id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-rwwv-hvjg-wcrp | An information leak vulnerability in the Smart USB Protection SMI Handler in some Lenovo models may allow an attacker with local access and elevated privileges to read SMM memory. | [] | null | 4.4 | null | null |
|
GHSA-wjxm-v88j-7gj4 | An issue in the oneflow.permute component of OneFlow-Inc. Oneflow v0.9.1 causes an incorrect calculation when the same dimension operation is performed. | [] | null | 9.8 | null | null |
|
CVE-2025-32524 | WordPress MyWorks WooCommerce Sync for QuickBooks Online plugin <= 2.9.1 - Reflected Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in MyWorks MyWorks WooCommerce Sync for QuickBooks Online allows Reflected XSS. This issue affects MyWorks WooCommerce Sync for QuickBooks Online: from n/a through 2.9.1. | [] | null | 7.1 | null | null |
GHSA-px6h-7v38-8hhr | SAP Business Objects Business Intelligence Platform (BI Launchpad), version 4.2, does not sufficiently encode user-controlled inputs, resulting reflected in Cross-Site Scripting. | [] | null | null | null | null |
|
GHSA-cp8j-5593-5j34 | Stack-based buffer overflow vulnerability exists in how the CMA readfile function of Garrett Metal Detectors iC Module CMA Version 5.0 is used at various locations. The Garrett iC Module exposes an authenticated CLI over TCP port 6877. This interface is used by a secondary GUI client, called “CMA Connect”, to interact with the iC Module on behalf of the user. Every time a user submits a password to the CLI password prompt, the buffer containing their input is passed as the password parameter to the checkPassword function. | [] | null | 7.2 | null | null |
|
CVE-2017-0137 | A remote code execution vulnerability exists in the way affected Microsoft scripting engines render when handling objects in memory in Microsoft browsers. These vulnerabilities could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited the vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. This vulnerability is different from those described in CVE-2017-0010, CVE-2017-0015, CVE-2017-0032, CVE-2017-0035, CVE-2017-0067, CVE-2017-0070, CVE-2017-0071, CVE-2017-0094, CVE-2017-0131, CVE-2017-0132, CVE-2017-0133, CVE-2017-0134, CVE-2017-0136, CVE-2017-0138, CVE-2017-0141, CVE-2017-0150, and CVE-2017-0151. | [
"cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*"
] | null | null | 7.5 | 7.6 |
|
CVE-2013-4005 | Cross-site scripting (XSS) vulnerability in the Administrative console in IBM WebSphere Application Server (WAS) 6.1 before 6.1.0.47, 7.0 before 7.0.0.31, 8.0 before 8.0.0.7, and 8.5 before 8.5.5.1 allows remote authenticated users to inject arbitrary web script or HTML via unspecified fields. | [
"cpe:2.3:a:ibm:websphere_application_server:6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.21:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.23:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.25:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.27:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.29:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.31:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.33:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.35:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.37:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.39:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.41:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.43:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.45:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.13:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.14:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:8.5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:8.5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:8.5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:8.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:8.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:8.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:8.0.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:8.0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:8.0.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:8.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.21:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.22:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.23:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.24:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.25:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.27:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.29:*:*:*:*:*:*:*"
] | null | null | null | 3.5 |
|
GHSA-f4mr-h274-9w8h | Improper initialization of variables in the DXE driver may allow a privileged user to leak sensitive information via local access. | [] | null | 4.4 | null | null |
|
GHSA-8m7f-5cc5-rjgp | An issue was discovered in GNU patch before 2.7.6. Out-of-bounds access within pch_write_line() in pch.c can possibly lead to DoS via a crafted input file. | [] | null | null | 5.5 | null |
|
GHSA-vcf9-g536-773c | Zenitel AlphaWeb XE v11.2.3.10 was discovered to contain a local file inclusion vulnerability via the component amc_uploads.php. | [] | null | 4.9 | null | null |
|
CVE-2002-0775 | browse.asp in Hosting Controller allows remote attackers to view arbitrary directories by specifying the target pathname in the FilePath parameter. | [
