id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
57.2k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2024-41120 | streamlit-geospatial blind SSRF in pages/9_🔲_Vector_Data_Visualization.py | streamlit-geospatial is a streamlit multipage app for geospatial applications. Prior to commit c4f81d9616d40c60584e36abb15300853a66e489, the `url` variable on line 63 of `pages/9_🔲_Vector_Data_Visualization.py` takes user input, which is later passed to the `gpd.read_file` method. `gpd.read_file` method creates a request to arbitrary destinations, leading to blind server-side request forgery. Commit c4f81d9616d40c60584e36abb15300853a66e489 fixes this issue. | [
"cpe:2.3:a:opengeos:streamlit-geospatial:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
CVE-2023-29103 | A vulnerability has been identified in SIMATIC Cloud Connect 7 CC712 (All versions >= V2.0 < V2.1), SIMATIC Cloud Connect 7 CC712 (All versions < V2.1), SIMATIC Cloud Connect 7 CC716 (All versions >= V2.0 < V2.1), SIMATIC Cloud Connect 7 CC716 (All versions < V2.1). The affected device uses a hard-coded password to protect the diagnostic files. This could allow an authenticated attacker to access protected data. | [
"cpe:2.3:o:siemens:6gk1411-1ac00_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:6gk1411-1ac00:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:6gk1411-5ac00_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:6gk1411-5ac00:-:*:*:*:*:*:*:*"
] | null | 4.3 | null | null |
|
CVE-2022-45539 | EyouCMS <= 1.6.0 was discovered a reflected-XSS in FileManager component in GET value "activepath" when creating a new file. | [
"cpe:2.3:a:eyoucms:eyoucms:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | null |
|
GHSA-3jj9-9287-pj45 | Cross-Site Request Forgery (CSRF) vulnerability in Pearlbells Flash News / Post (Responsive) allows Privilege Escalation.This issue affects Flash News / Post (Responsive): from n/a through 4.1. | [] | null | 9.8 | null | null |
|
RHSA-2023:5464 | Red Hat Security Advisory: frr security update | frr: Incorrect handling of a error in parsing of an invalid section of a BGP update can de-peer a router | [
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 7.5 | null | null |
GHSA-rhhm-9xfq-x5qf | OX App Suite before backend 7.10.6-rev37 has an information leak in the handling of distribution lists, e.g., partial disclosure of the private contacts of another user. | [] | null | 4.3 | null | null |
|
CVE-2020-26900 | Certain NETGEAR devices are affected by disclosure of administrative credentials. This affects CBR40 before 2.5.0.10, RBK752 before 3.2.15.25, RBR750 before 3.2.15.25, RBS750 before 3.2.15.25, RBK852 before 3.2.15.25, RBR850 before 3.2.15.25, and RBS850 before 3.2.15.25. | [
"cpe:2.3:o:netgear:cbr40_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:cbr40:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbk752_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbk752:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbr750_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbr750:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbs750_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbs750:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbk852_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbk852:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbr850_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbr850:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbs850_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbs850:-:*:*:*:*:*:*:*"
] | null | 9.6 | null | null |
|
RHSA-2023:1327 | Red Hat Security Advisory: OpenShift Container Platform 4.13.0 security update | golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests | [
"cpe:/a:redhat:openshift:4.13::el8"
] | null | 5.3 | null | null |
CVE-2024-22042 | A vulnerability has been identified in Unicam FX (All versions). The windows installer agent used in affected product contains incorrect use of privileged APIs that trigger the Windows Console Host (conhost.exe) as a child process with SYSTEM privileges. This could be exploited by an attacker to perform a local privilege escalation attack. | [
"cpe:2.3:a:siemens:unicam_fx:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
|
CVE-2022-30141 | Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability | Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability | [
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:hololens:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:azure:*:*:*"
] | null | 8.1 | null | null |
CVE-2019-8081 | Adobe Experience Manager versions 6.5, 6.4, 6.3 and 6.2 have an authentication bypass vulnerability. Successful exploitation could lead to sensitive information disclosure. | [
"cpe:2.3:a:adobe:experience_manager:6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:experience_manager:6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:experience_manager:6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:experience_manager:6.5:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
GHSA-qmx9-67mw-5ghq | Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via mjs_ffi_cb_free at src/mjs_ffi.c. This vulnerability can lead to a Denial of Service (DoS). | [] | null | 5.5 | null | null |
|
CVE-2017-3093 | Adobe Digital Editions versions 4.5.4 and earlier have an exploitable memory corruption vulnerability in the bitmap representation module. Successful exploitation could lead to arbitrary code execution. | [
"cpe:2.3:a:adobe:digital_editions:*:*:*:*:*:*:*:*"
] | null | null | 9.8 | 10 |
|
GHSA-6gcw-2jwm-f6f4 | Cross-site scripting (XSS) vulnerability in manager/templates/default/header.tpl in MODX Revolution 2.3.1-pl and earlier allows remote attackers to inject arbitrary web script or HTML via the "a" parameter to manager/. NOTE: this issue exists because of a CVE-2014-2080 regression. | [] | null | null | null | null |
|
GHSA-rq57-8pjv-c6r7 | IBM System Storage DS8900F 89.22.19.0, 89.30.68.0, 89.32.40.0, 89.33.48.0, 89.40.83.0, and 89.40.93.0 could allow a remote user to create an LDAP connection with a valid username and empty password to establish an anonymous connection. IBM X-Force ID: 279518. | [] | null | 5 | null | null |
