id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
57.2k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2008-5224 | Cross-site scripting (XSS) vulnerability in Kent Web Mart 1.61 and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | [
"cpe:2.3:a:kent-web:kent-web_mart:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-53ph-2r2x-vqw8 | Cross-site WebSocket hijacking vulnerability in the Jenkins CLI | Jenkins has a built-in command line interface (CLI) to access Jenkins from a script or shell environment. Since Jenkins 2.217 and LTS 2.222.1, one of the ways to communicate with the CLI is through a WebSocket endpoint. This endpoint relies on the default Jenkins web request authentication functionality, like HTTP Basic authentication with API tokens, or session cookies. This endpoint is enabled when running on a version of Jetty for which Jenkins supports WebSockets. This is the case when using the provided native installers, packages, or the Docker containers, as well as when running Jenkins with the command java -jar jenkins.war.Jenkins 2.217 through 2.441 (both inclusive), LTS 2.222.1 through 2.426.2 (both inclusive) does not perform origin validation of requests made through the CLI WebSocket endpoint, resulting in a cross-site WebSocket hijacking (CSWSH) vulnerability. | [] | null | 8.8 | null | null |
CVE-2017-13147 | In GraphicsMagick 1.3.26, an allocation failure vulnerability was found in the function ReadMNGImage in coders/png.c when a small MNG file has a MEND chunk with a large length value. | [
"cpe:2.3:a:graphicsmagick:graphicsmagick:1.3.26:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.8 |
|
GHSA-f6hq-6569-mpqg | Vulnerability in the Oracle Banking Trade Finance product of Oracle Financial Services Applications (component: Infrastructure). The supported version that is affected is 14.5. Difficult to exploit vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Banking Trade Finance. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Banking Trade Finance accessible data as well as unauthorized access to critical data or complete access to all Oracle Banking Trade Finance accessible data. CVSS 3.1 Base Score 6.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N). | [] | null | 6.4 | null | null |
|
GHSA-475x-m5p2-cpmx | The Admin CP in vBulletin 5.6.3 allows XSS via an Announcement Title to Channel Manager. | [] | null | null | null | null |
|
GHSA-m84v-rxrp-w8rc | Directory traversal vulnerability in application/templates/amelia/loadjs.php in Free Reprintables ArticleFR 3.0.7 and earlier allows local users to read arbitrary files via the s parameter. | [] | null | null | null | null |
|
CVE-2024-54269 | WordPress Notibar plugin <= 2.1.4 - Broken Access Control vulnerability | Missing Authorization vulnerability in Ninja Team Notibar allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Notibar: from n/a through 2.1.4. | [] | null | 4.3 | null | null |
CVE-2025-27742 | NTFS Information Disclosure Vulnerability | Out-of-bounds read in Windows NTFS allows an unauthorized attacker to disclose information locally. | [] | null | 5.5 | null | null |
GHSA-jv74-f9pj-xp3f | Apache Camel's Mail is vulnerable to path traversal | Apache Camel's Mail 2.20.0 through 2.20.3, 2.21.0 through 2.21.1 and 2.22.0 is vulnerable to path traversal. | [] | null | null | 5.3 | null |
GHSA-8c7v-p9q4-7x63 | An issue was discovered in helpers/mailer.php in the Creative Contact Form extension 4.6.2 before 2019-12-03 for Joomla!. A directory traversal vulnerability resides in the filename field for uploaded attachments via the creativecontactform_upload parameter. An attacker could exploit this vulnerability with the "Send me a copy" option to receive any files of the filesystem via email. | [] | null | 5.3 | null | null |
|
CVE-2012-4077 | Cisco NX-OS allows local users to gain privileges and execute arbitrary commands via the sed e option, aka Bug IDs CSCtf25457 and CSCtf27651. | [
"cpe:2.3:o:cisco:nx-os:-:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
GHSA-vwrv-x97v-wggr | SmarterTools SmarterMail 16.x before build 6985 allows directory traversal. An authenticated user could delete arbitrary files or could create files in new folders in arbitrary locations on the mail server. This could lead to command execution on the server for instance by putting files inside the web directories. | [] | null | null | 6.5 | null |
|
GHSA-fxf7-m32w-qh93 | Nextcloud Server before 9.0.55 and 10.0.2 suffers from a bypass in the quota limitation. Due to not properly sanitizing values provided by the `OC-Total-Length` HTTP header an authenticated adversary may be able to exceed their configured user quota. Thus using more space than allowed by the administrator. | [] | null | null | 4.3 | null |
|
GHSA-x6mx-7fcg-2j6w | mount and umount in util-linux and loop-aes-utils call the setuid and setgid functions in the wrong order and do not check the return values, which might allow attackers to gain privileges via helpers such as mount.nfs. | [] | null | null | null | null |
|
GHSA-4mmp-hx5j-xw4g | Missing Authorization vulnerability in MyThemeShop URL Shortener by MyThemeShop.This issue affects URL Shortener by MyThemeShop: from n/a through 1.0.17. | [] | null | 5.4 | null | null |
|
GHSA-8fmv-4jcp-rv3m | A NULL pointer dereference was discovered in ifilter_bank of libfaad/filtbank.c in Freeware Advanced Audio Decoder 2 (FAAD2) 2.8.8. The vulnerability causes a segmentation fault and application crash, which leads to denial of service because adding to windowed output is mishandled in the ONLY_LONG_SEQUENCE case. | [] | null | 5.5 | null | null |
|