"cpe:2.3:a:hosting_controller:hosting_controller:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:hosting_controller:hosting_controller:1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:hosting_controller:hosting_controller:1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:hosting_controller:hosting_controller:1.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:hosting_controller:hosting_controller:1.4b:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-r367-m5qq-xxfg | The caif_seqpkt_recvmsg function in net/caif/caif_socket.c in the Linux kernel before 3.9-rc7 does not initialize a certain length variable, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call. | [] | null | null | null | null |
|
CVE-2013-7457 | Unspecified vulnerability in the Qualcomm components in Android before 2016-07-05 allows attackers to gain privileges via a crafted application. | [
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | 10 |
|
CVE-2012-1413 | Cross-site scripting (XSS) vulnerability in zc_install/includes/modules/pages/database_setup/header_php.php in Zen Cart 1.5.0 and earlier, when the software is being installed, allows remote attackers to inject arbitrary web script or HTML via the db_username parameter to zc_install/index.php. | [
"cpe:2.3:a:zen-cart:zen_cart:*:*:*:*:*:*:*:*",
"cpe:2.3:a:zen-cart:zen_cart:1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:zen-cart:zen_cart:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:zen-cart:zen_cart:1.2.0d:*:*:*:*:*:*:*",
"cpe:2.3:a:zen-cart:zen_cart:1.2.1:patch1:*:*:*:*:*:*",
"cpe:2.3:a:zen-cart:zen_cart:1.2.1_patch1:*:*:*:*:*:*:*",
"cpe:2.3:a:zen-cart:zen_cart:1.2.1d:*:*:*:*:*:*:*",
"cpe:2.3:a:zen-cart:zen_cart:1.2.2d:*:*:*:*:*:*:*",
"cpe:2.3:a:zen-cart:zen_cart:1.2.3d:*:*:*:*:*:*:*",
"cpe:2.3:a:zen-cart:zen_cart:1.2.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:zen-cart:zen_cart:1.2.4d:*:*:*:*:*:*:*",
"cpe:2.3:a:zen-cart:zen_cart:1.2.5d:*:*:*:*:*:*:*",
"cpe:2.3:a:zen-cart:zen_cart:1.2.6d:*:*:*:*:*:*:*",
"cpe:2.3:a:zen-cart:zen_cart:1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:zen-cart:zen_cart:1.3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:zen-cart:zen_cart:1.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:zen-cart:zen_cart:1.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:zen-cart:zen_cart:1.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:zen-cart:zen_cart:1.3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:zen-cart:zen_cart:1.3.8:*:*:*:*:*:*:*",
"cpe:2.3:a:zen-cart:zen_cart:1.3.8a:*:*:*:*:*:*:*",
"cpe:2.3:a:zen-cart:zen_cart:1.3.9:*:*:*:*:*:*:*",
"cpe:2.3:a:zen-cart:zen_cart:1.3.9h:*:*:*:*:*:*:*",
"cpe:2.3:a:zen-cart:zen_cart:2008:*:*:*:*:*:*:*"
] | null | null | null | 2.6 |
|
CVE-2024-25147 | Cross-site scripting (XSS) vulnerability in HtmlUtil.escapeJsLink in Liferay Portal 7.2.0 through 7.4.1, and older unsupported versions, and Liferay DXP 7.3 before service pack 3, 7.2 before fix pack 15, and older unsupported versions allows remote attackers to inject arbitrary web script or HTML via crafted javascript: style links. | [
"cpe:2.3:a:liferay:portal:*:*:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:-:*:*:*:*:*:*:*"
] | null | 9.6 | null | null |
|
CVE-2013-4968 | Puppet Enterprise before 3.0.1 allows remote attackers to (1) conduct clickjacking attacks via unspecified vectors related to the console, and (2) conduct cross-site scripting (XSS) attacks via unspecified vectors related to "live management." | [
"cpe:2.3:a:puppet:puppet_enterprise:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 |
|
GHSA-97r4-38mp-rc64 | In the Linux kernel, the following vulnerability has been resolved:drm/amd/display: fix array index out of bound error in DCN32 DML[Why&How]
LinkCapacitySupport array is indexed with the number of voltage states and
not the number of max DPPs. Fix the error by changing the array
declaration to use the correct (larger) array size of total number of
voltage states. | [] | null | 5.5 | null | null |
|
GHSA-cm4c-v7fr-h4j2 | The broker EditWith feature in Microsoft Internet Explorer 8 through 11 allows remote attackers to bypass the AppContainer protection mechanism and gain privileges via a DelegateExecute launch of an arbitrary application, as demonstrated by a transition from Low Integrity to Medium Integrity, aka "Internet Explorer Elevation of Privilege Vulnerability." | [] | null | null | null | null |
|
CVE-2024-47613 | GHSL-2024-118: GStreamer has a null pointer dereference in gst_gdk_pixbuf_dec_flush | GStreamer is a library for constructing graphs of media-handling components. A null pointer dereference vulnerability has been identified in `gst_gdk_pixbuf_dec_flush` within `gstgdkpixbufdec.c`. This function invokes `memcpy`, using `out_pix` as the destination address. `out_pix` is expected to point to the frame 0 from the frame structure, which is read from the input file. However, in certain situations, it can points to a NULL frame, causing the subsequent call to `memcpy` to attempt writing to the null address (0x00), leading to a null pointer dereference. This vulnerability can result in a Denial of Service (DoS) by triggering a segmentation fault (SEGV). This vulnerability is fixed in 1.24.10. | [
"cpe:2.3:a:gstreamer_project:gstreamer:*:*:*:*:*:*:*:*"
] | 8.6 | null | null | null |
CVE-2020-5246 | LDAP injection vulnerability in Traccar GPS Tracking System | Traccar GPS Tracking System before version 4.9 has a LDAP injection vulnerability. It occurs when user input is being used in LDAP search filter. By providing specially crafted input, an attacker can modify the logic of the LDAP query and get admin privileges. The issue only impacts instances with LDAP configuration and where users can craft their own names. This has been patched in version 4.9. | [
"cpe:2.3:a:traccar:traccar:*:*:*:*:*:*:*:*"
] | null | 7.7 | null | null |
