id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2021-43820
|
Permissions check bypass in Seafile
|
Seafile is an open source cloud storage system. A sync token is used in Seafile file syncing protocol to authorize access to library data. To improve performance, the token is cached in memory in seaf-server. Upon receiving a token from sync client or SeaDrive client, the server checks whether the token exist in the cache. However, if the token exists in cache, the server doesn't check whether it's associated with the specific library in the URL. This vulnerability makes it possible to use any valid sync token to access data from any **known** library. Note that the attacker has to first find out the ID of a library which it has no access to. The library ID is a random UUID, which is not possible to be guessed. There are no workarounds for this issue.
|
[
"cpe:2.3:a:seafile:seafile_server:*:*:*:*:community:*:*:*",
"cpe:2.3:a:seafile:seafile_server:*:*:*:*:professional:*:*:*"
] | null | 7.4 | null | null |
GHSA-j42w-vpmm-467m
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in WPWeb Elite Docket (WooCommerce Collections / Wishlist / Watchlist) allows SQL Injection.This issue affects Docket (WooCommerce Collections / Wishlist / Watchlist): from n/a before 1.7.0.
|
[] | null | 9.3 | null | null |
|
CVE-2020-2828
|
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: WLS Web Services). The supported version that is affected is 10.3.6.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via IIOP, T3 to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle WebLogic Server accessible data. CVSS 3.0 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
|
[
"cpe:2.3:a:oracle:weblogic_server:10.3.6.0.0:*:*:*:*:*:*:*"
] | null | null | 7.5 | null |
|
GHSA-xfrc-7mj2-5xh9
|
Undefined Behavior in zencashjs
|
Versions of `zencashjs` prior to 1.2.0 may cause loss of funds when used with cryptocurrency wallets. The package relies on a string comparison of the first two characters of a Horizen address to determine the destination address type of a transaction (P2PKH or P2SH). Due to the base58 address prefixes chosen in Horizen there exists the possibility of a clash of address prefixes for testnet P2PKH and mainnet P2SH addresses, testnet P2PKH addresses start with “zt” while a subset of mainnet P2SH addresses can also start with “zt”. The package interprets transactions sent to a “zt” P2SH address on mainnet as P2PKH transactions erroneously. Any funds sent to a mainnet P2SH multisignature address starting with “zt” will be sent to the wrong address and be lost.RecommendationUpgrade to version 1.2.0 or later.
|
[] | null | null | null | null |
GHSA-4f88-x3x5-4xc4
|
An issue was discovered in Adobe InDesign 12.1.0 and earlier versions. An exploitable memory corruption vulnerability exists. Successful exploitation could lead to arbitrary code execution.
|
[] | null | null | 9.8 | null |
|
CVE-2022-23746
|
The IPsec VPN blade has a dedicated portal for downloading and connecting through SSL Network Extender (SNX). If the portal is configured for username/password authentication, it is vulnerable to a brute-force attack on usernames and passwords.
|
[
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:-:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_10:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_103:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_117:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_118:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_127:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_134:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_135:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_138:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_141:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_149:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_155:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_156:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_160:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_161:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_17:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_173:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_183:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_187:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_188:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_190:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_202:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_203:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_205:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_208:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_210:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_211:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_220:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_33:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_42:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_47:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_73:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_74:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_80:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_87:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_91:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:-:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_105:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_121:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_163:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_178:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_191:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_210:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_240:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_258:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_266:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_273:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_279:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_283:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_295:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_302:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_304:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_305:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_306:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_309:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_310:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_313:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_314:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_315:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_317:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_326:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_327:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_331:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_332:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_334:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_335:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:-:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_107:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_111:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_135:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_136:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_140:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_155:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_163:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_166:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_168:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_180:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_19:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_191:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_195:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_196:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_210:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_213:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_214:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_215:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_217:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_219:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_221:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_226:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_227:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_228:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_232:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_235:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_236:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_237:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_241:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_242:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_245:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_246:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_251:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_254:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_50:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_76:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.30sp:-:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.30sp:take_101:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.30sp:take_31:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.30sp:take_32:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.30sp:take_45:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.30sp:take_49:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.30sp:take_56:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.30sp:take_73:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.30sp:take_75:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.30sp:take_82:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.30sp:take_97:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:-:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_100:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_102:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_114:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_118:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_119:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_120:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_121:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_125:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_126:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_131:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_138:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_139:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_150:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_153:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_154:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_156:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_158:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_161:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_172:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_173:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_25:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_38:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_45:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_48:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_53:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_54:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_55:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_65:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_67:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_69:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_74:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_77:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_78:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_83:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_87:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_89:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_91:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_92:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_93:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_94:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r81:-:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r81:take_10:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r81:take_11:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r81:take_13:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r81:take_17:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r81:take_23:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r81:take_25:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r81:take_27:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r81:take_29:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r81:take_34:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r81:take_36:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r81:take_42:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r81:take_44:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r81:take_51:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r81:take_56:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r81:take_58:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r81:take_60:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r81:take_65:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r81:take_68:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r81:take_69:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r81:take_72:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r81:take_74:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r81.10:-:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r81.10:take_14:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r81.10:take_22:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r81.10:take_30:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r81.10:take_38:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r81.10:take_44:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r81.10:take_45:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r81.10:take_55:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r81.10:take_61:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r81.10:take_66:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r81.10:take_75:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r81.10:take_78:*:*:*:-:*:*",
"cpe:2.3:a:checkpoint:ssl_network_extender:r81.10:take_9:*:*:*:-:*:*"
] | null | 7.5 | null | null |
|
CVE-2024-8533
|
Rockwell Automation OptixPanel™ Privilege Escalation Vulnerability via File Permissions
|
A privilege escalation vulnerability exists in the Rockwell Automation affected products. The vulnerability occurs due to improper default file permissions allowing users to exfiltrate credentials and escalate privileges.
