id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 36
232
⌀ |
---|---|---|---|---|---|---|---|---|
GHSA-7359-3c6r-hfc2
|
Improper Certificate Validation in oauth ruby gem
|
lib/oauth/consumer.rb in the oauth-ruby gem through 0.5.4 for Ruby does not verify server X.509 certificates if a certificate bundle cannot be found, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information.
|
[] | null | 7.4 | null | null | null |
GHSA-m28c-vf5g-3rv9
|
Multiple cross-site scripting (XSS) vulnerabilities in Web Wiz Forum 9.5 allow remote attackers to inject arbitrary web script or HTML via the mode parameter to (1) admin_group_details.asp and (2) admin_category_details.asp.
|
[] | null | null | null | null | null |
|
CVE-2005-4486
|
SQL injection vulnerability in Quantum Art QP7.Enterprise (formerly Q-Publishing) allows remote attackers to execute arbitrary SQL commands via the p_news_id parameter to (1) news_and_events_new.asp and (2) news.asp. NOTE: on 20060227, the vendor disputed the accuracy of this report, saying that the p_news_id, news_and_events_new.asp, and news.asp are not specifically part of their product, although they could be dynamically generated through use of the product. Some investigation by CVE suggests evidence that the news_and_events_new.asp page has at least a forced invalid SQL syntax error, but this could not be repeated for news.asp
|
[
"cpe:2.3:a:quantum_art:qp7_enterprise:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-gv9g-ccx2-9xj9
|
In the Linux kernel, the following vulnerability has been resolved:scsi: lpfc: Protect memory leak for NPIV ports sending PLOGI_RJTThere is a potential memory leak in lpfc_ignore_els_cmpl() and
lpfc_els_rsp_reject() that was allocated from NPIV PLOGI_RJT
(lpfc_rcv_plogi()'s login_mbox).Check if cmdiocb->context_un.mbox was allocated in lpfc_ignore_els_cmpl(),
and then free it back to phba->mbox_mem_pool along with mbox->ctx_buf for
service parameters.For lpfc_els_rsp_reject() failure, free both the ctx_buf for service
parameters and the login_mbox.
|
[] | null | 5.5 | null | null | null |
|
GHSA-9vwq-rwcj-cmcg
|
A Cross-Site Request Forgery (CSRF) vulnerability exists in the latest commit (56b782bcefd2e59b19cd7ba7878b95f54884f502) of the vanna-ai/vanna repository. Two endpoints in the built-in web app that provide SQL functionality are implemented as simple GET requests, making them susceptible to CSRF attacks. This vulnerability allows an attacker to run arbitrary SQL commands via CSRF without the target intending to expose the web app to the network or other users. The impact is limited to data alteration or deletion, as the attacker cannot read the results of the query.
|
[] | null | null | 6.5 | null | null |
|
GHSA-8xg2-4v9w-4g38
|
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in George Pattihis Link Juice Keeper plugin <= 2.0.2 versions.
|
[] | null | 5.9 | null | null | null |
|
GHSA-g3fr-vrmh-8q64
|
HTTPD in IBM Netezza Performance Portal 1.0.2 allows remote authenticated users to list application directories containing asset files via a direct request to a directory URI, as demonstrated by listing image files.
|
[] | null | null | null | null | null |
|
CVE-2014-3559
|
The oVirt storage backend in Red Hat Enterprise Virtualization 3.4 does not wipe memory snapshots when deleting a VM, even when wipe-after-delete (WAD) is configured for the VM's disk, which allows remote authenticated users with certain credentials to read portions of the deleted VM's memory and obtain sensitive information via an uninitialized storage volume.
|
[
"cpe:2.3:a:redhat:enterprise_virtualization:3.4:*:*:*:*:*:*:*"
] | null | null | null | 3.5 | null |
|
GHSA-4gh5-3g83-4888
|
An issue in GPAC GPAC v.2.2.1 and before allows a local attacker to cause a denial of service via the Q_DecCoordOnUnitSphere function of file src/bifs/unquantize.c.
|
[] | null | 5.5 | null | null | null |
|
CVE-2019-14443
|
An issue was discovered in Libav 12.3. Division by zero in range_decode_culshift in libavcodec/apedec.c allows remote attackers to cause a denial of service (application crash), as demonstrated by avconv.
|
[
"cpe:2.3:a:libav:libav:12.3:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4.3 | null |
|
CVE-2024-3079
|
ASUS Router - Stack-based Buffer Overflow
|
Certain models of ASUS routers have buffer overflow vulnerabilities, allowing remote attackers with administrative privileges to execute arbitrary commands on the device.
|
[
"cpe:2.3:o:asus:rt-ax58u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:rt-ax88u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:rt-ax57_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:rt-ac86u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:rt-ac68u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:zenwifi_xt8_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:zenwifi_xt8_v2_firmware:-:*:*:*:*:*:*:*"
] | null | 7.2 | null | null | null |
GHSA-gvjj-rw87-3637
|
The privoxy configuration file in Tor before 0.1.1.20, when run on Apple OS X, logs all data via the "logfile", which allows attackers to obtain potentially sensitive information.
|
[] | null | null | null | null | null |
|
GHSA-j9pc-9px3-mp86
|
Proxy command injection vulnerability in Trend Micro InterScan Messaging Virtual Appliance 9.0 and 9.1 allows remote attackers to execute arbitrary code on vulnerable installations. The specific flaw can be exploited by parsing the "t" parameter within modTMCSS Proxy. Formerly ZDI-CAN-4744.
|
[] | null | null | 8.8 | null | null |
|
GHSA-q3qh-grhq-w6j8
|
Vulnerability in the BI Publisher component of Oracle Fusion Middleware (subcomponent: BI Publisher Security). Supported versions that are affected are 11.1.1.7.0, 11.1.1.9.0, 12.2.1.1.0 and 12.2.1.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise BI Publisher. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in BI Publisher, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all BI Publisher accessible data as well as unauthorized update, insert or delete access to some of BI Publisher accessible data. CVSS 3.0 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N).
