id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
sequencelengths 0
5.42k
|
---|---|---|---|
CVE-2008-4867 | Buffer overflow in libavcodec/dca.c in FFmpeg 0.4.9 before r14917, as used by MPlayer, allows context-dependent attackers to have an unknown impact via vectors related to an incorrect DCA_MAX_FRAME_SIZE value. | [
"cpe:2.3:a:ffmpeg:ffmpeg:*:pre1:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*"
] |
|
GHSA-xgvh-4wv3-f5h2 | In camera isp, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07085486; Issue ID: ALPS07085486. | [] |
|
GHSA-352j-2x5m-wf94 | HOME SPOT CUBE2 V102 contains an OS command injection vulnerability due to improper processing of data received from DHCP server. An adjacent attacker may execute an arbitrary OS command on the product if a malicious DHCP server is placed on the WAN side of the product. | [] |
|
CVE-2012-2585 | Multiple cross-site scripting (XSS) vulnerabilities in ManageEngine ServiceDesk Plus 8.1 allow remote attackers to inject arbitrary web script or HTML via an e-mail message body with (1) a SCRIPT element, (2) a crafted Cascading Style Sheets (CSS) expression property, (3) a CSS expression property in the STYLE attribute of an arbitrary element, or (4) a crafted SRC attribute of an IFRAME element, or an e-mail message subject with (5) a SCRIPT element, (6) a CSS expression property in the STYLE attribute of an arbitrary element, (7) a crafted SRC attribute of an IFRAME element, (8) a crafted CONTENT attribute of an HTTP-EQUIV="refresh" META element, or (9) a data: URL in the CONTENT attribute of an HTTP-EQUIV="refresh" META element. | [
"cpe:2.3:a:manageengine:servicedesk_plus:8.1:*:*:*:*:*:*:*"
] |
|
GHSA-67hf-6rcg-6p33 | The scm plug-in in mock might allow attackers to bypass the intended chroot protection mechanism and gain root privileges via a crafted spec file. | [] |
|
CVE-2012-3175 | Unspecified vulnerability in the Oracle Application Server Single Sign-On component in Oracle Fusion Middleware 10.1.4.3.0 allows remote attackers to affect integrity via unknown vectors related to Redirects, a different vulnerability than CVE-2012-0518. | [
"cpe:2.3:a:oracle:fusion_middleware:10.1.4.3:*:*:*:*:*:*:*"
] |
|
CVE-2014-2138 | CRLF injection vulnerability in the web framework in Cisco Security Manager 4.2 and earlier allows remote attackers to inject arbitrary HTTP headers and conduct redirection attacks via a crafted URL, aka Bug ID CSCun82349. | [
"cpe:2.3:a:cisco:security_manager:*:-:*:*:*:*:*:*",
"cpe:2.3:a:cisco:security_manager:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:security_manager:3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:security_manager:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:security_manager:3.1.1:sp3:*:*:*:*:*:*",
"cpe:2.3:a:cisco:security_manager:3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:security_manager:3.2:sp1:*:*:*:*:*:*",
"cpe:2.3:a:cisco:security_manager:3.2:sp2:*:*:*:*:*:*",
"cpe:2.3:a:cisco:security_manager:3.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:security_manager:3.2.1:sp1:*:*:*:*:*:*",
"cpe:2.3:a:cisco:security_manager:3.2.2:-:*:*:*:*:*:*",
"cpe:2.3:a:cisco:security_manager:3.2.2:sp1:*:*:*:*:*:*",
"cpe:2.3:a:cisco:security_manager:3.2.2:sp2:*:*:*:*:*:*",
"cpe:2.3:a:cisco:security_manager:3.2.2:sp3:*:*:*:*:*:*",
"cpe:2.3:a:cisco:security_manager:3.2.2:sp4:*:*:*:*:*:*",
"cpe:2.3:a:cisco:security_manager:3.3:-:*:*:*:*:*:*",
"cpe:2.3:a:cisco:security_manager:3.3:sp1:*:*:*:*:*:*",
"cpe:2.3:a:cisco:security_manager:3.3:sp2:*:*:*:*:*:*",
"cpe:2.3:a:cisco:security_manager:3.3.1:-:*:*:*:*:*:*",
"cpe:2.3:a:cisco:security_manager:3.3.1:sp1:*:*:*:*:*:*",
"cpe:2.3:a:cisco:security_manager:3.3.1:sp2:*:*:*:*:*:*",
