6:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.6.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.6.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.6.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.6.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.2:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.2:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.3.3:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
CVE-2018-12190
|
Insufficient input validation in Intel(r) CSME subsystem before versions 11.8.60, 11.11.60, 11.22.60 or 12.0.20 or Intel(r) TXE before 3.1.60 or 4.0.10 may allow a privileged user to potentially enable an escalation of privilege via local access.
|
[
"cpe:2.3:o:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:trusted_execution_engine_firmware:*:*:*:*:*:*:*:*"
] | null | null | 6.7 | 4.6 | null |
|
GHSA-v2f3-f8x4-m3w8
|
Cross Site Scripting in LavaLite CMS
|
Cross Site Scripting (XSS) vulnerabiity exists in LavaLite CMS 5.8.0 via the Menu Blocks feature, which can be bypassed by using HTML event handlers, such as "ontoggle,".
|
[] | null | 4.8 | null | null | null |
CVE-2022-31971
|
ChatBot App with Suggestion v1.0 is vulnerable to SQL Injection via /simple_chat_bot/admin/?page=responses/view_response&id=.
|
[
"cpe:2.3:a:chatbot_app_with_suggestion_project:chatbot_app_with_suggestion:1.0:*:*:*:*:*:*:*"
] | null | 7.2 | null | 6.5 | null |
|
GHSA-3hwx-c6cp-q972
|
Publify vulnerable to cross site scripting
|
Unrestricted file upload allowed the attacker to manipulate the request and bypass the protection of HTML files using a text file. Stored XSS may be obtained.
|
[] | null | null | 9.1 | null | null |
GHSA-8679-mqj6-8992
|
SQL injection vulnerability exists in GetDIAE_usListParameters.
|
[] | null | 8.8 | null | null | null |
|
GHSA-25f6-v77j-jgcf
|
In LibTIFF 4.0.7, the TIFFReadDirEntryLong8Array function in libtiff/tif_dirread.c mishandles a malloc operation, which allows attackers to cause a denial of service (memory leak within the function _TIFFmalloc in tif_unix.c) via a crafted file.
|
[] | null | null | 6.5 | null | null |
|
CVE-2024-1250
|
Privilege Chaining in GitLab
|
An issue has been discovered in GitLab EE affecting all versions starting from 16.8 before 16.8.2. When a user is assigned a custom role with manage_group_access_tokens permission, they may be able to create group access tokens with Owner privileges, which may lead to privilege escalation.
|
[
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*",
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*"
] | null | 6.5 | null | null | null |
GHSA-48w9-cx3r-qxr5
|
Afian FileRun (before 2018.02.13) suffers from a remote SQL injection vulnerability, when logged in as superuser, via the search parameter in a /?module=users§ion=cpanel&page=list request.
|
[] | null | null | 7.2 | null | null |
|
CVE-2024-7208
|
CVE-2024-7208
|
A vulnerability in multi-tenant hosting allows an authenticated sender to spoof the identity of a shared, hosted domain, thus bypass security measures provided by DMARC (or SPF or DKIM) policies.
|
[] | null | 6.5 | null | null | null |
GHSA-xqx3-w575-cg29
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in WebbyTemplate Office Locator allows SQL Injection. This issue affects Office Locator: from n/a through 1.3.0.
|
[] | null | 9.3 | null | null | null |
|
CVE-1999-1350
|
ARCAD Systemhaus 0.078-5 installs critical programs and files with world-writeable permissions, which could allow local users to gain privileges by replacing a program with a Trojan horse.
|
[
"cpe:2.3:a:arcad_systemhaus:arcad:0.078_5:*:*:*:*:*:*:*"
] | null | null | null | 4.6 | null |
|
GHSA-f792-rc34-g659
|
A vulnerability has been found in DataGear up to 1.11.1 and classified as problematic. This vulnerability affects unknown code of the component Plugin Handler. The manipulation leads to cross site scripting. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. Upgrading to version 1.12.0 is able to address this issue. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-223564.