|
CVE-2024-11398 | Improper limitation of a pathname to a restricted directory ('Path Traversal') vulnerability in OTP reset functionality in Synology Router Manager (SRM) before 1.3.1-9346-9 allows remote authenticated users to delete arbitrary files via unspecified vectors. | [] | null | 8.1 | null | null |
|
CVE-2022-41787 | BIG-IP DNS Express vulnerability CVE-2022-41787 | In BIG-IP versions 17.0.x before 17.0.0.1, 16.1.x before 16.1.3.1, 15.1.x before 15.1.6.1, 14.1.x before 14.1.5.1, and 13.1.x before 13.1.5.1, when DNS profile is configured on a virtual server with DNS Express enabled, undisclosed DNS queries with DNSSEC can cause TMM to terminate. | [
"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
CVE-2002-1293 | The Microsoft Java implementation, as used in Internet Explorer, provides a public load0() method for the CabCracker class (com.ms.vm.loader.CabCracker), which allows remote attackers to bypass the security checks that are performed by the load() method. | [
"cpe:2.3:a:microsoft:java_virtual_machine:1.1:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-m6qq-x2hx-wvxv | IBM Rhapsody Model Manager 6.0.6 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 145510. | [] | null | null | 5.4 | null |
|
CVE-2023-52596 | sysctl: Fix out of bounds access for empty sysctl registers | In the Linux kernel, the following vulnerability has been resolved:
sysctl: Fix out of bounds access for empty sysctl registers
When registering tables to the sysctl subsystem there is a check to see
if header is a permanently empty directory (used for mounts). This check
evaluates the first element of the ctl_table. This results in an out of
bounds evaluation when registering empty directories.
The function register_sysctl_mount_point now passes a ctl_table of size
1 instead of size 0. It now relies solely on the type to identify
a permanently empty register.
Make sure that the ctl_table has at least one element before testing for
permanent emptiness. | [] | null | 5.5 | null | null |
GHSA-3fh9-9x39-q9qw | Niels Provos Systrace before 1.6f on the x86_64 Linux platform allows local users to bypass intended access restrictions by making a 64-bit syscall with a syscall number that corresponds to a policy-compliant 32-bit syscall. | [] | null | null | null | null |
|
GHSA-w72r-2wgf-qg44 | Unspecified vulnerability in the Oracle Secure Global Desktop component in Oracle Virtualization 5.0 and 5.1 allows remote attackers to affect availability via vectors related to SGD Proxy Server (ttaauxserv) and SGD SSL Daemon (ttassl). | [] | null | null | null | null |
|
GHSA-jq42-836h-c5wg | Format string vulnerability in the proto_item_set_text function in Ethereal 0.9.4 through 0.10.11, as used in multiple dissectors, allows remote attackers to write to arbitrary memory locations and gain privileges via a crafted AFP packet. | [] | null | null | null | null |
|
GHSA-q9gf-f79c-cjcf | Denial of service in syslog by sending it a large number of superfluous messages. | [] | null | null | null | null |
|
RHSA-2020:2740 | Red Hat Security Advisory: candlepin and satellite security update | apache-commons-beanutils: does not suppresses the class property in PropertyUtilsBean by default | [
"cpe:/a:redhat:satellite:6.5::el7",
"cpe:/a:redhat:satellite_capsule:6.5::el7"
] | null | null | 7.3 | null |
GHSA-3r46-8fph-p95v | An issue was discovered in NOKIA AMS 9.7.05. Remote Code Execution exists via the debugger of the ipAddress variable. A remote user, authenticated to the AMS server, could inject code in the PING function. The privileges of the command executed depend on the user that runs the service. | [] | null | 8.8 | null | null |
|
CVE-2023-30680 | Improper privilege management vulnerability in MMIGroup prior to SMR Aug-2023 Release 1 allows code execution with privilege. | [
"cpe:2.3:a:samsung_mobile:samsung_mobile_devices:*:*:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:-:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-apr-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-apr-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-aug-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-dec-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-dec-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-feb-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-feb-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-jan-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-jan-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-jul-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-jul-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-jun-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-jun-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-mar-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-mar-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-may-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-may-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-nov-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-nov-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-oct-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-sep-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:-:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-apr-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-dec-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-feb-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-jan-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-jul-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-jun-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-mar-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-may-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-nov-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-oct-2022-r1:*:*:*:*:*:*"
] | null | 8.4 | null | null |
|
CVE-2024-25167 | Cross Site Scripting vulnerability in eblog v1.0 allows a remote attacker to execute arbitrary code via a crafted script to the argument description parameter when submitting a comment on a post. | [
"cpe:2.3:a:biantaibao:eblog:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | null |
|