|
[] | null | null | 8.2 | null | null |
|
CVE-2025-27651
|
Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.862 Application 20.0.2014 allows Server-Side Request Forgery: Elatec V-2023-014.
|
[] | null | 9.8 | null | null | null |
|
GHSA-6c6r-39cv-x5fq
|
Chakra JIT server Privilege Escalation
|
A vulnerability exists in Microsoft Chakra JIT server, aka 'Scripting Engine Elevation of Privileges Vulnerability'.
|
[] | null | null | 8.1 | null | null |
GHSA-x932-88vq-xg5c
|
nslcd/pam.c in the nss-pam-ldapd 0.8.0 PAM module returns a success code when a user is not found in LDAP, which allows remote attackers to bypass authentication.
|
[] | null | null | null | null | null |
|
GHSA-64r9-wcqr-wq62
|
Multiple SQL injection vulnerabilities in index.php in Invision Gallery 1.0.1 allow remote attackers to execute arbitrary SQL via the (1) img, (2) cat, (3) sort_key, (4) order_key, (5) user, or (6) album parameters.
|
[] | null | null | null | null | null |
|
GHSA-87rv-5pg2-g76r
|
SQL injection vulnerability in interface/forms/eye_mag/php/Anything_simple.php from library/forms.inc in versions of OpenEMR before 5.0.1.4 allows a remote authenticated attacker to execute arbitrary SQL commands via the 'encounter' parameter.
|
[] | null | null | 8.8 | null | null |
|
CVE-2017-3084
|
Adobe Flash Player versions 25.0.0.171 and earlier have an exploitable use after free vulnerability in the advertising metadata functionality. Successful exploitation could lead to arbitrary code execution.
|
[
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*"
] | null | null | 9.8 | 10 | null |
|
ICSA-22-263-03
|
Dataprobe iBoot-PDU
|
A specific function does not sanitize the input provided by the user, which may expose the affected an OS command injection vulnerability. CVE-2022-3183 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). The device�s existing firmware allows unauthenticated users to access an old PHP page vulnerable to directory traversal, which may allow a user to write a file to the webroot directory. CVE-2022-3184 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). The affected product exposes sensitive data concerning the device. CVE-2022-3185 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N). The affected product allows an attacker to access the device�s main management page from the cloud. This feature enables users to remotely connect devices, however, the current implementation permits users to access other device's information. CVE-2022-3186 has been assigned to this vulnerability. A CVSS v3 base score of 8.6 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N). Certain PHP pages only validate when a valid connection is established with the database. However, these PHP pages do not verify the validity of a user. Attackers could leverage this lack of verification to read the state of outlets. CVE-2022-3187 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N). Unauthenticated users could open PHP index pages without authentication and download the history file from the device; the history file includes the latest actions completed by specific users. CVE-2022-3188 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N). A specially crafted PHP script could use parameters from a HTTP request to create a URL capable of changing the host parameter. The changed host parameter in the HTTP could point to another host that will send a request to the host or IP specified in the changed host parameter. CVE-2022-3189 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N). The affected product is vulnerable to a stack-based buffer overflow, which could lead to a denial-of-service condition or remote code execution. CVE-2022-46658 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H). The affected product exposes multiple sensitive data fields of the affected product. An attacker can use the SNMP command to get a device MAC address and login as the administrator. CVE-2022-46738 has been assigned to this vulnerability. A CVSS v3 base score of 7.2 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:L). The iBoot device�s basic discovery protocol assists in initial device configuration. The discovery protocol shows basic information about devices on the network and allows users to perform configuration changes. CVE-2022-47320 has been assigned to this vulnerability. A CVSS v3 base score of 8.1 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N). A proprietary protocol for iBoot devices is used for control and keepalive commands. The function compares the username and password and also contains the configuration data for the user specified. If the user does not exist, then it sends a value for username and password, which allows successful authentication for a connection. CVE-2022-47311 has been assigned to this vulnerability. A CVSS v3 base score of 8.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N). The DataProbe cloud usernames and passwords are stored in plain text in a specific file. Any user able to read this specific file from the device could compromise other devices connected to the user's cloud. CVE-2022-4945 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been assigned; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N).
|
[] | null | null | 6.5 | null | null |
CVE-2017-9627
|
An Uncontrolled Resource Consumption issue was discovered in Schneider Electric Wonderware ArchestrA Logger, versions 2017.426.2307.1 and prior. The uncontrolled resource consumption vulnerability could allow an attacker to exhaust the memory resources of the machine, causing a denial of service.
|
[
"cpe:2.3:a:schneider-electric:wonderware_archestra_logger:2017.426.2307.1:*:*:*:*:*:*:*"
] | null | 8.6 | null | 5 | null |
|
GHSA-m439-jg5v-8cp2
|
Multiple cross-site scripting (XSS) vulnerabilities in phpMyChat 0.14.6 allow remote attackers to inject arbitrary web script or HTML via the medium parameter to (1) start_page.css.php and (2) style.css.php; or the From parameter to users_popupL.php.
|
[] | null | null | null | null | null |
|
GHSA-cp9r-g575-xc5f
|
Jenkins DingTalk Plugin Unconditionally Disables SSL/TLS Certificate and Hostname Validation
|
Jenkins DingTalk Plugin 2.7.3 and earlier unconditionally disables SSL/TLS certificate and hostname validation for connections to the configured DingTalk webhooks.
|
[] | null | 5.9 | null | null | null |
GHSA-m9vp-5pvm-gxw4
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in AB-WP Simple Counter allows Stored XSS.This issue affects Simple Counter: from n/a through 1.0.2.
