id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
ICSA-20-210-02 | Softing Industrial Automation OPC | The affected product is vulnerable to a heap-based buffer overflow, which may allow an attacker to remotely execute arbitrary code.CVE-2020-14524 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). The affected product is vulnerable to uncontrolled resource consumption, which may allow an attacker to cause a denial-of-service condition.CVE-2020-14522 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). | [] | null | null | 7.5 | null |
GHSA-mphw-9ggw-rxxh | Cross-site scripting (XSS) vulnerability in the Adobe Flex SDK 3.x and 4.x before 4.6 allows remote attackers to inject arbitrary web script or HTML via vectors related to the loading of modules from different domains. | [] | null | null | null | null |
|
GHSA-7qf6-6hr2-26gq | Sophos Web Appliance before 3.7.8.2 allows (1) remote attackers to execute arbitrary commands via shell metacharacters in the client-ip parameter to the Block page, when using the user_workstation variable in a customized template, and remote authenticated users to execute arbitrary commands via shell metacharacters in the (2) url parameter to the Diagnostic Tools functionality or (3) entries parameter to the Local Site List functionality. | [] | null | null | null | null |
|
RHSA-2020:2615 | Red Hat Security Advisory: thunderbird security update | Mozilla: Security downgrade with IMAP STARTTLS leads to information leakage Mozilla: Use-after-free in SharedWorkerService Mozilla: JavaScript Type confusion with NativeTypes Mozilla: Memory safety bugs fixed in Firefox 77 and Firefox ESR 68.9 | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.8 | 7.5 | null |
GHSA-98c2-3mpw-gw7c | The Visitors WordPress plugin through 0.3 is affected by an Unauthenticated Stored Cross-Site Scripting (XSS) vulnerability. The plugin would display the user's user agent string without validation or encoding within the WordPress admin panel. | [] | null | null | null | null |
|
GHSA-2jjj-q6r5-r2xp | Cross-site scripting (XSS) vulnerability in shopadmin.asp in VP-ASP Shopping Cart 5.50 allows remote attackers to inject arbitrary web script or HTML via the UserName parameter. | [] | null | null | null | null |
|
GHSA-qg7x-r68h-9889 | A vulnerability in the installation process of Cisco HyperFlex Software could allow an authenticated, local attacker to read sensitive information. The vulnerability is due to insufficient cleanup of installation files. An attacker could exploit this vulnerability by accessing the residual installation files on an affected system. A successful exploit could allow the attacker to collect sensitive information regarding the configuration of the system. | [] | null | 5.5 | null | null |
|
CVE-2022-3511 | Awesome Support < 6.1.2 - Subscriber+ Arbitrary Exported Tickets Download | The Awesome Support WordPress plugin before 6.1.2 does not ensure that the exported tickets archive to be downloaded belongs to the user making the request, allowing a low privileged user, such as subscriber to download arbitrary exported tickets via an IDOR vector | [
"cpe:2.3:a:getawesomesupport:awesome_support:*:*:*:*:*:wordpress:*:*"
] | null | 6.5 | null | null |
GHSA-f37c-qmx2-jfjh | Unspecified vulnerability in the EnterpriseOne Tools component in Oracle JD Edwards 8.98 SP 24 allows remote attackers to affect availability, related to Enterprise Infrastructure SEC (JDENET). | [] | null | null | null | null |
|
GHSA-wm6x-mrp3-f56m | The browser user interface in Firefox before 1.0.5, Mozilla before 1.7.9, and Netscape 8.0.2 and 7.2 does not properly distinguish between user-generated events and untrusted synthetic events, which makes it easier for remote attackers to perform dangerous actions that normally could only be performed manually by the user. | [] | null | null | null | null |
|
CVE-2022-1519 | LRM does not restrict the types of files that can be uploaded to the affected product. A malicious actor can upload any file type, including executable code that allows for a remote code exploit. | [
"cpe:2.3:a:illumina:local_run_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:h:illumina:iseq_100:-:*:*:*:*:*:*:*",
"cpe:2.3:h:illumina:miniseq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:illumina:miseq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:illumina:miseq_dx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:illumina:nextseq_500:-:*:*:*:*:*:*:*",
"cpe:2.3:h:illumina:nextseq_550:-:*:*:*:*:*:*:*",
"cpe:2.3:h:illumina:nextseq_550dx:-:*:*:*:*:*:*:*"
] | null | 10 | null | null |
|
GHSA-x88v-3jcf-x556 | Event Tracing for Windows Information Disclosure Vulnerability. This CVE ID is unique from CVE-2023-21753. | [] | null | 4.7 | null | null |
|
CVE-2024-9881 | LearnPress < 4.2.7.2 - Admin+ Stored XSS | The LearnPress WordPress plugin before 4.2.7.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). | [] | null | 4.8 | null | null |
CVE-2022-21473 | Vulnerability in the Oracle Banking Treasury Management product of Oracle Financial Services Applications (component: Infrastructure). The supported version that is affected is 14.5. Difficult to exploit vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Banking Treasury Management. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Banking Treasury Management accessible data as well as unauthorized read access to a subset of Oracle Banking Treasury Management accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Banking Treasury Management. CVSS 3.1 Base Score 5.9 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:H/A:L). | [
"cpe:2.3:a:oracle:banking_treasury_management:14.5:*:*:*:*:*:*:*"
] | null | 5.9 | null | null |
|
GHSA-xpjw-f7rh-9w56 | An issue was discovered in EMC ScaleIO 2.0.1.x. In a Linux environment, one of the support scripts saves the credentials of the ScaleIO MDM user who executed the script in clear text in temporary log files. The temporary files may potentially be read by an unprivileged user with access to the server where the script was executed to recover exposed credentials. | [] | null | 8.4 | null | null |
|
GHSA-xr5q-pj6q-cgc5 | Cross-site scripting (XSS) vulnerability in auth.php in Just For Fun Network Management System (JFFNMS) 0.8.3 allows remote attackers to inject arbitrary web script or HTML via the user parameter. | [] | null | null | null | null |
|
GHSA-3wjr-cm4f-gg8r | The Pizza Hut Japan Official Order application before 1.1.1.a for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [] | null | null | null | null |
|
CVE-2023-7081 | SQLi in PosTahsil's Online Payment System | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in POSTAHSİL Online Payment System allows SQL Injection.This issue affects Online Payment System: before 14.02.2024.
