id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 38
232
⌀ |
---|---|---|---|---|---|---|---|---|
GHSA-mg8f-gmvx-pvjj
|
In the Linux kernel, the following vulnerability has been resolved:drm/modes: Avoid divide by zero harder in drm_mode_vrefresh()drm_mode_vrefresh() is trying to avoid divide by zero
by checking whether htotal or vtotal are zero. But we may
still end up with a div-by-zero of vtotal*htotal*...
|
[] | null | 5.5 | null | null | null |
|
GHSA-2g5r-h37m-8972
|
** UNSUPPPORTED WHEN ASSIGNED ** Uncontrolled resource consumption in ekorRCI, allowing an attacker with low-privileged access to the web server to send continuous legitimate web requests to a functionality that is not properly validated, in order to cause a denial of service (DoS) on the device.
|
[] | null | 6.5 | null | null | null |
|
CVE-2020-2090
|
A cross-site request forgery vulnerability in Jenkins Amazon EC2 Plugin 1.47 and earlier allows attackers to connect to an attacker-specified URL within the AWS region using attacker-specified credentials IDs obtained through another method.
|
[
"cpe:2.3:a:jenkins:amazon_ec2:*:*:*:*:*:jenkins:*:*"
] | null | 8.8 | null | 6.8 | null |
|
GHSA-65p9-86g3-vxrx
|
Unicorn Engine 1.0.2 has an out-of-bounds write in tb_flush_armeb (called from cpu_arm_exec_armeb and tcg_cpu_exec_armeb).
|
[] | null | null | null | null | null |
|
GHSA-2c36-px5h-vq95
|
Easy Hosting Control Panel (EHCP) v0.37.12.b allows remote attackers to conduct cross-site request forgery (CSRF) attacks by leveraging lack of CSRF protection.
|
[] | null | null | 8.8 | null | null |
|
CVE-2024-50766
|
SourceCodester Survey Application System 1.0 is vulnerable to SQL Injection in takeSurvey.php via the id parameter.
|
[
"cpe:2.3:a:sourcecodester:survey_application_system:1.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
|
GHSA-f3mv-g3xr-fp7w
|
Restlet Arbitrary Java Code Execution via a serialized object
|
The default configuration of the ObjectRepresentation class in Restlet before 2.1.4 deserializes objects from untrusted sources, which allows remote attackers to execute arbitrary Java code via a serialized object, a different vulnerability than CVE-2013-4221.
|
[] | null | null | null | null | null |
GHSA-gmvw-7v53-4794
|
Belkin F5D5230-4 4-Port Cable/DSL Gateway Router 1.20.000 modifies the source IP address of internal packets to that of the router's external interface when forwarding a request from an internal host to an internal web server, which allows remote attackers to hide which host is being used to access the web server.
|
[] | null | null | null | null | null |
|
CVE-2025-26555
|
WordPress Debug-Bar-Extender Plugin <= 0.5 - Reflected Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Debug-Bar-Extender allows Reflected XSS. This issue affects Debug-Bar-Extender: from n/a through 0.5.
|
[] | null | 7.1 | null | null | null |
RHSA-2024:1515
|
Red Hat Security Advisory: squid security and bug fix update
|
squid: Denial of Service in HTTP Chunked Decoding
|
[
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 8.6 | null | null | null |
GHSA-6hf2-chq7-2mhh
|
DESIGNA ABACUS v.18 and before allows an attacker to bypass the payment process via a crafted QR code.
|
[] | null | 6.3 | null | null | null |
|
GHSA-7j86-mfh6-h4g2
|
Vulnerability in the JD Edwards EnterpriseOne Tools product of Oracle JD Edwards (component: Web Runtime SEC). Supported versions that are affected are Prior to 9.2.9.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise JD Edwards EnterpriseOne Tools. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of JD Edwards EnterpriseOne Tools. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
|
[] | null | 6.5 | null | null | null |
|
GHSA-mhm6-7j2c-j5cm
|
Multiple incomplete blacklist vulnerabilities in the filemanager::isFileExclude method in the Media Manager in Dotclear before 2.6.3 allow remote authenticated users to execute arbitrary PHP code by uploading a file with a (1) double extension or (2) .php5, (3) .phtml, or some other PHP file extension.
|
[] | null | null | null | null | null |
|
GHSA-v7f9-3v82-w67w
|
In NFC, there is a possible out of bounds read due to uninitialized data. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-148736216
|
[] | null | null | null | null | null |
|
CVE-2021-27659
|
exacqVision Web Service CSS
|
exacqVision Web Service 21.03 does not sufficiently validate, filter, escape, and/or encode user-controllable input before it is placed in output that is used as a web page that is served to other users.
|
[
"cpe:2.3:a:johnsoncontrols:exacqvision_web_service:*:*:*:*:*:*:*:*"
] | null | 5.3 | null | null | null |
CVE-2022-41661
|
A vulnerability has been identified in JT2Go (All versions < V14.1.0.4), Teamcenter Visualization V13.2 (All versions < V13.2.0.12), Teamcenter Visualization V13.3 (All versions < V13.3.0.7), Teamcenter Visualization V14.0 (All versions < V14.0.0.3), Teamcenter Visualization V14.1 (All versions < V14.1.0.4). The affected products contain an out of bounds read vulnerability when parsing a CGM file. An attacker can leverage this vulnerability to execute code in the context of the current process.
|
[
"cpe:2.3:a:siemens:jt2go:*:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:teamcenter_visualization:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
|
CVE-2024-36501
|
Memory management vulnerability in the boottime module
Impact: Successful exploitation of this vulnerability can affect integrity.