|
[
"cpe:2.3:o:rockwellautomation:2800c_optixpanel_compact:4.0.0.325:*:*:*:*:*:*:*",
"cpe:2.3:o:rockwellautomation:2800s_optixpanel_standard:4.0.0.350:*:*:*:*:*:*:*",
"cpe:2.3:o:rockwellautomation:embedded_edge_compute_module:4.0.0.347:*:*:*:*:*:*:*",
"cpe:2.3:o:rockwellautomation:2800c_optixpanel_compact_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:rockwellautomation:2800c_optixpanel_compact:-:*:*:*:*:*:*:*",
"cpe:2.3:o:rockwellautomation:2800s_optixpanel_standard_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:rockwellautomation:2800s_optixpanel_standard:-:*:*:*:*:*:*:*",
"cpe:2.3:o:rockwellautomation:embedded_edge_compute_module_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:rockwellautomation:embedded_edge_compute_module:-:*:*:*:*:*:*:*"
] | 7.7 | null | null | null |
GHSA-546c-jgxm-3c33
|
The Backup Bolt WordPress plugin through 1.3.0 is vulnerable to Information Exposure via the unprotected access of debug logs. This makes it possible for unauthenticated attackers to retrieve the debug log which may contain information like system errors which could contain sensitive information.
|
[] | null | 4.7 | null | null |
|
GHSA-x7h3-m42w-6h68
|
cPanel before 70.0.23 allows code execution because "." is in @INC during a Perl syntax check of cpaddonsup (SEC-359).
|
[] | null | null | 7.2 | null |
|
GHSA-xw2v-wvvx-29jq
|
Vulnerability in the Oracle Outside In Technology component of Oracle Fusion Middleware (subcomponent: Outside In Filters). The supported version that is affected are 8.5.3 and 8.5.4. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Outside In Technology. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Outside In Technology and unauthorized read access to a subset of Oracle Outside In Technology accessible data. Note: Outside In Technology is a suite of software development kits (SDKs). The protocol and CVSS score depend on the software that uses the Outside In Technology code. The CVSS score assumes that the software passes data received over a network directly to Outside In Technology code, but if data is not received over a network the CVSS score may be lower. CVSS 3.0 Base Score 7.1 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H).
|
[] | null | null | 7.1 | null |
|
RHSA-2013:1543
|
Red Hat Security Advisory: samba4 security and bug fix update
|
samba: DoS via integer overflow when reading an EA list
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
GHSA-5jmf-9wpp-rqgr
|
KandNconcepts Club CMS 1.1 and 1.2 has cross site scripting via the 'team.php,player.php,club.php' id parameter.
|
[] | null | null | null | null |
|
CVE-2005-4331
|
SQL injection vulnerability in merchant.ihtml in iHTML Merchant Version 2 Pro allows remote attackers to execute arbitrary SQL commands via the (1) step, (2) id, and (3) pid parameters.
|
[
"cpe:2.3:a:ihtml_merchant:ihtml_merchant:2_pro:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2024-49292
|
WordPress Exclusive Addons for Elementor plugin <= 2.7.1 - Cross-Site Scripting vulnerability
|
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Exclusive Addons Exclusive Addons Elementor allows Stored XSS.This issue affects Exclusive Addons Elementor: from n/a through 2.7.1.
|
[] | null | 6.5 | null | null |
CVE-2015-4304
|
The web framework in Cisco Prime Collaboration Assurance before 10.5.1.53684-1 allows remote authenticated users to bypass intended access restrictions, and create administrative accounts or read data from arbitrary tenant domains, via a crafted URL, aka Bug IDs CSCus62671 and CSCus62652.
|
[
"cpe:2.3:a:cisco:prime_collaboration_assurance:9.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:prime_collaboration_assurance:9.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:prime_collaboration_assurance:10.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:prime_collaboration_assurance:10.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:prime_collaboration_assurance:10.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:prime_collaboration_assurance:10.6.0:*:*:*:*:*:*:*"
] | null | null | null | 9 |
|
GHSA-3c62-hfcf-656j
|
Cross-site scripting (XSS) vulnerability in the Classic Meeting Server in IBM Sametime 8.x through 8.5.2.1 allows remote attackers to inject arbitrary web script or HTML via a crafted URL.
|
[] | null | null | null | null |
|
GHSA-h5f5-3v68-7xc5
|
An elevation of privilege vulnerability in the Qualcomm Wi-Fi driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-32451171. References: QC-CR#1087807.
|
[] | null | null | 7 | null |
|
CVE-2023-35843
|
NocoDB through 0.106.0 (or 0.109.1) has a path traversal vulnerability that allows an unauthenticated attacker to access arbitrary files on the server by manipulating the path parameter of the /download route. This vulnerability could allow an attacker to access sensitive files and data on the server, including configuration files, source code, and other sensitive information.
|
[
"cpe:2.3:a:nocodb:nocodb:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
|
CVE-2017-0789
|
A elevation of privilege vulnerability in the Broadcom wi-fi driver. Product: Android. Versions: Android kernel. Android ID: A-37685267. References: B-V2017053102.
|
[
"cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:*"
] | null | null | 8.8 | 5.8 |
|
GHSA-g262-9hc8-9fhq
|
In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Automobile, Snapdragon Mobile, and Snapdragon Wear MSM8909W, SD 210/SD 212/SD 205, SD 400, SD 410/12, SD 425, SD 430, SD 450, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 800, SD 808, SD 810, SD 820, SD 820A, and SD 835, lack of length checking in wv_dash_core_load_keys_v8() could lead to a buffer overflow vulnerability.
|
[] | null | null | 9.8 | null |
|
GHSA-g6hp-54f4-25v2
|
wmFrog weather monitor 0.1.6 and other versions before 0.2.0 allows local users to overwrite arbitrary files via a symlink attack on temporary files.
|
[] | null | null | null | null |
|
GHSA-6vfh-4748-9hr4
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in interactivegeomaps Interactive Geo Maps allows Reflected XSS. This issue affects Interactive Geo Maps: from n/a through 1.6.24.
|
[] | null | 7.1 | null | null |
|
GHSA-qv96-733j-36x6
|
The Nifty Newsletters WordPress plugin is vulnerable to Cross-Site Request Forgery via the sola_nl_wp_head function found in the ~/sola-newsletters.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 4.0.23.
