id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-92mr-4w2q-4578 | Exposure of Sensitive Information to an Unauthorized Actor in Jenkins | The re-key admin monitor was introduced in Jenkins 1.498 and re-encrypted all secrets in JENKINS_HOME with a new key. It also created a backup directory with all old secrets, and the key used to encrypt them. These backups were world-readable and not removed afterwards. Jenkins now deletes the backup directory, if present. Upgrading from before 1.498 will no longer create a backup directory. Administrators relying on file access permissions in their manually created backups are advised to check them for the directory $JENKINS_HOME/jenkins.security.RekeySecretAdminMonitor/backups, and delete it if present. | [] | null | null | 9.8 | null |
GHSA-f9r5-j6qc-fj25 | A Use After Free vulnerability exists in Artifex Software, Inc. MuPDF library 1.17.0-rc1 and earlier when a valid page was followed by a page with invalid pixmap dimensions, causing bander - a static - to point to previously freed memory instead of a newband_writer. | [] | null | null | null | null |
|
GHSA-w8v3-j4vv-3q42 | The Custom Add User WordPress plugin through 2.0.2 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin | [] | null | 6.1 | null | null |
|
CVE-2011-0944 | Cisco IOS 12.4, 15.0, and 15.1 allows remote attackers to cause a denial of service (device reload) via malformed IPv6 packets, aka Bug ID CSCtj41194. | [
"cpe:2.3:o:cisco:ios:12.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1:*:*:*:*:*:*:*"
] | null | null | null | 7.8 |
|
RHSA-2010:0061 | Red Hat Security Advisory: gzip security update | gzip: (64 bit) Integer underflow by decompressing LZW format files | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
GHSA-2vg5-gq78-m2fx | Cross-site scripting (XSS) vulnerability in SourceCodester Fantastic-Blog-CMS V 1.0 allows remote attackers to inject arbitrary web script or HTML via the search field to search.php. | [] | null | null | null | null |
|
CVE-2024-32472 | excalidraw vulnerable to a Stored XSS in excalidraw's web embed component | excalidraw is an open source virtual hand-drawn style whiteboard. A stored XSS vulnerability in Excalidraw's web embeddable component. This allows arbitrary JavaScript to be run in the context of the domain where the editor is hosted. There were two vectors. One rendering untrusted string as iframe's `srcdoc` without properly sanitizing against HTML injection. Second by improperly sanitizing against attribute HTML injection. This in conjunction with allowing `allow-same-origin` sandbox flag (necessary for several embeds) resulted in the XSS. This vulnerability is fixed in 0.17.6 and 0.16.4. | [
"cpe:2.3:a:excalidraw:excalidraw:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | null |
CVE-2021-30297 | Possible out of bound read due to improper validation of packet length while handling data transfer in VR service in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Wearables | [
"cpe:2.3:o:qualcomm:apq8017_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:apq8017:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:apq8053_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:apq8053:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:apq8096au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:apq8096au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:aqt1000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:aqt1000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8917_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8917:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8953_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8953:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8996au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6310_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6310:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6320_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6320:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6335_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6335:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6390_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6390:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6391:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6420_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6420:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6426_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6426:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6430_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6430:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6436_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6436:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6564a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6564a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6564au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6564au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6574a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6574a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcm2290_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcm2290:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcm4290_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcm4290:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcm6125_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcm6125:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs2290_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs2290:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs4290_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs4290:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs603_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs603:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs605_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs605:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs610_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs610:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs6125_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs6125:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qualcomm215_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qualcomm215:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_636_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_636:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_675_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_675:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd205_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd205:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd210_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd210:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd429_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd429:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd439_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd439:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd460_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd460:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd632_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd632:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd662_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd662:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd665_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd665:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd675_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd675:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd678_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd678:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd690_5g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd690_5g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd720g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd720g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd730_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd730:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd750g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd750g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd765_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd765:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd765g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd765g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd768g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd768g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd778g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd778g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd780g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd780g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd855_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd855:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd865_5g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd865_5g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd870_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd870:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd888_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd888:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd888_5g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd888_5g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm630_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm630:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx50m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx50m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx55:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx55m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx55m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdxr1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdxr1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdxr2_5g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdxr2_5g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm4125_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm4125:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm6250_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm6250:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm6250p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm6250p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm7250_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm7250:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm7325_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm7325:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9375:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3610_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3610:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3615_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3615:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3660b_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3660b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3680_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3680:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3680b_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3680b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3910_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3910:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3950:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3988:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3991_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3991:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3998_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3998:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6740_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6740:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6750_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6750:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6850_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6850:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6851_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6851:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6855_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6855:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6856_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6856:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*"
] | null | 8.4 | null | null |
|
GHSA-w844-jc94-9fpw | Pre-Auth RCE via Path Traversal | [] | null | 8.3 | null | null |
|
GHSA-j979-qq9c-28r6 | Buffer overflow in the isdn_net_setcfg function in isdn_net.c in Linux kernel 2.6.23 allows local users to have an unknown impact via a crafted argument to the isdn_ioctl function. | [] | null | null | null | null |
|
GHSA-8c63-c298-4546 | libming v0.4.8 was discovered to contain a memory leak via the parseSWF_MORPHFILLSTYLES function. | [] | null | 6.5 | null | null |
|
GHSA-72gc-hjc8-g277 | Windows 95, 98, and NT 4.0 allow remote attackers to cause a denial of service by spoofing ICMP redirect messages from a router, which causes Windows to change its routing tables. | [] | null | null | null | null |
|
CVE-2006-3574 | Multiple cross-site scripting (XSS) vulnerabilities in Hitachi Groupmax Collaboration Portal and Web Client before 07-20-/D, and uCosminexus Collaboration Portal and Forum/File Sharing before 06-20-/C, allow remote attackers to "execute malicious scripts" via unknown vectors (aka HS06-014-01). | [
"cpe:2.3:a:hitachi:cosminexus_collaboration_portal:*:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachi:cosminexus_collaboration_portal:6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachi:cosminexus_collaboration_portal:06_00:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachi:groupmax_collaboration_portal:*:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachi:groupmax_collaboration_portal:7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachi:groupmax_collaboration_portal:07_00:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachi:groupmax_collaboration_web_client:*:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachi:groupmax_collaboration_web_client:7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachi:groupmax_collaboration_web_client:07_00:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
GHSA-fgmr-rcwc-wh2p | The OKLOK (3.1.1) mobile companion app for Fingerprint Bluetooth Padlock FB50 (2.3) allows remote attackers to submit API requests using authenticated but unauthorized tokens, resulting in IDOR issues. A remote attacker can use their own token to make unauthorized API requests on behalf of arbitrary user IDs. Valid and current user IDs are trivial to guess because of the user ID assignment convention used by the app. A remote attacker could harvest email addresses, unsalted MD5 password hashes, owner-assigned lock names, and owner-assigned fingerprint names for any range of arbitrary user IDs. | [] | null | null | null | null |