| [
"cpe:2.3:a:postahsil:online_payment_system:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
CVE-2019-13182 | A stored cross-site scripting (XSS) vulnerability exists in the web UI of SolarWinds Serv-U FTP Server 15.1.7. | [
"cpe:2.3:a:solarwinds:serv-u_ftp_server:15.1.7:*:*:*:*:*:*:*"
] | null | 5.4 | null | 3.5 |
|
GHSA-gx96-vgf7-hwfg | In Apache PDFBox a carefully crafted PDF file can trigger an extremely long running computation | In Apache PDFBox 1.8.0 to 1.8.15 and 2.0.0RC1 to 2.0.11, a carefully crafted PDF file can trigger an extremely long running computation when parsing the page tree. | [] | null | 5.5 | null | null |
CVE-2020-10011 | An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in iOS 14.2 and iPadOS 14.2, macOS Catalina 10.15.7, Security Update 2020-005 High Sierra, Security Update 2020-005 Mojave. Processing a maliciously crafted USD file may lead to unexpected application termination or arbitrary code execution. | [
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.13.6:-:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2018-002:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2018-003:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-001:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-002:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-003:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-004:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-005:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-006:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-007:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2020-001:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2020-002:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2020-003:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2020-004:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:-:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-001:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-002:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-004:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-005:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-006:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-007:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-001:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-002:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-003:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-004:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:11.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | 6.8 |
|
CVE-2022-20462 | In phNxpNciHal_write_unlocked of phNxpNciHal.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-230356196 | [
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
|
GHSA-h737-q6g6-8wr6 | OpenStack Glance Denial of service by creating a large number of images | OpenStack Image Registry and Delivery Service (Glance) 2014.2 through 2014.2.2 does not properly remove images, which allows remote authenticated users to cause a denial of service (disk consumption) by creating a large number of images using the task v2 API and then deleting them before the uploads finish, a different vulnerability than CVE-2015-1881. | [] | 7.1 | 6.5 | null | null |
CVE-2013-5328 | Adobe ColdFusion 10 before Update 12 allows remote attackers to read arbitrary files via unspecified vectors. | [
"cpe:2.3:a:adobe:coldfusion:*:update11:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:10.0:update1:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:10.0:update2:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:10.0:update3:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:10.0:update4:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:10.0:update8:*:*:*:*:*:*"
] | null | null | null | 7.8 |
|
GHSA-693w-9mm2-8px6 | Apple iCal 3.0.1 on Mac OS X allows remote CalDAV servers, and user-assisted remote attackers, to cause a denial of service (NULL pointer dereference and application crash) or possibly execute arbitrary code via a .ics file containing (1) a large 16-bit integer on a TRIGGER line, or (2) a large integer in a COUNT field on an RRULE line. | [] | null | null | null | null |
|
GHSA-wgx7-jwwm-cgjv | Improper Authentication in Apache Spark | In Apache Spark 2.4.5 and earlier, a standalone resource manager's master may be configured to require authentication (spark.authenticate) via a shared secret. When enabled, however, a specially-crafted RPC to the master can succeed in starting an application's resources on the Spark cluster, even without the shared key. This can be leveraged to execute shell commands on the host machine. This does not affect Spark clusters using other resource managers (YARN, Mesos, etc). | [] | 9.3 | 9.8 | null | null |
CVE-2011-1894 | The MHTML protocol handler in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 does not properly handle a MIME format in a request for embedded content in an HTML document, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted EMBED element in a web page that is visited in Internet Explorer, aka "MHTML Mime-Formatted Request Vulnerability." | [