|
[
"cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:14.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:2.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:4.2.0:*:*:*:*:*:*:*"
] | null | 5.6 | null | null | null |
|
CVE-2006-7182
|
PHP remote file inclusion vulnerability in noticias.php in MNews 2.0 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the inc parameter.
|
[
"cpe:2.3:a:mnews:mnews:*:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
RHSA-2012:1187
|
Red Hat Security Advisory: katello security update
|
Katello: Application.config.secret_token is not generated properly
|
[
"cpe:/a:rhel_sam:1.1::el6"
] | null | null | null | null | null |
GHSA-r7gc-vqj2-3qmm
|
Buffer overflow in pgpwded.sys in Symantec PGP Desktop 10.x and Encryption Desktop 10.3.0 before MP1 on Windows XP and Server 2003 allows local users to gain privileges via a crafted application.
|
[] | null | null | null | null | null |
|
CVE-2018-16407
|
An issue was discovered in Mayan EDMS before 3.0.3. The Tags app has XSS because tag label values are mishandled.
|
[
"cpe:2.3:a:mayan-edms:mayan_edms:*:*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 | null |
|
GHSA-x96j-9h97-w3qm
|
Dirapi.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0317, CVE-2011-0319, CVE-2011-0320, CVE-2011-0335, CVE-2011-2119, and CVE-2011-2122.
|
[] | null | null | null | null | null |
|
CVE-2018-6777
|
In Jiangmin Antivirus 16.0.0.100, the driver file (KVFG.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x220400.
|
[
"cpe:2.3:a:jiangmin:antivirus:16.0.0.100:*:*:*:*:*:*:*"
] | null | null | 7.8 | 6.1 | null |
|
CVE-2016-10063
|
Buffer overflow in coders/tiff.c in ImageMagick before 6.9.5-1 allows remote attackers to cause a denial of service (application crash) or have other unspecified impact via a crafted file, related to extend validity.
|
[
"cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | 6.8 | null |
|
CVE-1999-1112
|
Buffer overflow in IrfanView32 3.07 and earlier allows attackers to execute arbitrary commands via a long string after the "8BPS" image type in a Photo Shop image header.
|
[
"cpe:2.3:a:irfanview:irfanview:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-gf6v-v2m7-4pr4
|
An attacker could obtain firmware files and reverse engineer their
intended use leading to loss of confidentiality and integrity of the
hardware devices enabled by the Qardio iOS and Android applications.
|
[] | 6.9 | 6.4 | null | null | null |
|
GHSA-9x7r-56w7-953w
|
Bay Technical Associates RPC-3 Telnet Host 3.05 allows remote attackers to bypass authentication by pressing the escape and enter keys at the username prompt.
|
[] | null | null | null | null | null |
|
GHSA-vqv8-v28v-329v
|
Checkmk before 1.6.0p17 allows local users to obtain SYSTEM privileges via a Trojan horse shell script in the %PROGRAMDATA%\checkmk\agent\local directory.
|
[] | null | 7.8 | null | null | null |
|
GHSA-96vw-8v59-qqm9
|
The HUSKY – Products Filter Professional for WooCommerce plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the really_curr_tax parameter in all versions up to, and including, 1.3.6.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
|
[] | null | 6.1 | null | null | null |
|
GHSA-f9ww-v5mx-p9gf
|
XSS exists in Enphase Envoy R3.*.* via the profileName parameter to the /home URI on TCP port 8888.
|
[] | null | null | 6.1 | null | null |
|
GHSA-j34c-3gp7-29jp
|
A vulnerability in the web-based management interface of Cisco Unified Intelligence Center could allow an unauthenticated, remote attacker to conduct a reflected cross-site scripting (XSS) attack against a user of the interface. This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive browser-based information.
|
[] | null | 6.1 | null | null | null |
|
CVE-2013-4544
|
hw/net/vmxnet3.c in QEMU 2.0.0-rc0, 1.7.1, and earlier allows local guest users to cause a denial of service or possibly execute arbitrary code via vectors related to (1) RX or (2) TX queue numbers or (3) interrupt indices. NOTE: some of these details are obtained from third party information.
|
[
"cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.0:rc4:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.1:rc1:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.1:rc2:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.1:rc3:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.1:rc4:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.5.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.5.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.5.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.6.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.6.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.6.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:2.0.0:rc0:*:*:*:*:*:*"
] | null | null | null | 4.9 | null |
|
GHSA-jxp8-fv2c-c5vh
|
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Repute InfoSystems ARMember plugin <= 4.0.1 versions.
|
[] | null | 7.1 | null | null | null |
|
CVE-2006-6614
|
The save_log_local function in Fully Automatic Installation (FAI) 2.10.1, and possibly 3.1.2, when verbose mode is enabled, stores the root password hash in /var/log/fai/current/fai.log, whose file permissions allow it to be copied to other hosts when fai-savelog is called and allows attackers to obtain the hash.
|
[
"cpe:2.3:a:thomas_lange:fully_automated_installation:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:thomas_lange:fully_automated_installation:3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:3.1:*:alpha:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:3.1:*:amd64:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:3.1:*:arm:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:3.1:*:hppa:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:3.1:*:ia-32:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:3.1:*:ia-64:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:3.1:*:m68k:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:3.1:*:mips:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:3.1:*:mipsel:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:3.1:*:ppc:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:3.1:*:s-390:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:3.1:*:sparc:*:*:*:*:*"
] | null | null | null | 1.9 | null |
|
GHSA-cg99-p6r9-c75p
|
GL.iNET GL-AR750S-Ext firmware v3.215 inserts the admin authentication token into a GET request when the OpenVPN Server config file is downloaded. The token is then left in the browser history or access logs, potentially allowing attackers to bypass authentication via session replay.