"cpe:2.3:a:cisco:security_manager:3.3.1:sp3:*:*:*:*:*:*",
"cpe:2.3:a:cisco:security_manager:3.3.1:sp4:*:*:*:*:*:*",
"cpe:2.3:a:cisco:security_manager:4.0:-:*:*:*:*:*:*",
"cpe:2.3:a:cisco:security_manager:4.0:sp1:*:*:*:*:*:*",
"cpe:2.3:a:cisco:security_manager:4.0.1:-:*:*:*:*:*:*",
"cpe:2.3:a:cisco:security_manager:4.0.1:sp1:*:*:*:*:*:*",
"cpe:2.3:a:cisco:security_manager:4.0.1:sp2:*:*:*:*:*:*",
"cpe:2.3:a:cisco:security_manager:4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:security_manager:4.1:sp1:*:*:*:*:*:*",
"cpe:2.3:a:cisco:security_manager:4.1:sp2:*:*:*:*:*:*"
] |
|
GHSA-p5rm-chg6-p3j7 | The AMD Ryzen and Ryzen Pro processor chips have insufficient access control for the Secure Processor, aka RYZENFALL-2, RYZENFALL-3, and RYZENFALL-4. | [] |
|
CVE-2017-8561 | Windows kernel in Microsoft Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an elevation of privilege vulnerability due to the way it handles objects in memory, aka "Windows Kernel Elevation of Privilege Vulnerability". | [
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*"
] |
|
CVE-2020-28692 | In Gila CMS 1.16.0, an attacker can upload a shell to tmp directy and abuse .htaccess through the logs function for executing PHP files. | [
"cpe:2.3:a:gilacms:gila_cms:1.16.0:*:*:*:*:*:*:*"
] |
|
CVE-2018-14361 | An issue was discovered in NeoMutt before 2018-07-16. nntp.c proceeds even if memory allocation fails for messages data. | [
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:neomutt:neomutt:*:*:*:*:*:*:*:*"
] |
|
GHSA-qrgr-qfr9-4xfh | The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets. | [] |
|
CVE-2020-3358 | Cisco RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers SSL Denial of Service Vulnerability | A vulnerability in the Secure Sockets Layer (SSL) VPN feature for Cisco Small Business RV VPN Routers could allow an unauthenticated, remote attacker to cause the device to unexpectedly restart, causing a denial of service (DoS) condition. The vulnerability is due to a lack of proper input validation of HTTP requests. An attacker could exploit this vulnerability by sending a crafted HTTP request over an SSL connection to the targeted device. A successful exploit could allow the attacker to cause a reload, resulting in a DoS condition. | [
"cpe:2.3:o:cisco:rv340_dual_wan_gigabit_vpn_router_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:rv340_dual_wan_gigabit_vpn_router:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:rv340w_dual_wan_gigabit_wireless-ac_vpn_router:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv345_dual_wan_gigabit_vpn_router_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:rv345_dual_wan_gigabit_vpn_router:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv345p_dual_wan_gigabit_poe_vpn_router_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:rv345p_dual_wan_gigabit_poe_vpn_router:-:*:*:*:*:*:*:*"
] |
CVE-2003-1489 | upload.php in Truegalerie 1.0 allows remote attackers to read arbitrary files by specifying the target filename in the file cookie in form.php, then downloading the file from the image gallery. | [
"cpe:2.3:a:truegalerie:truegalerie:1.0:*:*:*:*:*:*:*"
] |
|
CVE-2008-3047 | Incomplete blacklist vulnerability in the KB Unpack (kb_unpack) extension 0.1.0 and earlier for TYPO3 has unknown impact and attack vectors. | [
"cpe:2.3:a:typo3:kb_unpack_extension:*:*:*:*:*:*:*:*"
] |
|
CVE-2023-25960 | WordPress Zendrop – Global Dropshipping Plugin <= 1.0.0 is vulnerable to SQL Injection | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Zendrop Zendrop – Global Dropshipping zendrop-dropshipping-and-fulfillment allows SQL Injection.This issue affects Zendrop – Global Dropshipping: from n/a through 1.0.0.