|
CVE-2018-17179 | An issue was discovered in OpenEMR before 5.0.1 Patch 7. There is SQL Injection in the make_task function in /interface/forms/eye_mag/php/taskman_functions.php via /interface/forms/eye_mag/taskman.php. | [
"cpe:2.3:a:open-emr:openemr:*:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 |
|
GHSA-pwmr-3mwq-gcmr | cPanel before 68.0.15 allows unprivileged users to access restricted directories during account restores (SEC-311). | [] | null | null | 5.5 | null |
|
CVE-2009-4505 | Multiple cross-site scripting (XSS) vulnerabilities in OpenCMS OAMP Comments Module 1.0.1 allow remote attackers to inject arbitrary web script or HTML via the name field in a comment, and other unspecified vectors. | [
"cpe:2.3:a:alkacon:oamp_comments:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:alkacon:opencms:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-6rh4-jr4q-29gx | IBM Db2 JDBC Driver for Db2 for Linux, UNIX and Windows 10.5, 11.1, and 11.5 could allow a remote authenticated attacker to execute arbitrary code via JNDI Injection. By sending a specially crafted request using the property clientRerouteServerListJNDIName, an attacker could exploit this vulnerability to execute arbitrary code on the system. IBM X-Force ID: 249514. | [] | null | 6.3 | null | null |
|
CVE-2023-41213 | D-Link DAP-1325 setDhcpAssignRangeUpdate lan_ipaddr Stack-based Buffer Overflow Remote Code Execution Vulnerability | D-Link DAP-1325 setDhcpAssignRangeUpdate lan_ipaddr Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DAP-1325 routers. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the handling of XML data provided to the HNAP1 SOAP endpoint. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-18840. | [
"cpe:2.3:o:dlink:dap-1325_firmware:1.07b01:*:*:*:*:*:*:*"
] | null | null | 8.8 | null |
GHSA-3x7r-v44p-242p | Ecava IntegraXor SCADA Server Stable 4.1.4360 and earlier and Beta 4.1.4392 and earlier allows remote attackers to discover full pathnames via an application tag. | [] | null | null | null | null |
|
GHSA-x7xv-3f7c-pp2m | An Improper Authentication issue was discovered in Siemens SIMATIC CP 44x-1 RNA, all versions prior to 1.4.1. An unauthenticated remote attacker may be able to perform administrative actions on the Communication Process (CP) of the RNA series module, if network access to Port 102/TCP is available and the configuration file for the CP is stored on the RNA's CPU. | [] | null | null | 8.1 | null |
|
GHSA-r777-4879-hrqc | Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in WPmanage Uji Popup plugin <= 1.4.3 versions. | [] | null | 6.5 | null | null |
|
CVE-2018-17183 | Artifex Ghostscript before 9.25 allowed a user-writable error exception table, which could be used by remote attackers able to supply crafted PostScript to potentially overwrite or replace error handlers to inject code. | [
"cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
] | null | null | 7.8 | 6.8 |
|
GHSA-mvrp-8x9x-4cvr | An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. macOS before 10.12.6 is affected. tvOS before 10.2.2 is affected. watchOS before 3.2.3 is affected. The issue involves the "Kernel" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app. | [] | null | null | 7.8 | null |
|
GHSA-mprw-jcqm-8qg2 | Online Car Wash Booking System v1.0 by oretnom23 has SQL injection in /ocwbs/admin/services/manage_service.php?id=. | [] | null | 9.8 | null | null |
|
CVE-2019-7220 | X-Cart V5 is vulnerable to XSS via the CategoryFilter2 parameter. | [
"cpe:2.3:a:qualiteam:x-cart:*:*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 |
|
CVE-2010-2790 | Multiple cross-site scripting (XSS) vulnerabilities in the formatQuery function in frontends/php/include/classes/class.curl.php in Zabbix before 1.8.3rc1 allow remote attackers to inject arbitrary web script or HTML via the (1) filter_set, (2) show_details, (3) filter_rst, or (4) txt_select parameters to the triggers page (tr_status.php). NOTE: some of these details are obtained from third party information. | [
"cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.1:beta10:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.1:beta11:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.1:beta12:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.1:beta2:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.1:beta3:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.1:beta4:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.1:beta5:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.1:beta6:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.1:beta7:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.1:beta8:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.1:beta9:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.3:beta:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.3.1:beta:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.3.2:beta:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.3.3:beta:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.3.4:beta:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.3.5:beta:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.3.6:beta:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.3.7:beta:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.3.8:beta:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.5:beta:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.5.1:beta:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.5.2:beta:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.5.3:beta:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.5.4:beta:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.6.7:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.6.8:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.6.9:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.8.1:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2023-26599 | XSS vulnerability in TripleSign in Tripleplay Platform releases prior to Caveman 3.4.0 allows attackers to inject client-side code to run as an authenticated user via a crafted link. | [
"cpe:2.3:a:uniguest:tripleplay:3.4.0:*:*:*:*:*:*:*"
] | null | 6.1 | null | null |
|
CVE-2019-9660 | Stored XSS exists in YzmCMS 5.2 via the admin/category/edit.html "catname" parameter. | [
"cpe:2.3:a:yzmcms:yzmcms:5.2:*:*:*:*:*:*:*"
] | null | null | 4.8 | 3.5 |
|
GHSA-4xv7-93mm-vwcp | The WP Quick FrontEnd Editor plugin for WordPress is vulnerable to page content injection in versions up to, and including, 5.5. This is due to missing capability checks in the plugin's page-editing functionality. This makes it possible for low-authenticated attackers, such as subscribers, to edit/create any page or post on the blog. | [] | null | 8.1 | null | null |
|
CVE-2023-39113 | ngiflib commit fb271 was discovered to contain a segmentation violation via the function "main" at gif2tag.c. This vulnerability is triggered when running the program gif2tga. | [
"cpe:2.3:a:miniupnp_project:ngiflib:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
|
GHSA-3fvq-f7qm-q85x | IBM Sterling Partner Engagement Manager 6.1.2, 6.2, and Cloud/SasS 22.2 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 223127. | [] | null | 5.4 | null | null |
|
GHSA-fhv6-q583-cm6q | The WP Fastest Cache plugin for WordPress is vulnerable to unauthorized data loss due to a missing capability check on the deleteCssAndJsCacheToolbar function in versions up to, and including, 1.1.2. This makes it possible for authenticated attackers with subscriber-level access to perform cache deletion. | [] | null | 4.3 | null | null |