|
[] | null | null | null | null |
|
GHSA-5q4p-94m5-jf36
|
In Lizard (formerly LZ5) 2.0, use of an invalid memory address was discovered in LZ5_compress_continue in lz5_compress.c, related to LZ5_compress_fastSmall and MEM_read32. The vulnerability causes a segmentation fault and application crash, which leads to denial of service.
|
[] | null | null | 7.5 | null |
|
CVE-2019-14883
|
A vulnerability was found in Moodle 3.6 before 3.6.7 and 3.7 before 3.7.3, where tokens used to fetch inline atachments in email notifications were not disabled when a user's account was no longer active. Note: to access files, a user would need to know the file path, and their token.
|
[
"cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*"
] | null | null | 3.7 | null |
|
CVE-2021-44343
|
David Brackeen ok-file-formats 203defd is vulnerable to Buffer Overflow. When the function of the ok-file-formats project is used, a heap-buffer-overflow occurred in function ok_png_read_data() in "/ok_png.c".
|
[
"cpe:2.3:a:ok-file-formats_project:ok-file-formats:2021-06-05:*:*:*:*:*:*:*"
] | null | 7.8 | null | 6.8 |
|
CVE-2021-2149
|
Vulnerability in the Oracle ZFS Storage Appliance Kit product of Oracle Systems (component: Core). The supported version that is affected is 8.8. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where Oracle ZFS Storage Appliance Kit executes to compromise Oracle ZFS Storage Appliance Kit. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle ZFS Storage Appliance Kit accessible data. CVSS 3.1 Base Score 2.5 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N).
|
[
"cpe:2.3:o:oracle:zfs_storage_appliance:8.8:*:*:*:*:*:*:*"
] | null | 2.5 | null | null |
|
CVE-2017-1292
|
IBM Maximo Asset Management 7.5 and 7.6 generates error messages that could reveal sensitive information that could be used in further attacks against the system. IBM X-Force ID: 125153.
|
[
"cpe:2.3:a:ibm:maximo_asset_management:7.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:7.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management_essentials:7.5:*:*:*:*:*:*:*"
] | null | null | 5.3 | 5 |
|
CVE-2025-25946
|
An issue in Bento4 v1.6.0-641 allows an attacker to cause a memory leak via Ap4Marlin.cpp and Ap4Processor.cpp, specifically in AP4_MarlinIpmpEncryptingProcessor::Initialize and AP4_Processor::Process, during the execution of mp4encrypt with a specially crafted MP4 input file.
|
[] | null | 5.5 | null | null |
|
GHSA-8pwh-g3mh-g2qj
|
The (1) AgentInterface and (2) CustomerInterface components in Open Ticket Request System (OTRS) before 3.0.6 place cleartext credentials into the session data in the database, which makes it easier for context-dependent attackers to obtain sensitive information by reading the _UserLogin and _UserPW fields.
|
[] | null | null | null | null |
|
GHSA-h235-jq43-x2pf
|
An issue was discovered in VERMEG AgileReporter 21.3. An admin can enter an XSS payload in the Analysis component.
|
[] | null | 5.4 | null | null |
|
CVE-2006-4531
|
PHP remote file inclusion vulnerability in lib/config.php in Pheap CMS 1.1 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the lpref parameter.
|
[
"cpe:2.3:a:bare_concept_media:pheap_cms:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2017-1000156
|
Mahara 15.04 before 15.04.9 and 15.10 before 15.10.5 and 16.04 before 16.04.3 are vulnerable to a group's configuration page being editable by any group member even when they didn't have the admin role.
|
[
"cpe:2.3:a:mahara:mahara:15.04:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:15.04:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:15.04.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:15.04.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:15.04.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:15.04.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:15.04.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:15.04.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:15.04.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:15.04.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:15.04.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:16.04:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:16.04:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:16.04.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:16.04.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:16.04.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:15.10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:15.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:15.10.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:15.10.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:15.10.4:*:*:*:*:*:*:*"
] | null | null | 6.5 | 5.5 |
|
GHSA-487j-f8hg-5p28
|
An undocumented SNMP read/write community string ('NoGaH$@!') in Avaya P330, P130, and M770-ATM Cajun products allows remote attackers to gain administrative privileges.
|
[] | null | null | null | null |
|
GHSA-hfjh-h3g2-p6m4
|
In TrendNet TW100-S4W1CA 2.3.32, due to a lack of proper session controls, a threat actor could make unauthorized changes to an affected router via a specially crafted web page. If an authenticated user were to interact with a malicious web page it could allow for a complete takeover of the router.
|
[] | null | null | null | null |
|
CVE-2006-4972
|
Cross-site scripting (XSS) vulnerability in archive/index.php/forum-4.html in MyBB (aka MyBulletinBoard) allows remote attackers to inject arbitrary web script or HTML via the navbits[][name] parameter.
|
[
"cpe:2.3:a:mybulletinboard:mybulletinboard:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mybulletinboard:mybulletinboard:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mybulletinboard:mybulletinboard:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mybulletinboard:mybulletinboard:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mybulletinboard:mybulletinboard:1.0_final:*:*:*:*:*:*:*",
"cpe:2.3:a:mybulletinboard:mybulletinboard:1.0_preview_release_2:*:*:*:*:*:*:*",
"cpe:2.3:a:mybulletinboard:mybulletinboard:1.0_rc2:*:*:*:*:*:*:*",
"cpe:2.3:a:mybulletinboard:mybulletinboard:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mybulletinboard:mybulletinboard:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mybulletinboard:mybulletinboard:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mybulletinboard:mybulletinboard:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mybulletinboard:mybulletinboard:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mybulletinboard:mybulletinboard:1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mybulletinboard:mybulletinboard:1.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mybulletinboard:mybulletinboard:1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mybulletinboard:mybulletinboard:1.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mybulletinboard:mybulletinboard:1.20:*:*:*:*:*:*:*"
] | null | null | null | 5.1 |
|
CVE-2018-16268
|
The SoundServer/FocusServer system services in Tizen allow an unprivileged process to perform media-related system actions, due to improper D-Bus security policy configurations. Such actions include playing an arbitrary sound file or DTMF tones. This affects Tizen before 5.0 M1, and Tizen-based firmwares including Samsung Galaxy Gear series before build RE2.