| [
"cpe:2.3:a:zendrop:zendrop:*:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:zendrop:zendrop:1.0.0:*:*:*:*:wordpress:*:*"
] |
GHSA-g7cg-63c8-8whr | An issue was discovered in FIS GT.M through V7.0-000 (related to the YottaDB code base). Using crafted input, can cause the bounds of a for loop to be miscalculated, which leads to a use after free condition a pointer is pushed into previously free memory by the loop. | [] |
|
GHSA-vcm8-mcfj-6qg5 | Unspecified vulnerability in iostat in IBM AIX 5.2, 5.3, and 6.1 allows local users to gain privileges via unknown vectors related to an "environment variable handling error." | [] |
|
GHSA-364f-83pm-pm23 | A flaw was found in privoxy before 3.0.32. Invalid memory access with an invalid pattern passed to pcre_compile() may lead to denial of service. | [] |
|
CVE-2024-46586 | Draytek Vigor 3910 v4.3.2.6 was discovered to contain a buffer overflow in the sCloudPass parameter at v2x00.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input. | [
"cpe:2.3:o:draytek:vigor3910_firmware:4.3.2.6:*:*:*:*:*:*:*",
"cpe:2.3:h:draytek:vigor3910:-:*:*:*:*:*:*:*"
] |
|
CVE-2020-27254 | Emerson Rosemount X-STREAM Gas AnalyzerX-STREAM enhanced XEGP, XEGK, XEFD, XEXF – all revisions, The affected products are vulnerable to improper authentication for accessing log and backup data, which could allow an attacker with a specially crafted URL to obtain access to sensitive information. | [
"cpe:2.3:o:emerson:x-stream_enhanced_xegp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:emerson:x-stream_enhanced_xegp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:emerson:x-stream_enhanced_xegk_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:emerson:x-stream_enhanced_xegk:-:*:*:*:*:*:*:*",
"cpe:2.3:o:emerson:x-stream_enhanced_xefd_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:emerson:x-stream_enhanced_xefd:-:*:*:*:*:*:*:*",
"cpe:2.3:o:emerson:x-stream_enhanced_xexf_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:emerson:x-stream_enhanced_xexf:-:*:*:*:*:*:*:*"
] |
|
CVE-2017-14321 | Multiple cross-site scripting (XSS) vulnerabilities in the administrative interface in Mirasvit Helpdesk MX before 1.5.3 allow remote attackers to inject arbitrary web script or HTML via the (1) customer name or (2) subject in a ticket. | [
"cpe:2.3:a:mirasvit:helpdesk_mx:*:*:*:*:*:*:*:*"
] |
|
CVE-2024-34561 | WordPress Real3D Flipbook PDF Viewer Lite plugin <= 3.71 - Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Creative interactive media 3D FlipBook, PDF Viewer, PDF Embedder – Real 3D FlipBook WordPress Plugin allows Stored XSS.This issue affects 3D FlipBook, PDF Viewer, PDF Embedder – Real 3D FlipBook WordPress Plugin: from n/a through 3.71.
| [] |
GHSA-q397-j87x-7vrj | The foldername parameter in Bolt 5.1.7 was discovered to have incorrect input validation, allowing attackers to perform directory enumeration or cause a Denial of Service (DoS) via a crafted input. | [] |
|
CVE-2008-0233 | Unrestricted file upload vulnerability in Zero CMS 1.0 Alpha and earlier allows remote attackers to bypass intended access restrictions and upload and execute arbitrary files by uploading an avatar file with an accepted Content-Type such as image/jpeg. | [
"cpe:2.3:a:zero_cms:zero_cms:1.0_alpha:*:*:*:*:*:*:*"
] |
|
GHSA-26px-c4h6-78fc | In SignalStrengthAdapter::FillGsmSignalStrength() of protocolmiscadapter.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with baseband firmware compromise required. User interaction is not needed for exploitation. | [] |
|
CVE-2025-24870 | Insecure Key & Secret Management vulnerability in SAP GUI for Windows | SAP GUI for Windows & RFC service credentials are incorrectly stored in the memory of the program allowing an unauthenticated attacker to access information within systems, resulting in privilege escalation. On successful exploitation, this could result in disclosure of highly sensitive information. This has no impact on integrity, and availability. | [] |
CVE-2023-28851 | Silverstripe Form Capture vulnerable to Stored Cross-Site Scripting | Silverstripe Form Capture provides a method to capture simple silverstripe forms and an admin interface for users. Starting in version 0.2.0 and prior to versions 1.0.2, 1.1.0, 2.2.5, and 3.1.1, improper escaping when presenting stored form submissions allowed for an attacker to perform a Cross-Site Scripting attack. The vulnerability was initially patched in version 1.0.2, and version 1.1.0 includes this patch. The bug was then accidentally re-introduced during a merge error, and has been re-patched in versions 2.2.5 and 3.1.1. There are no known workarounds for this vulnerability. | [
"cpe:2.3:a:bigfork:silverstripe_form_capture:*:*:*:*:*:*:*:*",
"cpe:2.3:a:bigfork:silverstripe_form_capture:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:bigfork:silverstripe_form_capture:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:bigfork:silverstripe_form_capture:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:bigfork:silverstripe_form_capture:3.1.0:*:*:*:*:*:*:*"
] |