CVE-2007-4150 | The Visionsoft Audit on Demand Service (VSAOD) in Visionsoft Audit 12.4.0.0 uses weak cryptography (XOR) when (1) transmitting passwords, which allows remote attackers to obtain sensitive information by sniffing the network; and (2) storing passwords in the configuration file, which allows local users to obtain sensitive information by reading this file. | [
"cpe:2.3:a:visionsoft:audit:12.4.0.0:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
GHSA-g26h-jcgf-xc83 | A vulnerability was found in TOTOLINK A702R, A3002R and A3002RU 3.0.0-B20230809.1615. It has been classified as critical. Affected is an unknown function of the file /boafrm/formSetLg of the component HTTP POST Request Handler. The manipulation of the argument submit-url leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. | [] | 8.7 | 8.8 | null | null |
|
CVE-2016-0331 | Cross-site scripting (XSS) vulnerability in IBM Rational Team Concert 6.0.1 and 6.0.2 before 6.0.2 iFix2 and Rational Collaborative Lifecycle Management 6.0.1 and 6.0.2 before 6.0.2 iFix2 allows remote authenticated users to inject arbitrary web script or HTML via a crafted URL. | [
"cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_team_concert:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_team_concert:6.0.2:*:*:*:*:*:*:*"
] | null | null | 5.4 | 3.5 |
|
GHSA-hgqg-j5g9-wjqr | Remote Desktop Client Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-21851. | [] | null | 8.8 | null | null |
|
GHSA-r3hf-mcpf-6r4f | An issue with the Autodiscover component in Nagios XI 2024R1.01 allows a remote attacker to escalate privileges via a crafted Dashlet. | [] | null | 9.8 | null | null |
|
CVE-2024-22212 | Nextcloud global site selector authentication bypass | Nextcloud Global Site Selector is a tool which allows you to run multiple small Nextcloud instances and redirect users to the right server. A problem in the password verification method allows an attacker to authenticate as another user. It is recommended that the Nextcloud Global Site Selector is upgraded to version 1.4.1, 2.1.2, 2.3.4 or 2.4.5. There are no known workarounds for this issue. | [
"cpe:2.3:a:nextcloud:global_site_selector:*:*:*:*:*:*:*:*"
] | null | 9.7 | null | null |
GHSA-pj82-fpwx-65j3 | The php_openssl_apply_verification_policy function in PHP before 5.2.11 does not properly perform certificate validation, which has unknown impact and attack vectors, probably related to an ability to spoof certificates. | [] | null | null | null | null |
|
CVE-2020-13259 | A vulnerability in the web-based management interface of RAD SecFlow-1v os-image SF_0290_2.3.01.26 could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack on an affected system. The vulnerability is due to insufficient CSRF protections for the web UI on an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to follow a malicious link. A successful exploit could allow the attacker to perform arbitrary actions with the privilege level of the affected user. This could be exploited in conjunction with CVE-2020-13260. | [
"cpe:2.3:o:rad:secflow-1v_firmware:os-image_sf_0290_2.3.01.26:*:*:*:*:*:*:*",
"cpe:2.3:h:rad:secflow-1v:-:*:*:*:*:*:*:*"
] | null | 8.8 | null | 9.3 |
|
CVE-2022-23959 | In Varnish Cache before 6.6.2 and 7.x before 7.0.2, Varnish Cache 6.0 LTS before 6.0.10, and and Varnish Enterprise (Cache Plus) 4.1.x before 4.1.11r6 and 6.0.x before 6.0.9r4, request smuggling can occur for HTTP/1 connections. | [
"cpe:2.3:a:varnish-software:varnich_cache:*:*:*:*:-:*:*:*",
"cpe:2.3:a:varnish-software:varnich_cache:*:*:*:*:plus:*:*:*",
"cpe:2.3:a:varnish-software:varnich_cache:4.1:*:*:*:lts:*:*:*",
"cpe:2.3:a:varnish-software:varnish_cache:*:*:*:*:lts:*:*:*",
"cpe:2.3:a:varnish-software:varnish_cache_plus:*:*:*:*:*:*:*:*",
"cpe:2.3:a:varnish_cache_project:varnish_cache:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*"
] | null | 9.1 | null | 6.4 |
|
GHSA-h7m4-rgxj-84w3 | IBM Rational Quality Manager and IBM Rational Collaborative Lifecycle Management 5.0 through 5.0.2 and 6.0 through 6.0.5 are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 124752. | [] | null | null | 5.4 | null |
|
RHSA-2024:0776 | Red Hat Security Advisory: jenkins and jenkins-2-plugins security update | maven: Block repositories using http by default snakeyaml: Denial of Service due to missing nested depth limitation for collections maven-shared-utils: Command injection via Commandline class apache-commons-text: variable interpolation RCE jenkins-2-plugins/script-security: Sandbox bypass vulnerability in Script Security Plugin jenkins-2-plugins/JUnit: Stored XSS vulnerability in JUnit Plugin jenkins-2-plugins/pipeline-build-step: Stored XSS vulnerability in Pipeline: Build Step Plugin Jenkins: Session fixation vulnerability in OpenShift Login Plugin jenkins: Arbitrary file read vulnerability through the CLI can lead to RCE jenkins: cross-site WebSocket hijacking | [
"cpe:/a:redhat:ocp_tools:4.13::el8"
] | null | 8.8 | null | null |
CVE-2007-6500 | Unspecified vulnerability in Hosting Controller 6.1 Hot fix 3.3 and earlier allows remote authenticated users to delete "gateway information" via a request to OpenApi/GatewayVariables.asp. | [
"cpe:2.3:a:hosting_controller:hosting_controller:*:*:*:*:*:*:*:*"
] | null | null | null | 4.9 |
|
GHSA-54xq-rwg3-336q | Huawei P8 before GRA-CL00C92B210, before GRA-L09C432B200, before GRA-TL00C01B210, and before GRA-UL00C00B210 allows remote attackers to obtain user equipment (aka UE) measurements of signal strengths. | [] | null | null | 3.7 | null |
|
