id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-f4m6-6rf4-xgc8 | Cross-site request forgery (CSRF) vulnerability on I-O DATA DEVICE HVL-A2.0, HVL-A3.0, HVL-A4.0, HVL-AT1.0S, HVL-AT2.0, HVL-AT3.0, HVL-AT4.0, HVL-AT2.0A, HVL-AT3.0A, and HVL-AT4.0A devices with firmware before 2.04 allows remote attackers to hijack the authentication of arbitrary users for requests that delete content. | [] | null | null | 8.8 | null |
|
CVE-2022-44000 | An issue was discovered in BACKCLICK Professional 5.9.63. Due to an exposed internal communications interface, it is possible to execute arbitrary system commands on the server. | [
"cpe:2.3:a:backclick:backclick:5.9.63:*:*:*:professional:*:*:*"
] | null | 9.8 | null | null |
|
GHSA-73xh-4mx2-qvpf | It is identified a vulnerability of Unrestricted Upload of File with Dangerous Type in the file uploading function in InfoDoc Document On-line Submission and Approval System, which allows an unauthenticated remote attacker to exploit this vulnerability to upload and run arbitrary executable files to perform arbitrary system commands or disrupt service. This issue affects Document On-line Submission and Approval System: 22547, 22567. | [] | null | 9.8 | null | null |
|
GHSA-qqm5-7q57-5m9g | Missing Authorization vulnerability in Fantastic Plugins Fantastic Content Protector Free allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Fantastic Content Protector Free: from n/a through 2.6. | [] | null | 5.3 | null | null |
|
CVE-2024-40515 | An issue in SHENZHEN TENDA TECHNOLOGY CO.,LTD Tenda AX2pro V16.03.29.48_cn allows a remote attacker to execute arbitrary code via the Routing functionality. | [
"cpe:2.3:o:tendacn:ax2_pro:16.03.29.48_cn:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
GHSA-mpm5-mv3x-34x2 | Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK & Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454. | [] | null | null | null | null |
|
CVE-2019-7786 | Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have a use after free vulnerability. Successful exploitation could lead to arbitrary code execution. | [
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | null | 8.8 | 9.3 |
|
CVE-2019-11287 | RabbitMQ Web Management Plugin DoS via heap overflow | Pivotal RabbitMQ, versions 3.7.x prior to 3.7.21 and 3.8.x prior to 3.8.1, and RabbitMQ for Pivotal Platform, 1.16.x versions prior to 1.16.7 and 1.17.x versions prior to 1.17.4, contain a web management plugin that is vulnerable to a denial of service attack. The "X-Reason" HTTP Header can be leveraged to insert a malicious Erlang format string that will expand and consume the heap, resulting in the server crashing. | [
"cpe:2.3:a:pivotal_software:rabbitmq:*:*:*:*:*:pivotal_cloud_foundry:*:*",
"cpe:2.3:a:pivotal_software:rabbitmq:*:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:rabbitmq:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openstack:15:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] | null | null | 4.5 | null |
CVE-2014-2623 | Unspecified vulnerability in HP Storage Data Protector 8.x allows remote attackers to execute arbitrary code via unknown vectors. | [
"cpe:2.3:a:hp:storage_data_protector:8.0:-:*:*:*:windows_7:*:*",
"cpe:2.3:a:hp:storage_data_protector:8.0:-:*:*:*:windows_8:*:*",
"cpe:2.3:a:hp:storage_data_protector:8.0:-:*:*:*:windows_server_2003:*:*",
"cpe:2.3:a:hp:storage_data_protector:8.0:-:*:*:*:windows_server_2008:*:*",
"cpe:2.3:a:hp:storage_data_protector:8.10:-:*:*:*:windows_7:*:*",
"cpe:2.3:a:hp:storage_data_protector:8.10:-:*:*:*:windows_8:*:*",
"cpe:2.3:a:hp:storage_data_protector:8.10:-:*:*:*:windows_server_2003:*:*",
"cpe:2.3:a:hp:storage_data_protector:8.10:-:*:*:*:windows_server_2008:*:*"
] | null | null | null | 10 |
|
CVE-2013-5454 | IBM WebSphere Portal 6.0 through 6.0.1.7, 6.1.0 through 6.1.0.6 CF27, 6.1.5 through 6.1.5.3 CF27, 7.0 through 7.0.0.2 CF25, and 8.0 through 8.0.0.1 CF08 allows remote attackers to read arbitrary files via a modified URL. | [
"cpe:2.3:a:ibm:websphere_portal:6.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:6.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:6.0.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:6.0.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:6.0.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:6.0.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:6.0.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:6.0.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:6.0.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:6.1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:6.1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:6.1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:6.1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:6.1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:6.1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:6.1.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:6.1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:6.1.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:6.1.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:7.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:7.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:7.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:8.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:8.0.0.1:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2019-0682 | An elevation of privilege vulnerability exists due to an integer overflow in Windows Subsystem for Linux, aka 'Windows Subsystem for Linux Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-0689, CVE-2019-0692, CVE-2019-0693, CVE-2019-0694. | [
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
] | null | null | 7.8 | 4.6 |
|
CVE-2023-28346 | An issue was discovered in Faronics Insight 10.0.19045 on Windows. It is possible for a remote attacker to communicate with the private API endpoints exposed at /login, /consoleSettings, /console, etc. despite Virtual Host Routing being used to block this access. Remote attackers can interact with private pages on the web server, enabling them to perform privileged actions such as logging into the console and changing console settings if they have valid credentials. | [
"cpe:2.3:a:faronics:insight:10.0.19045:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 7.3 | null | null |
|
CVE-2023-44011 | An issue in mojoPortal v.2.7.0.0 allows a remote attacker to execute arbitrary code via a crafted script to the layout.master skin file at the Skin management component. | [
"cpe:2.3:a:mojoportal:mojoportal:2.7.0.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
CVE-2024-35288 | Nitro PDF Pro before 13.70.8.82 and 14.x before 14.26.1.0 allows Local Privilege Escalation in the MSI Installer because custom actions occur unsafely in repair mode. CertUtil is run in a conhost.exe window, and there is a mechanism allowing CTRL+o to launch cmd.exe as NT AUTHORITY\SYSTEM. | [
"cpe:2.3:a:gonitro:nitro_pdf_pro:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
|
GHSA-qchr-f55h-m8qr | Cross-site scripting (XSS) vulnerability in the WhyDoWork AdSense plugin 1.2 for WordPress allows remote attackers to inject arbitrary web script or HTML via the idcode parameter in the whydowork_adsense page to wp-admin/options-general.php. | [] | null | null | null | null |
|
GHSA-9ppw-7p8w-h9g2 | A vulnerability in the email filtering mechanism of Cisco Secure Email Gateway could allow an unauthenticated, remote attacker to bypass the configured rules and allow emails that should have been denied to flow through an affected device. This vulnerability is due to improper handling of email that passes through an affected device. An attacker could exploit this vulnerability by sending a crafted email through the affected device. A successful exploit could allow the attacker to bypass email filters on the affected device. | [] | null | 5.8 | null | null |
|
RHSA-2014:0827 | Red Hat Security Advisory: tomcat security update | Tomcat/JBossWeb: Limited DoS in chunked transfer encoding input filter Tomcat/JBossWeb: XXE vulnerability via user supplied XSLTs Tomcat/JBossWeb: Request smuggling via malicious content length header | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
CVE-2010-4395 | Heap-based buffer overflow in RealNetworks RealPlayer 11.0 through 11.1, RealPlayer SP 1.0 through 1.1.5, and Linux RealPlayer 11.0.2.1744 allows remote attackers to execute arbitrary code via a crafted conditional component in AAC frame data. | [