|
CVE-2014-4253 | Unspecified vulnerability in the Oracle WebLogic Server component in Oracle Fusion Middleware 10.0.2.0, 10.3.6.0, 12.1.1.0, and 12.1.2.0 allows remote attackers to affect availability via vectors related to WebLogic Server JVM. | [
"cpe:2.3:a:oracle:fusion_middleware:10.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:fusion_middleware:10.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:fusion_middleware:12.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:fusion_middleware:12.1.2.0.0:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2015-1640 | Cross-site scripting (XSS) vulnerability in Microsoft Project Server 2010 SP2 and 2013 SP1 allows remote attackers to inject arbitrary web script or HTML via a crafted request, aka "Microsoft SharePoint XSS Vulnerability." | [
"cpe:2.3:a:microsoft:project_server:2010:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:project_server:2013:sp1:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-2h47-9gv9-rq2w | The musica de barrios sonideros (aka com.nobexinc.wls_93155702.rc) application 3.3.10 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [] | null | null | null | null |
|
RHSA-2015:0118 | Red Hat Security Advisory: mariadb security update | mysql: unspecified vulnerability related to Server:InnoDB:DML (CPU Jan 2015) mysql: unspecified vulnerability related to Server:Security:Privileges:Foreign Key (CPU Jan 2015) mysql: unspecified vulnerability related to Server:Replication (CPU Jan 2015) mysql: unspecified vulnerability related to Server:Replication (CPU Jan 2015) mysql: unspecified vulnerability related to Server:DDL (CPU Jan 2015) mysql: unspecified vulnerability related to Server:Security:Encryption (CPU Jan 2015) mysql: unspecified vulnerability related to Server:InnoDB:DDL:Foreign Key (CPU Jan 2015) | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
GHSA-57qp-9rcf-vpfx | A vulnerability was found in ZHENFENG13/code-projects My-Blog-layui 1.0. It has been declared as critical. This vulnerability affects the function Upload of the file /admin/upload/authorImg/. The manipulation of the argument File leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | [] | 5.3 | 6.3 | null | null |
|
RHSA-2025:0166 | Red Hat Security Advisory: thunderbird security update | firefox: thunderbird: WebChannel APIs susceptible to confused deputy attack firefox: thunderbird: Use-after-free when breaking lines in text firefox: Alt-Svc ALPN validation failure when redirected firefox: Compartment mismatch when parsing JavaScript JSON module firefox: Memory corruption when using JavaScript Text Segmentation firefox: thunderbird: Memory safety bugs fixed in Firefox 134, Thunderbird 134, Firefox ESR 115.19, Firefox ESR 128.6, Thunderbird 115.19, and Thunderbird 128.6 firefox: thunderbird: Memory safety bugs fixed in Firefox 134, Thunderbird 134, Firefox ESR 128.6, and Thunderbird 128.6 | [
"cpe:/a:redhat:rhel_eus:9.4::appstream"
] | null | 7.5 | null | null |
GHSA-g2fw-hxwc-j3px | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Camoo Sarl CAMOO SMS allows Reflected XSS. This issue affects CAMOO SMS: from n/a through 3.0.1. | [] | null | 7.1 | null | null |
|
RHBA-2021:1365 | Red Hat Bug Fix Advisory: OpenShift Container Platform 4.7.9 bug fix update | gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation | [
"cpe:/a:redhat:openshift:4.7::el8"
] | null | 8.6 | null | null |
GHSA-2hff-34p4-2jhh | In bta_scan_results_cb_impl of btif_ble_scanner.cc, there is possible resource exhaustion if a large number of repeated BLE scan results are received. This could lead to a remote denial of service of a critical system process with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: 8.0. Android ID: A-65174158. | [] | null | null | 7.5 | null |
|
CVE-2018-19587 | In Cesanta Mongoose 6.13, a SIGSEGV exists in the mongoose.c mg_mqtt_add_session() function. | [
"cpe:2.3:a:cesanta:mongoose:6.13:*:*:*:*:*:*:*"
] | null | null | 6.5 | 4.3 |
|
GHSA-xr6w-643f-4rpc | A cross-site scripting (XSS) vulnerability in UJCMS v4.1.3 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the URL parameter under the Add New Articles function. | [] | null | 6.1 | null | null |
|
GHSA-8727-34w8-v299 | nagios.upgrade_to_v3.sh, as distributed by Red Hat and possibly others for Nagios Core 3.4.4, 3.5.1, and earlier, allows local users to overwrite arbitrary files via a symlink attack on a temporary nagioscfg file with a predictable name in /tmp/. | [] | null | null | null | null |
|
GHSA-w763-qv46-5p55 | An issue was discovered on XIAOMI AI speaker MDZ-25-DT 1.34.36, and 1.40.14. Attackers can get root shell by accessing the UART interface and then they can read Wi-Fi SSID or password, read the dialogue text files between users and XIAOMI AI speaker, use Text-To-Speech tools pretend XIAOMI speakers' voice achieve social engineering attacks, eavesdrop on users and record what XIAOMI AI speaker hears, delete the entire XIAOMI AI speaker system, modify system files, stop voice assistant service, start the XIAOMI AI speaker’s SSH service as a backdoor | [] | null | null | null | null |
|
GHSA-mhfp-6mc3-v4q5 | Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4272, CVE-2016-4279, CVE-2016-6923, CVE-2016-6925, CVE-2016-6926, CVE-2016-6927, CVE-2016-6929, CVE-2016-6930, CVE-2016-6931, and CVE-2016-6932. | [] | null | null | 9.8 | null |
|
GHSA-v6ph-92jm-6cmp | Icecast 1.3.7, and other versions before 1.3.11 with HTTP server file streaming support enabled allows remote attackers to cause a denial of service (crash) via a URL that ends in . (dot), / (forward slash), or \ (backward slash). | [] | null | null | null | null |
|
CVE-2007-1203 | Unspecified vulnerability in Microsoft Excel 2000 SP3, 2002 SP3, 2003 SP2, 2003 Viewer, 2004 for Mac, and 2007 allows user-assisted remote attackers to execute arbitrary code via a crafted set font value in an Excel file, which results in memory corruption. | [
"cpe:2.3:a:microsoft:excel:2000:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:excel:2002:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:excel:2003:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:excel:2004:*:mac:*:*:*:*:*",
"cpe:2.3:a:microsoft:excel:2007:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:excel_viewer:2003:*:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
CVE-2010-2170 | Integer overflow in Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, might allow attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-2181 and CVE-2010-2183. | [