|
[] | null | 5.4 | null | null | null |
|
GHSA-qv8r-vgr9-cx64
|
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 9.5. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of TIF files. The issue results from the lack of proper validation of user-supplied data, which can result in a type confusion condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-8695.
|
[] | null | 7.8 | null | null | null |
|
CVE-2014-2381
|
Schneider Electric Wonderware Information Server (WIS) Portal 4.0 SP1 through 5.5 uses weak encryption, which allows local users to obtain sensitive information by reading a credential file.
|
[
"cpe:2.3:a:invensys:wonderware_information_server:4.0:sp1:*:*:*:*:*:*",
"cpe:2.3:a:invensys:wonderware_information_server:4.0:sp1:*:*:portal:*:*:*",
"cpe:2.3:a:invensys:wonderware_information_server:4.5:-:portal:*:*:*:*:*",
"cpe:2.3:a:invensys:wonderware_information_server:5.0:-:portal:*:*:*:*:*",
"cpe:2.3:a:invensys:wonderware_information_server:5.5:*:*:*:portal:*:*:*"
] | null | null | null | 2.1 | null |
|
CVE-2023-42823
|
The issue was resolved by sanitizing logging This issue is fixed in watchOS 10.1, macOS Sonoma 14.1, tvOS 17.1, macOS Monterey 12.7.1, iOS 16.7.2 and iPadOS 16.7.2, iOS 17.1 and iPadOS 17.1, macOS Ventura 13.6.1. An app may be able to access user-sensitive data.
|
[
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:ipados:17.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:17.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:14.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] | null | 2.7 | null | null | null |
|
CVE-2021-47241
|
ethtool: strset: fix message length calculation
|
In the Linux kernel, the following vulnerability has been resolved:
ethtool: strset: fix message length calculation
Outer nest for ETHTOOL_A_STRSET_STRINGSETS is not accounted for.
This may result in ETHTOOL_MSG_STRSET_GET producing a warning like:
calculated message payload length (684) not sufficient
WARNING: CPU: 0 PID: 30967 at net/ethtool/netlink.c:369 ethnl_default_doit+0x87a/0xa20
and a splat.
As usually with such warnings three conditions must be met for the warning
to trigger:
- there must be no skb size rounding up (e.g. reply_size of 684);
- string set must be per-device (so that the header gets populated);
- the device name must be at least 12 characters long.
all in all with current user space it looks like reading priv flags
is the only place this could potentially happen. Or with syzbot :)
|
[
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
CVE-2025-46228
|
WordPress Event post <= 5.9.11 - Cross Site Scripting (XSS) Vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Bastien Ho Event post allows DOM-Based XSS. This issue affects Event post: from n/a through 5.9.11.
|
[] | null | 6.5 | null | null | null |
CVE-2025-45864
|
TOTOLINK A3002R v4.0.0-B20230531.1404 was discovered to contain a buffer overflow via the addrPoolStart parameter in the formDhcpv6s interface.
|
[] | null | 5.4 | null | null | null |
|
GHSA-wcvj-p4xr-mvwv
|
Path traversal vulnerability in Samsung Cloud prior to version 5.3.0.32 allows attacker to access specific png file.
|
[] | null | 3.3 | null | null | null |
|
CVE-2021-44496
|
An issue was discovered in FIS GT.M through V7.0-000 (related to the YottaDB code base). Using crafted input, an attacker can control the size variable and buffer that is passed to a call to memcpy. An attacker can use this to overwrite key data structures and gain control of the flow of execution.
|
[
"cpe:2.3:a:fisglobal:gt.m:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 | null |
|
GHSA-83mj-hg89-wff4
|
In ImageMagick 7.0.7-12 Q16, a memory leak vulnerability was found in the function ReadXPMImage in coders/xpm.c, which allows attackers to cause a denial of service via a crafted XPM image file.