"cpe:2.3:a:realnetworks:realplayer:11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:11.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:11.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:11.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:11.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:11.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:11.1:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer_sp:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer_sp:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer_sp:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer_sp:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer_sp:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer_sp:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer_sp:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer_sp:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer_sp:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer_sp:1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:11.0.2.1744:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
GHSA-x7jg-6pwg-fx5h | HTTP Smuggling via Transfer-Encoding Header in Puma | ImpactBy using an invalid transfer-encoding header, an attacker could [smuggle an HTTP response.](https://portswigger.net/web-security/request-smuggling)Originally reported by @ZeddYu, who has our thanks for the detailed report.PatchesThe problem has been fixed in Puma 3.12.5 and Puma 4.3.4.For more informationIf you have any questions or comments about this advisory:Open an issue in [Puma](https://github.com/puma/puma)See our [security policy](https://github.com/puma/puma/security/policy) | [] | null | 7.5 | null | null |
CVE-2010-2352 | The Node Reference module in Content Construction Kit (CCK) module 5.x before 5.x-1.11 and 6.x before 6.x-2.7 for Drupal does not perform access checks before displaying referenced nodes, which allows remote attackers to read controlled nodes. | [
"cpe:2.3:a:karen_stevenson:cck:5.x-1.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:karen_stevenson:cck:5.x-1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:karen_stevenson:cck:5.x-1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:karen_stevenson:cck:5.x-1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:karen_stevenson:cck:5.x-1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:karen_stevenson:cck:5.x-1.x:dev:*:*:*:*:*:*",
"cpe:2.3:a:karen_stevenson:cck:6.x-2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:karen_stevenson:cck:6.x-2.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:karen_stevenson:cck:6.x-2.0:rc10:*:*:*:*:*:*",
"cpe:2.3:a:karen_stevenson:cck:6.x-2.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:karen_stevenson:cck:6.x-2.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:karen_stevenson:cck:6.x-2.0:rc4:*:*:*:*:*:*",
"cpe:2.3:a:karen_stevenson:cck:6.x-2.0:rc5:*:*:*:*:*:*",
"cpe:2.3:a:karen_stevenson:cck:6.x-2.0:rc6:*:*:*:*:*:*",
"cpe:2.3:a:karen_stevenson:cck:6.x-2.0:rc7:*:*:*:*:*:*",
"cpe:2.3:a:karen_stevenson:cck:6.x-2.0:rc8:*:*:*:*:*:*",
"cpe:2.3:a:karen_stevenson:cck:6.x-2.0:rc9:*:*:*:*:*:*",
"cpe:2.3:a:karen_stevenson:cck:6.x-2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:karen_stevenson:cck:6.x-2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:karen_stevenson:cck:6.x-2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:karen_stevenson:cck:6.x-2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:karen_stevenson:cck:6.x-2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:karen_stevenson:cck:6.x-2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:yves_chedemois:cck:5.x-1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:yves_chedemois:cck:5.x-1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:yves_chedemois:cck:5.x-1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:yves_chedemois:cck:5.x-1.6-1:*:*:*:*:*:*:*",
"cpe:2.3:a:yves_chedemois:cck:5.x-1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:yves_chedemois:cck:5.x-1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:yves_chedemois:cck:5.x-1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-p9v5-43w4-jhw3 | The OWM Weather WordPress plugin before 5.6.9 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by users with a role as low as contributor | [] | null | 8.8 | null | null |
|
CVE-2015-8709 | kernel/ptrace.c in the Linux kernel through 4.4.1 mishandles uid and gid mappings, which allows local users to gain privileges by establishing a user namespace, waiting for a root process to enter that namespace with an unsafe uid or gid, and then using the ptrace system call. NOTE: the vendor states "there is no kernel bug here. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | null | 7 | 6.9 |
|
GHSA-cx28-78m7-h38f | A Cross-Site Scripting (XSS) vulnerability in the Rendering Engine component in Apryse WebViewer v11.1 and earlier allows attackers to execute arbitrary code via a crafted PDF file. | [] | null | 5.4 | null | null |
|
GHSA-68cf-8298-f8rx | A stored cross-site scripting (XSS) vulnerability exists in the management web interface of WatchGuard Firebox and XTM appliances. A remote attacker can potentially execute arbitrary JavaScript code in the management web interface by sending crafted requests to exposed management ports. This is fixed in Fireware OS 12.8.1, 12.5.10, and 12.1.4. | [] | null | 5.4 | null | null |
|
CVE-2006-4054 | Multiple PHP remote file inclusion vulnerabilities in ME Download System 1.3 allow remote attackers to execute arbitrary PHP code via a URL in the (1) Vb8878b936c2bd8ae0cab parameter to (a) inc/sett_style.php or (b) inc/sett_smilies.php; or the (2) Vb6c4d0e18a204a63b38f, (3) V18a78b93c3adaaae84e2, or (4) V9ae5d2ca9e9e787969ff parameters to (c) inc/datei.php. NOTE: the provenance of this information is unknown; the details are obtained from third party information. | [
"cpe:2.3:a:ehmig:me_download_system:1.3:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-xm3m-xgwh-g333 | SQL injection vulnerability in the Workflow Screen in dotCMS before 3.3.2 allows remote administrators to execute arbitrary SQL commands via the orderby parameter. | [] | null | null | 7.2 | null |
|
CVE-2015-6363 | Multiple cross-site scripting (XSS) vulnerabilities in the web framework in Cisco FireSIGHT Management Center (MC) 5.4.1.4 and 6.0.1 allow remote authenticated users to inject arbitrary web script or HTML via unspecified parameters, aka Bug ID CSCuw88396. | [
"cpe:2.3:a:cisco:firesight_system_software:5.4.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firesight_system_software:6.0.1:*:*:*:*:*:*:*"
] | null | null | null | 3.5 |
|
GHSA-hm7f-rq7q-j9xp | @builder.io/qwik vulnerable to Cross-site Scripting | @builder.io/qwik prior to version 0.16.2 is vulnerable to cross-site scripting due to attribute names and the class attribute values not being properly handled. | [] | null | 6.1 | null | null |
GHSA-f8vc-wfc8-hxqh | Improper Privilege Management in Apache Hadoop | In Apache Hadoop 3.2.0 to 3.2.1, 3.0.0-alpha1 to 3.1.3, and 2.0.0-alpha to 2.10.0, WebHDFS client might send SPNEGO authorization header to remote URL without proper verification. | [] | null | 8.8 | null | null |
GHSA-q57w-826p-46jr | Apache Airflow ODBC Provider, Apache Airflow MSSQL Provider Improper Input Validation vulnerability | Input Validation vulnerability in Apache Software Foundation Apache Airflow ODBC Provider, Apache Software Foundation Apache Airflow MSSQL Provider.This vulnerability is considered low since it requires DAG code to use `get_sqlalchemy_connection` and someone with access to connection resources specifically updating the connection to exploit it.This issue affects Apache Airflow ODBC Provider: before 4.0.0; Apache Airflow MSSQL Provider: before 3.4.1.It is recommended to upgrade to a version that is not affected | [] | null | 4.3 | null | null |
CVE-2008-5201 | Directory traversal vulnerability in index.php in OTManager CMS 24a allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the conteudo parameter. NOTE: in some environments, this can be leveraged for remote file inclusion by using a UNC share pathname or an ftp, ftps, or ssh2.sftp URL. | [
"cpe:2.3:a:otmanager:otmanager_cms:24a:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-76p4-4v5g-fpxr | An Insecure Direct Object Reference, with Authorization Bypass through a User-Controlled Key, was possible in JetBrains YouTrack. The issue was fixed in 2018.4.49168. | [] | null | null | 9.8 | null |
|