"cpe:2.3:o:microsoft:windows_2003_server:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:*:sp2:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:*:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:*:x32:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:*:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x32:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:*:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:*:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp2:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2008-5406 | Stack-based buffer overflow in Apple QuickTime Player 7.5.5 and iTunes 8.0.2.20 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a MOV file with "long arguments," related to an "off by one overflow." | [
"cpe:2.3:a:apple:itunes:8.0.2.20:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.5.5:*:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
GHSA-hf56-943j-3hp3 | Buffer overflow vulnerability in Linksys WAP610N v1.0.05.002 due to the lack of length verification, which is related to the time setting operation. The attacker can directly control the remote target device by successfully exploiting this vulnerability. | [] | null | 7.3 | null | null |
|
CVE-2008-5731 | The PGPwded device driver (aka PGPwded.sys) in PGP Corporation PGP Desktop 9.0.6 build 6060 and 9.9.0 build 397 allows local users to cause a denial of service (system crash) and possibly gain privileges via a certain METHOD_BUFFERED IOCTL request that overwrites portions of memory, related to a "Driver Collapse." NOTE: some of these details are obtained from third party information. | [
"cpe:2.3:a:pgp:desktop:9.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:pgp:desktop:9.9.0:*:*:*:*:*:*:*"
] | null | null | null | 4.9 |
|
GHSA-v226-92fr-fm36 | A vulnerability has been identified in Teamcenter Visualization V14.3 (All versions < V14.3.0.13), Teamcenter Visualization V2312 (All versions < V2312.0009), Teamcenter Visualization V2406 (All versions < V2406.0007), Teamcenter Visualization V2412 (All versions < V2412.0002), Tecnomatix Plant Simulation V2302 (All versions < V2302.0021), Tecnomatix Plant Simulation V2404 (All versions < V2404.0010). The affected application is vulnerable to memory corruption while parsing specially crafted WRL files. This could allow an attacker to execute code in the context of the current process. | [] | 7.3 | 7.8 | null | null |
|
CVE-2023-43256 | A path traversal in Gladys Assistant v4.26.1 and below allows authenticated attackers to extract sensitive files in the host machine by exploiting a non-sanitized user input. | [
"cpe:2.3:a:gladysassistant:gladys_assistant:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | null |
|
GHSA-96xh-p2g6-wph5 | SQL injection vulnerability found in PrestaShop sendinblue v.4.0.15 and before allow a remote attacker to gain privileges via the ajaxOrderTracking.php component. | [] | null | 9.8 | null | null |
|
GHSA-85gr-f847-q6cw | Buffer underflow in some Intel(R) PCM software before version 202307 may allow an unauthenticated user to potentially enable denial of service via network access. | [] | null | 7.5 | null | null |
|
CVE-2014-6313 | Cross-site scripting (XSS) vulnerability in the WooCommerce plugin before 2.2.3 for WordPress allows remote attackers to inject arbitrary web script or HTML via the range parameter on the wc-reports page to wp-admin/admin.php. | [
"cpe:2.3:a:woothemes:woocommerce_plugin:*:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:woothemes:woocommerce_plugin:2.1.0:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:woothemes:woocommerce_plugin:2.1.1:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:woothemes:woocommerce_plugin:2.1.2:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:woothemes:woocommerce_plugin:2.1.3:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:woothemes:woocommerce_plugin:2.1.4:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:woothemes:woocommerce_plugin:2.1.5:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:woothemes:woocommerce_plugin:2.1.6:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:woothemes:woocommerce_plugin:2.1.7:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:woothemes:woocommerce_plugin:2.1.8:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:woothemes:woocommerce_plugin:2.1.9:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:woothemes:woocommerce_plugin:2.1.10:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:woothemes:woocommerce_plugin:2.1.11:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:woothemes:woocommerce_plugin:2.1.12:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:woothemes:woocommerce_plugin:2.2.0:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:woothemes:woocommerce_plugin:2.2.1:*:*:*:*:wordpress:*:*"
] | null | null | null | 4.3 |
|
GHSA-rjcg-qgj2-xjr9 | Adobe Acrobat and Reader versions 2019.010.20064 and earlier, 2019.010.20064 and earlier, 2017.011.30110 and earlier version, and 2015.006.30461 and earlier have a type confusion vulnerability. Successful exploitation could lead to arbitrary code execution. | [] | null | null | null | null |
|
CVE-2013-4804 | Unspecified vulnerability in HP Business Process Monitor 9.13.1 patch 1 and 9.22 patch 1 allows remote attackers to execute arbitrary code and obtain sensitive information via unknown vectors. | [
"cpe:2.3:a:ibm:business_process_monitor:9.13.1:patch1:*:*:*:*:*:*",
"cpe:2.3:a:ibm:business_process_monitor:9.22:patch1:*:*:*:*:*:*"
] | null | null | null | 10 |
|
GHSA-gj6c-q4g4-xwj5 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in SonicWall GMS and Analytics allows an unauthenticated attacker to extract sensitive information from the application database. This issue affects GMS: 9.3.2-SP1 and earlier versions; Analytics: 2.5.0.4-R7 and earlier versions. | [] | null | 7.5 | null | null |