|
[] | null | 5.9 | null | null | null |
|
GHSA-f2x5-xv5g-cxfh
|
The web console in CA (formerly Computer Associates) eTrust ITM (Threat Manager) 8.1 allows remote attackers to redirect users to arbitrary web sites via a crafted HTTP URL on port 6689.
|
[] | null | null | null | null | null |
|
GHSA-pfq2-x69w-983r
|
The Newsletter, SMTP, Email marketing and Subscribe forms by Sendinblue WordPress plugin before 3.1.25 does not escape the sib-statistics-date parameter before outputting it back in an attribute, leading to a Reflected Cross-Site Scripting issue
|
[] | null | 6.1 | null | null | null |
|
GHSA-c7f9-gprv-h5hq
|
Cross-site scripting (XSS) vulnerability on D-Link DIR-615 routers 20.07 allows an attacker to inject JavaScript into the "Status -> Active Client Table" page via the hostname field in a DHCP request.
|
[] | null | 6.1 | null | null | null |
|
RHSA-2024:6137
|
Red Hat Security Advisory: postgresql:12 security update
|
postgresql: PostgreSQL relation replacement during pg_dump executes arbitrary SQL
|
[
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 7.5 | null | null | null |
CVE-2025-28892
|
WordPress FTP Sync plugin <= 1.1.6 - CSRF to Stored XSS vulnerability
|
Cross-Site Request Forgery (CSRF) vulnerability in a2rocklobster FTP Sync allows Stored XSS. This issue affects FTP Sync: from n/a through 1.1.6.
|
[] | null | 7.1 | null | null | null |
GHSA-jmqv-hx9g-2j64
|
An issue was discovered on Samsung mobile devices with P(9.0) and Q(10.0) software. Attackers can view notifications by entering many PINs in Lockdown mode. The Samsung ID is SVE-2019-16590 (March 2020).
|
[] | null | null | null | null | null |
|
RHSA-2021:3328
|
Red Hat Security Advisory: kernel-rt security and bug fix update
|
kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation kernel: lack a full memory barrier upon the assignment of a new table value in net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h may lead to DoS kernel: race condition for removal of the HCI controller
|
[
"cpe:/a:redhat:rhel_extras_rt:7"
] | null | 7 | null | null | null |
GHSA-xffv-hvpr-87v7
|
Unrestricted file upload vulnerability in Visual Mining NetCharts Server allows remote attackers to execute arbitrary code by uploading a file with an executable extension, then accessing it via unspecified vectors.
|
[] | null | null | null | null | null |
|
CVE-2017-7017
|
An issue was discovered in certain Apple products. macOS before 10.12.6 is affected. The issue involves the "Intel Graphics Driver" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app.
|
[
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | 9.3 | null |
|
GHSA-hc62-cr99-v89f
|
J2EEFAST v2.7.0 was discovered to contain a SQL injection vulnerability via the findPage function in SysMsgPushMapper.xml.
|
[] | null | 9.8 | null | null | null |
|
GHSA-h4g8-q9cc-gpgj
|
A vulnerability has been identified in Tecnomatix Plant Simulation V2302 (All versions < V2302.0011). The affected application contains an out of bounds write past the end of an allocated buffer while parsing a specially crafted MODEL file. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-22974)
|
[] | null | 7.8 | null | null | null |
|
CVE-2010-2656
|
The IBM BladeCenter with Advanced Management Module (AMM) firmware build ID BPET48L, and possibly other versions before 4.7 and 5.0, stores sensitive information under the web root with insufficient access control, which allows remote attackers to download (1) logs or (2) core files via direct requests, as demonstrated by a request for private/sdc.tgz.
|
[
"cpe:2.3:h:ibm:advanced_management_module:*:l:*:*:*:*:*:*",
"cpe:2.3:h:ibm:advanced_management_module:1.00:*:*:*:*:*:*:*",
"cpe:2.3:h:ibm:advanced_management_module:1.01:*:*:*:*:*:*:*",
"cpe:2.3:h:ibm:advanced_management_module:1.20:*:*:*:*:*:*:*",
"cpe:2.3:h:ibm:advanced_management_module:1.20:f:*:*:*:*:*:*",
"cpe:2.3:h:ibm:advanced_management_module:1.25:*:*:*:*:*:*:*",
"cpe:2.3:h:ibm:advanced_management_module:1.25:e:*:*:*:*:*:*",
"cpe:2.3:h:ibm:advanced_management_module:1.25:i:*:*:*:*:*:*",
"cpe:2.3:h:ibm:advanced_management_module:1.26:b:*:*:*:*:*:*",
"cpe:2.3:h:ibm:advanced_management_module:1.26:e:*:*:*:*:*:*",
"cpe:2.3:h:ibm:advanced_management_module:1.26:h:*:*:*:*:*:*",
"cpe:2.3:h:ibm:advanced_management_module:1.26:i:*:*:*:*:*:*",
"cpe:2.3:h:ibm:advanced_management_module:1.26:k:*:*:*:*:*:*",
"cpe:2.3:h:ibm:advanced_management_module:1.28:g:*:*:*:*:*:*",
"cpe:2.3:h:ibm:advanced_management_module:1.32:d:*:*:*:*:*:*",
"cpe:2.3:h:ibm:advanced_management_module:1.34:b:*:*:*:*:*:*",