|
[] | null | 5.9 | null | null | null |
|
CVE-2002-0616
|
The Macro Security Model in Microsoft Excel 2000 and 2002 for Windows allows remote attackers to execute code by attaching an inline macro to an object within an Excel workbook, aka the "Excel Inline Macros Vulnerability."
|
[
"cpe:2.3:a:microsoft:excel:2000:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:excel:2000:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:excel:2000:sr1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:excel:2002:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:excel:2002:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2000:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:xp:*:*:*:*:*:*:*"
] | null | null | null | 5.1 | null |
|
GHSA-xfc5-hp99-89qr
|
The team sync HTTP API in Grafana Enterprise 7.4.x before 7.4.5 has an Incorrect Access Control issue. On Grafana instances using an external authentication service, this vulnerability allows any authenticated user to add external groups to existing teams. This can be used to grant a user team permissions that the user isn't supposed to have.
|
[] | null | null | null | null | null |
|
GHSA-29q9-j4j7-vqf4
|
Portal do Software Publico Brasileiro i3geo v7.0.5 was discovered to contain a cross-site scripting (XSS) vulnerability via access_token.php.
|
[] | null | 6.1 | null | null | null |
|
RHSA-2015:0165
|
Red Hat Security Advisory: subversion security update
|
subversion: credentials leak via MD5 collision subversion: NULL pointer dereference flaw in mod_dav_svn when handling REPORT requests
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null | null |
GHSA-cfwp-2wp7-m86f
|
A vulnerability was found in Campcodes Payroll Management System 1.0 and classified as critical. This issue affects some unknown processing of the file /ajax.php?action=delete_employee_attendance_single. The manipulation of the argument ID leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
|
[] | 5.5 | 7.3 | null | null | null |
|
GHSA-3qh4-83p4-2w86
|
In FreeBSD 12.0-STABLE before r347474, 12.0-RELEASE before 12.0-RELEASE-p7, 11.2-STABLE before r347475, and 11.2-RELEASE before 11.2-RELEASE-p11, a bug in the FFS implementation causes up to three bytes of kernel stack memory to be written to disk as uninitialized directory entry padding.
|
[] | null | null | 6.5 | null | null |
|
GHSA-9j7r-mqx9-67mv
|
Sensitive data could be exposed in logs of subiquity version 23.09.1 and earlier. An attacker in the adm group could use this information to find hashed passwords and possibly escalate their privilege.
|
[] | null | 5.5 | null | null | null |
|
CVE-2018-13341
|
Crestron TSW-X60 all versions prior to 2.001.0037.001 and MC3 all versions prior to 1.502.0047.00, The passwords for special sudo accounts may be calculated using information accessible to those with regular user privileges. Attackers could decipher these passwords, which may allow them to execute hidden API calls and escape the CTP console sandbox environment with elevated privileges.
|
[
"cpe:2.3:o:crestron:tsw-x60_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:crestron:tsw-1060-b-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:crestron:tsw-1060-nc-b-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:crestron:tsw-1060-nc-w-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:crestron:tsw-1060-w-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:crestron:tsw-560-b-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:crestron:tsw-560-nc-b-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:crestron:tsw-560-nc-w-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:crestron:tsw-560-w-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:crestron:tsw-760-b-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:crestron:tsw-760-nc-b-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:crestron:tsw-760-nc-w-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:crestron:tsw-760-w-s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:crestron:mc3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:crestron:mc3:-:*:*:*:*:*:*:*"
] | null | null | 8.8 | 4 | null |
|
CVE-2025-0659
|
Path Traversal and Rockwell Automation Third-party Vulnerability in DataMosaix™ Private Cloud
|
A path
traversal vulnerability exists in the Rockwell Automation DataEdge Platform DataMosaix Private Cloud. By specifying the character
sequence in the body of the vulnerable endpoint, it is possible to overwrite
files outside of the intended directory. A threat actor with admin privileges could
leverage this vulnerability to overwrite reports including user projects.
|
[] | 7 | null | null | null | null |
GHSA-4f8g-fq6x-jqrr
|
org.xwiki.platform:xwiki-platform-oldcore vulnerable to data leak through deleted documents
|
ImpactRights added to a document are not taken into account for viewing it once it's deleted. Note that this vulnerability only impact deleted documents that where containing view rights: the view rights provided on a space of a deleted document are properly checked.PatchesThe problem has been patched in XWiki 14.10 by checking the rights of current user: only admin and deleter of the document are allowed to view it.WorkaroundsThere is no workaround for this vulnerability other than upgrading.ReferencesJira ticket: https://jira.xwiki.org/browse/XWIKI-16285Commit: https://github.com/xwiki/xwiki-platform/commit/d9e947559077e947315bf700c5703dfc7dd8a8d7For more informationIf you have any questions or comments about this advisory:Open an issue in [Jira](https://jira.xwiki.org)Email us at [security ML](mailto:[email protected])
|
[] | null | 7.5 | null | null | null |
CVE-2023-34253
|
Grav vulnerable to Server-side Template Injection (SSTI) via Denylist Bypass
|
Grav is a flat-file content management system. Prior to version 1.7.42, the denylist introduced in commit 9d6a2d to prevent dangerous functions from being executed via injection of malicious templates was insufficient and could be easily subverted in multiple ways -- (1) using unsafe functions that are not banned, (2) using capitalised callable names, and (3) using fully-qualified names for referencing callables. Consequently, a low privileged attacker with login access to Grav Admin panel and page creation/update permissions is able to inject malicious templates to obtain remote code execution. A patch in version 1.7.42 improves the denylist.
|
[
"cpe:2.3:a:getgrav:grav:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | null | null |
CVE-2025-27744
|
Microsoft Office Elevation of Privilege Vulnerability
|
Improper access control in Microsoft Office allows an authorized attacker to elevate privileges locally.