CVE-2021-28806 | DOM-Based XSS Vulnerability in QTS and QuTS hero | A DOM-based XSS vulnerability has been reported to affect QNAP NAS running QTS and QuTS hero. If exploited, this vulnerability allows attackers to inject malicious code. This issue affects: QNAP Systems Inc. QTS versions prior to 4.5.3.1652 Build 20210428. QNAP Systems Inc. QuTS hero versions prior to h4.5.2.1638 Build 20210414. QNAP Systems Inc. QuTScloud versions prior to c4.5.5.1656 Build 20210503. This issue does not affect: QNAP Systems Inc. QTS 4.3.6; 4.3.3. | [
"cpe:2.3:o:qnap:qts:*:*:*:*:*:*:*:*",
"cpe:2.3:o:qnap:quts_hero:*:*:*:*:*:*:*:*",
"cpe:2.3:o:qnap:qutscloud:*:*:*:*:*:*:*:*"
] | null | 5.7 | null | null |
RHSA-2015:2552 | Red Hat Security Advisory: kernel security and bug fix update | virt: guest to host DoS by triggering an infinite loop in microcode via #AC exception virt: guest to host DoS by triggering an infinite loop in microcode via #DB exception | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
GHSA-8fwf-4r37-rc6g | Heap-based buffer overflow in the HIFI driver in Huawei Mate 7 phones with software MT7-UL00 before MT7-UL00C17B354, MT7-TL10 before MT7-TL10C00B354, MT7-TL00 before MT7-TL00C01B354, and MT7-CL00 before MT7-CL00C92B354 and P8 phones with software GRA-TL00 before GRA-TL00C01B220SP01, GRA-CL00 before GRA-CL00C92B220, GRA-CL10 before GRA-CL10C92B220, GRA-UL00 before GRA-UL00C00B220, and GRA-UL10 before GRA-UL10C00B220 allows attackers to cause a denial of service (reboot) or execute arbitrary code via a crafted application. | [] | null | null | 7.8 | null |
|
CVE-2021-3900 | Cross-Site Request Forgery (CSRF) in firefly-iii/firefly-iii | firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF) | [
"cpe:2.3:a:firefly-iii:firefly_iii:*:*:*:*:*:*:*:*"
] | null | null | 4.3 | null |
CVE-2017-1722 | IBM Security QRadar SIEM 7.2 and 7.3 is vulnerable to SQL injection. A remote attacker could send specially-crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-Force ID: 134811. | [
"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p1:*:*:*:*:*:*",
"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p10:*:*:*:*:*:*",
"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p11:*:*:*:*:*:*",
"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p2:*:*:*:*:*:*",
"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p3:*:*:*:*:*:*",
"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p4:*:*:*:*:*:*",
"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p5:*:*:*:*:*:*",
"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p6:*:*:*:*:*:*",
"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p7:*:*:*:*:*:*",
"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p8:*:*:*:*:*:*",
"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p9:*:*:*:*:*:*",
"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.0:p1:*:*:*:*:*:*",
"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.0:p2:*:*:*:*:*:*",
"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.0:p3:*:*:*:*:*:*",
"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.0:p4:*:*:*:*:*:*",
"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.0:p5:*:*:*:*:*:*",
"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.0:p6:*:*:*:*:*:*",
"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.0:p7:*:*:*:*:*:*"
] | null | null | 6.3 | 6.5 |
|
CVE-2024-4906 | Campcodes Complete Web-Based School Management System show_student1.php sql injection | A vulnerability, which was classified as critical, was found in Campcodes Complete Web-Based School Management System 1.0. This affects an unknown part of the file /view/show_student1.php. The manipulation of the argument grade leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-264441 was assigned to this vulnerability. | [] | 5.3 | 6.3 | 6.3 | 6.5 |
GHSA-2j48-x5hc-4xv7 | IBM Security Access Manager for Mobile 8.x before 8.0.1 and Security Access Manager for Web 7.x before 7.0.0 FP10 and 8.x before 8.0.1 make it easier for remote attackers to obtain sensitive information by sniffing the network during use of a weak algorithm in an SSL cipher suite. | [] | null | null | null | null |
|
CVE-2023-37935 | A use of GET request method with sensitive query strings vulnerability in Fortinet FortiOS 7.0.0 - 7.0.12, 7.2.0 - 7.2.5 and 7.4.0 allows an attacker to view plaintext passwords of remote services such as RDP or VNC, if the attacker is able to read the GET requests to those services. | [
"cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:7.4.0:*:*:*:*:*:*:*"
] | null | 6.5 | null | null |
|
CVE-2016-3053 | IBM AIX contains an unspecified vulnerability that would allow a locally authenticated user to obtain root level privileges. | [
"cpe:2.3:o:ibm:aix:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | 7.2 |
|
GHSA-j97g-mp7p-4fj3 | Insufficient input validation in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable denial of service via network access. | [] | null | null | null | null |
|
GHSA-fvwj-74w8-g42q | The Cascading Style Sheets (CSS) implementation in Mozilla Firefox 4.x through 10.0, Firefox ESR 10.x before 10.0.3, Thunderbird 5.0 through 10.0, Thunderbird ESR 10.x before 10.0.3, and SeaMonkey before 2.8 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via dynamic modification of a keyframe followed by access to the cssText of the keyframe. | [] | null | null | null | null |
|
CVE-2013-4045 | Cross-site scripting (XSS) vulnerability in the Portal application in IBM SPSS Collaboration and Deployment Services 4.2.1 before 4.2.1.3 IF3 and 5.0 before FP3 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | [
"cpe:2.3:a:ibm:spss_collaboration_and_deployment_services:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:spss_collaboration_and_deployment_services:4.2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:spss_collaboration_and_deployment_services:4.2.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:spss_collaboration_and_deployment_services:4.2.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:spss_collaboration_and_deployment_services:5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:spss_collaboration_and_deployment_services:5.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:spss_collaboration_and_deployment_services:5.0.0.2:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-cg56-g6p6-m6gc | HP OpenVMS 8.3, 8.3-1H1, and 8.4 on the Itanium platform and 7.3-2, 8.2, 8.3, and 8.4 on the Alpha platform does not properly implement the LOGIN and ACME_SERVER ACMELOGIN programs, which allows remote attackers to cause a denial of service via unspecified vectors. | [] | null | null | null | null |
|
CVE-2024-4821 | WP Shortcodes Plugin — Shortcodes Ultimate <= 7.1.6 - Authenticated (Contributor+) Stored Cross-Site Scripting via su_lightbox Shortcode | The WP Shortcodes Plugin — Shortcodes Ultimate plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's su_lightbox shortcode in all versions up to, and including, 7.1.6 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [
"cpe:2.3:a:getshortcodes:shortcodes_ultimate:*:*:*:*:*:wordpress:*:*"
] | null | 6.4 | null | null |
GHSA-chvw-vg4m-qwm6 | Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability | [] | null | 8.8 | null | null |
|
GHSA-3hjh-9vcg-w788 | libautotrace.a in AutoTrace 0.31.1 has a "cannot be represented in type int" issue in input-bmp.c:309:7. | [] | null | null | 9.8 | null |
|
GHSA-h3w8-j4fj-qv4j | IBM DB2 Universal Database (UDB) 820 before ESE AIX 5765F4100 allows remote authenticated users to cause a denial of service (CPU consumption) by "abnormally" terminating a connection, which prevents db2agents from being properly cleared. | [] | null | null | null | null |
|
GHSA-9x58-7mrr-p9rc | Multiple cross-site scripting (XSS) vulnerabilities in the Welcart e-Commerce plugin 1.3.12 for WordPress allow remote attackers to inject arbitrary web script or HTML via (1) unspecified vectors related to purchase_limit or the (2) name, (3) intl, (4) nocod, or (5) time parameter in an add_delivery_method action to wp-admin/admin-ajax.php. | [] | null | null | null | null |
|
CVE-2018-20194 | There is a stack-based buffer underflow in the third instance of the calculate_gain function in libfaad/sbr_hfadj.c in Freeware Advanced Audio Decoder 2 (FAAD2) 2.8.8. A crafted input will lead to a denial of service or possibly unspecified other impact because limiting the additional noise energy level is mishandled for the G_max <= G case. | [
"cpe:2.3:a:audiocoding:freeware_advanced_audio_decoder_2:2.8.8:*:*:*:*:*:*:*"
] | null | null | 7.8 | 6.8 |
|
GHSA-rjxw-rrmr-pgg7 | In the Schiocco "Support Board - Chat And Help Desk" plugin 1.2.3 for WordPress, a Stored XSS vulnerability has been discovered in file upload areas in the Chat and Help Desk sections via the msg parameter in a /wp-admin/admin-ajax.php sb_ajax_add_message action. | [] | null | null | 5.4 | null |
|
CVE-2024-1688 | The Woo Total Sales plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the get_orders_archive() function in all versions up to, and including, 3.1.4. This makes it possible for unauthenticated attackers to retrieve sales reports for the store. | [] | null | 5.3 | null | null |
|
CVE-2013-1802 | The extlib gem 0.9.15 and earlier for Ruby does not properly restrict casts of string values, which might allow remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) by leveraging Action Pack support for (1) YAML type conversion or (2) Symbol type conversion, a similar vulnerability to CVE-2013-0156. | [
"cpe:2.3:a:dan_kubb:extlib:*:*:*:*:*:*:*:*",
"cpe:2.3:a:dan_kubb:extlib:0.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:dan_kubb:extlib:0.9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:dan_kubb:extlib:0.9.4:*:*:*:*:*:*:*",
"cpe:2.3:a:dan_kubb:extlib:0.9.5:*:*:*:*:*:*:*",
"cpe:2.3:a:dan_kubb:extlib:0.9.6:*:*:*:*:*:*:*",
"cpe:2.3:a:dan_kubb:extlib:0.9.7:*:*:*:*:*:*:*",
"cpe:2.3:a:dan_kubb:extlib:0.9.8:*:*:*:*:*:*:*",
"cpe:2.3:a:dan_kubb:extlib:0.9.9:*:*:*:*:*:*:*",
"cpe:2.3:a:dan_kubb:extlib:0.9.10:*:*:*:*:*:*:*",
"cpe:2.3:a:dan_kubb:extlib:0.9.11:*:*:*:*:*:*:*",
"cpe:2.3:a:dan_kubb:extlib:0.9.12:*:*:*:*:*:*:*",
"cpe:2.3:a:dan_kubb:extlib:0.9.13:*:*:*:*:*:*:*",
"cpe:2.3:a:dan_kubb:extlib:0.9.14:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2021-44092 | An SQL Injection vulnerability exists in code-projects Pharmacy Management 1.0 via the username parameter in the administer login form. | [
"cpe:2.3:a:pharmacy_management_project:pharmacy_management:1.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
|
GHSA-pfww-hw2q-8mc3 | Buffer overflow in Collaboration Data Objects (CDO), as used in Microsoft Windows and Microsoft Exchange Server, allows remote attackers to execute arbitrary code when CDOSYS or CDOEX processes an e-mail message with a large header name, as demonstrated using the "Content-Type" string. | [] | null | null | null | null |
|
CVE-2008-0047 | Heap-based buffer overflow in the cgiCompileSearch function in CUPS 1.3.5, and other versions including the version bundled with Apple Mac OS X 10.5.2, when printer sharing is enabled, allows remote attackers to execute arbitrary code via crafted search expressions. | [
"cpe:2.3:o:apple:mac_os_x:10.5.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cups:cups:1.3.5:*:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
GHSA-rpg9-p2rj-cf43 | Stack-based buffer overflow in Icarus 2.0 allows remote attackers to cause a denial of service (application crash) or execute arbitrary code via a crafted Portable Game Notation (.pgn) file. | [] | null | null | null | null |
|
GHSA-ccvp-hcv8-2jjx | The wp-file-upload plugin before 3.0.0 for WordPress has insufficient restrictions on upload of php, js, pht, php3, php4, php5, phtml, htm, html, and htaccess files. | [] | null | null | 7.5 | null |
|
RHSA-2011:0028 | Red Hat Security Advisory: kvm security and bug fix update | kvm: x86: zero kvm_vcpu_events->interrupt.pad infoleak | [