|
GHSA-qw2f-33vp-25mq | An insufficient session expiration vulnerability [CWE- 613] in FortiClientEMS versions 6.4.2 and below, 6.2.8 and below may allow an attacker to reuse the unexpired admin user session IDs to gain admin privileges, should the attacker be able to obtain that session ID (via other, hypothetical attacks) | [] | null | null | null | null |
|
CVE-2015-4104 | Xen 3.3.x through 4.5.x does not properly restrict access to PCI MSI mask bits, which allows local x86 HVM guest users to cause a denial of service (unexpected interrupt and host crash) via unspecified vectors. | [
"cpe:2.3:o:xen:xen:3.3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.1.5:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.1.6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.2.3:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.3.4:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.4.1:-:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:*"
] | null | null | null | 7.8 |
|
GHSA-gq6c-wcjg-9p8q | common/spinlock.c in Xen 4.4.x and earlier does not properly handle read and write locks, which allows local x86 guest users to cause a denial of service (write denial or NMI watchdog timeout and host crash) via a large number of read requests, a different vulnerability to CVE-2014-9066. | [] | null | null | null | null |
|
CVE-2025-31888 | WordPress WP Multi Store Locator Plugin <= 2.5.2 - Cross Site Request Forgery (CSRF) vulnerability | Cross-Site Request Forgery (CSRF) vulnerability in WPExperts.io WP Multistore Locator allows Cross Site Request Forgery. This issue affects WP Multistore Locator: from n/a through 2.5.2. | [] | null | 4.3 | null | null |
RHSA-2022:4895 | Red Hat Security Advisory: postgresql:10 security update | postgresql: Autovacuum, REINDEX, and others omit "security restricted operation" sandbox | [
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 8.8 | null | null |
GHSA-42xf-g5pp-5x9x | Multiple directory traversal vulnerabilities in phpTrafficA 1.4.1, and possibly earlier, allow remote attackers to include arbitrary local files via a .. (dot dot) in the (1) file parameter to plotStat.php and the (2) lang parameter to banref.php. | [] | null | null | null | null |
|
GHSA-rg33-3c9v-cfv6 | Out of bound write while QoS DSCP mapping due to improper input validation for data received from association response frame in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in APQ8009, APQ8017, APQ8053, APQ8096AU, APQ8098, MDM9150, MDM9206, MDM9207C, MDM9607, MDM9650, MSM8905, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8996AU, Nicobar, QCA6174A, QCA6574AU, QCA9377, QCA9379, QCM2150, QCN7605, QCS405, QCS605, QM215, SA6155P, Saipan, SC8180X, SDA845, SDM429, SDM429W, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM845, SDX20, SDX55, SM8150, SM8250, SXR2130 | [] | null | null | null | null |
|
GHSA-rpwq-g7r7-vvmv | STDU Viewer 1.6.375 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .xps file, related to "Data from Faulting Address controls Branch Selection starting at STDUXPSFile!DllUnregisterServer+0x0000000000028657." | [] | null | null | 7.8 | null |
|
GHSA-wcwc-jqw2-r482 | The devada.co.uk (aka com.wdevadacouk) application 1.2 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [] | null | null | null | null |
|
GHSA-xxf7-gc52-wjrf | IBM Lotus Domino R5 and R6 WebMail, with "Generate HTML for all fields" enabled, stores HTTPPassword hashes from names.nsf in a manner accessible through Readviewentries and OpenDocument requests to the defaultview view, a different vector than CVE-2005-2428. | [] | null | null | null | null |
|
GHSA-qhc3-g353-ghmg | SQL injection vulnerability in games/game.php in ProArcadeScript allows remote attackers to execute arbitrary SQL commands via the id parameter. | [] | null | null | null | null |
|
CVE-2001-1106 | The default configuration of Sambar Server 5 and earlier uses a symmetric key that is compiled into the binary program for encrypting passwords, which could allow local users to break all user passwords by cracking the key or modifying a copy of the sambar program to call the decryption procedure. | [
"cpe:2.3:a:sambar:sambar_server:4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:sambar:sambar_server:4.2.1_production:*:*:*:*:*:*:*",
"cpe:2.3:a:sambar:sambar_server:4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:sambar:sambar_server:4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:sambar:sambar_server:5.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:sambar:sambar_server:5.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:sambar:sambar_server:5.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:sambar:sambar_server:5.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:sambar:sambar_server:5.0:beta5:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-659v-49wv-3wv5 | Multiple cross-site scripting (XSS) vulnerabilities in the HMI web application in Siemens WinCC (TIA Portal) 11 allow remote attackers to inject arbitrary web script or HTML via a crafted URL. | [] | null | null | null | null |
|
CVE-2018-2606 | Vulnerability in the Oracle Hospitality Guest Access component of Oracle Hospitality Applications (subcomponent: Base). Supported versions that are affected are 4.2.0 and 4.2.1. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle Hospitality Guest Access executes to compromise Oracle Hospitality Guest Access. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Hospitality Guest Access accessible data. CVSS 3.0 Base Score 6.2 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N). | [