|
[] | null | null | 6.5 | null | null |
|
GHSA-wpqh-m7ff-47xw
|
HP Support Solution Framework before 11.51.0049 allows remote attackers to download an arbitrary program onto a client machine and execute this program via unspecified vectors.
|
[] | null | null | null | null | null |
|
RHSA-2020:3414
|
Red Hat Security Advisory: OpenShift Container Platform 4.5.5 security update
|
golang.org/x/crypto: Processing of crafted ssh-ed25519 public keys allows for panic
|
[
"cpe:/a:redhat:openshift:4.5::el7"
] | null | 5.3 | null | null | null |
GHSA-m6v6-xwrv-hp92
|
In S+ Operations and S+ Historian, the passwords of internal users (not Windows Users) are encrypted but improperly stored in a database.
|
[] | null | null | null | null | null |
|
GHSA-gf94-rr7h-656m
|
Huawei S9300, S9303, S9306, S9312 with software V100R002; S7700, S7703, S7706, S7712 with software V100R003, V100R006, V200R001, V200R002, V200R003, V200R005; S9300E, S9303E, S9306E, S9312E with software V200R001; S9700, S9703, S9706, S9712 with software V200R002, V200R003, V200R005; S12708, S12712 with software V200R005; 5700HI, 5300HI with software V100R006, V200R001, V200R002, V200R003, V200R005; 5710EI, 5310EI with software V200R002, V200R003, V200R005; 5710HI, 5310HI with software V200R003, V200R005; 6700EI, 6300EI with software V200R005 could cause a leak of IP addresses of devices, related to unintended interface support for VRP MPLS LSP Ping.
|
[] | null | null | 5.3 | null | null |
|
GHSA-gxc5-6328-23q6
|
USVN (aka User-friendly SVN) before 1.0.10 allows attackers to execute arbitrary code in the commit view.
|
[] | null | null | null | null | null |
|
CVE-2019-18200
|
An issue was discovered on Fujitsu Wireless Keyboard Set LX390 GK381 devices. Because of the lack of proper encryption of 2.4 GHz communication, they are prone to keystroke injection attacks.
|
[
"cpe:2.3:o:fujitsu:lx390_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:fujitsu:lx390:gk381:*:*:*:*:*:*:*"
] | null | 9.8 | null | 10 | null |
|
GHSA-prch-x8g4-6r55
|
SQL injection vulnerability in the search feature in e107 0.7.16 and earlier allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
|
[] | null | null | null | null | null |
|
CVE-2023-31307
|
Improper validation of array index in Power Management Firmware (PMFW) may allow a privileged attacker to cause an out-of-bounds memory read within PMFW, potentially leading to a denial of service.
|
[
"cpe:2.3:a:amd:radeon_software:*:*:*:*:adrenalin:*:*:*",
"cpe:2.3:h:amd:radeon_rx_6300m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_rx_6400:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_rx_6450m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_rx_6500_xt:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_rx_6500m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_rx_6550m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_rx_6550s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_rx_6600:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_rx_6600_xt:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_rx_6600m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_rx_6600s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_rx_6650_xt:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_rx_6650m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_rx_6650m_xt:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_rx_6700:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_rx_6700_xt:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_rx_6700m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_rx_6700s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_rx_6750_gre:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_rx_6750_xt:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_rx_6800:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_rx_6800_xt:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_rx_6800m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_rx_6800s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_rx_6850m_xt:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_rx_6900_xt:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_rx_6950_xt:-:*:*:*:*:*:*:*",
"cpe:2.3:a:amd:radeon_software:*:*:*:*:pro:*:*:*",
"cpe:2.3:h:amd:radeon_pro_w6300:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_pro_w6400:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_pro_w6600:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_pro_w6800:-:*:*:*:*:*:*:*"
] | null | 2.3 | null | null | null |
|
CVE-2003-0717
|
The Messenger Service for Windows NT through Server 2003 does not properly verify the length of the message, which allows remote attackers to execute arbitrary code via a buffer overflow attack.