|
[] | null | 7.8 | null | null | null |
CVE-2021-31217
|
In SolarWinds DameWare Mini Remote Control Server 12.0.1.200, insecure file permissions allow file deletion as SYSTEM.
|
[
"cpe:2.3:a:solarwinds:dameware_mini_remote_control:12.0.1.200:*:*:*:*:*:*:*"
] | null | 9.1 | null | 9.4 | null |
|
CVE-2018-3828
|
Elastic Cloud Enterprise (ECE) versions prior to 1.1.4 contain an information exposure vulnerability. It was discovered that certain exception conditions would result in encryption keys, passwords, and other security sensitive headers being leaked to the allocator logs. An attacker with access to the logging cluster may obtain leaked credentials and perform authenticated actions using these credentials.
|
[
"cpe:2.3:a:elastic:elastic_cloud_enterprise:*:*:*:*:*:*:*:*"
] | null | null | 7.5 | 3.5 | null |
|
CVE-2021-41258
|
Cross-site scripting (XSS) from image block content in the site frontend
|
Kirby is an open source file structured CMS. In affected versions Kirby's blocks field stores structured data for each block. This data is then used in block snippets to convert the blocks to HTML for use in your templates. We recommend to escape HTML special characters to protect against cross-site scripting (XSS) attacks. The default snippet for the image block unfortunately did not use our escaping helper. This made it possible to include malicious HTML code in the source, alt and link fields of the image block, which would then be displayed on the site frontend and executed in the browsers of site visitors and logged in users who are browsing the site. Attackers must be in your group of authenticated Panel users in order to exploit this weakness. Users who do not make use of the blocks field are not affected. This issue has been patched in Kirby version 3.5.8 by escaping special HTML characters in the output from the default image block snippet. Please update to this or a later version to fix the vulnerability.
|
[
"cpe:2.3:a:getkirby:kirby:*:*:*:*:*:*:*:*"
] | null | 7.3 | null | null | null |
CVE-2000-1071
|
The GUI installation for iCal 2.1 Patch 2 disables access control for the X server using an "xhost +" command, which allows remote attackers to monitor X Windows events and gain privileges.
|
[
"cpe:2.3:a:netscape:iplanet_ical:2.1:patch2:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
CVE-2020-35165
|
Dell BSAFE Crypto-C Micro Edition, versions before 4.1.5, and Dell BSAFE Micro Edition Suite, versions before 4.6, contain an Observable Timing Discrepancy Vulnerability.
|
[] | null | 5.1 | null | null | null |
|
GHSA-x2x5-2j3g-8q37
|
ClamAV (aka Clam AntiVirus) before 0.99.2 allows remote attackers to cause a denial of service (application crash) via a crafted mew packer executable.
|
[] | null | null | 5.5 | null | null |
|
GHSA-7v4x-624r-2m39
|
The gmc_mmx function in libavcodec/x86/mpegvideodsp.c in FFmpeg 2.3 and 3.4 does not properly validate widths and heights, which allows remote attackers to cause a denial of service (integer signedness error and out-of-array read) via a crafted MPEG file.
|
[] | null | null | 6.5 | null | null |
|
GHSA-rwpc-rr3r-438g
|
hansun CMS v1.0 was discovered to contain a SQL injection vulnerability via the component /ajax/ajax_login.ashx.
|
[] | null | 9.8 | null | null | null |
|
CVE-2022-1076
|
Automatic Question Paper Generator System My Account Page login.php cross site scripting
|
A vulnerability was found in Automatic Question Paper Generator System 1.0. It has been classified as problematic. This affects the file /aqpg/users/login.php of the component My Account Page. The manipulation of the argument First Name/Middle Name/Last Name leads to cross site scripting. It is possible to initiate the attack remotely.
|
[
"cpe:2.3:a:automatic_question_paper_generator_system_project:automatic_question_paper_generator_system:1.0:*:*:*:*:*:*:*"
] | null | 4.3 | null | null | null |
GHSA-jff3-2vxf-7gwc
|
Buffer overflow in Oracle9iAS Web Cache 2.0.0.1 allows remote attackers to execute arbitrary code via a long HTTP GET request.
|
[] | null | null | null | null | null |
|
GHSA-3v6w-73q2-w9pg
|
In OpenBSD 7.2, a TCP packet with destination port 0 that matches a pf divert-to rule can crash the kernel.
|
[] | null | 7.5 | null | null | null |
|
GHSA-wr37-9fm6-9669
|
Missing Authorization vulnerability in WP Messiah Ai Image Alt Text Generator for WP allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Ai Image Alt Text Generator for WP: from n/a through 1.0.8.
|
[] | null | 5.4 | null | null | null |
|
CVE-2018-14583
|
xyhai.php?s=/Auth/addUser in XYHCMS 3.5 allows CSRF to add a background administrator account.
|
[
"cpe:2.3:a:xyhcms:xyhcms:3.5:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.8 | null |
|
RHSA-2017:1203
|
Red Hat Security Advisory: Red Hat Single Sign-On Node.js adapter security update
|
keycloak-connect: auth token validity check ignored
|
[
"cpe:/a:redhat:jboss_single_sign_on:7.1"
] | null | null | 8.1 | null | null |
CVE-2020-12255
|
rConfig 3.9.4 is vulnerable to remote code execution due to improper validation in the file upload functionality. vendor.crud.php accepts a file upload by checking content-type without considering the file extension and header. Thus, an attacker can exploit this by uploading a .php file to vendor.php that contains arbitrary PHP code and changing the content-type to image/gif.
|
[
"cpe:2.3:a:rconfig:rconfig:3.9.4:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.5 | null |
|
GHSA-j9fq-4p85-2pqh
|
A heap-based buffer overflow in the sixel_encoder_output_without_macro function in encoder.c of Libsixel 1.8.4 allows attackers to cause a denial of service (DOS) via converting a crafted PNG file into Sixel format.