CVE-2012-4876 | Stack-based buffer overflow in the UltraMJCam ActiveX Control in TRENDnet SecurView TV-IP121WN Wireless Internet Camera allows remote attackers to execute arbitrary code via a long string to the OpenFileDlg method. | [
"cpe:2.3:a:trendnet:securview_wireless_internet_camera_activex_control:1.1.52.18:*:*:*:*:*:*:*",
"cpe:2.3:h:trendnet:securview_wireless_internet_camera:tv-ip121wn:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
CVE-2011-1740 | EMC Avamar 4.x, 5.0.x, and 6.0.x before 6.0.0-592 allows remote authenticated users to modify client data or obtain sensitive information about product activities by leveraging privileged access to a different domain. | [
"cpe:2.3:a:emc:avamar:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:avamar:4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:avamar:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:avamar:5.0:sp1:*:*:*:*:*:*",
"cpe:2.3:a:emc:avamar:5.0:sp2:*:*:*:*:*:*",
"cpe:2.3:a:emc:avamar:5.0.0-407:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:avamar:5.0.4-26:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:avamar:6.0:*:*:*:*:*:*:*"
] | null | null | null | 7.7 |
|
CVE-2018-15678 | An issue was discovered in BTITeam XBTIT 2.5.4. The "act" parameter in the sign-up page available at /index.php?page=signup is vulnerable to reflected cross-site scripting. | [
"cpe:2.3:a:btiteam:xbtit:2.5.4:*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 |
|
CVE-2022-32525 | A CWE-120: Buffer Copy without Checking Size of Input vulnerability exists that could cause a stack-based buffer overflow, potentially leading to remote code execution when an attacker sends specially crafted alarm data messages. Affected Products: IGSS Data Server - IGSSdataServer.exe (Versions prior to V15.0.0.22170) | [
"cpe:2.3:a:schneider-electric:interactive_graphical_scada_system:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
GHSA-9vx5-gccr-9gr3 | Double free vulnerabilities in the error handling code for ASN.1 decoders in the (1) Key Distribution Center (KDC) library and (2) client library for MIT Kerberos 5 (krb5) 1.3.4 and earlier may allow remote attackers to execute arbitrary code. | [] | null | null | null | null |
|
GHSA-vwrp-9627-m33j | Cross-site request forgery (CSRF) vulnerability on Cisco TelePresence MCU 4500 devices with software 4.5(1.55) allows remote attackers to hijack the authentication of arbitrary users, aka Bug ID CSCuu90710. | [] | null | null | null | null |
|
GHSA-p32x-38hp-2r9x | IBM Security Verify Privilege On-Premises 11.5 could allow a privileged user to cause by using a malicious payload. IBM X-Force ID: 240634. | [] | null | 2.7 | null | null |
|
CVE-2024-49352 | IBM Cognos Anaytics XML external entity injection | IBM Cognos Analytics 11.2.0, 11.2.1, 11.2.2, 11.2.3, 11.2.4, 12.0.0, 12.0.1, 12.0.2, 12.0.3, and 12.0.4 is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. | [] | null | 7.1 | null | null |
CVE-2023-47684 | WordPress Essential Grid Plugin <= 3.1.0 is vulnerable to Cross Site Scripting (XSS) | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in ThemePunch OHG Essential Grid plugin <= 3.1.0 versions. | [
"cpe:2.3:a:themepunch:essential_grid:*:*:*:*:*:wordpress:*:*"
] | null | 7.1 | null | null |
GHSA-wcqr-6gj6-96wc | The issue was addressed with improved permissions logic. This issue is fixed in macOS Sequoia 15.2, macOS Sonoma 14.7.2. An app may be able to modify protected parts of the file system. | [] | null | 5.5 | null | null |
|
RHSA-2021:0172 | Red Hat Security Advisory: OpenShift Container Platform 4.6.13 packages and security update | kubernetes: Docker config secrets leaked when file is malformed and loglevel >= 4 golang: data race in certain net/http servers including ReverseProxy can lead to DoS golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs golang: math/big: panic during recursive division of very large numbers | [
"cpe:/a:redhat:openshift:4.6::el7",
"cpe:/a:redhat:openshift:4.6::el8"
] | null | 7.5 | null | null |
GHSA-949j-r9x2-w58x | An arbitrary file upload vulnerability in Xpand IT Write-back Manager v2.3.1 allows attackers to execute arbitrary code via a crafted jsp file. | [] | null | 9.8 | null | null |
|
RHSA-2025:1188 | Red Hat Security Advisory: buildah security update | podman: buildah: Container breakout by using --jobs=2 and a race condition when building a malicious Containerfile | [
"cpe:/a:redhat:rhel_eus:9.4::appstream"
] | null | 8.6 | null | null |
GHSA-w8c5-v27m-v5ch | Diasoft File Replication Pro 7.5.0 allows attackers to escalate privileges by replacing a legitimate file with a Trojan horse that will be executed as LocalSystem. This occurs because %ProgramFiles%\FileReplicationPro allows Everyone:(F) access. | [] | null | 9.8 | null | null |
|
GHSA-5xr7-3q35-3j73 | Insecure permissions in Aginode GigaSwitch v5 allows attackers to access sensitive information via using the SCP command. | [] | null | 6.5 | null | null |
|
RHBA-2023:7492 | Red Hat Bug Fix Advisory: RHODS 2.4 - Red Hat OpenShift Data Science | HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) | [
"cpe:/a:redhat:openshift_data_science:2.4::el8"
] | null | 7.5 | null | null |
CVE-2021-45972 | The giftrans function in giftrans 1.12.2 contains a stack-based buffer overflow because a value inside the input file determines the amount of data to write. This allows an attacker to overwrite up to 250 bytes outside of the allocated buffer with arbitrary data. | [
"cpe:2.3:a:giftrans_project:giftrans:1.12.2:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*"
] | null | 7.1 | null | 5.8 |
|
CVE-2013-2199 | The HTTP API in WordPress before 3.5.2 allows remote attackers to send HTTP requests to intranet servers via unspecified vectors, related to a Server-Side Request Forgery (SSRF) issue, a similar vulnerability to CVE-2013-0235. | [
"cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:0.71:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:1.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:1.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:1.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:1.2.5:a:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:1.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:1.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:1.5.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:1.5.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:1.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:1.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.8.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.8.4:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.8.4:a:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.8.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.8.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.8.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.8.6:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.9.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.5.0:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-p8jq-m873-mx98 | A vulnerability was found in Tenda AC15 15.03.20_multi. It has been declared as critical. This vulnerability affects the function saveParentControlInfo of the file /goform/saveParentControlInfo. The manipulation of the argument urls leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-257776. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | [] | null | 8.8 | null | null |
|
CVE-2022-31584 | The stonethree/s3label repository through 2019-08-14 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely. | [
"cpe:2.3:a:s3label_project:s3label:*:*:*:*:*:*:*:*"
] | null | 9.3 | null | 6.4 |
|
CVE-2021-21639 | Jenkins 2.286 and earlier, LTS 2.277.1 and earlier does not validate the type of object created after loading the data submitted to the `config.xml` REST API endpoint of a node, allowing attackers with Computer/Configure permission to replace a node with one of a different type. | [
"cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*",
"cpe:2.3:a:jenkins:jenkins:*:*:*:*:-:*:*:*"
] | null | 4.3 | null | 4 |
|
CVE-2000-0983 | Microsoft NetMeeting with Remote Desktop Sharing enabled allows remote attackers to cause a denial of service (CPU utilization) via a sequence of null bytes to the NetMeeting port, aka the "NetMeeting Desktop Sharing" vulnerability. | [
"cpe:2.3:a:microsoft:netmeeting:3.0.1:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2024-34478 | btcd before 0.24.0 does not correctly implement the consensus rules outlined in BIP 68 and BIP 112, making it susceptible to consensus failures. Specifically, it uses the transaction version as a signed integer when it is supposed to be treated as unsigned. There can be a chain split and loss of funds. | [
"cpe:2.3:a:btcd:btcd:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
|
GHSA-r33r-8f25-2v5p | An exploitable local privilege elevation vulnerability exists in the file system permissions of GOG Galaxy's install directory. An attacker can overwrite an executable that is launched as a system service on boot by default to exploit this vulnerability and execute arbitrary code with system privileges. | [] | null | null | 7.8 | null |
|
CVE-2012-1079 | Unspecified vulnerability in the Webservices for TYPO3 (typo3_webservice) extension before 0.3.8 for TYPO3 allows remote authenticated users to execute arbitrary code via unknown vectors. | [
"cpe:2.3:a:helmut_hummel:typo3_webservice:*:*:*:*:*:*:*:*",
"cpe:2.3:a:helmut_hummel:typo3_webservice:0.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:helmut_hummel:typo3_webservice:0.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:helmut_hummel:typo3_webservice:0.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:helmut_hummel:typo3_webservice:0.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*"
] | null | null | null | 6.5 |
|
RHSA-2014:1011 | Red Hat Security Advisory: resteasy-base security update | RESTEasy: XXE via parameter entities | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
CVE-2014-3429 | IPython Notebook 0.12 through 1.x before 1.2 does not validate the origin of websocket requests, which allows remote attackers to execute arbitrary code by leveraging knowledge of the kernel id and a crafted page. | [
"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ipython:ipython_notebook:0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:ipython:ipython_notebook:0.12.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ipython:ipython_notebook:0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:ipython:ipython_notebook:0.13.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ipython:ipython_notebook:0.13.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ipython:ipython_notebook:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ipython:ipython_notebook:1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:mageia:mageia:3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:mageia:mageia:4.0:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
CVE-2014-0057 | The x_button method in the ServiceController (vmdb/app/controllers/service_controller.rb) in Red Hat CloudForms 3.0 Management Engine 5.2 allows remote attackers to execute arbitrary methods via unspecified vectors. | [
"cpe:2.3:a:redhat:cloudforms:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:cloudforms_3.0_management_engine:5.2:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2017-7552 | A flaw was discovered in the file editor of millicore, affecting versions before 3.19.0 and 4.x before 4.5.0, which allows files to be executed as well as created. An attacker could use this flaw to compromise other users or teams projects stored in source control management of the RHMAP Core installation. | [
"cpe:2.3:a:redhat:mobile_application_platform:*:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 |
|
ICSA-22-291-01 | Advantech R-SeeNet | Advantech R-SeeNet Versions 2.4.19 and prior are vulnerable to path traversal attacks. An unauthorized attacker could remotely exploit vulnerable PHP code to delete .PDF files.CVE-2022-3387 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N). Advantech R-SeeNet Versions 2.4.17 and prior are vulnerable to a stack-based buffer overflow. An unauthorized attacker can use an outsized filename to overflow the stack buffer and enable remote code execution.CVE-2022-3386 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). Advantech R-SeeNet Versions 2.4.17 and prior are vulnerable to a stack-based buffer overflow. An unauthorized attacker can remotely overflow the stack buffer and enable remote code execution.CVE-2022-3385has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). | [] | null | null | 9.8 | null |