"cpe:2.3:h:ibm:advanced_management_module:1.34:e:*:*:*:*:*:*",
"cpe:2.3:h:ibm:advanced_management_module:1.36:d:*:*:*:*:*:*",
"cpe:2.3:h:ibm:advanced_management_module:1.36:g:*:*:*:*:*:*",
"cpe:2.3:h:ibm:advanced_management_module:1.36:h:*:*:*:*:*:*",
"cpe:2.3:h:ibm:advanced_management_module:1.36:k:*:*:*:*:*:*",
"cpe:2.3:h:ibm:advanced_management_module:1.42:d:*:*:*:*:*:*",
"cpe:2.3:h:ibm:advanced_management_module:1.42:f:*:*:*:*:*:*",
"cpe:2.3:h:ibm:advanced_management_module:1.42:i:*:*:*:*:*:*",
"cpe:2.3:h:ibm:advanced_management_module:1.42:n:*:*:*:*:*:*",
"cpe:2.3:h:ibm:advanced_management_module:1.42:o:*:*:*:*:*:*",
"cpe:2.3:h:ibm:advanced_management_module:1.42:t:*:*:*:*:*:*",
"cpe:2.3:h:ibm:advanced_management_module:2.46:c:*:*:*:*:*:*",
"cpe:2.3:h:ibm:advanced_management_module:2.46:j:*:*:*:*:*:*",
"cpe:2.3:h:ibm:advanced_management_module:2.48:c:*:*:*:*:*:*",
"cpe:2.3:h:ibm:advanced_management_module:2.48:d:*:*:*:*:*:*",
"cpe:2.3:h:ibm:advanced_management_module:2.48:g:*:*:*:*:*:*",
"cpe:2.3:h:ibm:advanced_management_module:2.48:n:*:*:*:*:*:*",
"cpe:2.3:h:ibm:advanced_management_module:2.50:c:*:*:*:*:*:*",
"cpe:2.3:h:ibm:advanced_management_module:2.50:g:*:*:*:*:*:*",
"cpe:2.3:h:ibm:advanced_management_module:2.50:k:*:*:*:*:*:*",
"cpe:2.3:h:ibm:advanced_management_module:2.50:p:*:*:*:*:*:*",
"cpe:2.3:h:ibm:bladecenter:*:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-qvw5-r2q2-rmh2
|
Microsoft Windows XP Explorer allows local users to execute arbitrary code via a system folder with a Desktop.ini file containing a .ShellClassInfo specifier with a CLSID value that is associated with an executable file.
|
[] | null | null | null | null | null |
|
CVE-2021-25670
|
A vulnerability has been identified in Tecnomatix RobotExpert (All versions < V16.1). Affected applications lack proper validation of user-supplied data when parsing CELL files. This could result in an out of bounds write past the end of an allocated structure. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-12608)
|
[
"cpe:2.3:a:siemens:tecnomatix_robotexpert:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | 6.8 | null |
|
CVE-2006-1668
|
newimage.php in Eric Gerdes Crafty Syntax Image Gallery (CSIG) (aka PHP thumbnail Photo Gallery) 3.1g and earlier allows remote authenticated users to upload and execute arbitrary PHP code via a multipart/form-data POST with a .jpg filename in the fullimage parameter and the ext parameter set to .php.
|
[
"cpe:2.3:a:crafty_syntax_image_gallery:crafty_syntax_image_gallery:*:*:*:*:*:*:*:*"
] | null | null | null | 9 | null |
|
CVE-2025-54747
|
WordPress Templatera Plugin <= 2.3.0 - Cross Site Scripting (XSS) Vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in wpbakery Templatera allows DOM-Based XSS. This issue affects Templatera: from n/a through 2.3.0.
|
[] | null | 6.5 | null | null | null |
GHSA-9jm6-6j35-x89g
|
A RootCA vulnerability found in Trend Micro Password Manager for Windows and macOS exists where the localhost.key of RootCA.crt might be improperly accessed by an unauthorized party and could be used to create malicious self-signed SSL certificates, allowing an attacker to misdirect a user to phishing sites.
|
[] | null | 5.5 | null | null | null |
|
GHSA-cr5m-c8fx-9pvc
|
Buffer overflow in Linux cdrecord allows local users to gain privileges via the dev parameter.
|
[] | null | null | null | null | null |
|
CVE-2018-12794
|
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have a Type Confusion vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
|
[
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.8 | null |
|
cisco-sa-sdwclici-cvrQpH9v
|
Cisco SD-WAN Solution Command Injection Vulnerability
|
A vulnerability in the CLI of Cisco SD-WAN Solution software could allow an authenticated, local attacker to inject arbitrary commands that are executed with root privileges.
The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by authenticating to the device and submitting crafted input to the CLI utility. The attacker must be authenticated to access the CLI utility. A successful exploit could allow the attacker to execute commands with root privileges.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwclici-cvrQpH9v ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwclici-cvrQpH9v"]
|
[] | null | null | 7.8 | null | null |
GHSA-p56h-5fx4-p722
|
importbuddy.php in the BackupBuddy plugin 2.2.25 for WordPress allows remote attackers to obtain configuration information via a step 0 phpinfo action, which calls the phpinfo function.