|
[] | null | null | null | null | null |
|
CVE-2025-1753
|
Command Injection in LLama-Index CLI in run-llama/llama_index
|
LLama-Index CLI version v0.12.20 contains an OS command injection vulnerability. The vulnerability arises from the improper handling of the `--files` argument, which is directly passed into `os.system`. An attacker who controls the content of this argument can inject and execute arbitrary shell commands. This vulnerability can be exploited locally if the attacker has control over the CLI arguments, and remotely if a web application calls the LLama-Index CLI with a user-controlled filename. This issue can lead to arbitrary code execution on the affected system.
|
[] | null | null | 7.8 | null | null |
CVE-2024-11319
|
Stored XSS in Open Source Project "django-cms"
|
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in django CMS Association django-cms allows Cross-Site Scripting (XSS).This issue affects django-cms: 3.11.7, 3.11.8, 4.1.2, 4.1.3.
|
[
"cpe:2.3:a:django-cms:django_cms:*:*:*:*:*:*:*:*",
"cpe:2.3:a:django-cms:django_cms:3.11.7:*:*:*:*:*:*:*",
"cpe:2.3:a:django-cms:django_cms:3.11.8:*:*:*:*:*:*:*",
"cpe:2.3:a:django-cms:django_cms:4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:django-cms:django_cms:4.1.3:*:*:*:*:*:*:*"
] | null | 3.8 | null | null | null |
CVE-2025-27915
|
An issue was discovered in Zimbra Collaboration (ZCS) 9.0 and 10.0 and 10.1. A stored cross-site scripting (XSS) vulnerability exists in the Classic Web Client due to insufficient sanitization of HTML content in ICS files. When a user views an e-mail message containing a malicious ICS entry, its embedded JavaScript executes via an ontoggle event inside a <details> tag. This allows an attacker to run arbitrary JavaScript within the victim's session, potentially leading to unauthorized actions such as setting e-mail filters to redirect messages to an attacker-controlled address. As a result, an attacker can perform unauthorized actions on the victim's account, including e-mail redirection and data exfiltration.
|
[] | null | 5.4 | null | null | null |
|
cisco-sa-sdwan-fileoverwrite-Uc9tXWH
|
Cisco Catalyst SD-WAN Manager Arbitrary File Overwrite Vulnerability
|
A vulnerability in the CLI of Cisco Catalyst SD-WAN Manager, formerly Cisco SD-WAN vManage, could allow an authenticated, local attacker to overwrite arbitrary files on the local file system of an affected device. To exploit this vulnerability, the attacker must have valid read-only credentials with CLI access on the affected system.
This vulnerability is due to improper access controls on files that are on the local file system. An attacker could exploit this vulnerability by running a series of crafted commands on the local file system of an affected device. A successful exploit could allow the attacker to overwrite arbitrary files on the affected device and gain privileges of the root user. To exploit this vulnerability, an attacker would need to have CLI access as a low-privilege user.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
|
[] | null | 5.5 | null | null | null |
GHSA-58vv-56m5-q92p
|
An issue has been discovered in GitLab affecting all versions starting from 13.7 before 15.7.8, all versions starting from 15.8 before 15.8.4, all versions starting from 15.9 before 15.9.2. A specially crafted Kroki diagram could lead to a stored XSS on the client side which allows attackers to perform arbitrary actions on behalf of victims.
|
[] | null | 5.4 | null | null | null |
|
GHSA-93q8-gq69-wqmw
|
Inefficient Regular Expression Complexity in chalk/ansi-regex
|
ansi-regex is vulnerable to Inefficient Regular Expression Complexity which could lead to a denial of service when parsing invalid ANSI escape codes.**Proof of Concept**The ReDOS is mainly due to the sub-patterns `[[\\]()#;?]*` and `(?:;[-a-zA-Z\\d\\/#&.:=?%@~_]*)*`
|
[] | null | 7.5 | null | null | null |
CVE-2017-2890
|
An exploitable vulnerability exists in the /api/CONFIG/restore functionality of Circle with Disney running firmware 2.0.1. Specially crafted network packets can cause an OS command injection. An attacker can send an HTTP request trigger this vulnerability.
|
[
"cpe:2.3:o:meetcircle:circle_with_disney_firmware:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:h:meetcircle:circle_with_disney:-:*:*:*:*:*:*:*"
] | null | null | 9.9 | null | null |
|
GHSA-3fg9-g2vc-x467
|
Ignite Realtime Openfire 4.6.0 has create-bookmark.jsp groupchatJID Stored XSS.
|
[] | null | 5.4 | null | null | null |
|
CVE-2023-24858
|
Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability
|
Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability
|
[
"cpe:2.3:o:microsoft:windows_10:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
CVE-2020-0591
|
Improper buffer restrictions in BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.