CVE-2007-1554 | Direct static code injection vulnerability in admin/configuration.php in Guestbara 1.2 and earlier allows remote authenticated users to inject arbitrary PHP code into config.php via the (1) admin_mail, (2) emotpatch, (3) login, (4) pass, and unspecified other parameters. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | [
"cpe:2.3:a:guestbara:guestbara:1.2:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
GHSA-rv5g-mm56-gjv3 | Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used. | [] | null | null | null | null |
|
CVE-2013-0769 | Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.1, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.1, and SeaMonkey before 2.15 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors. | [
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird_esr:*:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:-:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:vmware:*:*",
"cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp4:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp2:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:5.9:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
CVE-2019-9103 | An issue was discovered on Moxa MGate MB3170 and MB3270 devices before 4.1, MB3280 and MB3480 devices before 3.1, MB3660 devices before 2.3, and MB3180 devices before 2.1. An attacker can access sensitive information (e.g., conduct username disclosure attacks) on the built-in WEB-service without authorization. | [
"cpe:2.3:o:moxa:mb3170_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:mb3170:-:*:*:*:*:*:*:*",
"cpe:2.3:o:moxa:mb3270_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:mb3270:-:*:*:*:*:*:*:*",
"cpe:2.3:o:moxa:mb3180_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:mb3180:-:*:*:*:*:*:*:*",
"cpe:2.3:o:moxa:mb3280_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:mb3280:-:*:*:*:*:*:*:*",
"cpe:2.3:o:moxa:mb3480_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:mb3480:-:*:*:*:*:*:*:*",
"cpe:2.3:o:moxa:mb3660_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:mb3660:-:*:*:*:*:*:*:*"
] | null | null | 5.3 | null |
|
CVE-2025-23591 | WordPress blu Logistics plugin <= 1.0.0 - Reflected Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Blu Logistics Pte. Ltd. blu Logistics allows Reflected XSS. This issue affects blu Logistics: from n/a through 1.0.0. | [] | null | 7.1 | null | null |
CVE-2011-1873 | win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 on 64-bit platforms does not properly validate pointers during the parsing of OpenType (aka OTF) fonts, which allows remote attackers to execute arbitrary code via a crafted font file, aka "Win32k OTF Validation Vulnerability." | [
"cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:*:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:*:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:*:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:*"
] | null | null | null | 9.3 |
|
RHSA-2003:162 | Red Hat Security Advisory: : : : Updated Mozilla packages fix security vulnerability. | security flaw | [
"cpe:/o:redhat:linux:7.1",
"cpe:/o:redhat:linux:7.2",
"cpe:/o:redhat:linux:7.3",
"cpe:/o:redhat:linux:8.0"
] | null | null | null | null |
CVE-2021-39884 | In all versions of GitLab EE since version 8.13, an endpoint discloses names of private groups that have access to a project to low privileged users that are part of that project. | [
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*"
] | null | 4.3 | null | null |
|
cisco-sa-20180905-rv-routers-overflow | Cisco RV110W, RV130W, and RV215W Routers Management Interface Buffer Overflow Vulnerability | A vulnerability in the web-based management interface of the Cisco RV110W Wireless-N VPN Firewall, Cisco RV130W Wireless-N Multifunction VPN Router, and Cisco RV215W Wireless-N VPN Router could allow an unauthenticated, remote attacker to cause a denial of service condition or to execute arbitrary code.
The vulnerability is due to improper boundary restrictions on user-supplied input in the Guest user feature of the web-based management interface. An attacker could exploit this vulnerability by sending malicious requests to a targeted device, triggering a buffer overflow condition. A successful exploit could allow the attacker to cause the device to stop responding, resulting in a denial of service condition, or could allow the attacker to execute arbitrary code.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180905-rv-routers-overflow ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180905-rv-routers-overflow"] | [] | null | null | 9.8 | null |
CVE-2016-10310 | Buffer overflow in the MobiLink Synchronization Server component in SAP SQL Anywhere 17 and possibly earlier allows remote authenticated users to cause a denial of service (resource consumption and process crash) by sending a crafted packet several times, aka SAP Security Note 2308778. | [
"cpe:2.3:a:sap:sql_anywhere:*:*:*:*:*:*:*:*"
] | null | null | 4.9 | 4 |
|
GHSA-hm85-x8v2-3xgv | Buffer over-read while unpacking the RTCP packet we may read extra byte if wrong length is provided in RTCP packets in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables | [] | null | null | null | null |
|
CVE-2022-26259 | A buffer over flow in Xiongmai DVR devices NBD80X16S-KL, NBD80X09S-KL, NBD80X08S-KL, NBD80X09RA-KL, AHB80X04R-MH, AHB80X04R-MH-V2, AHB80X04-R-MH-V3, AHB80N16T-GS, AHB80N32F4-LME, and NBD90S0VT-QW allows attackers to cause a Denial of Service (DoS) via a crafted RSTP request. | [