RHSA-2020:5275 | Red Hat Security Advisory: rh-php73-php security, bug fix, and enhancement update | php: DirectoryIterator class accepts filenames with embedded \0 byte and treats them as terminating at that byte php: Information disclosure in exif_read_data() php: Integer wraparounds when receiving multipart forms php: Out of bounds read when parsing EXIF information oniguruma: Heap-based buffer over-read in function gb18030_mbc_enc_len in file gb18030.c oniguruma: Heap-based buffer over-read in function fetch_interval_quantifier in regparse.c oniguruma: Heap-based buffer overflow in str_lower_case_match in regexec.c php: Out of bounds read in php_strip_tags_ex php: Global buffer-overflow in mbfl_filt_conv_big5_wchar function php: NULL pointer dereference in PHP session upload progress php: Files added to tar with Phar::buildFromIterator have all-access permissions php: Information disclosure in exif_read_data() function php: Using mb_strtolower() function with UTF-32LE encoding leads to potential code execution php: Information disclosure in function get_headers | [
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 4.3 | 6.5 | null |
CVE-2005-1119 | Sudo VISudo 1.6.8 and earlier allows local users to corrupt arbitrary files via a symlink attack on temporary files. | [
"cpe:2.3:a:todd_miller:sudo:1.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.5.8:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.5.9:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.6.3_p1:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.6.3_p2:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.6.3_p3:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.6.3_p4:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.6.3_p5:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.6.3_p6:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.6.3_p7:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.6.4_p1:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.6.4_p2:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.6.5_p1:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.6.5_p2:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.6.7:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.6.7_p5:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.6.8:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.6.8_p1:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.6.8_p8:*:*:*:*:*:*:*"
] | null | null | null | 2.1 |
|
CVE-2024-37223 | WordPress Restaurant Reservations plugin <= 2.0 - Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Nicdark Restaurant Reservations allows Stored XSS.This issue affects Restaurant Reservations: from n/a through 2.0. | [
"cpe:2.3:a:nicdarkthemes:restaurant_food:*:*:*:*:*:wordpress:*:*"
] | null | 6.5 | null | null |
GHSA-r9hq-g47p-52p3 | The Muslim Prayer Time-Salah/Iqamah plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Masjid ID parameter in all versions up to, and including, 1.8.8 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] | null | 6.4 | null | null |
|
GHSA-pvw2-9h4r-c5cr | An internal reference count is held on the buffer pool, incremented every time a new buffer is created from the pool. The reference count is maintained as an int; on LP64 systems this can cause the reference count to overflow if the client creates a large number of wl_shm buffer objects, or if it can coerce the server to create a large number of external references to the buffer storage. With the reference count overflowing, a use-after-free can be constructed on the wl_shm_pool tracking structure, where values may be incremented or decremented; it may also be possible to construct a limited oracle to leak 4 bytes of server-side memory to the attacking client at a time. | [] | null | 9.8 | null | null |
|
GHSA-fpfv-jqm9-f5jm | Incorrect Comparison in NumPy | Incomplete string comparison in the numpy.core component in NumPy1.9.x, which allows attackers to fail the APIs via constructing specific string objects. | [] | null | 5.3 | null | null |
CVE-2009-3245 | OpenSSL before 0.9.8m does not check for a NULL return value from bn_wexpand function calls in (1) crypto/bn/bn_div.c, (2) crypto/bn/bn_gf2m.c, (3) crypto/ec/ec2_smpl.c, and (4) engines/e_ubsec.c, which has unspecified impact and context-dependent attack vectors. | [
"cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.8:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.8a:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.8b:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.8c:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.8d:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.8e:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.8f:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.8g:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.8h:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.8i:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.8j:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.8k:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
CVE-2008-5857 | The DropDocuments plugin in KnowledgeTree before 3.5.4a allows remote authenticated users to gain administrative privileges via a certain sequence of "browse documents" and dashboard requests. | [
"cpe:2.3:a:knowledgetree_document_management:knowledgetree_document_management:*:*:*:*:*:*:*:*",
"cpe:2.3:a:knowledgetree_document_management:knowledgetree_document_management:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:knowledgetree_document_management:knowledgetree_document_management:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:knowledgetree_document_management:knowledgetree_document_management:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:knowledgetree_document_management:knowledgetree_document_management:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:knowledgetree_document_management:knowledgetree_document_management:3.0.3a:*:*:*:*:*:*:*",
"cpe:2.3:a:knowledgetree_document_management:knowledgetree_document_management:3.0.3b:*:*:*:*:*:*:*",
"cpe:2.3:a:knowledgetree_document_management:knowledgetree_document_management:3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:knowledgetree_document_management:knowledgetree_document_management:3.1a:*:*:*:*:*:*:*",
"cpe:2.3:a:knowledgetree_document_management:knowledgetree_document_management:3.1b:*:*:*:*:*:*:*",
"cpe:2.3:a:knowledgetree_document_management:knowledgetree_document_management:3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:knowledgetree_document_management:knowledgetree_document_management:3.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:knowledgetree_document_management:knowledgetree_document_management:3.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:knowledgetree_document_management:knowledgetree_document_management:3.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:knowledgetree_document_management:knowledgetree_document_management:3.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:knowledgetree_document_management:knowledgetree_document_management:3.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:knowledgetree_document_management:knowledgetree_document_management:3.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:knowledgetree_document_management:knowledgetree_document_management:3.3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:knowledgetree_document_management:knowledgetree_document_management:3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:knowledgetree_document_management:knowledgetree_document_management:3.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:knowledgetree_document_management:knowledgetree_document_management:3.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:knowledgetree_document_management:knowledgetree_document_management:3.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:knowledgetree_document_management:knowledgetree_document_management:3.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:knowledgetree_document_management:knowledgetree_document_management:3.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:knowledgetree_document_management:knowledgetree_document_management:3.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:knowledgetree_document_management:knowledgetree_document_management:3.4a:*:*:*:*:*:*:*",
"cpe:2.3:a:knowledgetree_document_management:knowledgetree_document_management:3.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:knowledgetree_document_management:knowledgetree_document_management:3.5.2a:*:*:*:*:*:*:*",
"cpe:2.3:a:knowledgetree_document_management:knowledgetree_document_management:3.5.2b:*:*:*:*:*:*:*",
"cpe:2.3:a:knowledgetree_document_management:knowledgetree_document_management:3.5.2c:*:*:*:*:*:*:*",
"cpe:2.3:a:knowledgetree_document_management:knowledgetree_document_management:3.5.3:*:*:*:*:*:*:*"
] | null | null | null | 6.5 |
|
CVE-2023-20909 | In multiple functions of RunningTasks.java, there is a possible privilege escalation due to a missing privilege check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-243130512 | [