"cpe:2.3:a:adobe:flash_player:9.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.20.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.28:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.28.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.31:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.31.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.45.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.47.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.48.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.124.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.125.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.151.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.152.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.159.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.246.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.260.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.262.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.0.0.584:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.0.12.10:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.0.12.36:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.0.15.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.0.22.87:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.0.32.18:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.0.42.34:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:6.0.79:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.14.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.19.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.24.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.25:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.53.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.60.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.61.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.63:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.66.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.67.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.68.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.69.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.70.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.73.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:8.0.22.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:8.0.24.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:8.0.33.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:8.0.34.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:8.0.35.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:8.0.42.0:*:*:*:*:*:*:*",
"cpe:2.3:a:macromedia:flash_player:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:macromedia:flash_player:5.0.30.0:*:*:*:*:*:*:*",
"cpe:2.3:a:macromedia:flash_player:5.0.41.0:*:*:*:*:*:*:*",
"cpe:2.3:a:macromedia:flash_player:5.0.42.0:*:*:*:*:*:*:*",
"cpe:2.3:a:macromedia:flash_player:5.0.58.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air:1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air:1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air:1.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air:1.5.3:*:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
CVE-2024-31452 | OpenFGA Authorization Bypass | OpenFGA is a high-performance and flexible authorization/permission engine. Some end users of OpenFGA v1.5.0 or later are vulnerable to authorization bypass when calling Check or ListObjects APIs. You are very likely affected if your model involves exclusion (e.g. `a but not b`) or intersection (e.g. `a and b`). This vulnerability is fixed in v1.5.3. | [
"cpe:2.3:a:openfga:openfga:1.5.0:*:*:*:*:*:*:*"
] | null | 8.1 | null | null |
GHSA-x7fr-8wvg-vxxf | SQL injection vulnerability in adrotate/adrotate-out.php in the AdRotate plugin 3.6.6, and other versions before 3.6.8, for WordPress allows remote attackers to execute arbitrary SQL commands via the track parameter (aka redirect URL). | [] | null | null | null | null |
|
CVE-2021-38130 | A potential Information leakage vulnerability has been identified in versions of Micro Focus Voltage SecureMail Mail Relay prior to 7.3.0.1. The vulnerability could be exploited to create an information leakage attack. | [
"cpe:2.3:a:microfocus:voltage_securemail:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4 |
|
GHSA-3xmr-5wwh-fr8m | The issue was addressed with improved memory handling. This issue is fixed in iOS 17.5 and iPadOS 17.5, macOS Sonoma 14.5. An attacker may be able to cause unexpected app termination or arbitrary code execution. | [] | null | 7.8 | null | null |
|
GHSA-4658-qgx5-q5g3 | Rejected reason: Not used | [] | null | null | null | null |
|
CVE-2024-9679 | A Hardcoded Cryptographic key vulnerability existed in DLP Extension 11.11.1.3 which allowed the decryption of previously encrypted user credentials. | [] | null | 5.3 | null | null |
|
GHSA-29fq-m65q-8gqc | Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Performance Schema). Supported versions that are affected are 5.6.38 and prior and 5.7.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data. CVSS 3.0 Base Score 4.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N). | [] | null | null | 4.9 | null |
|
GHSA-r3gp-gxr6-hfg5 | In telephony service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. | [] | null | 5.5 | null | null |
|
GHSA-qm3v-8cq5-mxv7 | In NFC, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure. System execution privileges, a Firmware compromise, and User interaction are needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-144506224 | [] | null | null | null | null |
|
GHSA-hcxq-x77q-3469 | Improper Limitation of a Pathname to a Restricted Directory in plexus-archiver | plexus-archiver before 3.6.0 is vulnerable to directory traversal, allowing attackers to write to arbitrary files via a ../ (dot dot slash) in an archive entry that is mishandled during extraction. This vulnerability is also known as 'Zip-Slip'. | [] | null | null | 5.5 | null |
GHSA-h895-jpgg-q54p | A stack-based buffer over-read exists in FoFiTrueType::dumpString in fofi/FoFiTrueType.cc in Xpdf 4.01.01. It can, for example, be triggered by sending crafted TrueType data in a PDF document to the pdftops tool. It might allow an attacker to cause Denial of Service or leak memory data into dump content. | [] | null | null | null | null |
|
GHSA-qpf2-w648-mr69 | InHand Networks InRouter 900 Industrial 4G Router before v1.0.0.r11700 was discovered to contain a remote code execution (RCE) vulnerability via the function sub_1791C. This vulnerability is triggered via a crafted packet. | [] | null | 9.8 | null | null |
|
GHSA-4v3f-x74x-h275 | A vulnerability was found in madgicweb BuddyStream Plugin up to 3.2.7. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file ShareBox.php. The manipulation of the argument content/link/shares leads to cross site scripting. The attack can be launched remotely. Upgrading to version 3.2.8 is able to address this issue. The name of the patch is 7d5b9a89a27711aad76fd55ab4cc4185b545a1d0. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-221479. | [] | null | 6.1 | null | null |
|
CVE-2023-41331 | SOFARPC Remote Command Execution (RCE) Vulnerability | SOFARPC is a Java RPC framework. Versions prior to 5.11.0 are vulnerable to remote command execution. Through a carefully
crafted payload, an attacker can achieve JNDI injection or system command execution. In the default configuration of the SOFARPC framework, a blacklist is used to filter out dangerous classes encountered during the deserialization process. However, the blacklist is not comprehensive, and an actor can exploit certain native JDK classes and common third-party packages to construct gadget chains capable of achieving JNDI injection or system command execution attacks. Version 5.11.0 contains a fix for this issue. As a workaround, users can add `-Drpc_serialize_blacklist_override=javax.sound.sampled.AudioFileFormat` to the blacklist. | [
"cpe:2.3:a:sofastack:sofarpc:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
GHSA-63wg-rrpw-6rxq | Mishandling of '>' on the Jooan JA-Q1H Wi-Fi camera with firmware 21.0.0.91 allows remote attackers to cause a denial of service (crash and reboot) via certain ONVIF methods such as CreateUsers, SetImagingSettings, GetStreamUri, and so on. | [] | null | null | 7.5 | null |