"cpe:/a:redhat:rhel_virtualization:5::client",
"cpe:/a:redhat:rhel_virtualization:5::server"
] | null | null | null | null |
CVE-2017-9963 | A cross-site request forgery vulnerability exists on the Secure Gateway component of Schneider Electric's PowerSCADA Anywhere v1.0 redistributed with PowerSCADA Expert v8.1 and PowerSCADA Expert v8.2 and Citect Anywhere version 1.0 for multiple state-changing requests. This type of attack requires some level of social engineering in order to get a legitimate user to click on or access a malicious link/site containing the CSRF attack. | [
"cpe:2.3:a:schneider-electric:powerscada_anywhere:1.0:*:*:*:*:*:*:*"
] | null | null | 8.1 | 5.8 |
|
CVE-2022-39287 | Plaintext transmission of CSRF tokens in tiny-csrf | tiny-csrf is a Node.js cross site request forgery (CSRF) protection middleware. In versions prior to 1.1.0 cookies were not encrypted and thus CSRF tokens were transmitted in the clear. This issue has been addressed in commit `8eead6d` and the patch with be included in version 1.1.0. Users are advised to upgrade. There are no known workarounds for this issue. | [
"cpe:2.3:a:tiny-csrf_project:tiny-csrf:*:*:*:*:*:node.js:*:*"
] | null | 8.1 | null | null |
GHSA-8cm6-w967-v85j | Hospital Management System v1.0 is affected by an unrestricted upload of dangerous file type vulerability in treatmentrecord.php. To exploit, an attacker can upload any PHP file, and then execute it. | [] | null | 9.8 | null | null |
|
CVE-2021-3577 | An unauthenticated remote code execution vulnerability was reported in some Motorola-branded Binatone Hubble Cameras that could allow an attacker on the same network unauthorized access to the device. | [
"cpe:2.3:o:binatoneglobal:halo\\+_camera_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:binatoneglobal:halo\\+_camera:-:*:*:*:*:*:*:*",
"cpe:2.3:o:binatoneglobal:comfort_85_connect_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:binatoneglobal:comfort_85_connect:-:*:*:*:*:*:*:*",
"cpe:2.3:o:binatoneglobal:mbp3855_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:binatoneglobal:mbp3855:-:*:*:*:*:*:*:*",
"cpe:2.3:o:binatoneglobal:focus_68_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:binatoneglobal:focus_68:v100:*:*:*:*:*:*:*",
"cpe:2.3:h:binatoneglobal:focus_68:v200:*:*:*:*:*:*:*",
"cpe:2.3:o:binatoneglobal:focus_72r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:binatoneglobal:focus_72r:v100:*:*:*:*:*:*:*",
"cpe:2.3:h:binatoneglobal:focus_72r:v200:*:*:*:*:*:*:*",
"cpe:2.3:o:binatoneglobal:cn28_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:binatoneglobal:cn28:-:*:*:*:*:*:*:*",
"cpe:2.3:o:binatoneglobal:cn50_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:binatoneglobal:cn50:-:*:*:*:*:*:*:*",
"cpe:2.3:o:binatoneglobal:comfort_40_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:binatoneglobal:comfort_40:-:*:*:*:*:*:*:*",
"cpe:2.3:o:binatoneglobal:comfort_50_connect_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:binatoneglobal:comfort_50_connect:-:*:*:*:*:*:*:*",
"cpe:2.3:o:binatoneglobal:mbp4855_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:binatoneglobal:mbp4855:-:*:*:*:*:*:*:*",
"cpe:2.3:o:binatoneglobal:mbp3667_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:binatoneglobal:mbp3667:-:*:*:*:*:*:*:*",
"cpe:2.3:o:binatoneglobal:mbp669_connect_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:binatoneglobal:mbp669_connect:-:*:*:*:*:*:*:*",
"cpe:2.3:o:binatoneglobal:lux_64_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:binatoneglobal:lux_64:-:*:*:*:*:*:*:*",
"cpe:2.3:o:binatoneglobal:lux_65_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:binatoneglobal:lux_65:-:*:*:*:*:*:*:*",
"cpe:2.3:o:binatoneglobal:connect_view_65_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:binatoneglobal:connect_view_65:-:*:*:*:*:*:*:*",
"cpe:2.3:o:binatoneglobal:lux_85_connect_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:binatoneglobal:lux_85_connect:-:*:*:*:*:*:*:*",
"cpe:2.3:o:binatoneglobal:ease44_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:binatoneglobal:ease44:-:*:*:*:*:*:*:*",
"cpe:2.3:o:binatoneglobal:connect_20_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:binatoneglobal:connect_20:-:*:*:*:*:*:*:*",
"cpe:2.3:o:binatoneglobal:mbp6855_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:binatoneglobal:mbp6855:-:*:*:*:*:*:*:*",
"cpe:2.3:o:binatoneglobal:cn40_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:binatoneglobal:cn40:-:*:*:*:*:*:*:*",
"cpe:2.3:o:binatoneglobal:cn75_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:binatoneglobal:cn75:-:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
|
CVE-2025-23701 | WordPress Lime Developer Login plugin <= 1.4.0 - Reflected Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Matthew Blackford, LimeSquare Pty Ltd Lime Developer Login allows Reflected XSS. This issue affects Lime Developer Login: from n/a through 1.4.0. | [] | null | 7.1 | null | null |
CVE-2020-36713 | The MStore API plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 2.1.5. This is due to unrestricted access to the 'register' and 'update_user_profile' routes. This makes it possible for unauthenticated attackers to create new administrator accounts, delete existing administrator accounts, or escalate privileges on any account. | [
"cpe:2.3:a:inspireui:mstore_api:*:*:*:*:*:wordpress:*:*"
] | null | 9.8 | null | null |
|
GHSA-8gg5-pvcf-9jwc | Improper input validation in driver adgnetworkwfpdrv.sys in Adguard For Windows x86 up to version 7.11 allows attacker to gain local privileges escalation. | [] | null | 7.8 | null | null |
|
CVE-2023-42844 | This issue was addressed with improved handling of symlinks. This issue is fixed in macOS Sonoma 14.1, macOS Monterey 12.7.1, macOS Ventura 13.6.1. A website may be able to access sensitive user data when resolving symlinks. | [
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