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
|
GHSA-4rf9-6jc8-wpcq | Openforum stores sensitive information under the web root with insufficient access control, which allows remote attackers to download a database containing user passwords via a direct request for openforum.mdb. | [] | null | null | null | null |
|
GHSA-7r6c-w44p-vhc8 | In Nagios XI through 5.8.5, a read-only Nagios user (due to an incorrect permission check) is able to schedule downtime for any host/services. This allows an attacker to permanently disable all monitoring checks. | [] | null | 6.5 | null | null |
|
GHSA-cfw4-vhm2-m225 | An issue was discovered on D-Link DSR-250 3.17 devices. Insufficient validation of configuration file checksums could allow a remote, authenticated attacker to inject arbitrary crontab entries into saved configurations before uploading. These entries are executed as root. | [] | null | null | null | null |
|
CVE-2020-4365 | IBM WebSphere Application Server 8.5 is vulnerable to server-side request forgery. By sending a specially crafted request, a remote authenticated attacker could exploit this vulnerability to obtain sensitive data. IBM X-Force ID: 178964. | [
"cpe:2.3:a:ibm:websphere_application_server:*:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:i:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:z\\/os:-:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:solaris:-:*:*:*:*:*:*:*"
] | null | null | 5.3 | null |
|
CVE-1999-0465 | Remote attackers can crash Lynx and Internet Explorer using an IMG tag with a large width parameter. | [] | null | null | null | 10 |
|
CVE-2017-1442 | IBM Emptoris Services Procurement 10.0.0.5 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 128107. | [
"cpe:2.3:a:ibm:emptoris_services_procurement:10.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:emptoris_services_procurement:10.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:emptoris_services_procurement:10.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:emptoris_services_procurement:10.0.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:emptoris_services_procurement:10.0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:emptoris_services_procurement:10.0.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:emptoris_services_procurement:10.1.1.0:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.8 |
|
CVE-2008-6951 | MauryCMS 0.53.2 and earlier does not require administrative authentication for Editors/fckeditor/editor/filemanager/browser/default/browser.html, which allows remote attackers to upload arbitrary files via a direct request. | [
"cpe:2.3:a:cms.maury91:maurycms:0.53.2:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-724r-f3gv-fmx5 | Trimble SketchUp Viewer SKP File Parsing Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Trimble SketchUp Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of SKP files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24112. | [] | null | null | 7.8 | null |
|
GHSA-h882-fqc8-r8p8 | Unknown vulnerability in Sun Java System Web Server 6.0 SP7 and earlier and 6.1 SP1 and earlier, and Application Server 7 Update 4 and earlier, allows remote attackers to cause a denial of service (crash) via a malformed client certificate. | [] | null | null | null | null |
|
CVE-2024-38368 | Trunk's 'Claim your pod' could be used to obtain un-used pods | trunk.cocoapods.org is the authentication server for the CoacoaPods dependency manager. A vulnerability affected older pods which migrated from the pre-2014 pull request workflow to trunk. If the pods had never been claimed then it was still possible to do so. It was also possible to have all owners removed from a pod, and that made the pod available for the same claiming system. This was patched server-side in commit 71be5440906b6bdfbc0bcc7f8a9fec33367ea0f4 in September 2023. | [
"cpe:2.3:a:cocoapods:cocoapods:*:*:*:*:*:*:*:*",
"cpe:2.3:a:cocoapods:trunk.cocoapods.org:*:*:*:*:ruby:*:*:*"
] | null | 9.3 | null | null |
CVE-2022-29457 | Zoho ManageEngine ADSelfService Plus before 6121, ADAuditPlus 7060, Exchange Reporter Plus 5701, and ADManagerPlus 7131 allow NTLM Hash disclosure during certain storage-path configuration steps. | [
"cpe:2.3:a:zohocorp:manageengine_adaudit_plus:*:*:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.0.0:-:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.0.0:7000:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.0.0:7002:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.0.0:7003:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.0.0:7004:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.0.0:7005:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.0.0:7006:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.0.0:7007:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.0.0:7008:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.0.0:7050:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.0.0:7051:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.0.0:7052:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.0.0:7053:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.0.0:7054:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.0.0:7055:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_admanager_plus:*:*:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_admanager_plus:7.1:-:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_admanager_plus:7.1:7100:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_admanager_plus:7.1:7101:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_admanager_plus:7.1:7102:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_admanager_plus:7.1:7110:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_admanager_plus:7.1:7111:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_admanager_plus:7.1:7112:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_admanager_plus:7.1:7113:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_admanager_plus:7.1:7114:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_admanager_plus:7.1:7115:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_admanager_plus:7.1:7116:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_admanager_plus:7.1:7117:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_admanager_plus:7.1:7118:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_admanager_plus:7.1:7120:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_admanager_plus:7.1:7121:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_admanager_plus:7.1:7122:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_admanager_plus:7.1:7123:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_admanager_plus:7.1:7124:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_admanager_plus:7.1:7125:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_admanager_plus:7.1:7126:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_admanager_plus:7.1:7130:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:*:*:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:6.1:-:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:6.1:6100:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:6.1:6101:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:6.1:6102:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:6.1:6103:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:6.1:6104:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:6.1:6105:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:6.1:6106:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:6.1:6107:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:6.1:6108:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:6.1:6109:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:6.1:6110:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:6.1:6111:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:6.1:6112:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:6.1:6113:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:6.1:6114:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:6.1:6115:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:6.1:6116:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:6.1:6117:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:6.1:6118:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:6.1:6119:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:6.1:6120:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_exchange_reporter_plus:*:*:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_exchange_reporter_plus:5.7:-:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_exchange_reporter_plus:5.7:5700:*:*:*:*:*:*"