|
[] | null | null | null | null | null |
|
RHSA-2011:0310
|
Red Hat Security Advisory: firefox security and bug fix update
|
javascript: URLs in chrome documents (MFSA 2011-08) Mozilla recursive eval call causes confirm dialog to evaluate to true (MFSA 2011-02) Mozilla miscellaneous memory safety hazards (MFSA 2011-01) Mozilla Buffer overflow in JavaScript upvarMap (MFSA 2011-04) Mozilla use-after-free error in JSON.stringify (MFSA2011-03) Mozilla Buffer overflow in JavaScript atom map (MFSA 2011-05) Mozilla use-after-free error using Web Workers (MFSA 2011-06) Mozilla memory corruption during text run construction (MFSA 2011-07) Mozilla CSRF risk with plugins and 307 redirects (MFSA 2011-10) Mozilla crash caused by corrupted JPEG image (MFSA 2011-09) Mozilla miscellaneous memory safety hazards (MFSA 2011-01)
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null | null |
CVE-2025-30290
|
ColdFusion | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') (CWE-22)
|
ColdFusion versions 2023.12, 2021.18, 2025.0 and earlier are affected by an Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability that could lead to a security feature bypass. A high privileged attacker could exploit this vulnerability to bypass security protections and gain unauthorized write and delete access. Exploitation of this issue does not require user interaction and scope is changed.
|
[] | null | 8.7 | null | null | null |
ICSA-21-007-02
|
Omron CX-One
|
The affected product may allow an attacker to supply a pointer to arbitrary memory locations, which may allow an attacker to remotely execute arbitrary code. The affected product is vulnerable to a stack-based buffer overflow, which may allow an attacker to remotely execute arbitrary code. This vulnerability allows local attackers to execute arbitrary code due to the lack of proper validation of user-supplied data, which can result in a type-confusion condition.
|
[] | null | null | 6.6 | null | null |
CVE-2017-14995
|
The Management Console in WSO2 Application Server 5.3.0, WSO2 Business Process Server 3.6.0, WSO2 Business Rules Server 2.2.0, WSO2 Complex Event Processor 4.2.0, WSO2 Dashboard Server 2.0.0, WSO2 Data Analytics Server 3.1.0, WSO2 Data Services Server 3.5.1, and WSO2 Machine Learner 1.2.0 is affected by stored XSS.
|
[
"cpe:2.3:a:wso2:application_server:5.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wso2:business_process_server:3.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wso2:business_rules_server:2.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wso2:complex_event_processor:4.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wso2:dashboard_server:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wso2:data_analytics_server:3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wso2:data_services_server:3.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wso2:machine_learner:1.2.0:*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 | null |
|
CVE-2018-17797
|
An issue was discovered in zzcms 8.3. user/zssave.php allows remote attackers to delete arbitrary files via directory traversal sequences in the oldimg parameter in an action=modify request. This can be leveraged for database access by deleting install.lock.
|
[
"cpe:2.3:a:zzcms:zzcms:8.3:*:*:*:*:*:*:*"
] | null | null | 6.5 | 5.5 | null |
|
CVE-2007-1488
|
Unspecified vulnerability in Sun Java System Web Server 6.0 and 6.1 before 20070315 allows remote attackers to "gain unauthorized access to data", possibly involving a sample application.
|
[
"cpe:2.3:a:sun:java_system_web_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_web_server:6.0:sp1:*:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_web_server:6.0:sp10:*:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_web_server:6.0:sp2:*:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_web_server:6.0:sp3:*:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_web_server:6.0:sp4:*:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_web_server:6.0:sp5:*:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_web_server:6.0:sp6:*:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_web_server:6.0:sp7:*:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_web_server:6.0:sp8:*:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_web_server:6.0:sp9:*:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_web_server:6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_web_server:6.1:sp1:*:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_web_server:6.1:sp2:*:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_web_server:6.1:sp3:*:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_web_server:6.1:sp4:*:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_web_server:6.1:sp5:*:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_web_server:6.1:sp6:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2024-31893
|
IBM App Connect Enterprise information disclosure
|
IBM App Connect Enterprise 12.0.1.0 through 12.0.12.1 could allow an authenticated user to obtain sensitive calendar information using an expired access token. IBM X-Force ID: 288174.
|
[
"cpe:2.3:a:ibm:app_connect_enterprise:12.0.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:app_connect_enterprise:12.0.12.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:app_connect_enterprise:*:*:*:*:*:*:*:*"
] | null | 4.3 | null | null | null |
ICSA-17-180-02
|
Schneider Electric U.motion Builder (Update A)
|
Unauthenticated users can use calls to various paths in order to perform arbitrary SQL statements against the underlying database.CVE-2017-7973 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). The vulnerability exists within processing of track_import_export.php. The underlying SQLite database query is subject to SQL injection on the object_id input parameter.CVE-2018-7765 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). The vulnerability exists within processing of track_getdata.php. The underlying SQLite database query is subject to SQL injection on the id input parameter.CVE-2018-7766 has been assigned to this vulnerability. A CVSS v3 base score of 6.3 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L). The vulnerability exists within processing of editobject.php. The underlying SQLite database query is subject to SQL injection on the type input parameter.CVE-2018-7767 has been assigned to this vulnerability. A CVSS v3 base score of 6.3 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L). The vulnerability exists within processing of loadtemplate.php. The underlying SQLite database query is subject to SQL injection on the tpl input parameter.CVE-2018-7768 has been assigned to this vulnerability. A CVSS v3 base score of 6.3 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L). The vulnerability exists within processing of xmlserver.php. The underlying SQLite database query is subject to SQL injection on the id input parameter.CVE-2018-7769 has been assigned to this vulnerability. A CVSS v3 base score of 6.3 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L). The vulnerability exists within processing of applets that are exposed on the web service. The underlying SQLite database query to determine whether a user is logged in is subject to SQL injection on the loginSeed parameter, which can be embedded in the HTTP cookie of the request.CVE-2018-7772 has been assigned to this vulnerability. A CVSS v3 base score of 6.3 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L). The vulnerability exists within processing of nfcserver.php. The underlying SQLite database query is subject to SQL injection on the sessionid input parameter.CVE-2018-7773 