CVE-2023-5747 | Command injection via wave install file | Bashis, a Security Researcher at IPVM has found a flaw that allows for a remote code execution during the installation of Wave on the camera device. The Wave server application in camera device was vulnerable to command injection allowing an attacker to run arbitrary code. HanwhaVision has released patched firmware for the highlighted flaw. Please refer to the hanwhavision security report for more information and solution." | [
"cpe:2.3:a:hanwhavision:wave_server_software:*:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:pno-a6081r-e1t_firmware:2.21.02:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:pno-a6081r-e1t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hanwhavision:pno-a6081r-e2t_firmware:2.21.02:*:*:*:*:*:*:*",
"cpe:2.3:h:hanwhavision:pno-a6081r-e2t:-:*:*:*:*:*:*:*"
] | null | 7.2 | null | null |
CVE-2020-0946 | An information disclosure vulnerability exists when Media Foundation improperly handles objects in memory, aka 'Media Foundation Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2020-0937, CVE-2020-0939, CVE-2020-0945, CVE-2020-0947. | [
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
] | null | 5.5 | null | 4.3 |
|
CVE-2015-4474 | Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 40.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors. | [
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
CVE-2014-8394 | Multiple untrusted search path vulnerabilities in Corel CAD 2014 allow local users to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse (1) FxManagedCommands_3.08_9.tx or (2) TD_Mgd_3.08_9.dll file in the current working directory. | [
"cpe:2.3:a:corel:corelcad:2014:*:*:*:*:*:*:*"
] | null | null | null | 4.6 |
|
CVE-2023-2973 | SourceCodester Students Online Internship Timesheet Syste cross site scripting | A vulnerability, which was classified as problematic, has been found in SourceCodester Students Online Internship Timesheet Syste 1.0. Affected by this issue is some unknown functionality of the file /ajax.php?action=save_company. The manipulation of the argument name with the input <script>alert(document.cookie)</script> leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-230204. | [
"cpe:2.3:a:students_online_internship_timesheet_system_project:students_online_internship_timesheet_system:1.0:*:*:*:*:*:*:*"
] | null | 2.4 | 2.4 | 3.3 |
CVE-2020-12126 | Multiple authentication bypass vulnerabilities in the /cgi-bin/ endpoint of the WAVLINK WN530H4 M30H4.V5030.190403 allow an attacker to leak router settings, change configuration variables, and cause denial of service via an unauthenticated endpoint. | [
"cpe:2.3:o:wavlink:wn530h4_firmware:m30h4.v5030.190403:*:*:*:*:*:*:*",
"cpe:2.3:h:wavlink:wn530h4:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
|
CVE-2019-18813 | A memory leak in the dwc3_pci_probe() function in drivers/usb/dwc3/dwc3-pci.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption) by triggering platform_device_add_properties() failures, aka CID-9bbfceea12a8. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"
] | null | 7.5 | null | 7.8 |
|
GHSA-wr8q-hg3q-6xfh | Rejected reason: Not used | [] | null | null | null | null |
|
GHSA-mhcr-j4x3-h5xc | Integer overflow in the load_threadstack function in the Mach-O loader (mach_loader.c) in the xnu kernel in Apple Mac OS X 10.4 through 10.5.1 allows local users to cause a denial of service (infinite loop) via a crafted Mach-O binary. | [] | null | null | null | null |
|
GHSA-5wg6-c5v9-67gf | Rejected reason: Red Hat Product Security has come to the conclusion that this CVE is not needed. It was assigned as a duplicate of CVE-2023-52440 | [] | null | null | null | null |
|
ICSA-17-285-04A | NXP Semiconductors MQX RTOS (Update A) | The Real-Time TCP/IP Communications Suite (RTCS) in MQX 's DHCP client fails to sanitize all inputs, which may allow maliciously crafted DHCP packets to cause memory to be overwritten, allowing remote code execution.CVE-2017-12718 has been assigned to this vulnerability. A CVSS v3 base score of 8.1 has been assigned; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H). The DNS client for MQX fails to bounds check DNS response parameters, which may allow maliciously crafted DNS packets to cause memory to be read out-of-bounds, resulting in a denial of service.CVE-2017-12722 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L). | [] | null | null | 5.3 | null |
CVE-2023-3762 | Intergard SGS sensitive information in memory | A vulnerability was found in Intergard SGS 8.7.0. It has been classified as problematic. This affects an unknown part. The manipulation leads to cleartext storage of sensitive information in memory. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-234447. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | [
"cpe:2.3:a:intergard:smartgard_silver_with_matrix_keyboard:8.7.0:*:*:*:*:*:*:*"
] | null | 4.3 | 4.3 | 4 |
CVE-2024-21010 | Vulnerability in the Oracle Hospitality Simphony product of Oracle Food and Beverage Applications (component: Simphony Enterprise Server). Supported versions that are affected are 19.1.0-19.5.4. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Hospitality Simphony. While the vulnerability is in Oracle Hospitality Simphony, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle Hospitality Simphony. CVSS 3.1 Base Score 9.9 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H). | [
"cpe:2.3:a:oracle:hospitality_simphony:19.1.0-19.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:hospitality_simphony:*:*:*:*:*:*:*:*"
] | null | 9.9 | null | null |
|
RHSA-2021:1647 | Red Hat Security Advisory: samba security, bug fix, and enhancement update | samba: Netlogon elevation of privilege vulnerability (Zerologon) samba: Missing handle permissions check in SMB1/2/3 ChangeNotify samba: Unprivileged user can crash winbind | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 5 | null | null |