|
CVE-2017-2224 | Cross-site scripting vulnerability in Event Calendar WD prior to version 1.0.94 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | [
"cpe:2.3:a:web-dorado:event_calendar_wd:*:*:*:*:*:wordpress:*:*"
] | null | null | 6.1 | 4.3 |
|
CVE-2007-5906 | Xen 3.1.1 allows virtual guest system users to cause a denial of service (hypervisor crash) by using a debug register (DR7) to set certain breakpoints. | [
"cpe:2.3:a:xensource_inc:xen:3.1.1:*:*:*:*:*:*:*"
] | null | null | null | 4.7 |
|
CVE-2024-26262 | EBM Technologies Uniweb/SoliPACS WebServer - SQL Injection | EBM Technologies Uniweb/SoliPACS WebServer's query functionality lacks proper restrictions of user input, allowing remote attackers authenticated as regular user to inject SQL commands for reading, modifying, and deleting database records, as well as executing system commands. Attackers may even leverage the dbo privilege in the database for privilege escalation, elevating their privileges to administrator . | [
"cpe:2.3:a:ebm_technologies:uniweb:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
GHSA-v6wx-rx33-54f5 | Directory traversal vulnerability in libtransmission/metainfo.c in Transmission 1.22, 1.34, 1.75, and 1.76 allows remote attackers to overwrite arbitrary files via a .. (dot dot) in a pathname within a .torrent file. | [] | null | 8.8 | null | null |
|
CVE-2019-12139 | An XSS issue was discovered in the Admin UI in eZ Platform 2.x. This affects ezplatform-admin-ui 1.3.x before 1.3.5 and 1.4.x before 1.4.4, and ezplatform-page-builder 1.1.x before 1.1.5 and 1.2.x before 1.2.4. | [
"cpe:2.3:a:ez:ezplatform-admin-ui:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ez:ezplatform-page-builder:*:*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 |
|
CVE-2009-0569 | Buffer overflow in Becky! Internet Mail 2.48.02 and earlier allows remote attackers to execute arbitrary code via a mail message with a crafted return receipt request. | [
"cpe:2.3:a:rimarts:becky\\!_internet_mail:*:*:*:*:*:*:*:*",
"cpe:2.3:a:rimarts:becky\\!_internet_mail:1.26.3:*:*:*:*:*:*:*",
"cpe:2.3:a:rimarts:becky\\!_internet_mail:1.26.4:*:*:*:*:*:*:*",
"cpe:2.3:a:rimarts:becky\\!_internet_mail:1.26.5:*:*:*:*:*:*:*",
"cpe:2.3:a:rimarts:becky\\!_internet_mail:2.00.0:*:*:*:*:*:*:*",
"cpe:2.3:a:rimarts:becky\\!_internet_mail:2.00.01:*:*:*:*:*:*:*",
"cpe:2.3:a:rimarts:becky\\!_internet_mail:2.00.02:*:*:*:*:*:*:*",
"cpe:2.3:a:rimarts:becky\\!_internet_mail:2.00.03:*:*:*:*:*:*:*",
"cpe:2.3:a:rimarts:becky\\!_internet_mail:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:rimarts:becky\\!_internet_mail:2.00.04:*:*:*:*:*:*:*",
"cpe:2.3:a:rimarts:becky\\!_internet_mail:2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:rimarts:becky\\!_internet_mail:2.00.05:*:*:*:*:*:*:*",
"cpe:2.3:a:rimarts:becky\\!_internet_mail:2.00.06:*:*:*:*:*:*:*",
"cpe:2.3:a:rimarts:becky\\!_internet_mail:2.00.07:*:*:*:*:*:*:*",
"cpe:2.3:a:rimarts:becky\\!_internet_mail:2.00.08:*:*:*:*:*:*:*",
"cpe:2.3:a:rimarts:becky\\!_internet_mail:2.00.09:*:*:*:*:*:*:*",
"cpe:2.3:a:rimarts:becky\\!_internet_mail:2.00.10:*:*:*:*:*:*:*",
"cpe:2.3:a:rimarts:becky\\!_internet_mail:2.00.11:*:*:*:*:*:*:*",
"cpe:2.3:a:rimarts:becky\\!_internet_mail:2.05.00:*:*:*:*:*:*:*",
"cpe:2.3:a:rimarts:becky\\!_internet_mail:2.05.01:*:*:*:*:*:*:*",
"cpe:2.3:a:rimarts:becky\\!_internet_mail:2.05.02:*:*:*:*:*:*:*",
"cpe:2.3:a:rimarts:becky\\!_internet_mail:2.05.03:*:*:*:*:*:*:*",
"cpe:2.3:a:rimarts:becky\\!_internet_mail:2.05.04:*:*:*:*:*:*:*",
"cpe:2.3:a:rimarts:becky\\!_internet_mail:2.05.05:*:*:*:*:*:*:*",
"cpe:2.3:a:rimarts:becky\\!_internet_mail:2.05.06:*:*:*:*:*:*:*",
"cpe:2.3:a:rimarts:becky\\!_internet_mail:2.05.07:*:*:*:*:*:*:*",
"cpe:2.3:a:rimarts:becky\\!_internet_mail:2.05.08:*:*:*:*:*:*:*",
"cpe:2.3:a:rimarts:becky\\!_internet_mail:2.05.09:*:*:*:*:*:*:*",
"cpe:2.3:a:rimarts:becky\\!_internet_mail:2.05.10:*:*:*:*:*:*:*",
"cpe:2.3:a:rimarts:becky\\!_internet_mail:2.05.11:*:*:*:*:*:*:*",
"cpe:2.3:a:rimarts:becky\\!_internet_mail:2.06:*:*:*:*:*:*:*",
"cpe:2.3:a:rimarts:becky\\!_internet_mail:2.06.02:*:*:*:*:*:*:*",
"cpe:2.3:a:rimarts:becky\\!_internet_mail:2.07:*:*:*:*:*:*:*",
"cpe:2.3:a:rimarts:becky\\!_internet_mail:2.07.01:*:*:*:*:*:*:*",
"cpe:2.3:a:rimarts:becky\\!_internet_mail:2.07.02:*:*:*:*:*:*:*",
"cpe:2.3:a:rimarts:becky\\!_internet_mail:2.07.03:*:*:*:*:*:*:*",
"cpe:2.3:a:rimarts:becky\\!_internet_mail:2.07.04:*:*:*:*:*:*:*",
"cpe:2.3:a:rimarts:becky\\!_internet_mail:2.08:*:*:*:*:*:*:*",
"cpe:2.3:a:rimarts:becky\\!_internet_mail:2.08.01:*:*:*:*:*:*:*",
"cpe:2.3:a:rimarts:becky\\!_internet_mail:2.09:*:*:*:*:*:*:*",
"cpe:2.3:a:rimarts:becky\\!_internet_mail:2.09.01:*:*:*:*:*:*:*",
"cpe:2.3:a:rimarts:becky\\!_internet_mail:2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:rimarts:becky\\!_internet_mail:2.10.01:*:*:*:*:*:*:*",
"cpe:2.3:a:rimarts:becky\\!_internet_mail:2.10.02:*:*:*:*:*:*:*",
"cpe:2.3:a:rimarts:becky\\!_internet_mail:2.10.03:*:*:*:*:*:*:*",
"cpe:2.3:a:rimarts:becky\\!_internet_mail:2.10.04:*:*:*:*:*:*:*",
"cpe:2.3:a:rimarts:becky\\!_internet_mail:2.11:*:*:*:*:*:*:*",
"cpe:2.3:a:rimarts:becky\\!_internet_mail:2.11.01:*:*:*:*:*:*:*",
"cpe:2.3:a:rimarts:becky\\!_internet_mail:2.11.02:*:*:*:*:*:*:*",
"cpe:2.3:a:rimarts:becky\\!_internet_mail:2.12:*:*:*:*:*:*:*",
"cpe:2.3:a:rimarts:becky\\!_internet_mail:2.12.01:*:*:*:*:*:*:*",
"cpe:2.3:a:rimarts:becky\\!_internet_mail:2.20:*:*:*:*:*:*:*",
"cpe:2.3:a:rimarts:becky\\!_internet_mail:2.20.01:*:*:*:*:*:*:*",
"cpe:2.3:a:rimarts:becky\\!_internet_mail:2.20.02:*:*:*:*:*:*:*",
"cpe:2.3:a:rimarts:becky\\!_internet_mail:2.20.03:*:*:*:*:*:*:*",
"cpe:2.3:a:rimarts:becky\\!_internet_mail:2.20.04:*:*:*:*:*:*:*",
"cpe:2.3:a:rimarts:becky\\!_internet_mail:2.20.05:*:*:*:*:*:*:*",
"cpe:2.3:a:rimarts:becky\\!_internet_mail:2.20.06:*:*:*:*:*:*:*",
"cpe:2.3:a:rimarts:becky\\!_internet_mail:2.20.07:*:*:*:*:*:*:*",
"cpe:2.3:a:rimarts:becky\\!_internet_mail:2.21:*:*:*:*:*:*:*",
"cpe:2.3:a:rimarts:becky\\!_internet_mail:2.21.01:*:*:*:*:*:*:*",
"cpe:2.3:a:rimarts:becky\\!_internet_mail:2.21.02:*:*:*:*:*:*:*",
"cpe:2.3:a:rimarts:becky\\!_internet_mail:2.21.03:*:*:*:*:*:*:*",
"cpe:2.3:a:rimarts:becky\\!_internet_mail:2.21.04:*:*:*:*:*:*:*",
"cpe:2.3:a:rimarts:becky\\!_internet_mail:2.22:*:*:*:*:*:*:*",
"cpe:2.3:a:rimarts:becky\\!_internet_mail:2.22.01:*:*:*:*:*:*:*",
"cpe:2.3:a:rimarts:becky\\!_internet_mail:2.22.02:*:*:*:*:*:*:*",
"cpe:2.3:a:rimarts:becky\\!_internet_mail:2.23:*:*:*:*:*:*:*",
"cpe:2.3:a:rimarts:becky\\!_internet_mail:2.24:*:*:*:*:*:*:*",
"cpe:2.3:a:rimarts:becky\\!_internet_mail:2.24.01:*:*:*:*:*:*:*",
"cpe:2.3:a:rimarts:becky\\!_internet_mail:2.24.02:*:*:*:*:*:*:*",
"cpe:2.3:a:rimarts:becky\\!_internet_mail:2.25:*:*:*:*:*:*:*",
"cpe:2.3:a:rimarts:becky\\!_internet_mail:2.25.01:*:*:*:*:*:*:*",
"cpe:2.3:a:rimarts:becky\\!_internet_mail:2.25.02:*:*:*:*:*:*:*",
"cpe:2.3:a:rimarts:becky\\!_internet_mail:2.26:*:*:*:*:*:*:*",
"cpe:2.3:a:rimarts:becky\\!_internet_mail:2.27:*:*:*:*:*:*:*",
"cpe:2.3:a:rimarts:becky\\!_internet_mail:2.28:*:*:*:*:*:*:*",
"cpe:2.3:a:rimarts:becky\\!_internet_mail:2.28.01:*:*:*:*:*:*:*",
"cpe:2.3:a:rimarts:becky\\!_internet_mail:2.29:*:*:*:*:*:*:*",
"cpe:2.3:a:rimarts:becky\\!_internet_mail:2.30:*:*:*:*:*:*:*",
"cpe:2.3:a:rimarts:becky\\!_internet_mail:2.30.01:*:*:*:*:*:*:*",
"cpe:2.3:a:rimarts:becky\\!_internet_mail:2.30.02:*:*:*:*:*:*:*",