has been assigned to this vulnerability. A CVSS v3 base score of 6.3 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L). The vulnerability exists within processing of localize.php. The underlying SQLite database query is subject to SQL injection on the username input parameter.CVE-2018-7774 has been assigned to this vulnerability. A CVSS v3 base score of 6.3 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L). Unauthenticated users can execute arbitrary code and exfiltrate files.CVE-2017-7974 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N). The vulnerability exists within css.inc.php. The 'css' parameter contains a directory traversal vulnerability.CVE-2018-7763 has been assigned to this vulnerability. A CVSS v3 base score of 4.3 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N). The vulnerability exists within runscript.php applet. There is a directory traversal vulnerability in the processing of the 's' parameter of the applet.CVE-2018-7764 has been assigned to this vulnerability. A CVSS v3 base score of 4.3 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N). The vulnerability exists within processing of sendmail.php. The applet allows callers to select arbitrary files to send to an arbitrary email address.CVE-2018-7770 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N). The vulnerability exists within processing of editscript.php. A directory traversal vulnerability allows a caller with standard user privileges to write arbitrary php files anywhere in the web service directory tree.CVE-2018-7771 has been assigned to this vulnerability. A CVSS v3 base score of 5.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L). The system includes a hard-coded valid session. If an attacker uses that session ID as part of the HTTP cookie of a web request, then authentication is bypassed.CVE-2017-9956 has been assigned to this vulnerability. A CVSS v3 base score of 7.3 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L). The system comes with a system web access account hard-coded.CVE-2017-9957 has been assigned to this vulnerability. A CVSS v3 base score of 7.3 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L). Improper handling of the system configuration can allow an attacker to execute arbitrary code under the context of root.CVE-2017-9958 has been assigned to this vulnerability. A CVSS v3 base score of 7.3 has been assigned; the CVSS vector string is (AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H). The system accepts reboot in session from unauthenticated user causing a denial of service.CVE-2017-9959 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been assigned; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). The system returns more information than should be passed to an unauthenticated caller who might be an attacker.CVE-2017-9960 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N). The vulnerability exists within externalframe.php. Exception information is returned to the attacker that contains sensitive path information.CVE-2018-7776 has been assigned to this vulnerability. A CVSS v3 base score of 4.3 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N). The vulnerability is due to insufficient handling of update_file request parameter on update_module.php. A remote, authenticated attacker can exploit this vulnerability by sending a crafted request to the target server.CVE-2018-7777 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). Samba since Version 3.5.0 and before 4.6.4, 4.5.10 and 4.4.14 is vulnerable to remote code execution vulnerability, allowing a malicious client to upload a shared library to a writable share, and then cause the server to load and execute it.CVE-2017-7494 has been assigned to this vulnerability. A CVSS v3 base score of 10.0 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H).
|
[] | null | null | 10 | null | null |
GHSA-663h-c67h-phf7
|
The Crash Reporter (crash_reporter.php) component of OPNsense before 23.7 mishandles input sanitization.
|
[] | null | 5.4 | null | null | null |
|
GHSA-7pv4-f272-hv95
|
The BGP daemon (bgpd) in Quagga 0.99.11 and earlier allows remote attackers to cause a denial of service (crash) via an AS path containing ASN elements whose string representation is longer than expected, which triggers an assert error.
|
[] | null | null | null | null | null |
|
CVE-2009-1868
|
Heap-based buffer overflow in Adobe Flash Player before 9.0.246.0 and 10.x before 10.0.32.18, and Adobe AIR before 1.5.2, allows attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unspecified vectors involving URL parsing.
|
[
"cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air:1.01:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air:1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.25:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.63:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.63:*:linux:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.69.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.70.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:8.0:*:basic:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:8.0:*:pro:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:8.0.24.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:8.0.34.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:8.0.35.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.20.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.28:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.28.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.31.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.45.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.47.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.48.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.112.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.124.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.0.0.584:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.0.12.10:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.0.12.36:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flex:3.0:*:*:*:*:*:*:*"
] | null | null | null | 9.3 | null |
|
GHSA-q89p-g62h-mmhr
|
IBM Rational Quality Manager and IBM Rational Collaborative Lifecycle Management 5.0 through 5.0.2 and 6.0 through 6.0.5 are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 125729.
|
[] | null | null | 5.4 | null | null |
|
CVE-2021-34426
|
Arbitrary command execution in Keybase Client for Windows
|
A vulnerability was discovered in the Keybase Client for Windows before version 5.6.0 when a user executed the "keybase git lfs-config" command on the command-line. In versions prior to 5.6.0, a malicious actor with write access to a user\'s Git repository could leverage this vulnerability to potentially execute arbitrary Windows commands on a user\'s local system.
|
[
"cpe:2.3:a:keybase:keybase:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 5.3 | null | null | null |
GHSA-3jxh-7h2g-h6mg
|
AOL Instant Messenger (AIM) 4.7.2480 and earlier allows remote attackers to cause a denial of service (application crash) via an instant message that contains a large amount of "<!--" HTML comments.
|
[] | null | null | null | null | null |
|
RHSA-2021:2724
|
Red Hat Security Advisory: systemd security update
|
systemd: uncontrolled allocation on the stack in function unit_name_path_escape leads to crash
|
[
"cpe:/o:redhat:rhel_eus:8.1::baseos"
] | null | 5.5 | null | null | null |
CVE-2024-25978
|
Msa-24-0001: denial of service risk in file picker unzip functionality
|
Insufficient file size checks resulted in a denial of service risk in the file picker's unzip functionality.