|
[
"cpe:2.3:o:intel:bios:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_bronze_3204:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_bronze_3206r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_5215:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_5215l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_5217:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_5218:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_5218b:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_5218n:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_5218r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_5218t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_5220:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_5220r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_5220s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_5220t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_5222:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6208u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6209u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6210u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6212u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6222v:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6226:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6226r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6230:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6230n:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6230r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6230t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6234:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6238:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6238l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6238r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6238t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6240:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6240l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6240r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6240y:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6242:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6242r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6244:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6246:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6246r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6248:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6248r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6250:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6250l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6252:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6252n:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6254:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6256:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6258r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6262v:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8253:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8256:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8260l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8260y:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8268:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8270:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8276:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8276l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8280:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8280l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_9221:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_9222:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_9242:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_9282:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_silver_4208:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_silver_4209t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_silver_4210:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_silver_4210r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_silver_4210t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_silver_4214:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_silver_4214r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_silver_4214y:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_silver_4215:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_silver_4215r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_silver_4216:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-7640x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-3820:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-3920xm:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-3930k:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-3940xm:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-3960x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-3970x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-4820k:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-4930k:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-4930mx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-4940mx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-4960x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-5820k:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-5930k:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-5960x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-6800k:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-6850k:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-6900k:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-6950x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-7740x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-7800x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-7820x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-9800x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-10900x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-10920x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-10940x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-10980xe:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-7900x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-7920x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-7940x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-7960x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-7980xe:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-9820x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-9900x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-9920x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-9940x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-9960x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-9980xe:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-1513n:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-1518:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-1520:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-1521:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-1523n:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-1527:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-1528:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-1529:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-1531:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-1533n:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-1537:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-1539:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-1540:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-1541:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-1543n:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-1548:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-1553n:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-1557:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-1559:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-1567:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-1571:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-1577:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-1602:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-1622:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-1623n:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-1627:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-1633n:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-1637:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-1649n:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-1653n:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-2123it:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-2141i:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-2142it:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-2143it:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-2145nt:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-2146nt:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-2161i:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-2163it:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-2166nt:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-2173it:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-2177nt:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-2183it:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-2187nt:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-10855m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-10885m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-1250:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-1250e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-1250p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-1250te:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-1270:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-1270e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-1270p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-1270te:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-1290:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-1290e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-1290p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-1290t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-1290te:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-2123:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-2125:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-2133:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-2135:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-2145:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-2155:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-2175:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-2195:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-2223:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-2225:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-2235:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-2245:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-2255:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-2265:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-2275:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-2295:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-3175x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-3223:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-3225:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-3235:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-3245:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-3245m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-3265:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-3265m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-3275:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-3275m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_cpu_1518-4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_cpu_1518-4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_cpu_1518f-4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_cpu_1518f-4:-:*:*:*:*:*:*:*"
] | null | 6.7 | null | 4.6 | null |
|
GHSA-4hwj-h887-xw3m
|
Unspecified vulnerability in Adobe Reader and Acrobat 9.x before 9.3.2, and 8.x before 8.2.2 on Windows and Mac OS X, allows attackers to cause a denial of service or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2010-0192 and CVE-2010-0193.
|
[] | null | null | null | null | null |
|
GHSA-jccw-fxvj-rv5h
|
Object lifecycle issue in Chrome Custom Tab in Google Chrome prior to 65.0.3325.146 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.
|
[] | null | null | 4.3 | null | null |
|
GHSA-v332-vxq6-2g47
|
An information disclosure vulnerability exists when Microsoft Office improperly discloses the contents of its memory, aka 'Microsoft Office Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2020-1342.
|
[] | null | null | null | null | null |
|
CVE-2025-32603
|
WordPress WP Online Users Stats plugin <= 1.0.0 - SQL Injection vulnerability
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in HK WP Online Users Stats allows Blind SQL Injection. This issue affects WP Online Users Stats: from n/a through 1.0.0.
|
[] | null | 9.3 | null | null | null |
GHSA-qc5j-7652-9f34
|
An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A heap out-of-bounds write occurs in bitset_set_range() during regular expression compilation due to an uninitialized variable from an incorrect state transition. An incorrect state transition in parse_char_class() could create an execution path that leaves a critical local variable uninitialized until it's used as an index, resulting in an out-of-bounds write memory corruption.
|
[] | null | null | 9.8 | null | null |
|
GHSA-rr7w-29gf-6ffp
|
Use-after-free vulnerability in the mozilla::a11y::DocAccessible::ProcessInvalidationList function in Mozilla Firefox before 49.0, Firefox ESR 45.x before 45.4, and Thunderbird < 45.4 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via an aria-owns attribute.
|
[] | null | null | 9.8 | null | null |
|
GHSA-rmp8-hcf7-f7mf
|
The plus/search.php component in DedeCMS 5.7 SP2 allows remote attackers to execute arbitrary PHP code via the typename parameter because the contents of typename.inc are under an attacker's control.
|
[] | null | null | null | null | null |
|
GHSA-fpgc-v2fw-7f2p
|
DokuWiki before 2004-10-19, when used on a web server that permits execution based on file extension, allows remote attackers to execute arbitrary code by uploading a file with an appropriate extension such as ".php" or ".cgi".
|
[] | null | null | null | null | null |
|
CVE-2020-15924
|
There is a SQL Injection in Mida eFramework through 2.9.0 that leads to Information Disclosure. No authentication is required. The injection point resides in one of the authentication parameters.
|
[
"cpe:2.3:a:midasolutions:eframework:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null |
|
CVE-2009-4957
|
Directory traversal vulnerability in loadpanel.php in Interspire ActiveKB allows remote attackers to read arbitrary files and possibly have unspecified other impact via directory traversal sequences in the Panel parameter.
|
[
"cpe:2.3:a:interspire:activekb:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-mg46-f9h5-g27x
|
Apache Sling Engine vulnerable to cross-site scripting (XSS) that can lead to privilege escalation
|
The SlingRequestDispatcher doesn't correctly implement the RequestDispatcher API resulting in a generic type of include-based cross-site scripting issues on the Apache Sling level. The vulnerability is exploitable by an attacker that is able to include a resource with specific content-type and control the include path (i.e. writing content). The impact of a successful attack is privilege escalation to administrative power.Please update to Apache Sling Engine version 2.14.0 or newer and enable the "Check Content-Type overrides" configuration option.
|
[] | null | 8 | null | null | null |
CVE-2024-49273
|
WordPress ProfileGrid plugin <= 5.9.3 - Cross Site Request Forgery (CSRF) vulnerability
|
Missing Authorization vulnerability in ProfileGrid User Profiles ProfileGrid.This issue affects ProfileGrid: from n/a through 5.9.3.