RHSA-2020:4659 | Red Hat Security Advisory: gd security update | gd: NULL pointer dereference in gdImageClone gd: Heap-based buffer overflow in gdImageColorMatch() in gd_color_match.c gd: Double free in the gdImage*Ptr in gd_gif_out.c, gd_jpeg.c, and gd_wbmp.c | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | null | 5.3 | null |
GHSA-qcx5-pqvq-wp38 | Input verification vulnerability in the WMS API. Successful exploitation of this vulnerability may cause the device to restart. | [] | null | 7.5 | null | null |
|
GHSA-5x36-7567-3cw6 | partial_sort contains Out-of-bounds Read in release mode | Affected versions of this crate were using a debug assertion to validate the `last` parameter of `partial_sort()`. This would allow invalid inputs to cause an out-of-bounds read instead of immediately panicking, when compiled without debug assertions.All writes are bounds-checked, so the out-of-bounds memory access is read-only. This also means that the first attempted out-of-bounds write will panic, limiting the possible reads.The accessible region is further limited by an initial bounds-checked read at `(last / 2) - 1`, i.e., it is proportional to the size of the vector.This bug has been fixed in v0.2.0. | [] | null | null | null | null |
CVE-2020-7762 | Arbitrary File Read | This affects the package jsreport-chrome-pdf before 1.10.0. | [
"cpe:2.3:a:jsreport:jsreport-chrome-pdf:*:*:*:*:*:node.js:*:*"
] | null | 6.5 | null | null |
GHSA-7h4j-37qw-c282 | The /browse/~raw resource in Atlassian Fisheye and Crucible before version 4.5.3 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the handling of response headers. | [] | null | null | 6.1 | null |
|
GHSA-4ch5-cgm2-x6h9 | SupportAssist for Home PCs (version 3.11.4 and prior) and SupportAssist for Business PCs (version 3.2.0 and prior) contain cryptographic weakness vulnerability. An authenticated non-admin user could potentially exploit the issue and obtain sensitive information. | [] | null | 5.5 | null | null |
|
GHSA-3rh3-mwf4-58r4 | In Pulse Secure Pulse Connect Secure (PCS) before 8.1R15.1, 8.2 before 8.2R12.1, 8.3 before 8.3R7.1, and 9.0 before 9.0R3.4, an authenticated attacker (via the admin web interface) can exploit Directory Traversal to execute arbitrary code on the appliance. | [] | null | 7.2 | null | null |
|
GHSA-pf4m-mc6x-33mj | The Where Dallas (aka com.magzter.wheredallas) application 3.0.2 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [] | null | null | null | null |
|
GHSA-3cv9-2r4x-c3c5 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | [] | null | null | null | null |
|
GHSA-mvxf-h63w-mqr2 | Vulnerability in the JD Edwards EnterpriseOne Tools product of Oracle JD Edwards (component: Web Runtime SEC). Supported versions that are affected are Prior to 9.2.9.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise JD Edwards EnterpriseOne Tools. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all JD Edwards EnterpriseOne Tools accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N). | [] | null | 7.5 | null | null |
|
GHSA-mj83-j488-mg8j | leksbot 1.2.3 in Debian GNU/Linux installs the KATAXWR as setuid root, which allows local users to gain root privileges by exploiting unknown vulnerabilities related to the escalated privileges, which KATAXWR is not designed to have. | [] | null | null | null | null |
|
GHSA-fqg9-xpjx-879w | Unrestricted Upload of File with Dangerous Type vulnerability in David F. Carr RSVPMaker for Toastmasters allows Upload a Web Shell to a Web Server.This issue affects RSVPMaker for Toastmasters: from n/a through 6.2.4. | [] | null | 10 | null | null |
|
CVE-2021-32980 | Automation Direct CLICK PLC CPU Modules Authentication Bypass Using an Alternate Path or Channel | Automation Direct CLICK PLC CPU Modules: C0-1x CPUs with firmware prior to v3.00 does not protect against additional software programming connections. An attacker can connect to the PLC while an existing connection is already active. | [
"cpe:2.3:o:automationdirect:c0-10dd1e-d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:automationdirect:c0-10dd1e-d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:automationdirect:c0-10dd2e-d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:automationdirect:c0-10dd2e-d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:automationdirect:c0-10dre-d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:automationdirect:c0-10dre-d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:automationdirect:c0-10are-d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:automationdirect:c0-10are-d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:automationdirect:c0-11dd1e-d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:automationdirect:c0-11dd1e-d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:automationdirect:c0-11dd2e-d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:automationdirect:c0-11dd2e-d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:automationdirect:c0-11dre-d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:automationdirect:c0-11dre-d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:automationdirect:c0-11are-d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:automationdirect:c0-11are-d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:automationdirect:c0-12dd1e-d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:automationdirect:c0-12dd1e-d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:automationdirect:c0-12dd2e-d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:automationdirect:c0-12dd2e-d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