] | null | 8.8 | null | 6.5 |
|
CVE-2025-31622 | WordPress Advanced Typekit plugin <= 1.0.1 - Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Utkarsh Kukreti Advanced Typekit allows Stored XSS. This issue affects Advanced Typekit: from n/a through 1.0.1. | [] | null | 6.5 | null | null |
GHSA-xjq2-x47m-hqr8 | The uploads module in vTiger CRM 4.2 and earlier allows remote attackers to upload arbitrary files, such as PHP files, via the add2db action. | [] | null | null | null | null |
|
CVE-2024-8168 | code-projects Online Bus Reservation Site login.php sql injection | A vulnerability was found in code-projects Online Bus Reservation Site 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file login.php. The manipulation of the argument Username leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. | [
"cpe:2.3:a:code-projects:online_bus_reservation_site:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fabianros:online_bus_reservation_site:1.0:*:*:*:*:*:*:*"
] | 6.9 | 7.3 | 7.3 | 7.5 |
CVE-2019-13123 | Foxit Reader 9.6.0.25114 and earlier has two unique RecursiveCall bugs involving 3 functions exhausting available stack memory because of Uncontrolled Recursion in the V8 JavaScript engine (issue 1 of 2). | [
"cpe:2.3:a:foxitsoftware:foxit_reader:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
CVE-2023-51966 | Tenda AX1803 v1.0.0.1 contains a stack overflow via the adv.iptv.stballvlans parameter in the function setIptvInfo. | [
"cpe:2.3:o:tenda:ax1803_firmware:1.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:h:tenda:ax1803:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
GHSA-h535-j96r-875v | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in RadiusTheme The Post Grid allows PHP Local File Inclusion. This issue affects The Post Grid: from n/a through 7.7.17. | [] | null | 7.5 | null | null |
|
GHSA-prgf-2j5r-6m96 | Multiple buffer overflows in the HttpSprockMake function in http.c in Frank Yaul corehttp 0.5.3alpha allow remote attackers to execute arbitrary code via a long string in the (1) method name or (2) URI in an HTTP request. | [] | null | null | null | null |
|
GHSA-rc64-qfj8-v4mp | Out of bound access while processing a non-standard IE measurement request with length crossing past the size of frame in Snapdragon Auto, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in MDM9150, MDM9206, MDM9607, MDM9640, MDM9650, MSM8909W, MSM8996AU, QCA6174A, QCA6574AU, QCA9377, QCA9379, QCS405, SD 210/SD 212/SD 205, SD 425, SD 439 / SD 429, SD 450, SD 615/16/SD 415, SD 625, SD 632, SD 636, SD 650/52, SD 665, SD 675, SD 712 / SD 710 / SD 670, SD 730, SD 820A, SD 835, SD 845 / SD 850, SD 855, SDA660, SDM439, SDM630, SDM660, SDX20, SDX24 | [] | null | null | null | null |
|
GHSA-96vr-9q65-96gj | The FormFlow: WhatsApp Social and Advanced Form Builder with Easy Lead Collection WordPress plugin before 2.12.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) | [] | null | 5.9 | null | null |
|
RHSA-2020:1277 | Red Hat Security Advisory: OpenShift Container Platform 4.3.10 openshift-enterprise-hyperkube-container security update | kubernetes: crafted requests to kubelet API allow for memory exhaustion | [
"cpe:/a:redhat:openshift:4.3::el7"
] | null | 4.3 | null | null |
CVE-2024-51615 | WordPress WordPress Auction Plugin plugin <= 3.7 - SQL Injection vulnerability | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Owen Cutajar & Hyder Jaffari WordPress Auction Plugin allows SQL Injection.This issue affects WordPress Auction Plugin: from n/a through 3.7. | [
"cpe:2.3:a:wp_auctions:wp-auctions:*:*:*:*:*:*:*:*"
] | null | 9.3 | null | null |
GHSA-xjqr-wxf9-h6mr | An OS command injection vulnerability exists in the ys_thirdparty system_user_script functionality of Milesight UR32L v32.3.0.5. A specially crafted series of network requests can lead to command execution. An attacker can send a sequence of requests to trigger this vulnerability. | [] | null | 7.2 | null | null |
|
CVE-2022-0889 | The Ninja Forms - File Uploads Extension WordPress plugin is vulnerable to reflected cross-site scripting due to missing sanitization of the files filename parameter found in the ~/includes/ajax/controllers/uploads.php file which can be used by unauthenticated attackers to add malicious web scripts to vulnerable WordPress sites, in versions up to and including 3.3.12. | [
"cpe:2.3:a:ninjaforms:ninja_forms_file_uploads:*:*:*:*:*:wordpress:*:*"
] | null | 7.2 | null | null |
|
CVE-2018-11385 | An issue was discovered in the Security component in Symfony 2.7.x before 2.7.48, 2.8.x before 2.8.41, 3.3.x before 3.3.17, 3.4.x before 3.4.11, and 4.0.x before 4.0.11. A session fixation vulnerability within the "Guard" login feature may allow an attacker to impersonate a victim towards the web application if the session id value was previously known to the attacker. | [
"cpe:2.3:a:sensiolabs:symfony:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*"
] | null | null | 8.1 | 6.8 |
|
GHSA-j487-27wr-29q4 | Buffer overflow in Norton Antivirus for Exchange (NavExchange) allows remote attackers to cause a denial of service via a .zip file that contains long file names. | [] | null | null | null | null |
|
cisco-sa-ftd-dos-rUDseW3r | Cisco Firepower Threat Defense Software SSH Connections Denial of Service Vulnerability | A vulnerability in the processing of SSH connections for multi-instance deployments of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on the affected device.
This vulnerability is due to a lack of proper error handling when an SSH session fails to be established. An attacker could exploit this vulnerability by sending a high rate of crafted SSH connections to the instance. A successful exploit could allow the attacker to cause resource exhaustion, which causes a DoS condition on the affected device. The device must be manually reloaded to recover.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is part of the October 2021 release of the Cisco ASA, FTD, and FMC Security Advisory Bundled publication. For a complete list of the advisories and links to them, see Cisco Event Response: October 2021 Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication ["https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-74773"]. | [] | null | 8.6 | null | null |
GHSA-c7h3-gqp6-j6w6 | In multiple cases browser prompts could have been obscured by popups controlled by content. These could have led to potential user confusion and spoofing attacks. This vulnerability affects Firefox < 113, Firefox ESR < 102.11, and Thunderbird < 102.11. | [] | null | 6.5 | null | null |
|
GHSA-p65f-qm2h-fr27 | Cross-site scripting (XSS) vulnerability in scvrtsrv.cmd in Comtrend CT-507IT ADSL Router allows remote attackers to inject arbitrary web script or HTML via the srvName parameter. | [] | null | null | null | null |
|
GHSA-564g-g3h9-2h5g | The Windows font library in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Office 2007 SP3, Office 2010 SP2, Word Viewer, Skype for Business 2016, Lync 2013 SP1, Lync 2010, Lync 2010 Attendee, and Live Meeting 2007 Console allows remote attackers to execute arbitrary code via a crafted embedded font, aka "Windows Graphics Component RCE Vulnerability," a different vulnerability than CVE-2016-3303. | [] | null | null | 7.8 | null |
|
CVE-2021-26354 | Insufficient bounds checking in ASP may allow an
attacker to issue a system call from a compromised ABL which may cause
arbitrary memory values to be initialized to zero, potentially leading to a
loss of integrity.
| [