"cpe:2.3:a:oracle:hospitality_guest_access:4.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:hospitality_guest_access:4.2.1:*:*:*:*:*:*:*"
] | null | null | 6.2 | 2.1 |
|
CVE-2016-8439 | Possible buffer overflow in trust zone access control API. Buffer overflow may occur due to lack of buffer size checking. Product: Android. Versions: Kernel 3.18. Android ID: A-31625204. References: QC-CR#1027804. | [
"cpe:2.3:o:linux:linux_kernel:3.18:*:*:*:*:*:*:*"
] | null | null | 9.8 | 10 |
|
GHSA-37x9-fxq8-3m6j | Dolibarr ERP/CRM 9.0.1 was affected by stored XSS within uploaded files. These vulnerabilities allowed the execution of a JavaScript payload each time any regular user or administrative user clicked on the malicious link hosted on the same domain. The vulnerabilities could be exploited by low privileged users to target administrators. The viewimage.php page did not perform any contextual output encoding and would display the content within the uploaded file with a user-requested MIME type. | [] | null | null | 5.4 | null |
|
RHSA-2024:1559 | Red Hat Security Advisory: OpenShift Container Platform 4.15.6 bug fix and security update | kubevirt-csi: PersistentVolume allows access to HCP's root node golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON | [
"cpe:/a:redhat:openshift:4.15::el8",
"cpe:/a:redhat:openshift:4.15::el9"
] | null | 5.9 | null | null |
GHSA-3j3f-q7qx-c66q | The mci_check_login function in api/soap/mc_api.php in the SOAP API in MantisBT before 1.2.9 allows remote attackers to bypass authentication via a null password. | [] | null | null | null | null |
|
GHSA-4xqj-gmj4-778q | Cross-site request forgery (CSRF) vulnerability in the Call Detail Records Analysis and Reporting (CAR) interface in the OS Administration component in Cisco Unified Communications Manager (Unified CM) 10.0(1) and earlier allows remote attackers to hijack the authentication of administrators for requests that make administrative changes, aka Bug ID CSCun00701. | [] | null | null | null | null |
|
RHSA-2024:2696 | Red Hat Security Advisory: unbound security update | bind9: KeyTrap - Extreme CPU consumption in DNSSEC validator bind9: Preparing an NSEC3 closest encloser proof can exhaust CPU resources unbound: unrestricted reconfiguration enabled to anyone that may lead to local privilege escalation | [
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
] | null | 8 | null | null |
CVE-2019-1000 | An elevation of privilege vulnerability exists in Microsoft Azure Active Directory Connect build 1.3.20.0, which allows an attacker to execute two PowerShell cmdlets in context of a privileged account, and perform privileged actions.To exploit this, an attacker would need to authenticate to the Azure AD Connect server, aka 'Microsoft Azure AD Connect Elevation of Privilege Vulnerability'. | [
"cpe:2.3:a:microsoft:azure_active_directory_connect:-:*:*:*:*:*:*:*"
] | null | null | 5.3 | 3.5 |
|
CVE-2017-1000085 | Subversion Plugin connects to a user-specified Subversion repository as part of form validation (e.g. to retrieve a list of tags). This functionality improperly checked permissions, allowing any user with Item/Build permission (but not Item/Configure) to connect to any web server or Subversion server and send credentials with a known ID, thereby possibly capturing them. Additionally, this functionality did not require POST requests be used, thereby allowing the above to be performed without direct access to Jenkins via Cross-Site Request Forgery attacks. | [
"cpe:2.3:a:jenkins:subversion:*:*:*:*:*:jenkins:*:*"
] | null | null | 6.5 | 4.3 |
|
CVE-2022-46286 | CVE-2022-46286 | Versions of VISAM VBASE Automation Base prior to 11.7.5 may disclose information if a valid user opens a specially crafted file. | [
"cpe:2.3:a:visam:vbase_automation_base:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
RHSA-2024:9474 | Red Hat Security Advisory: krb5 security update | freeradius: forgery attack | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 9 | null | null |
CVE-2005-0319 | Direct remote injection vulnerability in modalfram.wdm in Alt-N WebAdmin 3.0.4 allows remote attackers to load external webpages that appear to come from the WebAdmin server, which allows remote attackers to inject arbitrary HTML or web script to facilitate cross-site scripting (XSS) and phishing attacks. | [
"cpe:2.3:a:alt-n:webadmin:3.0.3:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2023-24408 | WordPress Ecwid Shopping Cart Plugin <= 6.11.4 is vulnerable to Cross Site Scripting (XSS) | Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Ecwid Ecommerce Ecwid Ecommerce Shopping Cart plugin <= 6.11.4 versions. | [
"cpe:2.3:a:lightspeedhq:ecwid_ecommerce_shopping_cart:*:*:*:*:*:wordpress:*:*"
] | null | 6.5 | null | null |
RHSA-2022:7108 | Red Hat Security Advisory: sqlite security update | sqlite: Null pointer derreference in src/select.c sqlite: Out of bounds access during table rename | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 8.1 | null | null |
CVE-2022-29034 | A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V3.1). An error message pop up window in the web interface of the affected application does not prevent injection of JavaScript code.