|
GHSA-j8j9-8wxg-37f9 | The Perforce service (p4s.exe) in Perforce Server 2008.1 allows remote attackers to cause a denial of service (daemon crash) via crafted data beginning with a byte sequence of 0x4c, 0xb3, 0xff, 0xff, and 0xff. | [] | null | null | null | null |
|
CVE-2019-9537 | Telos Automated Message Handling System reflected XSS in uploaditem.asp | : Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in uploaditem.asp of Telos Automated Message Handling System allows a remote attacker to inject arbitrary script into an AMHS session. This issue affects: Telos Automated Message Handling System versions prior to 4.1.5.5. | [
"cpe:2.3:a:telos:automated_message_handling_system:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 |
CVE-2019-16309 | FlameCMS 3.3.5 has SQL injection in account/login.php via accountName. | [
"cpe:2.3:a:flamecms_project:flamecms:3.3.5:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
|
GHSA-cp8g-mv9m-5m2f | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none. | [] | null | null | null | null |
|
RHSA-2024:11122 | Red Hat Security Advisory: gstreamer1-plugins-good security update | gstreamer1-plugins-good: OOB-write in isomp4/qtdemux.c gstreamer1-plugins-good: OOB-write in convert_to_s334_1a gstreamer1-plugins-good: uninitialized stack memory in Matroska/WebM demuxer gstreamer1-plugins-good: integer overflows in MP4/MOV demuxer and memory allocator that can lead to out-of-bounds writes gstreamer1-plugins-good: null pointer dereference in gst_gdk_pixbuf_dec_flush | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 6.5 | null | null |
GHSA-gmhw-jgv2-j5cp | The api/ZRAndlink/set_ZRAndlink interface in China Mobile An Lianbao WF-1 router 1.0.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the iandlink_proc_enable parameter. | [] | null | 9.8 | null | null |
|
CVE-2022-2325 | Invitation Based Registrations <= 2.2.84 - Admin+ Stored Cross-Site Scripting | The Invitation Based Registrations WordPress plugin through 2.2.84 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks when the unfiltered_html capability is disallowed (for example in multisite setup) | [
"cpe:2.3:a:securebit:invitation_based_registrations:*:*:*:*:*:wordpress:*:*"
] | null | 4.8 | null | null |
GHSA-j7p2-9xp5-vw32 | Unrestricted file upload vulnerability in index.php in Speedywiki 2.0 allows remote authenticated users to upload and execute arbitrary PHP code by setting the upload parameter to 1. | [] | null | null | null | null |
|
RHSA-2024:1041 | Red Hat Security Advisory: go-toolset-1.19-golang security update | golang: net/http/internal: Denial of Service (DoS) via Resource Consumption via HTTP requests golang: cmd/go: Protocol Fallback when fetching modules | [
"cpe:/a:redhat:devtools:2023::el7"
] | null | 7.5 | null | null |
GHSA-5345-wpqm-6qgf | IBM Cognos Controller 10.2.0, 10.2.1, 10.3.0, 10.3.1, and 10.4.0 allows web pages to be stored locally which can be read by another user on the system. IBM X-Force ID: 158882. | [] | null | 3.3 | null | null |
|
CVE-2022-21226 | Out-of-bounds read in the Intel(R) Trace Analyzer and Collector before version 2021.5 may allow an authenticated user to potentially enable information disclosure via local access. | [
"cpe:2.3:a:intel:trace_analyzer_and_collector:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | 2.1 |
|
CVE-2024-32637 | A vulnerability has been identified in JT2Go (All versions < V2312.0005), Teamcenter Visualization V14.2 (All versions < V14.2.0.12), Teamcenter Visualization V14.3 (All versions < V14.3.0.10), Teamcenter Visualization V2312 (All versions < V2312.0005). The affected applications contain a null pointer dereference vulnerability while parsing specially crafted X_T files. An attacker could leverage this vulnerability to crash the application causing denial of service condition. | [
"cpe:2.3:a:siemens:ps_iges_parasolid_translator_component:*:*:*:*:*:*:*:*"
] | 4.8 | 3.3 | null | null |
|
CVE-2020-3875 | A validation issue was addressed with improved input sanitization. This issue is fixed in iOS 13.3.1 and iPadOS 13.3.1, macOS Catalina 10.15.3, tvOS 13.3.1, watchOS 6.1.2. An application may be able to read restricted memory. | [
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | 4.3 |
|
GHSA-vp7c-4m3c-rrmp | In Content, there is a possible way to determine whether an app is installed, without query permissions, due to side channel information disclosure. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. | [] | null | 5.5 | null | null |
|
CVE-2024-11364 | Rockwell Automation Third Party Vulnerability in Arena® | Another “uninitialized variable” code execution vulnerability exists in the Rockwell Automation Arena® that could allow a threat actor to craft a DOE file and force the software to access a variable prior to it being initialized. If exploited, a threat actor could leverage this vulnerability to execute arbitrary code. To exploit this vulnerability, a legitimate user must execute the malicious code crafted by the threat actor. | [] | 8.5 | null | null | null |
CVE-2001-0858 | Buffer overflow in pppattach and other linked PPP utilities in Caldera Open Unix 8.0 and UnixWare 7.1.0 and 7.1.1 allows local users to gain privileges. | [
"cpe:2.3:a:caldera:unixware:7.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:caldera:unixware:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:caldera:openunix:8.0:*:*:*:*:*:*:*"
] | null | null | null | 4.6 |
|
CVE-2000-0624 | Buffer overflow in Winamp 2.64 and earlier allows remote attackers to execute arbitrary commands via a long #EXTINF: extension in the M3U playlist. | [