|
[
"cpe:2.3:o:linux:tizen:1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:tizen:1.0:m1:*:*:*:*:*:*",
"cpe:2.3:o:linux:tizen:2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:tizen:2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:tizen:2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:tizen:2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:tizen:2.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:tizen:2.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:tizen:2.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:tizen:3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:tizen:3.0:m2:*:*:*:*:*:*",
"cpe:2.3:o:linux:tizen:3.0:m3:*:*:*:*:*:*",
"cpe:2.3:o:linux:tizen:4.0:m1:*:*:*:*:*:*",
"cpe:2.3:o:linux:tizen:4.0:m2:*:*:*:*:*:*",
"cpe:2.3:o:linux:tizen:4.0:m3:*:*:*:*:*:*",
"cpe:2.3:o:linux:tizen:5.0:*:*:*:*:*:*:*",
"cpe:2.3:h:samsung:galaxy_gear:-:*:*:*:*:*:*:*"
] | null | 4.3 | null | 3.3 |
|
GHSA-m77w-vf95-xmj5
|
Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK & Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
|
[] | null | null | null | null |
|
GHSA-84x5-p2mg-fvmp
|
pi.c in OpenJPEG, as used in PDFium in Google Chrome before 48.0.2564.109, does not validate a certain precision value, which allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read) via a crafted JPEG 2000 image in a PDF document, related to the opj_pi_next_rpcl, opj_pi_next_pcrl, and opj_pi_next_cprl functions.
|
[] | null | null | 6.3 | null |
|
GHSA-3p3p-cgj7-vgw3
|
RSSHub vulnerable to Server-Side Request Forgery
|
SummaryServeral Server-Side Request Forgery (SSRF) vulnerabilities in RSSHub allow remote attackers to use the server as a proxy to send HTTP GET requests to arbitrary targets and retrieve information in the internal network or conduct Denial-of-Service (DoS) attacks.Details`/mastodon/acct/:acct/statuses/:only_media?`https://github.com/DIYgod/RSSHub/blob/5928c5db2472e101c2f5c3bafed77a2f72edd40a/lib/routes/mastodon/acct.js#L4-L7https://github.com/DIYgod/RSSHub/blob/5928c5db2472e101c2f5c3bafed77a2f72edd40a/lib/routes/mastodon/utils.js#L85-L105`/zjol/paper/:id?`https://github.com/DIYgod/RSSHub/blob/172f6cfd2b69ea6affdbdedf61e6dde1671f3796/lib/routes/zjol/paper.js#L7-L13`/m4/:id?/:category*`https://github.com/DIYgod/RSSHub/blob/172f6cfd2b69ea6affdbdedf61e6dde1671f3796/lib/routes/m4/index.js#L10-L14PoChttps://rsshub.app/mastodon/acct/[email protected]%23/statuseshttps://rsshub.app/zjol/paper/a6wt15r2.requestrepo.com%23https://rsshub.app/m4/a6wt15r2.requestrepo.com%23/testImpactThe attacker can send malicious requests to a RSSHub server, to make the server send HTTP GET requests to arbitrary destinations and see partial responses. This may lead to:Leak the server IP address, which could be hidden behind a CDN.Retrieve information in the internal network. e.g. which addresses/ports are accessible, the titles and meta descriptions of HTML pages.DoS amplification. The attacker could request the server to download some large files, or chain several SSRF requests in a single attacker request: `https://rsshub.a.com/zjol/paper/rsshub.b.net%2Fzjol%2Fpaper%2Frsshub.a.com%252Fzjol%252Fpaper%252Frsshub.b.net%25252Fzjol%25252Fpaper%25252Frsshub.a.com%2525252Fzjol%2525252Fpaper%2525252Fexample.com%2525252523%25252523%252523%2523%23`.
|
[] | null | 6.5 | null | null |
GHSA-xv29-cvx6-qc29
|
procfs in FreeBSD and possibly other operating systems does not properly restrict access to per-process mem and ctl files, which allows local users to gain root privileges by forking a child process and executing a privileged process from the child, while the parent retains access to the child's address space.
|
[] | null | null | null | null |
|
CVE-2025-4333
|
feng_ha_ha/megagao ssm-erp/production_ssm FileServiceImpl.java uploadFile unrestricted upload
|
A vulnerability was found in feng_ha_ha/megagao ssm-erp and production_ssm up to 0.0.1. It has been classified as critical. This affects the function uploadFile of the file src/main/java/com/megagao/production/ssm/service/impl/FileServiceImpl.java. The manipulation of the argument uploadFile leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. This product is distributed under two entirely different names.
|
[] | 5.3 | 6.3 | 6.3 | 6.5 |
GHSA-g5fc-q72r-xgfm
|
The ICMPv6 parser in tcpdump before 4.9.2 has a buffer over-read in print-icmp6.c:icmp6_print().
|
[] | null | null | 9.8 | null |
|
CVE-2020-25036
|
UCOPIA Wi-Fi appliances 6.0.5 allow authenticated remote attackers to escape the restricted administration shell CLI, and access a shell with admin user rights, via an unprotected less command.
|
[
"cpe:2.3:a:ucopia:ucopia_wireless_appliance:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | 9 |
|
CVE-2004-1147
|
phpMyAdmin 2.6.0-pl2, and other versions before 2.6.1, with external transformations enabled, allows remote attackers to execute arbitrary commands via shell metacharacters.
|
[
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.5.5_pl1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.5.5_rc1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.5.5_rc2:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.5.6_rc1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.5.7_pl1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.6.0_pl1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.6.0_pl2:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.6.0_pl3:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
GHSA-27g2-9rj4-4jm7
|
Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.3.5 and 8.3.7 allows context-dependent attackers to affect availability via unknown vectors related to Outside In Filters, a different vulnerability than CVE-2012-1766, CVE-2012-1767, CVE-2012-1769, CVE-2012-1770, CVE-2012-1771, CVE-2012-1772, CVE-2012-1773, CVE-2012-3106, CVE-2012-3108, and CVE-2012-3110.