This could allow attackers to perform reflected cross-site scripting (XSS) attacks. | [
"cpe:2.3:a:siemens:sinema_remote_connect_server:3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:sinema_remote_connect_server:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | null |
|
CVE-2024-47265 | Improper limitation of a pathname to a restricted directory ('Path Traversal') vulnerability in encrypted share umount functionality in Synology Active Backup for Business before 2.7.1-13234, 2.7.1-23234 and 2.7.1-3234 allows remote authenticated users to write specific files via unspecified vectors. | [] | null | 6.5 | null | null |
|
CVE-2021-21416 | Potential sensitive information disclosed in error reports | django-registration is a user registration package for Django. The django-registration package provides tools for implementing user-account registration flows in the Django web framework. In django-registration prior to 3.1.2, the base user-account registration view did not properly apply filters to sensitive data, with the result that sensitive data could be included in error reports rather than removed automatically by Django. Triggering this requires: A site is using django-registration < 3.1.2, The site has detailed error reports (such as Django's emailed error reports to site staff/developers) enabled and a server-side error (HTTP 5xx) occurs during an attempt by a user to register an account. Under these conditions, recipients of the detailed error report will see all submitted data from the account-registration attempt, which may include the user's proposed credentials (such as a password). | [
"cpe:2.3:a:django-registration_project:django-registration:*:*:*:*:*:django:*:*"
] | null | 3.7 | null | null |
GHSA-cjqw-vhgv-5r7w | Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22. | [] | null | null | null | null |
|
GHSA-qw72-xqg4-c435 | An issue was discovered in Teluu pjproject (pjlib and pjlib-util) in PJSIP before 2.7.1. The ioqueue component may issue a double key unregistration after an attacker initiates a socket connection with specific settings and sequences. Such double key unregistration will trigger an integer overflow, which may cause ioqueue backends to reject future key registrations. | [] | null | null | 7.5 | null |
|
GHSA-hrx7-7chr-4cvm | Premisys Identicard version 3.1.190 stores backup files as encrypted zip files. The password to the zip is hard-coded and unchangeable. An attacker with access to these backups can decrypt them and obtain sensitive data. | [] | null | null | 7.5 | null |
|
GHSA-4gpf-73j9-3325 | Annex Cloud Loyalty Experience Platform <2021.1.0.1 allows any authenticated attacker to modify loyalty campaigns and settings, such as fraud prevention, coupon groups, email templates, or referrals. | [] | null | null | null | null |
|
CVE-2023-32193 | Norman API Cross-site Scripting Vulnerability | A vulnerability has been identified in which unauthenticated cross-site
scripting (XSS) in Norman's public API endpoint can be exploited. This
can lead to an attacker exploiting the vulnerability to trigger
JavaScript code and execute commands remotely. | [
"cpe:2.3:a:rancher:norman:*:*:*:*:*:*:*:*"
] | null | 8.3 | null | null |
GHSA-8h8w-q442-78j7 | Multiple vulnerabilities in the web-based management interface of Cisco Finesse could allow an unauthenticated, remote attacker to retrieve a cleartext password from an affected system. Cisco Bug IDs: CSCvg71044. | [] | null | null | 9.8 | null |
|
GHSA-gx8j-3gxx-r6x6 | A vulnerability in the multicast DNS (mDNS) protocol configuration of Cisco Webex Meetings Client for MacOS could allow an unauthenticated adjacent attacker to obtain sensitive information about the device on which the Webex client is running. The vulnerability exists because sensitive information is included in the mDNS reply. An attacker could exploit this vulnerability by doing an mDNS query for a particular service against an affected device. A successful exploit could allow the attacker to gain access to sensitive information. | [] | null | null | null | null |
|
CVE-2008-4493 | Microsoft PicturePusher ActiveX control (PipPPush.DLL 7.00.0709), as used in Microsoft Digital Image 2006 Starter Edition, allows remote attackers to force the upload of arbitrary files by using the AddString and Post methods and a modified PostURL to construct an HTTP POST request. NOTE: this issue might only be exploitable in limited environments or non-default browser settings. | [
"cpe:2.3:a:microsoft:digital_image:2006:unknown:starter:*:*:*:*:*"
] | null | null | null | 6.8 |
|
GHSA-3fw2-c79f-qqpj | Adobe Shockwave Player before 11.6.4.634 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0759. | [] | null | null | 8.8 | null |
|
CVE-2024-27558 | Stupid Simple CMS 1.2.4 is vulnerable to Cross Site Scripting (XSS) within the blog title of the settings. | [
"cpe:2.3:a:stupid_simple:cms:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | null |
|
CVE-2024-12114 | FooGallery – Responsive Photo Gallery, Image Viewer, Justified, Masonry & Carousel <= 2.4.29 - Insecure Direct Object Reference to Authenticated (Custom+) Arbitrary Post/Page Updates | The FooGallery – Responsive Photo Gallery, Image Viewer, Justified, Masonry & Carousel plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 2.4.29 via the foogallery_attachment_modal_save AJAX action due to missing validation on a user controlled key (img_id). This makes it possible for authenticated attackers, with granted access and above, to update arbitrary post and page content. This requires the Gallery Creator Role setting to be a value lower than 'Editor' for there to be any real impact. | [] | null | 4.3 | null | null |