|
[
"cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2000:*:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2000:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2000:*:sp3:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:enterprise:*:64-bit:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:enterprise_64-bit:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:r2:*:64-bit:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:r2:*:datacenter_64-bit:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:standard:*:64-bit:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:web:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_me:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:*:enterprise_server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:*:server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:*:terminal_server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:*:workstation:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp1:enterprise_server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp1:server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp1:terminal_server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp1:workstation:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp2:enterprise_server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp2:server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp2:terminal_server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp2:workstation:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp3:enterprise_server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp3:server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp3:terminal_server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp3:workstation:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp4:enterprise_server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp4:server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp4:terminal_server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp4:workstation:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp5:enterprise_server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp5:server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp5:terminal_server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp5:workstation:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp6:enterprise_server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp6:server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp6:terminal_server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp6:workstation:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:enterprise_server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:workstation:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:*:64-bit:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:*:home:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:gold:professional:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp1:64-bit:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp1:home:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2012-3173
|
Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.63 and earlier, and 5.5.25 and earlier, allows remote authenticated users to affect availability via unknown vectors related to InnoDB Plugin.
|
[
"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"
] | null | null | null | 4 | null |
|
CVE-2020-22019
|
Buffer Overflow vulnerability in FFmpeg 4.2 at convolution_y_10bit in libavfilter/vf_vmafmotion.c, which could let a remote malicious user cause a Denial of Service.
|
[
"cpe:2.3:a:ffmpeg:ffmpeg:4.2:-:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4.3 | null |
|
GHSA-ghv2-cp6r-w334
|
When protecting CSS blocks with the nonce feature of Content Security Policy, the @import statement in the CSS block could allow an attacker to inject arbitrary styles, bypassing the intent of the Content Security Policy. This vulnerability affects Firefox < 74.
|
[] | null | null | null | null | null |
|
CVE-2016-6125
|
IBM Kenexa LMS on Cloud 13.1 and 13.2 - 13.2.4 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.
|
[
"cpe:2.3:a:ibm:kenexa_lms_on_cloud:13.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:kenexa_lms_on_cloud:13.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:kenexa_lms_on_cloud:13.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:kenexa_lms_on_cloud:13.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:kenexa_lms_on_cloud:13.2.4:*:*:*:*:*:*:*"
] | null | null | 5.4 | 3.5 | null |
|
GHSA-g32g-63v9-68pf
|
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in wpdevart Gallery – Image and Video Gallery with Thumbnails plugin <= 2.0.1 versions.
|
[] | null | 6.1 | null | null | null |
|
CVE-2021-38094
|
Integer Overflow vulnerability in function filter_sobel in libavfilter/vf_convolution.c in Ffmpeg 4.2.1, allows attackers to cause a Denial of Service or other unspecified impacts.
|
[
"cpe:2.3:a:ffmpeg:ffmpeg:4.2.1:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.8 | null |
|
GHSA-684c-fmh3-cpgp
|
There is a SQL injection vulnerability in the Jizhicms 2.4.9 backend, which users can use to obtain database information
|
[] | null | 6.5 | null | null | null |
|
RHSA-2023:7616
|
Red Hat Security Advisory: postgresql security update
|
postgresql: Memory disclosure in aggregate function calls postgresql: Buffer overrun from integer overflow in array modification postgresql: Role pg_signal_backend can signal certain superuser processes. postgresql: extension script @substitutions@ within quoting allow SQL injection
|
[
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/a:redhat:rhel_eus:9.2::crb"
] | null | 7.5 | null | null | null |
CVE-2025-30710
|
Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: NDBCluster Plugin). Supported versions that are affected are 8.0.0-8.0.41, 8.4.0-8.4.4 and 9.0.0-9.2.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Cluster. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Cluster. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
|
[] | null | 4.9 | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.