|
[] | null | null | null | null |
|
GHSA-v7q3-h4r2-3g3j
|
Cloudlog 2.6.15 allows Oqrs.php get_station_info station_id SQL injection.
|
[] | null | 9.8 | null | null |
|
CVE-2020-10376
|
Technicolor TC7337NET 08.89.17.23.03 devices allow remote attackers to discover passwords by sniffing the network for an "Authorization: Basic" HTTP header.
|
[
"cpe:2.3:o:technicolor:tc7337net_firmware:08.89.17.23.03:*:*:*:*:*:*:*",
"cpe:2.3:h:technicolor:tc7337net:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | 5 |
|
GHSA-q239-6x89-792c
|
Vulnerable versions of the Jupiter (<= 6.10.1) and JupiterX (<= 2.0.6) Themes allow logged-in users, including subscriber-level users, to perform Path Traversal and Local File inclusion. In the JupiterX theme, the jupiterx_cp_load_pane_action AJAX action present in the lib/admin/control-panel/control-panel.php file calls the load_control_panel_pane function. It is possible to use this action to include any local PHP file via the slug parameter. The Jupiter theme has a nearly identical vulnerability which can be exploited via the mka_cp_load_pane_action AJAX action present in the framework/admin/control-panel/logic/functions.php file, which calls the mka_cp_load_pane_action function.
|
[] | null | 8.8 | null | null |
|
GHSA-725p-65w3-rpp3
|
Windows Portmapping Information Disclosure Vulnerability
|
[] | null | 7.1 | null | null |
|
CVE-2020-0069
|
In the ioctl handlers of the Mediatek Command Queue driver, there is a possible out of bounds write due to insufficient input sanitization and missing SELinux restrictions. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-147882143References: M-ALPS04356754
|
[
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:berkeley-l09_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:berkeley-l09:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:columbia-al10b_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:columbia-al10b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:columbia-l29d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:columbia-l29d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:columbia-tl00b_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:columbia-tl00b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:columbia-tl00d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:columbia-tl00d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:cornell-al00a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:cornell-al00a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:cornell-tl10b_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:cornell-tl10b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:dura-al00a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:dura-al00a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:honor_20_pro_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:honor_20_pro:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:y6_2019_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:y6_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:nova_3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:nova_3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:nova_4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:nova_4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:honor_8a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:honor_8a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:honor_view_20_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:honor_view_20:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:jakarta-al00a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:jakarta-al00a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:katyusha-al00a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:katyusha-al00a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:katyusha-al10a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:katyusha-al10a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:madrid-al00a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:madrid-al00a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:paris-l29b_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:paris-l29b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:princeton-al10b_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:princeton-al10b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:sydney-al00_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:sydney-al00:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:sydney-tl00_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:sydney-tl00:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:sydneym-al00_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:sydneym-al00:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:tony-al00b_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:tony-al00b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:tony-tl00b_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:tony-tl00b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:yale-al00a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:yale-al00a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:yale-l21a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:yale-l21a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:yalep-al10b_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:yalep-al10b:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | 7.2 |
|
CVE-2023-40166
|
Notepad++ heap buffer read overflow in FileManager::detectLanguageFromTextBegining
|
Notepad++ is a free and open-source source code editor. Versions 8.5.6 and prior are vulnerable to heap buffer read overflow in `FileManager::detectLanguageFromTextBegining `. The exploitability of this issue is not clear. Potentially, it may be used to leak internal memory allocation information. As of time of publication, no known patches are available in existing versions of Notepad++.
|
[
"cpe:2.3:a:notepad-plus-plus:notepad\\+\\+:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
cisco-sa-lldp-memlk-McOecPT
|
Cisco Webex Room Phone and Cisco Webex Share Link Layer Discovery Protocol Memory Leak Vulnerability
|
A vulnerability in the Link Layer Discovery Protocol (LLDP) feature of Cisco Webex Room Phone and Cisco Webex Share devices could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device.
This vulnerability is due to insufficient resource allocation. An attacker could exploit this vulnerability by sending crafted LLDP traffic to an affected device. A successful exploit could allow the attacker to exhaust the memory resources of the affected device, resulting in a crash of the LLDP process. If the affected device is configured to support LLDP only, this could cause an interruption to inbound and outbound calling. By default, these devices are configured to support both Cisco Discovery Protocol and LLDP. To recover operational state, the affected device needs a manual restart.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
|
[] | null | 6.5 | null | null |
cisco-sa-ucm-access-dMKvV2DY
|
Cisco Unified Communications Products Access Control Vulnerability
|
A vulnerability in the Disaster Recovery framework of Cisco Unified Communications Manager (Unified CM), Cisco Unified Communications Manager IM & Presence Service (Unified CM IM&P), and Cisco Unity Connection could allow an authenticated, remote attacker to perform certain administrative actions they should not be able to.
This vulnerability is due to insufficient access control checks on the affected device. An attacker with read-only privileges could exploit this vulnerability by executing a specific vulnerable command on an affected device. A successful exploit could allow the attacker to perform a set of administrative actions they should not be able to.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
|
[] | null | 6.5 | null | null |
GHSA-99jv-8292-2hpm
|
eventing-gitlab vulnerable to denial of service, caused by improper enforcement of the timeout on individual read operations
|
ImpactThe eventing-gitlab cluster-local server doesn't set `ReadHeaderTimeout` which could lead do a DDoS attack, where a large group of users send requests to the server causing the server to hang for long enough to deny it from being available to other users, also know as a Slowloris attack.PatchesFix in `v1.12.1` and `v1.11.3`.CreditsThe vulnerability was reported by Ada Logics during an ongoing security audit of Knative involving Ada Logics, the Knative maintainers, OSTIF and CNCF.
|
[] | null | null | null | null |
CVE-2025-28232
|
Incorrect access control in the HOME.php endpoint of JMBroadcast JMB0150 Firmware v1.0 allows attackers to access the Admin panel without authentication.
|
[] | null | 9.1 | null | null |
|
CVE-2023-37997
|
WordPress Post List With Featured Image Plugin <= 1.2 is vulnerable to Cross Site Scripting (XSS)
|
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Dharmesh Patel Post List With Featured Image plugin <= 1.2 versions.