CVE-2025-0795 | ESAFENET CDG todolistjump.jsp cross site scripting | A vulnerability was found in ESAFENET CDG V5. It has been classified as problematic. This affects an unknown part of the file /todolistjump.jsp. The manipulation of the argument flowId leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | [] | 5.3 | 3.5 | 3.5 | 4 |
GHSA-fpj9-r54f-3vw8 | Cross-site scripting (XSS) vulnerability in Sun Java System Portal Server 6.3.1, 7.1, and 7.2 allows remote attackers to inject arbitrary web script or HTML via vectors related to an error page. | [] | null | null | null | null |
|
CVE-2012-1133 | FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap write operation and memory corruption) or possibly execute arbitrary code via crafted glyph or bitmap data in a BDF font. | [
"cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.1.8:rc1:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_mobile:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_mobile:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_mobile:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_mobile:4.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_mobile:4.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_mobile:4.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_mobile:4.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_mobile:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_mobile:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_mobile:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_mobile:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_mobile:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_mobile:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_mobile:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_mobile:10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_mobile:10.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_mobile:10.0.2:*:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
CVE-2023-25435 | libtiff 4.5.0 is vulnerable to Buffer Overflow via extractContigSamplesShifted8bits() at /libtiff/tools/tiffcrop.c:3753. | [
"cpe:2.3:a:libtiff:libtiff:4.5.0:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
|
GHSA-7ghc-xw3w-fw2v | A cross-site scripting (XSS) vulnerability in Doctor Appointment Management System v1.0.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Employee ID parameter. | [] | null | 6.1 | null | null |
|
CVE-2024-0366 | The Starbox – the Author Box for Humans plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 3.4.7 via the action function due to missing validation on a user controlled key. This makes it possible for subscribers to view plugin preferences and potentially other user settings. | [
"cpe:2.3:a:squirrly:starbox:*:*:*:*:*:wordpress:*:*"
] | null | 4.3 | null | null |
|
GHSA-7394-mpvp-x94f | Absolute path traversal vulnerability in the Image Export plugin 1.1 for WordPress allows remote attackers to read and delete arbitrary files via a full pathname in the file parameter to download.php. | [] | null | null | 9.1 | null |
|
CVE-2016-10743 | hostapd before 2.6 does not prevent use of the low-quality PRNG that is reached by an os_random() function call. | [
"cpe:2.3:a:w1.fi:hostapd:*:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
CVE-2021-41826 | PlaceOS Authentication Service before 1.29.10.0 allows app/controllers/auth/sessions_controller.rb open redirect. | [
"cpe:2.3:a:place:placeos_authentication:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | 5.8 |
|
CVE-2023-2057 | EyouCms New Picture cross site scripting | A vulnerability was found in EyouCms 1.5.4. It has been classified as problematic. Affected is an unknown function of the file login.php?m=admin&c=Arctype&a=edit of the component New Picture Handler. The manipulation of the argument litpic_loca leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-225942 is the identifier assigned to this vulnerability. | [
"cpe:2.3:a:eyoucms:eyoucms:1.5.4:*:*:*:*:*:*:*"
] | null | 2.4 | 2.4 | 3.3 |
GHSA-w285-wf9q-5w69 | In Bouncy Castle JCE Provider the ECIES implementation allowed the use of ECB mode | In the Bouncy Castle JCE Provider version 1.55 and earlier the ECIES implementation allowed the use of ECB mode. This mode is regarded as unsafe and support for it has been removed from the provider. | [] | null | null | 7.4 | null |
CVE-2010-3611 | ISC DHCP server 4.0 before 4.0.2, 4.1 before 4.1.2, and 4.2 before 4.2.0-P1 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a DHCPv6 packet containing a Relay-Forward message without an address in the Relay-Forward link-address field. | [
"cpe:2.3:a:isc:dhcp:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:dhcp:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:dhcp:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:dhcp:4.0.1:b1:*:*:*:*:*:*",
"cpe:2.3:a:isc:dhcp:4.0.1:rc1:*:*:*:*:*:*",
"cpe:2.3:a:isc:dhcp:4.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:dhcp:4.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:dhcp:4.1.1:b1:*:*:*:*:*:*",
"cpe:2.3:a:isc:dhcp:4.1.1:b2:*:*:*:*:*:*",
"cpe:2.3:a:isc:dhcp:4.1.1:b3:*:*:*:*:*:*",
"cpe:2.3:a:isc:dhcp:4.1.1:rc1:*:*:*:*:*:*",
"cpe:2.3:a:isc:dhcp:4.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:dhcp:4.2.0:a1:*:*:*:*:*:*",
"cpe:2.3:a:isc:dhcp:4.2.0:a2:*:*:*:*:*:*",
"cpe:2.3:a:isc:dhcp:4.2.0:b1:*:*:*:*:*:*",
"cpe:2.3:a:isc:dhcp:4.2.0:b2:*:*:*:*:*:*",