GHSA-wpp7-4crq-f956 | Broker FTP Server 5.9.5.0 allows a remote attacker to cause a denial of service by repeatedly issuing an invalid CD or CWD ("CD . .") command. | [] |
|
GHSA-xrmc-6wqq-99wc | The affected product is vulnerable to five post-authentication buffer overflows, which may allow a logged in user to remotely execute arbitrary code on the IP150 (firmware versions 5.02.09). | [] |
|
GHSA-rjjv-98pw-hc2c | A directory traversal vulnerability on Mercury MAC1200R devices allows attackers to read arbitrary files via a web-static/ URL. | [] |
|
GHSA-7qqg-m879-q5xj | Incorrect default permissions in some Intel(R) GPA software installers before version 2023.3 may allow an authenticated user to potentially enable escalation of privilege via local access. | [] |
|
GHSA-6w3j-vqwj-vw36 | Vulnerability in the Oracle Communications Messaging Server component of Oracle Communications Applications (subcomponent: Web Client). The supported version that is affected is 3.x. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Communications Messaging Server. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Communications Messaging Server, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Communications Messaging Server accessible data as well as unauthorized read access to a subset of Oracle Communications Messaging Server accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N). | [] |
|
GHSA-qhhg-f5q2-j9gj | AnyDesk 7.0.8 allows remote Denial of Service. | [] |
|
CVE-2024-21039 | Vulnerability in the Oracle Complex Maintenance, Repair, and Overhaul product of Oracle E-Business Suite (component: LOV). Supported versions that are affected are 12.2.3-12.2.13. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Complex Maintenance, Repair, and Overhaul. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Complex Maintenance, Repair, and Overhaul, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Complex Maintenance, Repair, and Overhaul accessible data as well as unauthorized read access to a subset of Oracle Complex Maintenance, Repair, and Overhaul accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N). | [
"cpe:2.3:a:oracle:complex_maintenance_repair_and_overhaul:12.2.3-12.2.13:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:complex_maintenance_repair_and_overhaul:*:*:*:*:*:*:*:*"
] |
|
GHSA-q837-4wvg-jx7g | In malidp_mw_connector_reset, new memory is allocated with kzalloc, but
no check is performed. In order to prevent null pointer dereferencing,
ensure that mw_state is checked before calling
__drm_atomic_helper_connector_reset. | [] |
|
GHSA-h2jr-f722-chc2 | The Samsung A3 Android device with a build fingerprint of samsung/a3y17ltedx/a3y17lte:8.0.0/R16NW/A320YDXU4CSB3:user/release-keys contains a pre-installed app with a package name of com.samsung.android.themecenter app (versionCode=7000000, versionName=7.0.0.0) that allows other pre-installed apps to perform app installation via an accessible app component. This capability can be accessed by any pre-installed app on the device which can obtain signatureOrSystem permissions that are required by other other pre-installed apps that exported their capabilities to other pre-installed app. | [] |
|
CVE-2022-0615 | Use-after-free vulnerability in ESET products for Linux | Use-after-free in eset_rtp kernel module used in ESET products for Linux allows potential attacker to trigger denial-of-service condition on the system. | [
"cpe:2.3:a:eset:endpoint_antivirus:*:*:*:*:*:linux_kernel:*:*",
"cpe:2.3:a:eset:server_security:*:*:*:*:*:linux_kernel:*:*"
] |
GHSA-w7rr-g4c2-26cq | The TCP/IP implementation in Microsoft Windows Vista Gold, SP1, and SP2 and Server 2008 Gold and SP2, when IPv6 is enabled, does not properly perform bounds checking on ICMPv6 Route Information packets, which allows remote attackers to execute arbitrary code via crafted packets, aka "ICMPv6 Route Information Vulnerability." | [] |
|
GHSA-crh5-vv2v-c82q | @claviska/jquery-minicolors vulnerable to Cross-site Scripting | jQuery MiniColors is a color picker built on jQuery. Prior to version 2.3.6, jQuery MiniColors is prone to cross-site scripting when handling untrusted color names. This issue is patched in version 2.3.6. | [] |
GHSA-mh9g-743p-49cw | GitLab 10.7 and later through 12.7.2 has Incorrect Access Control. | [] |
|
GHSA-27vr-8fpq-79vm | A permissions issue existed. This issue was addressed with improved permission validation. This issue affected versions prior to iOS 12. | [] |
|
CVE-2009-0385 | Integer signedness error in the fourxm_read_header function in libavformat/4xm.c in FFmpeg before revision 16846 allows remote attackers to execute arbitrary code via a malformed 4X movie file with a large current_track value, which triggers a NULL pointer dereference. | [
"cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:10:*:*:*:*:*:*:*"
] |
|
GHSA-v7hp-7j8c-xrp4 | Inadequate encryption strength for some Edge Orchestrator software for Intel(R) Tiber™ Edge Platform may allow an authenticated user to potentially enable escalation of privilege via adjacent access. | [] |
|