|
[] | null | 7.5 | null | null | null |
CVE-2022-33985
|
DMA transactions which are targeted at input buffers used for the NvmExpressDxe software SMI handler could cause SMRAM corruption through a TOCTOU attack. DMA transactions which are targeted at input buffers used for the software SMI handler used by the NvmExpressDxe driver could cause SMRAM corruption through a TOCTOU attack. This issue was discovered by Insyde engineering based on the general description provided by Intel's iSTARE group. This issue was fixed in kernel 5.2: 05.27.25, kernel 5.3: 05.36.25, kernel 5.4: 05.44.25, kernel 5.5: 05.52.25 https://www.insyde.com/security-pledge/SA-2022055
|
[
"cpe:2.3:a:insyde:kernel:*:*:*:*:*:*:*:*"
] | null | 7 | null | null | null |
|
GHSA-6m6j-x3x6-grw2
|
Microsoft Excel 2000 SP3, 2002 SP3, 2003 SP2, 2004 for Mac, and v.X for Mac allows user-assisted remote attackers to execute arbitrary code via a malformed string, aka "Excel Malformed String Vulnerability."
|
[] | null | null | null | null | null |
|
CVE-2022-0198
|
Improper Restriction of XML External Entity Reference in stanfordnlp/corenlp
|
corenlp is vulnerable to Improper Restriction of XML External Entity Reference
|
[
"cpe:2.3:a:stanford:corenlp:*:*:*:*:*:*:*:*"
] | null | null | 6.1 | null | null |
CVE-2015-2337
|
TPInt.dll in VMware Workstation 10.x before 10.0.6 and 11.x before 11.1.1, VMware Player 6.x before 6.0.6 and 7.x before 7.1.1, and VMware Horizon Client 3.2.x before 3.2.1, 3.3.x, and 5.x local-mode before 5.4.2 on Windows does not properly allocate memory, which allows guest OS users to execute arbitrary code on the host OS via unspecified vectors.
|
[
"cpe:2.3:a:vmware:fusion:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:fusion:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:fusion:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:fusion:6.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:fusion:6.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:fusion:6.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:fusion:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:fusion:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:player:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:player:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:player:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:player:6.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:player:6.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:player:6.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:player:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:player:7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workstation:10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workstation:10.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workstation:10.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workstation:10.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workstation:10.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workstation:10.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workstation:11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workstation:11.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:horizon_client:3.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:horizon_client:3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:horizon_view_client:5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:horizon_view_client:5.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*"
] | null | null | null | 5.8 | null |
|
CVE-2025-4927
|
PHPGurukul Online Marriage Registration System between-dates-application-report.php sql injection
|
A vulnerability was found in PHPGurukul Online Marriage Registration System 1.0. It has been classified as critical. This affects an unknown part of the file /admin/between-dates-application-report.php. The manipulation of the argument fromdate/todate leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
|
[] | 6.9 | 7.3 | 7.3 | 7.5 | null |
CVE-2025-46190
|
SourceCodester Client Database Management System 1.0 is vulnerable to SQL Injection in user_delivery_update.php via the order_id POST parameter.
|
[] | null | 9.8 | null | null | null |
|
CVE-2024-30629
|
Tenda FH1205 v2.0.0.7(775) has a stack overflow vulnerability in the list1 parameter from fromDhcpListClient function.
|
[
"cpe:2.3:o:tenda:fh1205_firmware:*:*:*:*:*:*:*:*"
] | null | 5.7 | null | null | null |
|
GHSA-84x9-ph3v-mc23
|
GibbonEdu Gibbon through version 25.0.0 allows /modules/Planner/resources_addQuick_ajaxProcess.php file upload with resultant XSS. The imageAsLinks parameter must be set to Y to return HTML code. The filename attribute of the bodyfile1 parameter is reflected in the response.
|
[] | null | 6.1 | null | null | null |
|
CVE-2022-43983
|
Browsershot version 3.57.2 allows an external attacker to remotely obtain arbitrary local files. This is possible because the application does not validate that the HTML content passed to the Browsershot::html method does not contain URL's that use the file:// protocol.
|
[
"cpe:2.3:a:spatie:browsershot:3.57.2:*:*:*:*:*:*:*"
] | null | 8.2 | null | null | null |
|
GHSA-fm48-g92r-6m48
|
Multiple cross-site scripting (XSS) vulnerabilities in chathead.php in MM Chat 1.5 allow remote attackers to inject arbitrary web script or HTML via the (1) sitename and (2) wmessage parameters.
|
[] | null | null | null | null | null |
|
CVE-2017-17750
|
Bose SoundTouch devices allow XSS via a crafted public playlist from Spotify.
|
[
"cpe:2.3:a:bose:soundtouch:-:*:*:*:*:android:*:*",
"cpe:2.3:a:bose:soundtouch:-:*:*:*:*:iphone_os:*:*"
] | null | null | 5.4 | 3.5 | null |
|
GHSA-7j4q-97pw-5p6r
|
An issue was discovered in swftools through 20200710. A NULL pointer dereference exists in the function callcode() located in code.c. It allows an attacker to cause Denial of Service.
|
[] | null | null | null | null | null |
|
GHSA-4w3m-xm3w-43g9
|
In Modicon Quantum all firmware versions, CWE-264: Permissions, Privileges, and Access Control vulnerabilities could cause a denial of service or unauthorized modifications of the PLC configuration when using Ethernet/IP protocol.