"cpe:2.3:a:rimarts:becky\\!_internet_mail:2.30.03:*:*:*:*:*:*:*",
"cpe:2.3:a:rimarts:becky\\!_internet_mail:2.30.04:*:*:*:*:*:*:*",
"cpe:2.3:a:rimarts:becky\\!_internet_mail:2.31.00:*:*:*:*:*:*:*",
"cpe:2.3:a:rimarts:becky\\!_internet_mail:2.40.00:*:*:*:*:*:*:*",
"cpe:2.3:a:rimarts:becky\\!_internet_mail:2.40.01:*:*:*:*:*:*:*",
"cpe:2.3:a:rimarts:becky\\!_internet_mail:2.40.02:*:*:*:*:*:*:*",
"cpe:2.3:a:rimarts:becky\\!_internet_mail:2.40.03:*:*:*:*:*:*:*",
"cpe:2.3:a:rimarts:becky\\!_internet_mail:2.40.04:*:*:*:*:*:*:*",
"cpe:2.3:a:rimarts:becky\\!_internet_mail:2.41.00:*:*:*:*:*:*:*",
"cpe:2.3:a:rimarts:becky\\!_internet_mail:2.42.00:*:*:*:*:*:*:*",
"cpe:2.3:a:rimarts:becky\\!_internet_mail:2.43.00:*:*:*:*:*:*:*",
"cpe:2.3:a:rimarts:becky\\!_internet_mail:2.44.00:*:*:*:*:*:*:*",
"cpe:2.3:a:rimarts:becky\\!_internet_mail:2.45.00:*:*:*:*:*:*:*",
"cpe:2.3:a:rimarts:becky\\!_internet_mail:2.45.01:*:*:*:*:*:*:*",
"cpe:2.3:a:rimarts:becky\\!_internet_mail:2.45.02:*:*:*:*:*:*:*",
"cpe:2.3:a:rimarts:becky\\!_internet_mail:2.46:*:*:*:*:*:*:*",
"cpe:2.3:a:rimarts:becky\\!_internet_mail:2.47:*:*:*:*:*:*:*",
"cpe:2.3:a:rimarts:becky\\!_internet_mail:2.47.01:*:*:*:*:*:*:*",
"cpe:2.3:a:rimarts:becky\\!_internet_mail:2.48:*:*:*:*:*:*:*",
"cpe:2.3:a:rimarts:becky\\!_internet_mail:2.48.01:*:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
CVE-2017-8364 | The read_buf function in stream.c in rzip 2.1 allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted archive. | [
"cpe:2.3:a:rzip_project:rzip:2.1:*:*:*:*:*:*:*"
] | null | null | 7.8 | 6.8 |
|
GHSA-rv4p-c2hf-pcw7 | Buffer overflow in the Intelligent Platform Management Interface (IPMI) functionality in the Manager component in Cisco Unified Computing System (UCS) 1.0 and 1.1 before 1.1(1j) and 1.2 before 1.2(1b) allows remote attackers to execute arbitrary code via malformed data in a UDP packet, aka Bug ID CSCtd32371. | [] | null | null | null | null |
|
GHSA-7x73-763j-hw4v | A remote code execution vulnerability exists when the Windows font library improperly handles specially crafted embedded fonts, aka 'Microsoft Graphics Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-1145, CVE-2019-1149, CVE-2019-1150, CVE-2019-1151, CVE-2019-1152. | [] | null | null | null | null |
|
CVE-2025-23026 | HTML templates containing Javascript template strings are subject to XSS in jte | jte (Java Template Engine) is a secure and lightweight template engine for Java and Kotlin. In affected versions Jte HTML templates with `script` tags or script attributes that include a Javascript template string (backticks) are subject to XSS. The `javaScriptBlock` and `javaScriptAttribute` methods in the `Escape` class do not escape backticks, which are used for Javascript template strings. Dollar signs in template strings should also be escaped as well to prevent undesired interpolation. HTML templates rendered by Jte's `OwaspHtmlTemplateOutput` in versions less than or equal to `3.1.15` with `script` tags or script attributes that contain Javascript template strings (backticks) are vulnerable. Users are advised to upgrade to version 3.1.16 or later to resolve this issue. There are no known workarounds for this vulnerability. | [] | null | 6.1 | null | null |
RHSA-2020:4223 | Red Hat Security Advisory: OpenShift Container Platform 3.11.306 jenkins security update | jetty: double release of resource can lead to information disclosure jenkins: user-specified tooltip values leads to stored cross-site scripting jenkins: stored XSS vulnerability in project naming strategy jenkins: stored XSS vulnerability in 'trigger builds remotely' | [
"cpe:/a:redhat:openshift:3.11::el7"
] | null | 5.4 | null | null |
GHSA-vfjc-2qcw-j95j | The DefaultLinuxSpec function in oci/defaults.go in Docker Moby through 17.03.2-ce does not block /proc/scsi pathnames, which allows attackers to trigger data loss (when certain older Linux kernels are used) by leveraging Docker container access to write a "scsi remove-single-device" line to /proc/scsi/scsi, aka SCSI MICDROP. | [] | null | null | 5.9 | null |
|
CVE-2024-4683 | Campcodes Complete Web-Based School Management System exam_timetable_insert_form.php cross site scripting | A vulnerability was found in Campcodes Complete Web-Based School Management System 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file /view/exam_timetable_insert_form.php. The manipulation of the argument exam leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-263624. | [] | 5.3 | 3.5 | 3.5 | 4 |
GHSA-ccqr-9gqg-2rgq | Unrestricted Upload of File with Dangerous Type vulnerability in Themify Themify Ultra.This issue affects Themify Ultra: from n/a through 7.3.5. | [] | null | 9.9 | null | null |
|
GHSA-mfx7-6x75-v7hg | A vulnerability, which was classified as critical, has been found in PHPGurukul Human Metapneumovirus Testing Management System 1.0. This issue affects some unknown processing of the file /profile.php. The manipulation of the argument aid/adminname/mobilenumber/email leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. | [] | 5.3 | 6.3 | null | null |
|
GHSA-769j-489v-6c4g | Directory traversal vulnerability in the JA News (com_janews) component 1.0 for Joomla! allows remote attackers to read arbitrary local files via a .. (dot dot) in the controller parameter to index.php. NOTE: some of these details are obtained from third party information. | [] | null | null | null | null |
|
GHSA-2prh-76mq-h4gx | DexLoader function get_stringidx_fromdex() in Redex prior to commit 3b44c64 can load an out of bound address when loading the string index table, potentially allowing remote code execution during processing of a 3rd party Android APK file. | [] | null | 9.8 | null | null |
|
GHSA-2h35-g555-434h | Certain NETGEAR devices are affected by command injection by an authenticated user. This affects RBK752 before 3.2.16.6, RBR750 before 3.2.16.6, RBS750 before 3.2.16.6, RBK852 before 3.2.16.6, RBR850 before 3.2.16.6, and RBS850 before 3.2.16.6. | [] | null | null | null | null |
|
RHSA-2011:1248 | Red Hat Security Advisory: ca-certificates security update | An updated ca-certificates package that fixes one security issue is now
available for Red Hat Enterprise Linux 6.
The Red Hat Security Response Team has rated this update as having
important security impact. | [
"cpe:/o:redhat:enterprise_linux:6::server"
] | null | null | null | null |
CVE-2023-49156 | WordPress GoDaddy Email Marketing plugin <= 1.4.3 - Broken Access Control vulnerability | Missing Authorization vulnerability in GoDaddy GoDaddy Email Marketing allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects GoDaddy Email Marketing: from n/a through 1.4.3. | [] | null | 4.3 | null | null |
CVE-2018-15680 | An issue was discovered in BTITeam XBTIT 2.5.4. The hashed passwords stored in the xbtit_users table are stored as unsalted MD5 hashes, which makes it easier for context-dependent attackers to obtain cleartext values via a brute-force attack. | [
"cpe:2.3:a:btiteam:xbtit:2.5.4:*:*:*:*:*:*:*"
] | null | null | 9.8 | 5 |
|
GHSA-9f6v-44r7-qh3r | An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in macOS Catalina 10.15.6. A malicious application may be able to execute arbitrary code with kernel privileges. | [] | null | null | null | null |
|
CVE-2013-1769 | A certain hashing algorithm in Telepathy Gabble 0.16.x before 0.16.5 and 0.17.x before 0.17.3 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted message. | [