:automationdirect:c0-12dre-d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:automationdirect:c0-12dre-d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:automationdirect:c0-12are-d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:automationdirect:c0-12are-d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:automationdirect:c0-12dd1e-1-d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:automationdirect:c0-12dd1e-1-d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:automationdirect:c0-12dd2e-1-d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:automationdirect:c0-12dd2e-1-d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:automationdirect:c0-12dre-1-d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:automationdirect:c0-12dre-1-d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:automationdirect:c0-12are-1-d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:automationdirect:c0-12are-1-d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:automationdirect:c0-12dd1e-2-d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:automationdirect:c0-12dd1e-2-d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:automationdirect:c0-12dd2e-2-d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:automationdirect:c0-12dd2e-2-d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:automationdirect:c0-12dre-2-d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:automationdirect:c0-12dre-2-d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:automationdirect:c0-12are-2-d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:automationdirect:c0-12are-2-d:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
GHSA-5q28-759p-xwrx | Unspecified vulnerability in the Oracle Configurator component in Oracle Supply Chain Products Suite 11.5.10.2, 12.1, and 12.2 allows remote attackers to affect confidentiality via unknown vectors related to UI Servlet, a different vulnerability than CVE-2016-0541. | [] | null | null | null | null |
|
CVE-2010-0941 | Multiple cross-site scripting (XSS) vulnerabilities in eTek Systems Hit Counter 2.0 allow remote attackers to inject arbitrary web script or HTML via the PATH_INFO to (1) index.php, (2) inc/login.php, (3) admin/index.php, and (4) admin/forgot.php. | [
"cpe:2.3:a:web-site-development:etek_systems_hit_counter:2.0:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2025-2200 | SQL injection vulnerability in the Innovación y Cualificación IcProgreso plugin | SQL injection vulnerability in the IcProgreso Innovación y Cualificación plugin. This vulnerability allows an attacker to obtain, update and delete data from the database by injecting an SQL query on the parameters user, id, idGroup, start_date and end_date in the endpoint /report/icprogreso/generar_blocks.php. | [] | 9.3 | null | null | null |
GHSA-54w6-f3f8-54q2 | A path handling issue was addressed with improved validation. This issue is fixed in macOS Sequoia 15.2, macOS Ventura 13.7.2, macOS Sonoma 14.7.2. An app may be able to break out of its sandbox. | [] | null | 8.8 | null | null |
|
GHSA-mcw9-9pmh-fjfc | The AcquireQuantumPixels function in MagickCore/quantum.c in ImageMagick before 7.0.3-1 allows remote attackers to have unspecified impact via a crafted image file, which triggers a memory allocation failure. | [] | null | 8.8 | null | null |
|
GHSA-gv92-3p38-6rrw | A flaw was found in knot-resolver before version 2.3.0. Malformed DNS messages may cause denial of service. | [] | null | null | null | null |
|
GHSA-rwrh-x97c-rfp7 | An issue was discovered in ONAP Portal through Dublin. By executing a call to ONAPPORTAL/portalApi/loggedinUser, an attacker who possesses a user's cookie may retrieve that user's password from the database. All Portal setups are affected. | [] | null | null | null | null |
|
CVE-2024-31212 | SQL injection in index_chart_data action | InstantCMS is a free and open source content management system. A SQL injection vulnerability affects instantcms v2.16.2 in which an attacker with administrative privileges can cause the application to execute unauthorized SQL code. The vulnerability exists in index_chart_data action, which receives an input from user and passes it unsanitized to the core model `filterFunc` function that further embeds this data in an SQL statement. This allows attackers to inject unwanted SQL code into the statement. The `period` should be escaped before inserting it in the query. As of time of publication, a patched version is not available. | [
"cpe:2.3:a:instantcms:icms2:2.16.2:*:*:*:*:*:*:*"
] | null | 6.7 | null | null |
GHSA-9v8q-8cx2-7x55 | A memory corruption issue was addressed with improved memory handling. This issue affected versions prior to macOS Mojave 10.14. | [] | null | null | 7.8 | null |
|
GHSA-mpq7-9rx8-2r9g | An issue was discovered on FiberHome HG6245D devices through RP2613. wifictl_2g.cfg has cleartext passwords and 0644 permissions. | [] | null | null | null | null |
|
GHSA-q98w-m2p3-q3ff | The wps-hide-login plugin before 1.5.3 for WordPress has an action=confirmaction protection bypass. | [] | null | null | null | null |
|
CVE-2006-0647 | LDAP service in Sun Java System Directory Server 5.2, running on Linux and possibly other platforms, allows remote attackers to cause a denial of service (memory allocation error) via an LDAP packet with a crafted subtree search request, as demonstrated using the ProtoVer LDAP test suite. | [
"cpe:2.3:a:sun:java_system_directory_server:5.2:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-hc7f-qpr3-xp9p | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in PressPage Entertainment Inc. Smarty for WordPress plugin <= 3.1.35 versions. | [] | null | 5.9 | null | null |