"cpe:2.3:o:xiongmaitech:nbd80x16s-kl_firmware:4.03.r11.nat.dss.onvifc.20210727:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:nbd80x16s-kl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:nbd80x09s-kl_firmware:4.03.r11.nat.dss.onvifc.20210727:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:nbd80x09s-kl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:nbd80x08s-kl_firmware:4.03.r11.nat.dss.onvifc.20210727:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:nbd80x08s-kl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:nbd80x09ra-kl_firmware:4.03.r11.nat.dss.onvifc.20210727:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:nbd80x09ra-kl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ahb80x04r-mh_firmware:4.03.r11.nat.dss.onvifc.20210729:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ahb80x04r-mh:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ahb80x04r-mh-v2_firmware:4.03.r11.nat.dss.onvifc.20210729:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ahb80x04r-mh-v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ahb80x04-r-mh-v3_firmware:4.03.r11.nat.dss.onvifc.20210729:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ahb80x04-r-mh-v3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ahb80n16t-gs_firmware:4.03.r11.7601.nat.onvifc.20211223:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ahb80n16t-gs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:ahb80n32f4-lme_firmware:4.03.r11.7601.nat.onvifc.20211228:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:ahb80n32f4-lme:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xiongmaitech:nbd90s0vt-qw_firmware:4.03.r11.713g.nat.onvifc.2021:*:*:*:*:*:*:*",
"cpe:2.3:h:xiongmaitech:nbd90s0vt-qw:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | 4.6 |
|
GHSA-pgxv-x8c2-8f48 | Integer underflow in Freetype before 2.2 allows remote attackers to cause a denial of service (crash) via a font file with an odd number of blue values, which causes the underflow when decrementing by 2 in a context that assumes an even number of values. | [] | null | null | null | null |
|
CVE-2016-0557 | Unspecified vulnerability in the Oracle Advanced Collections component in Oracle E-Business Suite 11.5.10.2, 12.1.1, 12.1.2, and 12.1.3 allows remote authenticated users to affect confidentiality and integrity via unknown vectors related to Administration, a different vulnerability than CVE-2016-0556. | [
"cpe:2.3:a:oracle:advanced_collections:11.5.10.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:advanced_collections:12.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:advanced_collections:12.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:advanced_collections:12.1.3:*:*:*:*:*:*:*"
] | null | null | null | 5.5 |
|
CVE-2022-29555 | The Deviceconnect microservice through 1.3.0 in Northern.tech Mender Enterprise before 3.2.2. allows Cross-Origin Websocket Hijacking. | [
"cpe:2.3:a:northern.tech:mender:*:*:*:*:enterprise:*:*:*"
] | null | 8.8 | null | 6.8 |
|
GHSA-j46j-4c39-75fw | Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.2.16. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H). | [] | null | null | 8.6 | null |
|
CVE-2022-21851 | Remote Desktop Client Remote Code Execution Vulnerability | Remote Desktop Client Remote Code Execution Vulnerability | [
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:enterprise:*:x64:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:enterprise:*:x86:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:rt:*:*:*",
"cpe:2.3:o:microsoft:windows_server:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server:2022:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp2:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp2:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
GHSA-3942-ccxx-8xqv | Web View in Windows Explorer on Microsoft Windows 2000 SP4, XP SP1 and SP2, and Server 2003 does not properly handle certain HTML characters in preview fields, which allows remote user-assisted attackers to execute arbitrary code. | [] | null | null | null | null |
|
GHSA-rx9c-4x6j-xm83 | A remote authorization bypass vulnerability was discovered in Aruba ClearPass Policy Manager version(s): 6.10.4 and below, 6.9.9 and below, 6.8.9-HF2 and below, 6.7.x and below. Aruba has released updates to ClearPass Policy Manager that address this security vulnerability. | [] | null | 8.8 | null | null |
|
CVE-2011-4296 | lib/db/access.php in Moodle 2.0.x before 2.0.4 and 2.1.x before 2.1.1 assigns incorrect capabilities to the course-creator role, which allows remote authenticated users to modify course filters by leveraging this role. | [
"cpe:2.3:a:moodle:moodle:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.1.0:*:*:*:*:*:*:*"
] | null | null | null | 5.5 |
|
CVE-2020-25847 | Command Injection Vulnerability in QTS and QuTS hero | This command injection vulnerability allows attackers to execute arbitrary commands in a compromised application. QNAP have already fixed this vulnerability in the following versions of QTS and QuTS hero. | [
"cpe:2.3:o:qnap:qts:*:*:*:*:*:*:*:*",
"cpe:2.3:o:qnap:quts_hero:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
GHSA-jcmq-p3g6-5394 | The jas_matrix_asl function in jas_seq.c in JasPer 1.900.27 allows remote attackers to cause a denial of service (invalid memory read and crash) via a crafted image. | [] | null | null | 5.5 | null |
|
CVE-2011-0548 | Buffer overflow in the Lotus Freelance Graphics PRZ file viewer in Autonomy KeyView, as used in Symantec Mail Security (SMS) 6.x through 8.x, Symantec Brightmail and Messaging Gateway before 9.5.1, and Symantec Data Loss Prevention (DLP) before 10.5.3 and 11.x before 11.1, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted .prz file. NOTE: this may overlap CVE-2011-1217. | [