|
[
"cpe:2.3:a:metagauss:profilegrid:*:*:*:*:*:wordpress:*:*"
] | null | 4.3 | null | null | null |
CVE-2008-6438
|
SQL injection vulnerability in macgurublog_menu/macgurublog.php in the MacGuru BLOG Engine plugin 2.2 for e107 allows remote attackers to execute arbitrary SQL commands via the uid parameter, a different vector than CVE-2008-2455. NOTE: it was later reported that 2.1.4 is also affected.
|
[
"cpe:2.3:a:e107coders:macguru_blog_engine_plugin:2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2020-1704
|
An insecure modification vulnerability in the /etc/passwd file was found in all versions of OpenShift ServiceMesh (maistra) before 1.0.8 in the openshift/istio-kialia-rhel7-operator-container. An attacker with access to the container could use this flaw to modify /etc/passwd and escalate their privileges.
|
[
"cpe:2.3:a:redhat:openshift_service_mesh:*:*:*:*:*:*:*:*"
] | null | 7 | null | null | null |
|
ICSA-23-005-01
|
Hitachi Energy UNEM
|
Affected Hitachi Energy UNEM products use the DES cypher to encrypt user credentials used to access the network elements. DES is no longer considered secure because it uses a short 56-bit key, which could allow the cypher to be decrypted in a short time.-CVE-2021-40341 has been assigned to this vulnerability. A CVSS v3 base score of 7.1 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N). Affected Hitachi Energy UNEM products use a DES implementation with a default key for encryption. An attacker that exploits this vulnerability could obtain sensitive information and gain access to the network elements managed by the UNEM.-CVE-2021-40342 has been assigned to this vulnerability. A CVSS v3 base score of 7.1 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N). Affected Hitachi Energy UNEM products contain public and private keys used to sign and protect custom parameter set (CPS) files from modification. An attacker exploiting this vulnerability could change the CPS file and sign it, so that it is trusted as the legitimate CPS file.-CVE-2022-3927 has been assigned to this vulnerability. A CVSS v3 base score of 8.0 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H). In the message queue of affected Hitachi Energy UNEM products contains a hard-coded credential. An attacker that exploits this vulnerability could access data inside the internal message queue.-CVE-2022-3928 has been assigned to this vulnerability. A CVSS v3 base score of 7.1 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N). Communication between the client (UNEM User Interface) and the server application (UNEM Core) partially uses common object request broker architecture (CORBA) over TCP/IP. This protocol is not encrypted and could allow an unauthorized user to trace internal messages.-CVE-2022-3929 has been assigned to this vulnerability. A CVSS v3 base score of 8.3 has been calculated; the CVSS vector string is (AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H).
|
[] | null | null | 8.3 | null | null |
CVE-2005-4791
|
Multiple untrusted search path vulnerabilities in SUSE Linux 10.0 cause the working directory to be added to LD_LIBRARY_PATH, which might allow local users to execute arbitrary code via (1) liferea or (2) banshee.
|
[
"cpe:2.3:o:novell:suse_linux:10.0:*:*:*:*:*:*:*"
] | null | null | null | 2.1 | null |
|
CVE-2020-14810
|
Vulnerability in the Oracle Hospitality Suite8 product of Oracle Hospitality Applications (component: WebConnect). Supported versions that are affected are 8.10.2 and 8.11-8.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Hospitality Suite8. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Hospitality Suite8 accessible data as well as unauthorized read access to a subset of Oracle Hospitality Suite8 accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N).
|
[
"cpe:2.3:a:oracle:hospitality_suite8:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:hospitality_suite8:8.10.2:*:*:*:*:*:*:*"
] | null | 5.4 | null | null | null |
|
CVE-2022-33254
|
Reachable assertion in Modem
|
Transient DOS due to reachable assertion in Modem while processing SIB1 Message.
|
[
"cpe:2.3:o:qualcomm:aqt1000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6390_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6421_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6426_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6431_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6436_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6574a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca8337_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcm6490_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn6024_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn9024_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs6490_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcx315_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa515m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_8_gen1_5g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd480_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd690_5g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd695_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd750g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd765_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd765g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd768g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd778g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd780g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd855_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd865_5g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd870_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd888_5g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx50m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx55m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx57m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx65_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx70m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdxr2_5g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm7250p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm7325p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_4_gen_1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9341_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3991_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3998_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6740_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6750_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6850_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6851_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6855_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6856_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn7850_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn7851_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:aqt1000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ar8035:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6390:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6391:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6421:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6426:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6431:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6436:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6574a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6595au:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6696:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca8081:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca8337:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcm6490:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn6024:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn9024:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs6490:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcx315:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa515m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm8475:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd480:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd690_5g:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd695:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd750g:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd765:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd765g:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd768g:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd778g:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd780g:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd855:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd865_5g:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd870:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd888_5g:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx50m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx55:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx55m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx57m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx65:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx70m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdxr2_5g:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm7250p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm7325p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_4_gen_1:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9341:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9375:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3988:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3991:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3998:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6740:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6750:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6850:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6851:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6855:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6856:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn7850:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn7851:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8810:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8815:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
RHBA-2008:0314
|
Red Hat Bug Fix Advisory: Updated kernel packages for Red Hat Enterprise Linux 5.2
|
kernel-xen 3.1.1 virtual guest system denial of service (hypervisor crash) possibility kernel: ptrace: Crash on PTRACE_{ATTACH,DETACH} race
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null | null |
GHSA-f27g-cf8p-wpc2
|
Cross-site scripting (XSS) vulnerability in Kantan WEB Server 1.8 and earlier allows remote attackers to inject arbitrary web script or HTML via unknown vectors.
|
[] | null | null | null | null | null |
|
CVE-2017-2372
|
An issue was discovered in certain Apple products. GarageBand before 10.1.5 is affected. Logic Pro X before 10.3 is affected. The issue involves the "Projects" component, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted GarageBand project file.