"cpe:2.3:a:isc:dhcp:4.2.0:rc1:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2011-1567 | Multiple stack-based buffer overflows in IGSSdataServer.exe 9.00.00.11063 and earlier in 7-Technologies Interactive Graphical SCADA System (IGSS) allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted (1) ListAll, (2) Write File, (3) ReadFile, (4) Delete, (5) RenameFile, and (6) FileInfo commands in an 0xd opcode; (7) the Add, (8) ReadFile, (9) Write File, (10) Rename, (11) Delete, and (12) Add commands in an RMS report templates (0x7) opcode; and (13) 0x4 command in an STDREP request (0x8) opcode to TCP port 12401. | [
"cpe:2.3:a:7t:igss:*:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
CVE-2013-0776 | Mozilla Firefox before 19.0, Firefox ESR 17.x before 17.0.3, Thunderbird before 17.0.3, Thunderbird ESR 17.x before 17.0.3, and SeaMonkey before 2.16 allow man-in-the-middle attackers to spoof the address bar by operating a proxy server that provides a 407 HTTP status code accompanied by web script, as demonstrated by a phishing attack on an HTTPS site. | [
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird_esr:*:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_aus:5.9:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*"
] | null | null | null | 4 |
|
GHSA-8v6r-q522-82mj | A vulnerability, which was classified as problematic, has been found in European Environment Agency eionet.contreg. This issue affects some unknown processing. The manipulation of the argument searchTag/resourceUri leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 2022-06-27T0948 is able to address this issue. The name of the patch is a120c2153e263e62c4db34a06ab96a9f1c6bccb6. It is recommended to upgrade the affected component. The identifier VDB-215885 was assigned to this vulnerability. | [] | null | 6.1 | null | null |
|
CVE-2006-0645 | Tiny ASN.1 Library (libtasn1) before 0.2.18, as used by (1) GnuTLS 1.2.x before 1.2.10 and 1.3.x before 1.3.4, and (2) GNU Shishi, allows attackers to crash the DER decoder and possibly execute arbitrary code via "out-of-bounds access" caused by invalid input, as demonstrated by the ProtoVer SSL test suite. | [
"cpe:2.3:a:free_software_foundation_inc.:libtasn1:0.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:free_software_foundation_inc.:libtasn1:0.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:free_software_foundation_inc.:libtasn1:0.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:free_software_foundation_inc.:libtasn1:0.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:free_software_foundation_inc.:libtasn1:0.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:free_software_foundation_inc.:libtasn1:0.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:free_software_foundation_inc.:libtasn1:0.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:free_software_foundation_inc.:libtasn1:0.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:free_software_foundation_inc.:libtasn1:0.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:free_software_foundation_inc.:libtasn1:0.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:free_software_foundation_inc.:libtasn1:0.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:free_software_foundation_inc.:libtasn1:0.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:free_software_foundation_inc.:libtasn1:0.2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:free_software_foundation_inc.:libtasn1:0.2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:free_software_foundation_inc.:libtasn1:0.2.11:*:*:*:*:*:*:*",
"cpe:2.3:a:free_software_foundation_inc.:libtasn1:0.2.12:*:*:*:*:*:*:*",
"cpe:2.3:a:free_software_foundation_inc.:libtasn1:0.2.13:*:*:*:*:*:*:*",
"cpe:2.3:a:free_software_foundation_inc.:libtasn1:0.2.14:*:*:*:*:*:*:*",
"cpe:2.3:a:free_software_foundation_inc.:libtasn1:0.2.15:*:*:*:*:*:*:*",
"cpe:2.3:a:free_software_foundation_inc.:libtasn1:0.2.16:*:*:*:*:*:*:*",
"cpe:2.3:a:free_software_foundation_inc.:libtasn1:0.2.17:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2020-36540 | Neetai Tech product.php sql injection | A vulnerability, which was classified as critical, was found in Neetai Tech. Affected is an unknown function of the file /product.php. The manipulation leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. | [
"cpe:2.3:a:neetai:neetai_tech:-:*:*:*:*:*:*:*"
] | null | 6.3 | null | null |
CVE-2024-12862 | REST API allows users without permissions to remove external collaborators | Incorrect Authorization vulnerability in the OpenText Content Server REST API on Windows, Linux allows users without the appropriate permissions to remove external collaborators.This issue affects Content Server: 20.2-24.4. | [] | 5.5 | null | null | null |
CVE-2018-17283 | Zoho ManageEngine OpManager before 12.3 Build 123196 does not require authentication for /oputilsServlet requests, as demonstrated by a /oputilsServlet?action=getAPIKey request that can be leveraged against Firewall Analyzer to add an admin user via /api/json/v2/admin/addUser or conduct a SQL Injection attack via the /api/json/device/setManaged name parameter. | [
"cpe:2.3:a:zohocorp:manageengine_opmanager:*:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
GHSA-x9fq-wqqx-7x9w | The Control Panel in Parallels Plesk Panel 10.4.4_build20111103.18 includes a submitted password within an HTTP response body, which allows remote attackers to obtain sensitive information by sniffing the network, as demonstrated by password handling in certain files under client@1/domain@1/backup/local-repository/. | [] | null | null | null | null |
|
CVE-2002-0091 | Multiple CGI scripts in CIDER SHADOW 1.5 and 1.6 allows remote attackers to execute arbitrary commands via certain form fields. | [
"cpe:2.3:a:nswc:cider_shadow:1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:nswc:cider_shadow:1.6:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.