"cpe:2.3:a:nullsoft:winamp:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2024-45801 | Tampering by prototype polution in DOMPurify | DOMPurify is a DOM-only, super-fast, uber-tolerant XSS sanitizer for HTML, MathML and SVG. It has been discovered that malicious HTML using special nesting techniques can bypass the depth checking added to DOMPurify in recent releases. It was also possible to use Prototype Pollution to weaken the depth check. This renders dompurify unable to avoid cross site scripting (XSS) attacks. This issue has been addressed in versions 2.5.4 and 3.1.3 of DOMPurify. All users are advised to upgrade. There are no known workarounds for this vulnerability. | [] | null | 7.3 | null | null |
GHSA-m5hm-48p4-4q77 | Attackers can then execute malicious files by enabling certain services of the printer via the web configuration page and elevate its privileges to root. As for the affected products/models/versions, see the reference URL. | [] | null | 7.8 | null | null |
|
GHSA-p8vp-32g7-jxj4 | Stored XSS has been discovered in the upload section of ARDAWAN.COM User Management 1.1, as demonstrated by a .jpg filename to the /account URI. | [] | null | null | 5.4 | null |
|
CVE-2022-31675 | VMware vRealize Operations contains an authentication bypass vulnerability. An unauthenticated malicious actor with network access may be able to create a user with administrative privileges. | [
"cpe:2.3:a:vmware:vrealize_operations:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
|
GHSA-3gqx-rv8x-9m5c | In the Linux kernel, the following vulnerability has been resolved:f2fs: fix race in concurrent f2fs_stop_gc_threadIn my test case, concurrent calls to f2fs shutdown report the following
stack trace:Oops: general protection fault, probably for non-canonical address 0xc6cfff63bb5513fc: 0000 [#1] PREEMPT SMP PTI
CPU: 0 UID: 0 PID: 678 Comm: f2fs_rep_shutdo Not tainted 6.12.0-rc5-next-20241029-g6fb2fa9805c5-dirty #85
Call Trace:
<TASK>
? show_regs+0x8b/0xa0
? __die_body+0x26/0xa0
? die_addr+0x54/0x90
? exc_general_protection+0x24b/0x5c0
? asm_exc_general_protection+0x26/0x30
? kthread_stop+0x46/0x390
f2fs_stop_gc_thread+0x6c/0x110
f2fs_do_shutdown+0x309/0x3a0
f2fs_ioc_shutdown+0x150/0x1c0
__f2fs_ioctl+0xffd/0x2ac0
f2fs_ioctl+0x76/0xe0
vfs_ioctl+0x23/0x60
__x64_sys_ioctl+0xce/0xf0
x64_sys_call+0x2b1b/0x4540
do_syscall_64+0xa7/0x240
entry_SYSCALL_64_after_hwframe+0x76/0x7eThe root cause is a race condition in f2fs_stop_gc_thread() called from
different f2fs shutdown paths:[CPU0] [CPU1]f2fs_stop_gc_thread f2fs_stop_gc_thread
gc_th = sbi->gc_thread
gc_th = sbi->gc_thread
kfree(gc_th)
sbi->gc_thread = NULL
< gc_th != NULL >
kthread_stop(gc_th->f2fs_gc_task) //UAFThe commit c7f114d864ac ("f2fs: fix to avoid use-after-free in
f2fs_stop_gc_thread()") attempted to fix this issue by using a read
semaphore to prevent races between shutdown and remount threads, but
it fails to prevent all race conditions.Fix it by converting to write lock of s_umount in f2fs_do_shutdown(). | [] | null | 7.8 | null | null |
|
CVE-2020-4239 | IBM Tivoli Netcool Impact 7.1.0.0 through 7.1.0.17 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. IBM X-Force ID: 175412. | [
"cpe:2.3:a:ibm:tivoli_netcool\\/impact:*:*:*:*:*:*:*:*"
] | null | null | 5.3 | null |
|
GHSA-35cw-298h-r635 | expat_erl.c in ejabberd before 2.1.7 and 3.x before 3.0.0-alpha-3, and exmpp before 0.9.7, does not properly detect recursion during entity expansion, which allows remote attackers to cause a denial of service (memory and CPU consumption) via a crafted XML document containing a large number of nested entity references, a similar issue to CVE-2003-1564. | [] | null | null | null | null |
|
CVE-2024-50370 | A CWE-78 "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')" was discovered affecting the following devices manufactured by Advantech: EKI-6333AC-2G (<= 1.6.3), EKI-6333AC-2GD (<= v1.6.3) and EKI-6333AC-1GPO (<= v1.2.1). The vulnerability can be exploited by remote unauthenticated users capable of interacting with the default "edgserver" service enabled on the access point and malicious commands are executed with root privileges. No authentication is enabled on the service and the source of the vulnerability resides in processing code associated to the "cfg_cmd_set_eth_conf" operation. | [] | null | 9.8 | null | null |
|
CVE-2008-6242 | SQL injection vulnerability in SearchResults.php in Scripts For Sites (SFS) EZ e-store allows remote attackers to execute arbitrary SQL commands via the where parameter. | [
"cpe:2.3:a:scripts-for-sites:ez_e-store:-:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2017-14186 | A Cross-site Scripting (XSS) vulnerability in Fortinet FortiOS 6.0.0 to 6.0.4, 5.6.0 to 5.6.7, 5.4 and below versions under SSL VPN web portal allows a remote user to inject arbitrary web script or HTML in the context of the victim's browser via the login redir parameter. An URL Redirection attack may also be feasible by injecting an external URL via the affected parameter. | [
"cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*"
] | null | null | 5.4 | 3.5 |
|
GHSA-pg59-2f92-5cph | Heap buffer overflow in Tensorflow | ImpactThe `SparseCountSparseOutput` and `RaggedCountSparseOutput` implementations don't validate that the `weights` tensor has the same shape as the data. The check exists for `DenseCountSparseOutput`, where both tensors are fully specified:
https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/core/kernels/count_ops.cc#L110-L117In the sparse and ragged count weights are still accessed in parallel with the data:
https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/core/kernels/count_ops.cc#L199-L201But, since there is no validation, a user passing fewer weights than the values for the tensors can generate a read from outside the bounds of the heap buffer allocated for the weights.PatchesWe have patched the issue in 3cbb917b4714766030b28eba9fb41bb97ce9ee02 and will release a patch release.We recommend users to upgrade to TensorFlow 2.3.1.For more informationPlease consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.AttributionThis vulnerability is a variant of [GHSA-p5f8-gfw5-33w4](https://github.com/tensorflow/tensorflow/security/advisories/GHSA-p5f8-gfw5-33w4) | [] | 5.8 | 8.5 | null | null |