"cpe:2.3:o:amd:epyc_7773x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7573x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7473x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7373x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7003_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7003:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7002_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7002:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7232p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7252_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7262_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7272_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7282_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7302_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7302p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7352_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7402_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7402p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7452_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7502_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7502p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7532_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7542_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7552_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7642_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7662_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7702_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7702p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7742_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7f32_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7f52_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7f72_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7h12_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7h12:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_2400g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_2400g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_2400ge_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_2400ge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_2200g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_2200g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_2200ge_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_2200ge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_pro_2100ge_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_pro_2100ge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_2700x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_2700x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_2700_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_2700:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_2700e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_2700e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_2600x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_2600x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_2600_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_2600:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_2600e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_2600e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_2500x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_2500x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_1600_af_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_1600_af:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_2300x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_2300x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_1200_af_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_1200_af:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_9_3950x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_9_3950x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_9_3900xt_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_9_3900xt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_9_3900x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_9_3900x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_9_3900_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_9_3900:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_3800xt_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_3800xt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_3800x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_3800x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_3700x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_3700x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_3600xt_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_3600xt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_3600x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_3600x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_3600_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_3600:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_3500x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_3500x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_3500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_3500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3300x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_3300x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3100_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_3100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_9_5950x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_9_5950x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_9_5900x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_9_5900x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_9_5900_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_9_5900:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_5800x3d_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_5800x3d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_5800x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_5800x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_5800_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_5800:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_5700x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_5700x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5600x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_5600x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5600_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_5600:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_5500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_5700g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_5700g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_5700ge_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_5700ge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5600g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_5600g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5600ge_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_5600ge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_5300g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_5300g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_5300ge_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_5300ge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_2990wx_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_threadripper_2990wx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_2970wx_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_threadripper_2970wx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_2950x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_threadripper_2950x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_2920x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_threadripper_2920x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_pro_3945wx_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_threadripper_pro_3945wx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_pro_3955wx_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_threadripper_pro_3955wx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_pro_3975wx_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_threadripper_pro_3975wx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_pro_3995wx_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_threadripper_pro_3995wx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_3960x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_threadripper_3960x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_3970x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_threadripper_3970x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_3990x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_threadripper_3990x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_pro_5945wx_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_threadripper_pro_5945wx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_pro_5955wx_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_threadripper_pro_5955wx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_pro_5965wx_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_threadripper_pro_5965wx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_pro_5975wx_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_threadripper_pro_5975wx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_pro_5995wx_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_threadripper_pro_5995wx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3250u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_3250u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3250c_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_3250c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3200u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