|
[
"cpe:2.3:a:dharmeshpatel:post_list_with_featured_image:*:*:*:*:*:wordpress:*:*"
] | null | 7.1 | null | null |
GHSA-7wrc-738x-m52x
|
Cross-site scripting (XSS) vulnerability in templates/installer/step-004.inc.php in spotweb 1.5.1 and below allow remote attackers to inject arbitrary web script or HTML via the username parameter.
|
[] | null | null | null | null |
|
GHSA-cggj-gprv-7895
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Content Mirror allows Reflected XSS. This issue affects Content Mirror: from n/a through 1.2.
|
[] | null | 7.1 | null | null |
|
GHSA-f5h8-mp5p-q6q4
|
** DISPUTED ** Zone Alarm Pro 1.0 through 5.1 gives full access to %windir%\Internet Logs\* to the EVERYONE group, which allows local users to cause a denial of service by modifying the folder contents or permissions. NOTE: this issue has been disputed by the vendor, who claims that it does not affect product functionality since the same information is also saved in a protected file.
|
[] | null | null | null | null |
|
CVE-2015-4166
|
Cloudera Key Trustee Server before 5.4.3 does not store keys synchronously, which might allow attackers to have unspecified impact via vectors related to loss of an encryption key.
|
[
"cpe:2.3:a:cloudera:key_trustee_server:*:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 |
|
GHSA-8wmr-w5j9-89v2
|
PHP remote file inclusion vulnerability in viewevent.php in myWebland myEvent 1.x allows remote attackers to execute arbitrary PHP code via a URL in the myevent_path parameter, a different vector than CVE-2006-4040. NOTE: the provenance of this information is unknown; the details are obtained from third party information.
|
[] | null | null | null | null |
|
CVE-2023-0496
|
HT Event < 1.4.6 - Arbitrary Plugin Activation via CSRF
|
The HT Event WordPress plugin before 1.4.6 does not have CSRF check when activating plugins, which could allow attackers to make logged in admins activate arbitrary plugins present on the blog via a CSRF attack
|
[
"cpe:2.3:a:hasthemes:ht_event:*:*:*:*:*:wordpress:*:*"
] | null | 4.3 | null | null |
CVE-2014-2637
|
Unspecified vulnerability in HP Sprinter 12.01 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-2342.
|
[
"cpe:2.3:a:hp:sprinter:12.01:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2014-3376
|
Cisco IOS XR 5.1 and earlier allows remote attackers to cause a denial of service (process reload) via a malformed RSVP packet, aka Bug ID CSCuq12031.
|
[
"cpe:2.3:o:cisco:ios_xr:2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:3.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:3.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:3.2.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:3.2.50:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:3.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:3.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:3.3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:3.3.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:3.3.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:3.3.5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:3.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:3.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:3.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:3.4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:3.5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:3.5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:3.5.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:3.5.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:3.5.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:3.6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:3.6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:3.6.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:3.6.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:3.7:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:3.7.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:3.7.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:3.7.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:3.8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:3.8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:3.8.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:3.8.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:3.8.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:3.9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:3.9.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:3.9.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:4.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:4.2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:4.3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:4.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:4.3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:4.3.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:5.1.0:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-x78q-89f4-5w3c
|
In Wireshark 2.2.0 to 2.2.5 and 2.0.0 to 2.0.11, the BGP dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-bgp.c by using a different integer data type.
|
[] | null | null | 7.5 | null |
|
CVE-2020-4992
|
IBM DataPower Gateway 2018.4.1.0 through 2018.4.1.16 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 192737.
|
[
"cpe:2.3:a:ibm:datapower_gateway:*:*:*:*:*:*:*:*"
] | null | null | 4.3 | null |
|
CVE-2020-11681
|
Castel NextGen DVR v1.0.0 stores and displays credentials for the associated SMTP server in cleartext. Low privileged users can exploit this to create an administrator user and obtain the SMTP credentials.
|
[
"cpe:2.3:o:castel:nextgen_dvr_firmware:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:h:castel:nextgen_dvr:-:*:*:*:*:*:*:*"
] | null | 8.1 | null | 4 |
|
CVE-2024-13933
|
FoodBakery | Delivery Restaurant Directory WordPress Theme <= 4.7 - Cross-Site Request Forgery in Multiple Functions
|
The FoodBakery | Delivery Restaurant Directory WordPress Theme theme for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 4.7. This is due to missing or incorrect nonce validation on the foodbakery_var_backup_file_delete, foodbakery_widget_file_delete, theme_option_save, export_widget_settings, ajax_import_widget_data, foodbakery_var_settings_backup_generate, foodbakery_var_backup_file_restore, and theme_option_rest_all functions. This makes it possible for unauthenticated attackers to delete arbitrary files, update theme options, export widget options, import widget options, generate backups, restore backups, and reset theme options via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
|
[] | null | 8.8 | null | null |
GHSA-vr8v-ggvj-qc6m
|
Due to insufficient encoding of user input, SAP NetWeaver allows an unauthenticated attacker to inject code that may expose sensitive data like user ID and password. These endpoints are normally exposed over the network and successful exploitation can partially impact confidentiality of the application.
|
[] | null | 6.1 | null | null |
|
GHSA-mcqx-w3j9-p34h
|
SQL injection vulnerability in the Call Detail Record Postgres logging engine (cdr_pgsql) in Asterisk 1.4.x before 1.4.15, 1.2.x before 1.2.25, B.x before B.2.3.4, and C.x before C.1.0-beta6 allows remote authenticated users to execute arbitrary SQL commands via (1) ANI and (2) DNIS arguments.
|
[] | null | null | null | null |
|
cisco-sa-20190828-nexus-aci-dos
|
Cisco Nexus 9000 Series Fabric Switches ACI Mode Border Leaf Endpoint Learning Vulnerability
|
A vulnerability within the Endpoint Learning feature of Cisco Nexus 9000 Series Switches running in Application Centric Infrastructure (ACI) mode could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an endpoint device in certain circumstances.