GHSA-g3p6-f99v-p9j7 | The Team Builder – Meet the Team plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the save_team_builder_options() function in all versions up to, and including, 1.3. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update the plugin's settings. | [] | null | 4.3 | null | null |
|
CVE-2024-7889 | Local privilege escalation allows a low-privileged user to gain SYSTEM privileges | Local privilege escalation allows a low-privileged user to gain SYSTEM privileges in Citrix Workspace app for Windows | [
"cpe:2.3:a:citrix:workspace_app:*:*:*:*:*:windows:*:*",
"cpe:2.3:a:citrix:workspace_app:*:*:*:*:ltsr:windows:*:*",
"cpe:2.3:a:citrix:workspace:*:*:*:*:ltsr:windows:*:*",
"cpe:2.3:a:citrix:workspace:2203.1:cu1:*:*:ltsr:windows:*:*",
"cpe:2.3:a:citrix:workspace:2203.1:cu2:*:*:ltsr:windows:*:*",
"cpe:2.3:a:citrix:workspace:2203.1:cu3:*:*:ltsr:windows:*:*",
"cpe:2.3:a:citrix:workspace:2203.1:cu4:*:*:ltsr:windows:*:*",
"cpe:2.3:a:citrix:workspace:2203.1:cu5:*:*:ltsr:windows:*:*",
"cpe:2.3:a:citrix:workspace:2203.1:cu6_hotfix1:*:*:ltsr:windows:*:*",
"cpe:2.3:a:citrix:workspace:2203.1:cu6_hotfix2:*:*:ltsr:windows:*:*",
"cpe:2.3:a:citrix:workspace:2402:-:*:*:ltsr:windows:*:*",
"cpe:2.3:a:citrix:workspace:*:*:*:*:-:windows:*:*"
] | 7 | null | null | null |
GHSA-mx4m-rmpq-fcw6 | A command injection vulnerability was identified in GitHub Enterprise Server that allowed an attacker with an editor role in the Management Console to gain admin SSH access to the appliance when setting the username and password for collectd configurations. Exploitation of this vulnerability required access to the GitHub Enterprise Server instance and access to the Management Console with the editor role. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.12 and was fixed in versions 3.11.5, 3.10.7, 3.9.10, and 3.8.15. This vulnerability was reported via the GitHub Bug Bounty program https://bounty.github.com . | [] | null | 9.1 | null | null |
|
CVE-2005-0706 | Buffer overflow in discdb.c for grip 3.1.2 allows attackers to cause a denial of service (crash) and possibly execute arbitrary code by causing the cddb lookup to return more matches than expected. | [
"cpe:2.3:a:grip:grip:2.9.6:*:*:*:*:*:*:*",
"cpe:2.3:a:grip:grip:3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:grip:grip:3.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:grip:grip:3.2.0:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2021-26544 | Apache Livy (Incubating) is vulnerable to cross site scripting | Livy server version 0.7.0-incubating (only) is vulnerable to a cross site scripting issue in the session name. A malicious user could use this flaw to access logs and results of other users' sessions and run jobs with their privileges. This issue is fixed in Livy 0.7.1-incubating. | [
"cpe:2.3:a:apache:livy:0.7.0-incubating:*:*:*:*:*:*:*"
] | null | 5.4 | null | 3.5 |
CVE-2024-37187 | Advantech ADAM-5550 Weak Encoding for Password | Advantech ADAM-5550 share user credentials with a low level of encryption, consisting of base 64 encoding. | [
"cpe:2.3:o:advantech:adam-5550_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:advantech:adam-5550:-:*:*:*:*:*:*:*"
] | 6.8 | 5.7 | null | null |
RHSA-2018:0549 | Red Hat Security Advisory: firefox security update | Mozilla: Vorbis audio processing out of bounds write (MFSA 2018-08) | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 8.8 | null |
GHSA-7358-ghcm-c3ff | Improper Restriction of XML External Entity Reference ('XXE') vulnerability in the Policy Engine of Forcepoint Data Loss Prevention (DLP), which is also leveraged by Forcepoint One Endpoint (F1E), Web Security Content Gateway, Email Security with DLP enabled, and Cloud Security Gateway prior to June 20, 2022. The XML parser in the Policy Engine was found to be improperly configured to support external entities and external DTD (Document Type Definitions), which can lead to an XXE attack. This issue affects: Forcepoint Data Loss Prevention (DLP) versions prior to 8.8.2. Forcepoint One Endpoint (F1E) with Policy Engine versions prior to 8.8.2. Forcepoint Web Security Content Gateway versions prior to 8.5.5. Forcepoint Email Security with DLP enabled versions prior to 8.5.5. Forcepoint Cloud Security Gateway prior to June 20, 2022. | [] | null | 9.8 | null | null |
|
CVE-2022-35765 | Storage Spaces Direct Elevation of Privilege Vulnerability | Storage Spaces Direct Elevation of Privilege Vulnerability | [
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
CVE-2022-40809 | The d8s-dicts for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-hypothesis package. The affected version is 0.1.0 | [
"cpe:2.3:a:democritus_dicts_project:democritus_dicts:0.1.0:*:*:*:*:python:*:*"
] | null | 9.8 | null | null |
|
CVE-2010-3473 | Open redirect vulnerability in the Workplace (aka WP) component in IBM FileNet P8 Application Engine (P8AE) 3.5.1 before 3.5.1-021 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors. | [
"cpe:2.3:a:ibm:filenet_p8_application_engine:3.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:filenet_p8_application_engine:3.5.1:001:*:*:*:*:*:*",
"cpe:2.3:a:ibm:filenet_p8_application_engine:3.5.1:002:*:*:*:*:*:*",
"cpe:2.3:a:ibm:filenet_p8_application_engine:3.5.1:003:*:*:*:*:*:*",
"cpe:2.3:a:ibm:filenet_p8_application_engine:3.5.1:004:*:*:*:*:*:*",
"cpe:2.3:a:ibm:filenet_p8_application_engine:3.5.1:005:*:*:*:*:*:*",
"cpe:2.3:a:ibm:filenet_p8_application_engine:3.5.1:006:*:*:*:*:*:*",
"cpe:2.3:a:ibm:filenet_p8_application_engine:3.5.1:007:*:*:*:*:*:*",
"cpe:2.3:a:ibm:filenet_p8_application_engine:3.5.1:008:*:*:*:*:*:*",
"cpe:2.3:a:ibm:filenet_p8_application_engine:3.5.1:009:*:*:*:*:*:*",