"cpe:2.3:a:symantec:mail_security:6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:mail_security:7.5:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:mail_security:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:brightmail_and_messaging_gateway:*:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:brightmail_and_messaging_gateway:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:brightmail_and_messaging_gateway:4.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:brightmail_and_messaging_gateway:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:brightmail_and_messaging_gateway:7.7:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:brightmail_and_messaging_gateway:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:brightmail_and_messaging_gateway:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:brightmail_and_messaging_gateway:9.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:brightmail_and_messaging_gateway:9.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:data_loss_prevention:*:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:data_loss_prevention:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:data_loss_prevention:7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:data_loss_prevention:7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:data_loss_prevention:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:data_loss_prevention:8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:data_loss_prevention:8.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:data_loss_prevention:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:data_loss_prevention:10:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:data_loss_prevention:10.5:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:data_loss_prevention:10.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:data_loss_prevention:11.0:*:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
CVE-2016-3231 | The Standard Collector service in Windows Diagnostics Hub mishandles library loading, which allows local users to gain privileges via a crafted application, aka "Windows Diagnostics Hub Elevation of Privilege Vulnerability." | [
"cpe:2.3:a:microsoft:windows_diagnostics_hub:-:*:*:*:*:*:*:*"
] | null | null | 7.8 | 7.2 |
|
GHSA-9x7w-7fh3-wph9 | An authorised user on a Windows host running Citrix Universal Print Server can perform arbitrary command execution as SYSTEM in CVAD versions before 2009, 1912 LTSR CU1 hotfixes CTX285870 and CTX286120, 7.15 LTSR CU6 hotfix CTX285344 and 7.6 LTSR CU9. | [] | null | null | null | null |
|
GHSA-p7vc-9g4v-42gh | A remote attacker with write access to PI Vision could inject code into a display. Unauthorized information disclosure, modification, or deletion is possible if a victim views or interacts with the infected display using Microsoft Internet Explorer. The impact affects PI System data and other data accessible with victim’s user permissions. | [] | null | null | null | null |
|
GHSA-rrhw-mwxf-m9mp | A Missing Authentication for Critical Function vulnerability in Juniper Networks Junos OS on SRX Series allows an unauthenticated, network-based attacker to cause limited impact to the file system integrity.With a specific request that doesn't require authentication an attacker is able to upload arbitrary files via J-Web, leading to a loss ofintegrityfor a certainpart of the file system, which may allow chaining to other vulnerabilities.This issue affects Juniper Networks Junos OS on SRX Series:All versions prior to 20.4R3-S8;21.2 versions prior to 21.2R3-S6;21.3 versionsprior to21.3R3-S5;21.4 versionsprior to21.4R3-S5;22.1 versionsprior to22.1R3-S3;22.2 versionsprior to22.2R3-S2;22.3 versionsprior to22.3R2-S2, 22.3R3;22.4 versionsprior to22.4R2-S1, 22.4R3. | [] | null | 5.3 | null | null |
|
GHSA-qqv4-q4cc-mgqr | Vulnerability in the Oracle Financial Services Profitability Management component of Oracle Financial Services Applications (subcomponent: User Interface). Supported versions that are affected are 6.1.x and 8.0.x. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Financial Services Profitability Management. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Financial Services Profitability Management accessible data as well as unauthorized access to critical data or complete access to all Oracle Financial Services Profitability Management accessible data. CVSS 3.0 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N). | [] | null | null | 8.1 | null |
|
GHSA-f45g-v429-c6px | Cross-site scripting (XSS) vulnerability in wa/auth in PortWise SSL VPN 4.6 allows remote attackers to inject arbitrary web script or HTML via the reloadFrame parameter. | [] | null | null | null | null |
|
CVE-2022-1920 | Integer overflow in matroskademux element in gst_matroska_demux_add_wvpk_header function which allows a heap overwrite while parsing matroska files. Potential for arbitrary code execution through heap overwrite. | [
"cpe:2.3:a:gstreamer_project:gstreamer:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
|
GHSA-fm3g-x22c-cv3j | The wpbakery plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the button onclick attribute in all versions up to, and including, 7.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor access or higher, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] | null | 6.4 | null | null |
|
CVE-2006-6821 | myprofile.asp in Enthrallweb eNews does not properly validate the MM_recordId parameter during profile updates, which allows remote authenticated users to modify certain profile fields of another account by specifying that account's username in a modified MM_recordId parameter. | [
"cpe:2.3:a:enthrallweb:enews:*:*:*:*:*:*:*:*"
] | null | null | null | 3.5 |
|
CVE-2021-45034 | A vulnerability has been identified in CP-8000 MASTER MODULE WITH I/O -25/+70°C (All versions < V16.20), CP-8000 MASTER MODULE WITH I/O -40/+70°C (All versions < V16.20), CP-8021 MASTER MODULE (All versions < V16.20), CP-8022 MASTER MODULE WITH GPRS (All versions < V16.20). The web server of the affected system allows access to logfiles and diagnostic data generated by a privileged user. An unauthenticated attacker could access the files by knowing the corresponding download links. | [
"cpe:2.3:o:siemens:cp-8000_master_module_with_i\\/o_-25\\/\\+70_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:cp-8000_master_module_with_i\\/o_-25\\/\\+70:*:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:cp-8000_master_module_with_i\\/o_-40\\/\\+70_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:cp-8000_master_module_with_i\\/o_-40\\/\\+70:*:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:cp-8021_master_module_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:cp-8021_master_module:*:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:cp-8022_master_module_with_gprs_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:cp-8022_master_module_with_gprs:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | 4.3 |
|