|
RHSA-2023:0854 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: an out-of-bounds vulnerability in i2c-ismt driver kernel: mm/mremap.c use-after-free vulnerability kernel: nfsd buffer overflow by RPC message over TCP with garbage data | [
"cpe:/a:redhat:enterprise_linux:8::nfv",
"cpe:/a:redhat:enterprise_linux:8::realtime"
] | null | 7.5 | null | null |
CVE-2007-1064 | Cisco Secure Services Client (CSSC) 4.x, Trust Agent 1.x and 2.x, Cisco Security Agent (CSA) 5.0 and 5.1 (when a vulnerable Trust Agent has been deployed), and the Meetinghouse AEGIS SecureConnect Client do not drop privileges when the help facility in the supplicant GUI is invoked, which allows local users to gain privileges, aka CSCsf14120. | [
"cpe:2.3:a:cisco:secure_services_client:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_services_client:4.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_services_client:4.0.51:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:security_agent:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:security_agent:5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:trust_agent:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:trust_agent:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:trust_agent:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:trust_agent:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:meetinghouse:aegis_secureconnect_client:windows_platform:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
GHSA-wm8h-j7xc-cc9x | A vulnerability has been found in CodeZips Gym Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /dashboard/admin/more-userprofile.php. The manipulation of the argument login_id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. | [] | 5.3 | 6.3 | null | null |
|
CVE-2021-26113 | A use of a one-way hash with a predictable salt vulnerability [CWE-760] in FortiWAN before 4.5.9 may allow an attacker who has previously come in possession of the password file to potentially guess passwords therein stored. | [
"cpe:2.3:a:fortinet:fortiwan:*:*:*:*:*:*:*:*"
] | null | 6.2 | null | null |
|
GHSA-rjcw-h883-7wp6 | Stack-based buffer overflow in mnet.exe in Unisys Business Information Server (BIS) 10 and 10.1 on Windows allows remote attackers to execute arbitrary code via a crafted TCP packet. | [] | null | null | null | null |
|
GHSA-qpm4-jxrw-wfgf | The Health Advocate SmartHelp (aka com.healthadvocate.ui) application 3.6 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [] | null | null | null | null |
|
GHSA-p3g6-h4vx-mr87 | A vulnerability has been identified in Pachno 1.0.6 allowing an authenticated attacker to execute a cross-site scripting (XSS) attack. The vulnerability exists due to inadequate input validation in the Project Description and comments, which enables an attacker to inject malicious java script. | [] | null | 5.4 | null | null |
|
GHSA-3p7m-5559-6p23 | SAP Business Warehouse (Process Chains) allows an attacker to manipulate the process execution due to missing authorization check. An attacker with display authorization for the process chain object could set one or all processes to be skipped. This means corresponding activities, such as data loading, activation, or deletion, will not be executed as initially modeled. This could lead to unexpected results in business reporting leading to a significant impact on integrity. However, there is no impact on confidentiality or availability. | [] | null | 5.7 | null | null |
|
CVE-2007-4050 | Unspecified vulnerability in WebUI in ADempiere Bazaar before 3.3 beta Victoria edition allows remote attackers to access system-level windows via unspecified vectors. | [
"cpe:2.3:a:adempiere:bazaar:*:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
CVE-2017-14152 | A mishandled zero case was discovered in opj_j2k_set_cinema_parameters in lib/openjp2/j2k.c in OpenJPEG 2.2.0. The vulnerability causes an out-of-bounds write, which may lead to remote denial of service (heap-based buffer overflow affecting opj_write_bytes_LE in lib/openjp2/cio.c and opj_j2k_write_sot in lib/openjp2/j2k.c) or possibly remote code execution. | [
"cpe:2.3:a:uclouvain:openjpeg:2.2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.8 |
|
GHSA-j273-gw9j-pfxr | DBHcms v1.2.0 has no CSRF protection mechanism,as demonstrated by CSRF for an /index.php?dbhcms_pid=-80&deletemenu=9 can delete any menu. | [] | null | null | null | null |
|
GHSA-mr5j-qcjf-p9xm | BSCW groupware system 3.3 through 4.0.2 beta allows remote attackers to read or modify arbitrary files by uploading and extracting a tar file with a symlink into the data-bag space. | [] | null | null | null | null |
|
CVE-2008-6453 | Directory traversal vulnerability in section.php in 6rbScript 3.3, when magic_quotes_gpc is disabled, allows remote attackers to read arbitrary files via a .. (dot dot) in the name parameter. | [
"cpe:2.3:a:6rbscript:6rbscript:3.3:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2017-12464 | ccn-lite-valid.c in CCN-lite before 2.00 allows context-dependent attackers to cause a denial of service (NULL pointer dereference) via vectors involving the keyfile variable. | [
"cpe:2.3:a:ccn-lite:ccn-lite:*:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
CVE-2025-2549 | D-Link DIR-618/DIR-605L formSetPassword access control | A vulnerability has been found in D-Link DIR-618 and DIR-605L 2.02/3.02 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /goform/formSetPassword. The manipulation leads to improper access controls. The attack needs to be done within the local network. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer. | [] | 5.3 | 4.3 | 4.3 | 3.3 |