The vulnerability is due to improper endpoint learning when packets are received on a specific port from outside the ACI fabric and destined to an endpoint located on a border leaf when Disable Remote Endpoint Learning has been enabled. This can result in a Remote (XR) entry being created for the impacted endpoint that will become stale if the endpoint migrates to a different port or leaf switch. This results in traffic not reaching the impacted endpoint until the Remote entry can be relearned by another mechanism.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190828-nexus-aci-dos ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190828-nexus-aci-dos"]
|
[] | null | null | 6.8 | null |
CVE-2021-39295
|
In OpenBMC 2.9, crafted IPMI messages allow an attacker to cause a denial of service to the BMC via the netipmid (IPMI lan+) interface.
|
[
"cpe:2.3:a:openbmc-project:openbmc:2.9.0:-:*:*:*:*:*:*"
] | null | 7.5 | null | null |
|
GHSA-vm5p-w959-c36r
|
Crestron AM-100 with firmware 1.6.0.2 and AM-101 with firmware 2.7.0.2 is vulnerable to denial of service via a crafted request to TCP port 389. The request will force the slideshow to transition into a "stopped" state. A remote, unauthenticated attacker can use this vulnerability to stop an active slideshow.
|
[] | null | null | null | null |
|
CVE-2002-0538
|
FTP proxy in Symantec Raptor Firewall 6.5.3 and Enterprise 7.0 rewrites an FTP server's "FTP PORT" responses in a way that allows remote attackers to redirect FTP data connections to arbitrary ports, a variant of the "FTP bounce" vulnerability.
|
[
"cpe:2.3:a:symantec:enterprise_firewall:6.5.2:*:windows_2000_nt:*:*:*:*:*",
"cpe:2.3:a:symantec:enterprise_firewall:7.0:*:solaris:*:*:*:*:*",
"cpe:2.3:a:symantec:enterprise_firewall:7.0:*:windows_2000_nt:*:*:*:*:*",
"cpe:2.3:a:symantec:raptor_firewall:6.5:*:windows_nt:*:*:*:*:*",
"cpe:2.3:a:symantec:raptor_firewall:6.5.3:*:solaris:*:*:*:*:*",
"cpe:2.3:a:symantec:velociraptor:1.x:*:*:*:*:*:*:*",
"cpe:2.3:h:symantec:gateway_security:1.0:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-76v4-x2qg-xhgv
|
A vulnerability has been identified in Siemens Software Center (All versions < V3.0). A DLL Hijacking vulnerability could allow a local attacker to execute code with elevated privileges by placing a malicious DLL in one of the directories on the DLL search path.
|
[] | null | 7.8 | null | null |
|
GHSA-mq84-3c8v-r75g
|
Mozilla Firefox 1.5.0.6 allows remote attackers to execute arbitrary JavaScript in the context of the browser's session with an arbitrary intranet web server, by hosting script on an Internet web server that can be made inaccessible by the attacker and that has a domain name under the attacker's control, which can force the browser to drop DNS pinning and perform a new DNS query for the domain name after the script is already running.
|
[] | null | null | null | null |
|
GHSA-4c4v-9xr2-899m
|
In Parse_ins of eas_mdls.c, there is a possible out of bounds write due to a missing bounds check. This could lead to remote information disclosure in the media extractor process with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11 Android-8.0Android ID: A-150160279
|
[] | null | null | null | null |
|
CVE-2019-16318
|
In Pimcore before 5.7.1, an attacker with limited privileges can bypass file-extension restrictions via a 256-character filename, as demonstrated by the failure of automatic renaming of .php to .php.txt for long filenames, a different vulnerability than CVE-2019-10867 and CVE-2019-16317.
|
[
"cpe:2.3:a:pimcore:pimcore:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.5 |
|
CVE-2024-50480
|
WordPress Marketing Automation by AZEXO plugin <= 1.27.80 - Arbitrary File Upload vulnerability
|
Unrestricted Upload of File with Dangerous Type vulnerability in azexo Marketing Automation by AZEXO allows Upload a Web Shell to a Web Server.This issue affects Marketing Automation by AZEXO: from n/a through 1.27.80.
|
[
"cpe:2.3:a:azexo:marketing_automation_by_azexo:*:*:*:*:*:*:*:*"
] | null | 9.9 | null | null |
GHSA-6ppr-fg8v-vwjq
|
v2rayL 2.1.3 allows local users to achieve root access because /etc/v2rayL/config.json is owned by a low-privileged user but contains commands that are executed as root, after v2rayL.service is restarted via Sudo.
|
[] | null | null | null | null |
|
CVE-2023-25882
|
ZDI-CAN-19385: Adobe Dimension OBJ File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability
|
Adobe Dimension versions 3.4.7 (and earlier) is affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[
"cpe:2.3:a:adobe:dimension:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
CVE-2022-23469
|
Authorization header displayed in the debug logs
|
Traefik is an open source HTTP reverse proxy and load balancer. Versions prior to 2.9.6 are subject to a potential vulnerability in Traefik displaying the Authorization header in its debug logs. In certain cases, if the log level is set to DEBUG, credentials provided using the Authorization header are displayed in the debug logs. Attackers must have access to a users logging system in order for credentials to be stolen. This issue has been addressed in version 2.9.6. Users are advised to upgrade. Users unable to upgrade may set the log level to `INFO`, `WARN`, or `ERROR`.
|
[
"cpe:2.3:a:traefik:traefik:*:*:*:*:*:*:*:*"
] | null | 3.5 | null | null |
CVE-2024-5859
|
Appointment Booking and Online Scheduling <= 4.4.2 - Reflected Cross-Site Scripting
|
The Online Booking & Scheduling Calendar for WordPress by vcita plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘d’ parameter in all versions up to, and including, 4.4.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
|
[
"cpe:2.3:a:vcita:online_booking_\\&_scheduling_calendar_for_wordpress_by_vcita:*:*:*:*:*:wordpress:*:*"
] | null | 6.1 | null | null |
GHSA-r3fw-4472-w2w2
|
DELL ESI (Enterprise Storage Integrator) for SAP LAMA, version 10.0, contains an information disclosure vulnerability in EHAC component. An remote unauthenticated attacker could potentially exploit this vulnerability by eavesdropping the network traffic to gain admin level credentials.