GHSA-985c-hrh4-r66m | Untrusted search path vulnerability in GTK2 in OpenSUSE 11.0 and 11.1 allows local users to execute arbitrary code via a Trojan horse GTK module in an unspecified "relative search path." | [] | null | null | null | null |
|
RHSA-2012:1174 | Red Hat Security Advisory: kernel security and bug fix update | kernel: unfiltered netdev rio_ioctl access by users | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
CVE-2007-2491 | The PIIX4 power management subsystem in EMC VMware Workstation 5.5.3.34685 and VMware Server 1.0.1.29996 allows local users to write to arbitrary memory locations via a crafted poke to I/O port 0x1004, triggering a denial of service (virtual machine crash) or other unspecified impact, a related issue to CVE-2007-1337. | [
"cpe:2.3:a:vmware:server:1.0.1_build_29996:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workstation:5.5.3_build_34685:*:*:*:*:*:*:*"
] | null | null | null | 7.2 |
|
CVE-2016-7399 | scripts/license.pl in Veritas NetBackup Appliance 2.6.0.x through 2.6.0.4, 2.6.1.x through 2.6.1.2, 2.7.x through 2.7.3, and 3.0.x allow remote attackers to execute arbitrary commands via shell metacharacters in the hostName parameter to appliancews/getLicense. | [
"cpe:2.3:o:veritas:netbackup_appliance_firmware:2.6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:veritas:netbackup_appliance_firmware:2.6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:veritas:netbackup_appliance_firmware:2.6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:veritas:netbackup_appliance_firmware:2.6.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:veritas:netbackup_appliance_firmware:2.6.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:veritas:netbackup_appliance_firmware:2.6.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:veritas:netbackup_appliance_firmware:2.6.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:veritas:netbackup_appliance_firmware:2.6.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:veritas:netbackup_appliance_firmware:2.7.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:veritas:netbackup_appliance_firmware:2.7.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:veritas:netbackup_appliance_firmware:2.7.2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:veritas:netbackup_appliance_firmware:3.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:h:veritas:netbackup_appliance:-:*:*:*:*:*:*:*"
] | null | null | 9.8 | 10 |
|
GHSA-hgrq-rjwf-5f46 | Buffer Overflow vulnerability in mtrojnar osslsigncode v.2.3 and before allows a local attacker to execute arbitrary code via a crafted .exe, .sys, and .dll files. | [] | null | 7.8 | null | null |
|
GHSA-x7g5-r7mw-4gvx | Erlang/OTP before 18.0-rc1 does not properly check CBC padding bytes when terminating connections, which makes it easier for man-in-the-middle attackers to obtain cleartext data via a padding-oracle attack, a variant of CVE-2014-3566 (aka POODLE). | [] | null | null | 5.9 | null |
|
GHSA-3vg5-wppq-5c8w | System command injection vulnerability in wifi_access in Xiaomi Mi Router 3 version 2.22.15 allows attackers to execute system commands via the "timeout" URL parameter. | [] | null | null | 8.8 | null |
|
ICSMA-20-254-01 | Philips Patient Monitoring Devices (Update C) | In Patient Information Center iX (PICiX) Versions B.02, C.02, C.03, the software saves user-provided information into a comma-separated value (CSV) file, but it does not neutralize or incorrectly neutralizes special elements that could be interpreted as a command when the file is opened by spreadsheet software. In Patient Information Center iX (PICiX) Versions B.02, C.02, C.03, the software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is then used as a webpage and served to other users. Successful exploitation could lead to unauthorized access to patient data via a read-only web application. In Patient Information Center iX (PICiX) Version B.02, C.02, C.03, and PerformanceBridge Focal Point Version A.01, when an actor claims to have a given identity, the software does not prove or insufficiently proves the claim is correct. In Patient Information Center iX (PICiX) Versions C.02 and C.03, PerformanceBridge Focal Point Version A.01, IntelliVue patient monitors MX100, MX400-MX550, MX750, MX850, and IntelliVue X3 Versions N and prior, the software does not check or incorrectly checks the revocation status of a certificate, which may cause it to use a compromised certificate. In Patient Information Center iX (PICiX) Versions C.02, C.03, the software parses a formatted message or structure but does not handle or incorrectly handles a length field that is inconsistent with the actual length of the associated data, causing the application on the surveillance station to restart. In Patient Information Center iX (PICiX) Versions C.02, C.03, PerformanceBridge Focal Point Version A.01, the product receives input that is expected to be well-formed (i.e., to comply with a certain syntax) but it does not validate or incorrectly validates that the input complies with the syntax, causing the certificate enrollment service to crash. It does not impact monitoring but prevents new devices from enrolling. In IntelliVue patient monitors MX100, MX400-550, MX600, MX700, MX750, MX800, MX850, MP2-MP90, and IntelliVue X2 and X3 Versions N and prior, the product receives input or data but does not validate or incorrectly validates that the input has the properties required to process the data safely and correctly, which can induce a denial-of-service condition through a system restart. In Patient Information Center iX (PICiX) Versions B.02, C.02, C.03, the product exposes a resource to the wrong control sphere, providing unintended actors with inappropriate access to the resource. The application on the surveillance station operates in kiosk mode, which is vulnerable to local breakouts that could allow an attacker with physical access to escape the restricted environment with limited privileges. | [] | null | 6.8 | null | null |
CVE-2006-4322 | PHP remote file inclusion vulnerability in estateagent.php in the EstateAgent component (com_estateagent) for Mambo, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter. | [
"cpe:2.3:a:bits-dont-bite:estateagent:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.