CVE-2020-12394 | A logic flaw in our location bar implementation could have allowed a local attacker to spoof the current location by selecting a different origin and removing focus from the input element. This vulnerability affects Firefox < 76. | [
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"
] | null | 3.3 | null | 2.1 |
|
CVE-2015-4316 | The Mobile and Remote Access (MRA) endpoint-validation feature in Cisco TelePresence Video Communication Server (VCS) Expressway X8.5.2 improperly validates the phone line used for registration, which allows remote authenticated users to conduct impersonation attacks via a crafted registration, aka Bug ID CSCuv40396. | [
"cpe:2.3:a:cisco:telepresence_video_communication_server_software:x8.5.2:*:*:*:expressway:*:*:*"
] | null | null | null | 5.5 |
|
CVE-2005-0496 | Arkeia Network Backup Client 5.x contains hard-coded credentials that effectively serve as a back door, which allows remote attackers to access the file system and possibly execute arbitrary commands. | [
"cpe:2.3:a:arkeia:network_backup:5.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
|
GHSA-54fp-2qhf-47h6 | In the Linux kernel, the following vulnerability has been resolved:btrfs: do not clean up repair bio if submit failsThe submit helper will always run bio_endio() on the bio if it fails to
submit, so cleaning up the bio just leads to a variety of use-after-free
and NULL pointer dereference bugs because we race with the endio
function that is cleaning up the bio. Instead just return BLK_STS_OK as
the repair function has to continue to process the rest of the pages,
and the endio for the repair bio will do the appropriate cleanup for the
page that it was given. | [] | null | 7.8 | null | null |
|
GHSA-rvgq-w6rq-jcjp | Northern.tech Mender Enterprise before 3.6.4 and 3.7.x before 3.7.4 has Weak Authentication. | [] | null | 9.8 | null | null |
|
GHSA-cvhw-p87v-vr96 | A vulnerability was found in Weaver e-cology. It has been rated as critical. This issue affects some unknown processing of the file filelFileDownloadForOutDoc.class of the component HTTP POST Request Handler. The manipulation of the argument fileid with the input 1+WAITFOR+DELAY leads to sql injection. Upgrading to version 10.58.0 is able to address this issue. It is recommended to upgrade the affected component. The identifier VDB-235061 was assigned to this vulnerability. | [] | null | null | 5.5 | null |
|
CVE-2004-2216 | Unknown vulnerability in Sun Java System Web Server 6.0 SP7 and earlier and 6.1 SP1 and earlier, and Application Server 7 Update 4 and earlier, allows remote attackers to cause a denial of service (crash) via a malformed client certificate. | [
"cpe:2.3:a:sun:java_system_application_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_application_server:7.0:*:platform:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_application_server:7.0:*:standard:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_web_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_web_server:6.0:sp1:*:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_web_server:6.0:sp2:*:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_web_server:6.0:sp3:*:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_web_server:6.0:sp4:*:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_web_server:6.0:sp5:*:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_web_server:6.0:sp6:*:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_web_server:6.0:sp7:*:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_web_server:6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_web_server:6.1:sp1:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2005-2083 | Format string vulnerability in IMAP4 in IA eMailServer Corporate Edition 5.2.2 build 1051 allows remote attackers to cause a denial of service (application crash) via a LIST command with format string specifiers as the second argument. | [
"cpe:2.3:a:truenorth_software:ia_emailserver:corporate_5.2.2_build_1051:*:*:*:*:*:*:*",
"cpe:2.3:a:truenorth_software:ia_emailserver:corporate_5.2.3_build_1056:*:*:*:*:*:*:*",
"cpe:2.3:a:truenorth_software:ia_emailserver:corporate_5.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:truenorth_software:ia_emailserver:corporate_5.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:truenorth_software:ia_emailserver:corporate_5.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:truenorth_software:ia_emailserver:corporate_5.3.4_build_2018:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-r7c5-rrh6-44vf | A vulnerability was found in Navetti PricePoint 4.6.0.0. It has been classified as problematic. This affects an unknown part. The manipulation leads to basic cross site scripting (Reflected). It is possible to initiate the attack remotely. Upgrading to version 4.7.0.0 is able to address this issue. It is recommended to upgrade the affected component. | [] | null | 5.4 | null | null |
|
CVE-2024-38149 | BranchCache Denial of Service Vulnerability | BranchCache Denial of Service Vulnerability | [
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
GHSA-6jvf-9896-2hgg | Cross-site scripting (XSS) vulnerability in the htp PL/SQL package for Oracle 9i Application Server (9iAS) allows remote attackers to inject arbitrary web script or HTML via the cbuf parameter to htp.print. | [] | null | null | null | null |
|
GHSA-8459-9grp-5w5j | A BOLA vulnerability in GET, PUT, DELETE /admins/{adminId} allows a low privileged user to fetch, modify or delete a high privileged user (admin). This results in unauthorized access and unauthorized data manipulation. | [] | null | 9.9 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.