_3200u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:amd_3015e_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:amd_3015e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:amd_3015ce_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:amd_3015ce:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_2800h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_2800h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_2700u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_2700u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_2600h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_2600h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_2500u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_2500u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_2300u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_2300u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_2200u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_2200u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_3780u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_3780u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_3750h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_3750h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_3700c_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_3700c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_3700u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_3700u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_3580u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_3580u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_3550h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_3550h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_3500c_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_3500c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_3500u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_3500u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_3450u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_3450u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3350u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_3350u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3300u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_3300u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_5700u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_5700u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5500u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_5500u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_5300u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_5300u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_9_5980hx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_9_5980hx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_9_5980hs_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_9_5980hs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_9_5900hx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_9_5900hx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_9_5900hs_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_9_5900hs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_5800h_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_5800h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_5800hs_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_5800hs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_5825u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_5825u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_5800u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_5800u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5600h_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_5600h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5600hs_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_5600hs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5625u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_5625u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5600u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_5600u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5560u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_5560u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_5425u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_5425u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_5400u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_5400u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_5125c_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_5125c:-:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
|
GHSA-c3jp-9rg8-8vx4 | Buffer overflow in the Microsoft Office MSODataSourceControl ActiveX object allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long argument to the DeleteRecordSourceIfUnused method. | [] | null | null | null | null |
|
CVE-2023-22985 | Sourcecodester Simple Guestbook Management System version 1 is vulnerable to Cross Site Scripting (XSS) via Name, Referrer, Location, and Comments. | [
"cpe:2.3:a:simple_guestbook_management_system_project:simple_guestbook_management_system:1.0:*:*:*:*:*:*:*"
] | null | 6.1 | null | null |
|
RHSA-2023:1066 | Red Hat Security Advisory: pesign security update | pesign: Local privilege escalation on pesign systemd service | [
"cpe:/a:redhat:rhel_eus:8.4::appstream"
] | null | 7.8 | null | null |
CVE-2024-35266 | Azure DevOps Server Spoofing Vulnerability | Azure DevOps Server Spoofing Vulnerability | [
"cpe:2.3:o:microsoft:azure_devops_server:2022.1.0:*:*:*:*:*:*:*"
] | null | 7.6 | null | null |
GHSA-65fr-wr9w-9m6v | An injection vulnerability in Barco ClickShare CX-30/20, C-5/10, and ClickShare Bar Pro and Core models, running firmware before 2.21.1, allows physically proximate attackers or local admins to the webUI to trigger OS-level command execution as root. | [] | null | 7.6 | null | null |
|
RHSA-2020:3209 | Red Hat Security Advisory: AMQ Online 1.5.2 release and security update | postgresql-jdbc: XML external entity (XXE) vulnerability in PgSQLXML amq-on: CSRF (in graphQL requests) AMQ: Denial of Service via unrecognized field injection | [
"cpe:/a:redhat:amq_online:1.5"
] | null | 4.3 | null | null |
GHSA-cr2x-gvj3-j6cc | Multiple cross-site scripting (XSS) vulnerabilities in Mercury SiteScope 8.2 (8.1.2.0) allow remote authenticated users to inject arbitrary web script or HTML via (1) "any field create name field" except "create new group name" or (2) any description field. | [] | null | null | null | null |
|
CVE-2010-2309 | Buffer overflow in the web server for EvoLogical EvoCam 3.6.6 and 3.6.7 allows remote attackers to execute arbitrary code via a long GET request. | [
"cpe:2.3:a:evological:evocam:3.6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:evological:evocam:3.6.7:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-98g3-884p-c9q5 | In order to prevent XML External Entity vulnerability in SAP NetWeaver ABAP Server and ABAP Platform (Process Integration - Enterprise Service Repository JAVA Mappings), versions - 7.10, 7.20, 7.30, 7.31, 7.40, 7.50, SAP recommends to refer this note. | [] | null | null | null | null |
|
GHSA-q699-2648-qrc2 | Cross Site Scripting (XSS) vulnerability in Sourcecodester Insurance Management System 1.0 allows attackers to run arbitrary code via the Subject and Description fields when submitting a support ticket. | [] | null | 6.1 | null | null |
|
RHSA-2014:0679 | Red Hat Security Advisory: openssl security update | openssl: freelist misuse causing a possible use-after-free openssl: Buffer overflow via DTLS invalid fragment openssl: SSL_MODE_RELEASE_BUFFERS NULL pointer dereference in do_ssl3_write() openssl: DoS when sending invalid DTLS handshake openssl: SSL/TLS MITM vulnerability openssl: client-side denial of service when using anonymous ECDH | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
GHSA-frj7-889m-pjx6 | ImageMagick 7.0.8-50 Q16 has memory leaks in AcquireMagickMemory because of an AnnotateImage error. | [] | null | 6.5 | null | null |
|
GHSA-phmv-qjxc-9jxj | Proxy Driver Spoofing Vulnerability | [] | null | 6.7 | null | null |
|
CVE-2024-52569 | A vulnerability has been identified in Teamcenter Visualization V14.2 (All versions < V14.2.0.14), Teamcenter Visualization V14.3 (All versions < V14.3.0.12), Teamcenter Visualization V2312 (All versions < V2312.0008), Teamcenter Visualization V2406 (All versions < V2406.0005), Tecnomatix Plant Simulation V2302 (All versions < V2302.0018), Tecnomatix Plant Simulation V2404 (All versions < V2404.0007). The affected applications contain an out of bounds write vulnerability when parsing a specially crafted WRL file.