"cpe:2.3:a:simon_mcvittie:telepathy_gabble:0.16.0:*:*:*:*:*:*:*",
"cpe:2.3:a:simon_mcvittie:telepathy_gabble:0.16.1:*:*:*:*:*:*:*",
"cpe:2.3:a:simon_mcvittie:telepathy_gabble:0.16.2:*:*:*:*:*:*:*",
"cpe:2.3:a:simon_mcvittie:telepathy_gabble:0.16.3:*:*:*:*:*:*:*",
"cpe:2.3:a:simon_mcvittie:telepathy_gabble:0.16.4:*:*:*:*:*:*:*",
"cpe:2.3:a:simon_mcvittie:telepathy_gabble:0.17.0:*:*:*:*:*:*:*",
"cpe:2.3:a:simon_mcvittie:telepathy_gabble:0.17.1:*:*:*:*:*:*:*",
"cpe:2.3:a:simon_mcvittie:telepathy_gabble:0.17.2:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2024-9434 | WPGlobus Translate Options <= 2.2.0 - Cross-Site Request Forgery to Stored Cross-Site Scripting | The WPGlobus Translate Options plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.2.0. This is due to missing or incorrect nonce validation on the on__translate_options_page() function. This makes it possible for unauthenticated attackers to inject malicious web scripts and update plugin settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | [] | null | 6.1 | null | null |
GHSA-75c4-q3jm-gq6h | A vulnerability has been found in FFmpeg 2.0 and classified as problematic. This vulnerability affects the function decode_hextile of the file libavcodec/vmnc.c. The manipulation leads to memory corruption. The attack can be initiated remotely. It is recommended to apply a patch to fix this issue. | [] | null | 5.5 | null | null |
|
CVE-2019-6773 | This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader 9.4.1.16828. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the richValue property of a Field object within AcroForms. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the current process. Was ZDI-CAN-8272. | [
"cpe:2.3:a:foxitsoftware:foxit_reader:*:*:*:*:*:*:*:*",
"cpe:2.3:a:foxitsoftware:phantompdf:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | null | 3.3 | null |
|
CVE-2016-2522 | The dissect_ber_constrained_bitstring function in epan/dissectors/packet-ber.c in the ASN.1 BER dissector in Wireshark 2.0.x before 2.0.2 does not verify that a certain length is nonzero, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet. | [
"cpe:2.3:a:wireshark:wireshark:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:2.0.1:*:*:*:*:*:*:*"
] | null | null | 5.9 | 4.3 |
|
CVE-2019-7609 | Kibana versions before 5.6.15 and 6.6.1 contain an arbitrary code execution flaw in the Timelion visualizer. An attacker with access to the Timelion application could send a request that will attempt to execute javascript code. This could possibly lead to an attacker executing arbitrary commands with permissions of the Kibana process on the host system. | [
"cpe:2.3:a:elastic:kibana:*:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openshift_container_platform:4.1:*:*:*:*:*:*:*"
] | null | 9.8 | null | 10 |
|
GHSA-xm2p-w62m-c2hg | SQL injection vulnerability in info.php in CMS Faethon 2.2.0 Ultimate allows remote attackers to execute arbitrary SQL commands via the item parameter. | [] | null | null | null | null |
|
GHSA-4wvr-fq5p-2362 | The mod_jk component of Apache Tomcat Connectors in some circumstances, such as when a configuration included "JkOptions +ForwardDirectories" but the configuration did not provide explicit mounts for all possible proxied requests, mod_jk would use an implicit mapping and map the request to the first defined worker. Such an implicit mapping could result in the unintended exposure of the status worker and/or bypass security constraints configured in httpd. As of JK 1.2.49, the implicit mapping functionality has been removed and all mappings must now be via explicit configuration. Only mod_jk is affected by this issue. The ISAPI redirector is not affected.This issue affects Apache Tomcat Connectors (mod_jk only): from 1.2.0 through 1.2.48.Users are recommended to upgrade to version 1.2.49, which fixes the issue. | [] | null | 7.5 | null | null |
|
CVE-2017-17173 | Due to insufficient parameters verification GPU driver of Mate 9 Pro Huawei smart phones with the versions before LON-AL00B 8.0.0.356(C00) has an arbitrary memory free vulnerability. An attacker can tricks a user into installing a malicious application on the smart phone, and send given parameter to driver to release special kernel memory resource. Successful exploit may result in phone crash or arbitrary code execution. | [
"cpe:2.3:o:huawei:mate_9_pro_fimware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:mate_9_pro:-:*:*:*:*:*:*:*"
] | null | null | 7.8 | 9.3 |
|
RHSA-2015:1666 | Red Hat Security Advisory: httpd24-httpd security update | httpd: Possible mod_lua crash due to websocket bug httpd: NULL pointer dereference crash with ErrorDocument 400 pointing to a local URL-path httpd: HTTP request smuggling attack against chunked request parser httpd: ap_some_auth_required() does not properly indicate authenticated request in 2.4 | [
"cpe:/a:redhat:rhel_software_collections:2::el6",
"cpe:/a:redhat:rhel_software_collections:2::el7"
] | null | null | 3.7 | null |
GHSA-wc73-qprf-6fv8 | Improper privilege management in Zoom Rooms for macOS before version 5.16.0 may allow an authenticated user to conduct an escalation of privilege via local access. | [] | null | 7.8 | null | null |
|
CVE-2004-1269 | lppasswd in CUPS 1.1.22 does not remove the passwd.new file if it encounters a file-size resource limit while writing to passwd.new, which causes subsequent invocations of lppasswd to fail. | [
"cpe:2.3:a:easy_software_products:cups:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:easy_software_products:cups:1.0.4_8:*:*:*:*:*:*:*",
"cpe:2.3:a:easy_software_products:cups:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:easy_software_products:cups:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:easy_software_products:cups:1.1.4_2:*:*:*:*:*:*:*",
"cpe:2.3:a:easy_software_products:cups:1.1.4_3:*:*:*:*:*:*:*",
"cpe:2.3:a:easy_software_products:cups:1.1.4_5:*:*:*:*:*:*:*",
"cpe:2.3:a:easy_software_products:cups:1.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:easy_software_products:cups:1.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:easy_software_products:cups:1.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:easy_software_products:cups:1.1.12:*:*:*:*:*:*:*",
"cpe:2.3:a:easy_software_products:cups:1.1.13:*:*:*:*:*:*:*",
"cpe:2.3:a:easy_software_products:cups:1.1.14:*:*:*:*:*:*:*",
"cpe:2.3:a:easy_software_products:cups:1.1.15:*:*:*:*:*:*:*",
"cpe:2.3:a:easy_software_products:cups:1.1.16:*:*:*:*:*:*:*",
"cpe:2.3:a:easy_software_products:cups:1.1.17:*:*:*:*:*:*:*",
"cpe:2.3:a:easy_software_products:cups:1.1.18:*:*:*:*:*:*:*",
"cpe:2.3:a:easy_software_products:cups:1.1.19:*:*:*:*:*:*:*",
"cpe:2.3:a:easy_software_products:cups:1.1.19_rc5:*:*:*:*:*:*:*",
"cpe:2.3:a:easy_software_products:cups:1.1.20:*:*:*:*:*:*:*",
"cpe:2.3:a:easy_software_products:cups:1.1.21:*:*:*:*:*:*:*",
"cpe:2.3:a:easy_software_products:cups:1.1.22_rc1:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2021-42744 | Philips MRI 1.5T and 3T Information Exposure | Philips MRI 1.5T and MRI 3T Version 5.x.x exposes sensitive information to an actor not explicitly authorized to have access. | [
"cpe:2.3:o:philips:mri_1.5t_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:philips:mri_1.5t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:philips:mri_3t_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:philips:mri_3t:-:*:*:*:*:*:*:*"
] | null | 6.2 | null | null |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.