|
[] | null | null | null | null | null |
|
GHSA-8x28-7c5h-458j
|
Heap-based overflow vulnerability in TFTP Server SP 1.66 and earlier allows remote attackers to perform a denial of service or possibly execute arbitrary code via a long TFTP error packet, a different vulnerability than CVE-2008-2161.
|
[] | null | null | null | null | null |
|
RHSA-2023:7734
|
Red Hat Security Advisory: kpatch-patch security update
|
kernel: use-after-free vulnerability in the smb client component kernel: IGB driver inadequate buffer size for frames larger than MTU
|
[
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 7.5 | null | null | null |
CVE-2017-2996
|
Adobe Flash Player versions 24.0.0.194 and earlier have an exploitable memory corruption vulnerability in Primetime SDK. Successful exploitation could lead to arbitrary code execution.
|
[
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:chrome:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:edge:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:internet_explorer:*:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player_desktop_runtime:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | 9.3 | null |
|
CVE-2024-8780
|
The SYSCOM Group OMFLOW - Improper Authorization for Data Query Function
|
OMFLOW from The SYSCOM Group does not properly restrict the query range of its data query functionality, allowing remote attackers with regular privileges to obtain accounts and password hashes of other users.
|
[
"cpe:2.3:a:syscomgo:omflow:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | null | null |
CVE-2023-49298
|
OpenZFS through 2.1.13 and 2.2.x through 2.2.1, in certain scenarios involving applications that try to rely on efficient copying of file data, can replace file contents with zero-valued bytes and thus potentially disable security mechanisms. NOTE: this issue is not always security related, but can be security related in realistic situations. A possible example is cp, from a recent GNU Core Utilities (coreutils) version, when attempting to preserve a rule set for denying unauthorized access. (One might use cp when configuring access control, such as with the /etc/hosts.deny file specified in the IBM Support reference.) NOTE: this issue occurs less often in version 2.2.1, and in versions before 2.1.4, because of the default configuration in those versions.
|
[
"cpe:2.3:a:openzfs:openzfs:*:*:*:*:*:*:*:*",
"cpe:2.3:a:openzfs:openzfs:2.2.0:-:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:14.0:-:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
|
RHSA-2022:0561
|
Red Hat Security Advisory: OpenShift Container Platform 4.9.22 security update
|
golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet golang: net/http/httputil: panic due to racy read of persistConn after handler panic
|
[
"cpe:/a:redhat:openshift:4.9::el8"
] | null | 5.9 | null | null | null |
GHSA-365p-m6g8-hhgp
|
A vulnerability has been identified in JT2Go (All versions < V13.2.0.5), Teamcenter Visualization (All versions < V13.2.0.5). The Tiff_Loader.dll is vulnerable to use of uninitialized memory while parsing user supplied TIFF files. This could allow an attacker to cause a denial-of-service condition.
|
[] | null | 5.5 | null | null | null |
|
GHSA-mvfv-hmwr-6c9m
|
libreport 2.0.7 before 2.6.3 only saves changes to the first file when editing a crash report, which allows remote attackers to obtain sensitive information via unspecified vectors related to the (1) backtrace, (2) cmdline, (3) environ, (4) open_fds, (5) maps, (6) smaps, (7) hostname, (8) remote, (9) ks.cfg, or (10) anaconda-tb file attachment included in a Red Hat Bugzilla bug report.
|
[] | null | null | null | null | null |
|
GHSA-hjm7-v5pw-x89r
|
Use after free in Web Audio in Google Chrome prior to 121.0.6167.85 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
|
[] | null | 8.8 | null | null | null |
|
GHSA-2pcg-35vc-fm72
|
Multiple cross-site scripting (XSS) vulnerabilities in the Webee Comments (com_webeecomment) component 1.1.1, 1.2, and 2.0 for Joomla! allow remote attackers to inject arbitrary web script or HTML via the (1) color, (2) img, or (3) url BBCode tags in unspecified vectors.
|
[] | null | null | null | null | null |
|
GHSA-3fg7-rwvx-xrf8
|
ONTAP 9 versions prior to 9.9.1P18, 9.10.1P16, 9.11.1P13, 9.12.1P10
and 9.13.1P4 are susceptible to a vulnerability which could allow an
authenticated user with multiple remote accounts with differing roles to
perform actions via REST API beyond their intended privilege. Possible
actions include viewing limited configuration details and metrics or
modifying limited settings, some of which could result in a Denial of
Service (DoS).
|
[] | null | 7.6 | null | null | null |
|
GHSA-9c6p-3cm9-mxv6
|
Improper access control in SamsungAccount for Galaxy Watch prior to SMR Jul-2025 Release 1 allows local attackers to access phone number.
|
[] | null | 5.5 | null | null | null |
|
GHSA-q58j-fmvf-9rq6
|
Cross site scripting in actionpack Rubygem
|
A cross-site scripting vulnerability flaw was found in the `auto_link` function in Rails before version 3.0.6.
|
[] | null | 6.1 | null | null | null |
CVE-2025-49761
|
Windows Kernel Elevation of Privilege Vulnerability
|
Use after free in Windows Kernel allows an authorized attacker to elevate privileges locally.
|
[] | null | 7.8 | null | null | null |
CVE-2021-35616
|
Vulnerability in the Oracle Transportation Management product of Oracle Supply Chain (component: UI Infrastructure). The supported version that is affected is 6.4.3. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Transportation Management. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Transportation Management accessible data as well as unauthorized read access to a subset of Oracle Transportation Management accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N).
|
[
"cpe:2.3:a:oracle:transportation_management:6.4.3:*:*:*:*:*:*:*"
] | null | 5.4 | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.