"cpe:2.3:a:ibm:filenet_p8_application_engine:3.5.1:010:*:*:*:*:*:*",
"cpe:2.3:a:ibm:filenet_p8_application_engine:3.5.1:011:*:*:*:*:*:*",
"cpe:2.3:a:ibm:filenet_p8_application_engine:3.5.1:012:*:*:*:*:*:*",
"cpe:2.3:a:ibm:filenet_p8_application_engine:3.5.1:013:*:*:*:*:*:*",
"cpe:2.3:a:ibm:filenet_p8_application_engine:3.5.1:014:*:*:*:*:*:*",
"cpe:2.3:a:ibm:filenet_p8_application_engine:3.5.1:015:*:*:*:*:*:*",
"cpe:2.3:a:ibm:filenet_p8_application_engine:3.5.1:016:*:*:*:*:*:*",
"cpe:2.3:a:ibm:filenet_p8_application_engine:3.5.1:017:*:*:*:*:*:*",
"cpe:2.3:a:ibm:filenet_p8_application_engine:3.5.1:018:*:*:*:*:*:*",
"cpe:2.3:a:ibm:filenet_p8_application_engine:3.5.1:019:*:*:*:*:*:*",
"cpe:2.3:a:ibm:filenet_p8_application_engine:3.5.1:020:*:*:*:*:*:*"
] | null | null | null | 5.8 |
|
CVE-2022-3710 | A post-auth read-only SQL injection vulnerability allows API clients to read non-sensitive configuration database contents in the API controller of Sophos Firewall releases older than version 19.5 GA. | [
"cpe:2.3:o:sophos:xg_firewall_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sophos:xg_firewall:-:*:*:*:*:*:*:*"
] | null | 2.7 | null | null |
|
CVE-2023-41117 | An issue was discovered in EnterpriseDB Postgres Advanced Server (EPAS) before 11.21.32, 12.x before 12.16.20, 13.x before 13.12.16, 14.x before 14.9.0, and 15.x before 15.4.0. It contain packages, standalone packages, and functions that run SECURITY DEFINER but are inadequately secured against search_path attacks. | [
"cpe:2.3:a:enterprisedb:postgres_advanced_server:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
|
GHSA-vqxw-9pg7-v7v9 | Locust Stored Cross-site Scripting Vulnerability | A stored cross-site scripting (XSS) vulnerability affects the Web UI in Locust before 1.3.2, if the installation violates the usage expectations by exposing this UI to outside users. | [] | 5.3 | 6.1 | null | null |
GHSA-fqrh-w8r3-22q6 | lock order inversion in transitive grant copy handling As part of XSA-226 a missing cleanup call was inserted on an error handling path. While doing so, locking requirements were not paid attention to. As a result two cooperating guests granting each other transitive grants can cause locks to be acquired nested within one another, but in respectively opposite order. With suitable timing between the involved grant copy operations this may result in the locking up of a CPU. | [] | null | 5.6 | null | null |
|
GHSA-4vr3-9v7h-5f8v | Low severity vulnerability that affects Gw2Sharp | Leaking cached authenticated requestsImpactIf you've been using one `MemoryCacheMethod` object in multiple instances of `Gw2WebApiClient` and are requesting authenticated endpoints with different access tokens, then you are likely to run into this bug.When using an instance of `MemoryCacheMethod` and using it with multiple instances of `Gw2WebApiClient`, there's a possibility that cached authenticated responses are leaking to another request to the same endpoint, but with a different Guild Wars 2 access token. The latter request wouldn't start however, and would return the first cached response immediately. This means that the second response (or later responses) may contain the same data as the first response, therefore leaking data from another authenticated endpoint.The occurence of this is limited however. The Guild Wars 2 API doesn't use the `Expires` header on most (if not all) authenticated endpoints. This header is checked when caching responses. If this header isn't available, the response isn't cached at all. You should still update to at least version 0.3.1 in order to be certain that it won't happen.PatchesThis bug has been fixed in version 0.3.1. When using an authenticated endpoint, it will prepend the SHA-1 hash of the access token to the cache id.WorkaroundsFor version 0.3.0 and lower, you can use one separate instance of `MemoryCacheMethod` per `Gw2WebApiClient` if you need to use it.For more informationIf you have any questions or comments about this advisory, you can open an issue in [the Gw2Sharp repository](https://github.com/Archomeda/Gw2Sharp) or contact me on [Discord](https://discord.gg/hNcpDT3). | [] | null | null | null | null |
CVE-2017-0774 | A denial of service vulnerability in the Android media framework (libstagefright). Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2. Android ID: A-62673844. | [
"cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:*"
] | null | null | 5.5 | 7.1 |
|
GHSA-h9jx-rcv4-cgqg | A CSRF vulnerability exists in comfyanonymous/comfyui versions up to v0.2.2. This vulnerability allows attackers to host malicious websites that, when visited by authenticated ComfyUI users, can perform arbitrary API requests on behalf of the user. This can be exploited to perform actions such as uploading arbitrary files via the `/upload/image` endpoint. The lack of CSRF protections on API endpoints like `/upload/image`, `/prompt`, and `/history` leaves users vulnerable to unauthorized actions, which could be combined with other vulnerabilities such as stored-XSS to further compromise user sessions. | [] | null | null | 6.5 | null |
|
ICSA-18-338-02 | SpiderControl SCADA WebServer | Reflected cross-site scripting (non-persistent) could allow an attacker to send a crafted URL that contains JavaScript, which can be reflected off the web application to the victim 's browser. CVE-2018-18991 has been assigned to this vulnerability. A CVSS v3 base score of 6.1 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N). | [] | null | null | 6.1 | null |
GHSA-749p-fxxp-x88r | D-Link device D-Link DIR-823-Pro v1.0.2 was discovered to contain a command injection vulnerability in the function ChgSambaUserSettings. This vulnerability allows attackers to execute arbitrary commands via the samba_name parameter. | [] | null | 9.8 | null | null |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.