CVE-2001-0728 | Buffer overflow in Compaq Management Agents before 5.2, included in Compaq Web-enabled Management Software, allows local users to gain privileges. | [
"cpe:2.3:a:compaq:management_agents:*:*:*:*:*:*:*:*"
] |
|
GHSA-mxc5-wqq4-5j7m | In FusionPBX up to 4.5.7, the file app\extensions\extension_imports.php uses an unsanitized "query_string" variable coming from the URL, which is reflected in HTML, leading to XSS. | [] |
|
CVE-2012-4751 | Cross-site scripting (XSS) vulnerability in Open Ticket Request System (OTRS) Help Desk 2.4.x before 2.4.15, 3.0.x before 3.0.17, and 3.1.x before 3.1.11 allows remote attackers to inject arbitrary web script or HTML via an e-mail message body with whitespace before a javascript: URL in the SRC attribute of an element, as demonstrated by an IFRAME element. | [
"cpe:2.3:a:otrs:otrs:2.4.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.4.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.4.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.4.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.4.0:beta5:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.4.0:beta6:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.4.9:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.4.10:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.4.11:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.4.12:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.4.13:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.4.14:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:3.0.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:3.0.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:3.0.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:3.0.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:3.0.0:beta5:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:3.0.0:beta6:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:3.0.0:beta7:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:3.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:3.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:3.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:3.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:3.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:3.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:3.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:3.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:3.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:3.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:3.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:3.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:3.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:3.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:3.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:3.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:3.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:3.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:3.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:3.1.10:*:*:*:*:*:*:*"
] |
|
CVE-2017-12904 | Improper Neutralization of Special Elements used in an OS Command in bookmarking function of Newsbeuter versions 0.7 through 2.9 allows remote attackers to perform user-assisted code execution by crafting an RSS item that includes shell code in its title and/or URL. | [
"cpe:2.3:a:newsbeuter:newsbeuter:0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:newsbeuter:newsbeuter:0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:newsbeuter:newsbeuter:0.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:newsbeuter:newsbeuter:0.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:newsbeuter:newsbeuter:0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:newsbeuter:newsbeuter:0.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:newsbeuter:newsbeuter:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:newsbeuter:newsbeuter:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:newsbeuter:newsbeuter:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:newsbeuter:newsbeuter:1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:newsbeuter:newsbeuter:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:newsbeuter:newsbeuter:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:newsbeuter:newsbeuter:2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:newsbeuter:newsbeuter:2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:newsbeuter:newsbeuter:2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:newsbeuter:newsbeuter:2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:newsbeuter:newsbeuter:2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:newsbeuter:newsbeuter:2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:newsbeuter:newsbeuter:2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:newsbeuter:newsbeuter:2.9:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] |
|
CVE-2001-0786 | Internet Software Solutions Air Messenger LAN Server (AMLServer) 3.4.2 stores user passwords in plaintext in the pUser.Dat file. | [
"cpe:2.3:a:internet_software_solutions:air_messenger_lan_server:3.4.2:*:*:*:*:*:*:*"
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.