|
[
"cpe:2.3:a:apple:logic_pro_x:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:garageband:*:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.8 | null |
|
GHSA-ww7c-jvvf-833h
|
A cross-site scripting (XSS) vulnerability exists when visiting malicious websites with the Palo Alto Networks GlobalProtect Clientless VPN that can compromise the user's active session. This issue affects: PAN-OS 7.1 versions earlier than 7.1.26; PAN-OS 8.0 versions earlier than 8.0.21; PAN-OS 8.1 versions earlier than 8.1.13; PAN-OS 9.0 versions earlier than 9.0.7.
|
[] | null | null | null | null | null |
|
GHSA-rrcx-vcp9-h6c7
|
The ChatGPT system through 2025-03-30 performs inline rendering of SVG documents (instead of, for example, rendering them as text inside a code block), which enables HTML injection within most modern graphical web browsers.
|
[] | null | 6.5 | null | null | null |
|
GHSA-36x9-qhr2-jphh
|
The WP Shortcodes Plugin — Shortcodes Ultimate plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the several parameters in all versions up to, and including, 7.2.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] | null | 5.4 | null | null | null |
|
GHSA-wf55-rg6h-r62x
|
The installation of Debian GNU/Linux 3.1r1 from the network install CD creates /var/log/debian-installer/cdebconf with world writable permissions, which allows local users to cause a denial of service (disk consumption).
|
[] | null | null | null | null | null |
|
CVE-2022-40407
|
A zip slip vulnerability in the file upload function of Chamilo v1.11 allows attackers to execute arbitrary code via a crafted Zip file.
|
[
"cpe:2.3:a:chamilo:chamilo:1.11:*:*:*:*:*:*:*"
] | null | 8.8 | null | null | null |
|
GHSA-gjh2-vjq2-jqwc
|
In the Linux kernel, the following vulnerability has been resolved:nfc: nxp-nci: Fix potential memory leak in nxp_nci_send()nxp_nci_send() will call nxp_nci_i2c_write(), and only free skb when
nxp_nci_i2c_write() failed. However, even if the nxp_nci_i2c_write()
run succeeds, the skb will not be freed in nxp_nci_i2c_write(). As the
result, the skb will memleak. nxp_nci_send() should also free the skb
when nxp_nci_i2c_write() succeeds.
|
[] | null | 5.5 | null | null | null |
|
RHSA-2016:1552
|
Red Hat Security Advisory: ntp security update
|
ntp: off-path denial of service on authenticated broadcast mode ntp: crypto-NAK preemptable association denial of service ntp: ntpd switching to interleaved mode with spoofed packets ntp: libntp message digest disclosure ntp: out-of-bounds references on crafted packet
|
[
"cpe:/o:redhat:rhel_eus:6.7::computenode",
"cpe:/o:redhat:rhel_eus:6.7::server"
] | null | null | null | null | null |
CVE-2023-0903
|
SourceCodester Employee Task Management System edit-task.php sql injection
|
A vulnerability was found in SourceCodester Employee Task Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file edit-task.php. The manipulation of the argument task_id leads to sql injection. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-221452.
|
[
"cpe:2.3:a:employee_task_management_system_project:employee_task_management_system:1.0:*:*:*:*:*:*:*"
] | null | 5 | 5 | 4.6 | null |
RHSA-2021:2422
|
Red Hat Security Advisory: gupnp security update
|
gupnp: allows DNS rebinding which could result in tricking browser into triggering actions against local UPnP services
|
[
"cpe:/a:redhat:rhel_eus:8.2::appstream",
"cpe:/a:redhat:rhel_eus:8.2::crb"
] | null | 8.3 | null | null | null |
RHSA-2017:0444
|
Red Hat Security Advisory: rpm-ostree and rpm-ostree-client security, bug fix, and enhancement update
|
rpm-ostree-client: fails to check gpg package signatures when layering
|
[
"cpe:/a:redhat:rhel_atomic:7"
] | null | null | 5.3 | null | null |
RHSA-2024:9912
|
Red Hat Security Advisory: qemu-kvm security update
|
QEMU: Denial of Service via Improper Synchronization in QEMU NBD Server During Socket Closure
|
[
"cpe:/a:redhat:rhel_eus:9.4::appstream"
] | null | null | 7.5 | null | null |
GHSA-6pf5-463c-qv74
|
** DISPUTED ** gcc 4.2.0 through 4.3.0 in GNU Compiler Collection, when casts are not used, considers the sum of a pointer and an int to be greater than or equal to the pointer, which might lead to removal of length testing code that was intended as a protection mechanism against integer overflow and buffer overflow attacks, and provide no diagnostic message about this removal. NOTE: the vendor has determined that this compiler behavior is correct according to section 6.5.6 of the C99 standard (aka ISO/IEC 9899:1999).
|
[] | null | null | null | null | null |
|
GHSA-2m2q-2ghr-grp8
|
Cross-site scripting (XSS) vulnerability in Redmine before 2.6.2 allows remote attackers to inject arbitrary web script or HTML via vectors involving flash message rendering.
|
[] | null | null | 6.1 | null | null |
|
CVE-2025-29062
|
An issue in BL-AC2100 <=V1.0.4 allows a remote attacker to execute arbitrary code via the time1 and time2 parameters in the set_LimitClient_cfg of the goahead webservice.
|
[] | null | 9.8 | null | null | null |
|
GHSA-5wxw-67wh-rggh
|
The Apple iWork application before 2.6 for iOS, Apple Keynote before 6.6, Apple Pages before 5.6, and Apple Numbers before 3.6 allow remote attackers to obtain sensitive information via a crafted document.
|
[] | null | null | null | null | null |
|
CVE-2025-21106
|
Dell Recover Point for Virtual Machines 6.0.X contains a Weak file system permission vulnerability. A low privileged Local attacker could potentially exploit this vulnerability, leading to impacting only non-sensitive resources in the system.
|
[] | null | 5.5 | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.