|
[] | null | 9.8 | null | null |
|
GHSA-959q-hg7j-486g
|
BeyondTrust Privilege Management prior to version 21.6 creates a Temporary File in a Directory with Insecure Permissions.
|
[] | null | null | null | null |
|
CVE-2021-36287
|
Dell VNX2 for file version 8.1.21.266 and earlier, contain an unauthenticated remote code execution vulnerability which may lead unauthenticated users to execute commands on the system.
|
[
"cpe:2.3:a:dell:emc_unity_operating_environment:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:vnx_vg10:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:vnx_vg50:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:vnx5200:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:vnx5400:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:vnx5600:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:vnx5800:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:vnx7600:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:vnx8000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:vnxe1600:-:*:*:*:*:*:*:*"
] | null | 7.3 | null | null |
|
CVE-2023-25214
|
Tenda AC5 US_AC5V1.0RTL_V15.03.06.28 was discovered to contain a stack overflow via the setSchedWifi function. This vulnerability allows attackers to cause a Denial of Service (DoS) or execute arbitrary code via a crafted payload.
|
[
"cpe:2.3:o:tenda:ac5_firmware:15.03.06.28:*:*:*:*:*:*:*",
"cpe:2.3:h:tenda:ac5:1.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
CVE-2024-34602
|
Use of implicit intent for sensitive communication in Samsung Messages prior to SMR Jul-2024 Release 1 allows local attackers to get sensitive information. User interaction is required for triggering this vulnerability.
|
[
"cpe:2.3:o:samsung:android:12.0:-:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-apr-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-apr-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-apr-2024-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-aug-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-aug-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-dec-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-dec-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-dec-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-feb-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-feb-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-feb-2024-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-jan-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-jan-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-jan-2024-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-jul-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-jul-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-jun-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-jun-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-jun-2024-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-mar-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-mar-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-mar-2024-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-may-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-may-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-may-2024-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-nov-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-nov-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-nov-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-oct-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-oct-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-sep-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-sep-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:-:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-apr-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-apr-2024-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-aug-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-dec-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-dec-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-feb-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-feb-2024-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-jan-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-jan-2024-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-jul-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-jun-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-jun-2024-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-mar-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-mar-2024-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-may-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-may-2024-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-nov-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-nov-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-oct-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-oct-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-sep-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:-:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-apr-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-apr-2024-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-aug-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-dec-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-dec-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-feb-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-jan-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-jan-2024-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-jul-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-jun-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-jun-2024-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-mar-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-mar-2024-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-may-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-may-2024-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-nov-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-nov-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-oct-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-oct-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-sep-2023-r1:*:*:*:*:*:*"
] | null | 3.3 | null | null |
|
GHSA-q4g6-66mw-2pxj
|
Directory traversal vulnerability in print.php in moziloWiki 1.0.1 and earlier allows remote attackers to read arbitrary files via a .. (dot dot) in the page parameter.
|
[] | null | null | null | null |
|
CVE-2018-15676
|
An issue was discovered in BTITeam XBTIT. By using String.replace and eval, it is possible to bypass the includes/crk_protection.php anti-XSS mechanism that looks for a number of dangerous fingerprints.
|
[
"cpe:2.3:a:btiteam:xbtit:*:*:*:*:*:*:*:*"
] | null | null | 5.3 | 5 |
|
CVE-2023-33376
|
Connected IO v2.1.0 and prior has an argument injection vulnerability in its iptables command message in its communication protocol, enabling attackers to execute arbitrary OS commands on devices.
|
[
"cpe:2.3:a:connectedio:connected_io:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
GHSA-97r5-3mcv-523r
|
MyBB (aka MyBulletinBoard) before 1.6.18 and 1.8.x before 1.8.6 and MyBB Merge System before 1.8.6 allow remote attackers to obtain the installation path via vectors involving error log files.
|
[] | null | null | 7.5 | null |
|
CVE-2021-46638
|
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley MicroStation CONNECT 10.16.0.80. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of DGN files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-15510.
|
[
"cpe:2.3:a:bentley:microstation:*:*:*:*:*:*:*:*",
"cpe:2.3:a:bentley:microstation_connect:*:*:*:*:*:*:*:*",
"cpe:2.3:a:bentley:view:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | null |
|
GHSA-xqf7-wh6f-f6jh
|
The GeoDataSource Country Region DropDown plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'gds-country-dropdown' shortcode in all versions up to, and including, 1.0.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] | null | 6.4 | null | null |
|
GHSA-x2fr-wg43-9j34
|
Creative Cloud Desktop Application versions 4.6.1 and earlier have an insecure inherited permissions vulnerability. Successful exploitation could lead to privilege escalation.
|
[] | null | null | null | null |
|
GHSA-f47m-pm58-rvx2
|
A stored cross-site scripting (XSS) vulnerability in LightCMS v1.3.11 allows attackers to execute arbitrary web scripts or HTML via uploading a crafted PDF file.
|
[] | null | 4.8 | null | null |
|
CVE-2020-7177
|
A wmiconfigcontent expression language injection remote code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07).
|
[
"cpe:2.3:a:hp:intelligent_management_center:*:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:-:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0501:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0503:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0503p02:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0504:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0504p02:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0504p04:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0504p2:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0504p4:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0506:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0506p02:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0506p03:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0506p07:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0506p09:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0605:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0605h02:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0605h05:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0605h07:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0605h08:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0605h09:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0605p04:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0605p06:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0701:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0702:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0703:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0703h01:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0705:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0705p02:*:*:*:*:*:*"
] | null | 8.8 | null | 9 |
|
GHSA-wwwg-6r7f-9c9h
|
Malicious Package in file-logging
|
This package contained malicious code. The package uploaded system information such as OS and hostname to a remote server.RecommendationRemove the package from your environment. There are no indications of further compromise.
|
[] | null | 9.8 | null | null |
CVE-2024-26318
|
Serenity before 6.8.0 allows XSS via an email link because LoginPage.tsx permits return URLs that do not begin with a / character.
|
[] | null | 6.1 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.