This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-24260) | [
"cpe:2.3:a:siemens:tecnomatix_plant_simulation:-:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:tecnomatix_plant_simulation:*:*:*:*:*:*:*:*"
] | 7.3 | 7.8 | null | null |
|
CVE-2008-0066 | Multiple buffer overflows in htmsr.dll in the HTML speed reader in Autonomy (formerly Verity) KeyView, as used by IBM Lotus Notes 7.0.2 and 7.0.3, allow remote attackers to execute arbitrary code via an HTML document with (1) "large chunks of data," or a long URL in the (2) BACKGROUND attribute of a BODY element or (3) SRC attribute of an IMG element. | [
"cpe:2.3:a:autonomy:keyview:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:7.0.3:*:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
GHSA-wh4h-v3f2-r2pp | Uncontrolled Memory Consumption in Django | Django 1.11.x before 1.11.19, 2.0.x before 2.0.11, and 2.1.x before 2.1.6 allows Uncontrolled Memory Consumption via a malicious attacker-supplied value to the `django.utils.numberformat.format()` function. | [] | 8.7 | null | 7.5 | null |
GHSA-535v-4x9q-446c | Improper Authorization in org.apache.hbase:hbase | In all previously released Apache HBase 2.x versions (2.0.0-2.0.4, 2.1.0-2.1.3), authorization was incorrectly applied to users of the HBase REST server. Requests sent to the HBase REST server were executed with the permissions of the REST server itself, not with the permissions of the end-user. This issue is only relevant when HBase is configured with Kerberos authentication, HBase authorization is enabled, and the REST server is configured with SPNEGO authentication. This issue does not extend beyond the HBase REST server. | [] | null | null | 7.5 | null |
RHSA-2022:7639 | Red Hat Security Advisory: openblas security update | lapack: Out-of-bounds read in *larrv | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 5.9 | null | null |
GHSA-hpm9-fx8v-w45v | Plaintext storage in Jenkins instant-messaging Plugin | Jenkins instant-messaging Plugin 1.41 and earlier stores passwords for group chats unencrypted in the global configuration file of plugins based on Jenkins instant-messaging Plugin on the Jenkins controller where they can be viewed by users with access to the Jenkins controller file system. | [] | null | 6.5 | null | null |
CVE-1999-0855 | Buffer overflow in FreeBSD gdc program. | [
"cpe:2.3:o:freebsd:freebsd:3.3:*:*:*:*:*:*:*"
] | null | null | null | 7.2 |
|
GHSA-pfjp-fv5p-fjx7 | In the Linux kernel, the following vulnerability has been resolved:netfilter: nft_set_pipapo: release elements in clone only from destroy pathClone already always provides a current view of the lookup table, use it
to destroy the set, otherwise it is possible to destroy elements twice.This fix requires:212ed75dc5fb ("netfilter: nf_tables: integrate pipapo into commit protocol")which came after:9827a0e6e23b ("netfilter: nft_set_pipapo: release elements in clone from abort path"). | [] | null | 5.5 | null | null |
|
RHSA-2016:2819 | Red Hat Security Advisory: memcached security update | memcached: Server append/prepend remote code execution memcached: Server update remote code execution memcached: SASL authentication remote code execution | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 8.1 | null |
CVE-2018-7706 | Directory traversal vulnerability in SecurEnvoy SecurMail before 9.2.501 allows remote authenticated users to read arbitrary e-mail messages via a .. (dot dot) in the option2 parameter in an attachment action to secmail/getmessage.exe. | [
"cpe:2.3:a:securenvoy:securmail:*:*:*:*:*:*:*:*"
] | null | null | 6.5 | 4 |
|
GHSA-7679-9xw6-2858 | A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions < V8.2), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions < V8.2), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions < V8.2), SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2) (All versions < V8.2), SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2) (All versions < V8.2), SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2) (All versions < V8.2), SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2) (All versions < V8.2), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions < V8.2), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions < V8.2), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions < V8.2), SCALANCE M874-3 3G-Router (CN) (6GK5874-3AA00-2FA2) (All versions < V8.2), SCALANCE M876-3 (6GK5876-3AA02-2BA2) (All versions < V8.2), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions < V8.2), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions < V8.2), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions < V8.2), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions < V8.2), SCALANCE MUM853-1 (A1) (6GK5853-2EA10-2AA1) (All versions < V8.2), SCALANCE MUM853-1 (B1) (6GK5853-2EA10-2BA1) (All versions < V8.2), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions < V8.2), SCALANCE MUM856-1 (A1) (6GK5856-2EA10-3AA1) (All versions < V8.2), SCALANCE MUM856-1 (B1) (6GK5856-2EA10-3BA1) (All versions < V8.2), SCALANCE MUM856-1 (CN) (6GK5856-2EA00-3FA1) (All versions < V8.2), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions < V8.2), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions < V8.2), SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) (All versions < V8.2), SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) (All versions < V8.2). Affected devices do not properly validate input in configuration fields of the iperf functionality. This could allow an unauthenticated remote attacker to execute arbitrary code on the device. | [] | 8.6 | 7.2 | null | null |
|
RHSA-2016:1096 | Red Hat Security Advisory: kernel security and bug fix update | kernel: net: incorrect processing of checksums in UDP implementation kernel: net: incorrect processing of checksums in UDP implementation | [
"cpe:/o:redhat:rhel_aus:6.4::server"
] | null | null | null | null |
GHSA-x3f9-4w7w-5mj9 | Adobe After Effects version 18.2 (and earlier) is affected by a Heap-based Buffer Overflow vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [] | null | null | null | null |
|
CVE-2016-10600 | webrtc-native uses WebRTC from chromium project. webrtc-native downloads binary resources over HTTP, which leaves it vulnerable to MITM attacks. It may be possible to cause remote code execution (RCE) by swapping out the requested binary with an attacker controlled binary if the attacker is on the network or positioned in between the user and the remote server. | [
"cpe:2.3:a:webrtc:webrtc-native:*:*:*:*:*:node.js:*:*"
] | null | null | 8.1 | 9.3 |
|
CVE-2016-1632 | The Extensions subsystem in Google Chrome before 49.0.2623.75 does not properly maintain own properties, which allows remote attackers to bypass intended access restrictions via crafted JavaScript code that triggers an incorrect cast, related to extensions/renderer/v8_helpers.h and gin/converter.h. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.8 |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.