id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 38
232
⌀ |
---|---|---|---|---|---|---|---|---|
GHSA-6wpm-4j63-64j7
|
Deserialization of Untrusted Data vulnerability in WP Speedo Team Members allows Object Injection. This issue affects Team Members: from n/a through 3.4.0.
|
[] | null | 8.8 | null | null | null |
|
GHSA-qqx8-c7mj-52mh
|
The BeeTeam368 Extensions plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the handle_submit_upload_file() function in all versions up to, and including, 2.3.5. This makes it possible for authenticated attackers with Subscriber-level access or higher to upload arbitrary files on the affected site's server which may make remote code execution possible.
|
[] | null | 8.8 | null | null | null |
|
CVE-2010-2623
|
SQL injection vulnerability in pages.php in Internet DM Specialist Bed and Breakfast allows remote attackers to execute arbitrary SQL commands via the pp_id parameter.
|
[
"cpe:2.3:a:internetdm:bed_and_breakfast:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2010-4939
|
PHP remote file inclusion vulnerability in index.php in MailForm 1.2 allows remote attackers to execute arbitrary PHP code via a URL in the theme parameter.
|
[
"cpe:2.3:a:scripts.bdr130:mailform:1.2:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-m6w2-chv8-mqrq
|
Windows Active Directory Certificate Services (AD CS) Remote Code Execution Vulnerability
|
[] | null | 6.6 | null | null | null |
|
CVE-2023-48930
|
xinhu xinhuoa 2.2.1 contains a File upload vulnerability.
|
[
"cpe:2.3:a:rockoa:xinhu:2.2.1:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
|
CVE-2022-27043
|
Yearning versions 2.3.1 and 2.3.2 Interstellar GA and 2.3.4 - 2.3.6 Neptune is vulnerable to Directory Traversal.
|
[
"cpe:2.3:a:yearning:yearning:*:*:*:*:*:*:*:*",
"cpe:2.3:a:yearning:yearning:2.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:yearning:yearning:2.3.2:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null |
|
CVE-2024-23506
|
WordPress InstaWP Connect Plugin <= 0.1.0.9 is vulnerable to Sensitive Data Exposure
|
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in InstaWP Team InstaWP Connect – 1-click WP Staging & Migration.This issue affects InstaWP Connect – 1-click WP Staging & Migration: from n/a through 0.1.0.9.
|
[
"cpe:2.3:a:instawp:instawp_connect:*:*:*:*:*:wordpress:*:*"
] | null | 7.7 | null | null | null |
GHSA-vx88-5hj8-432c
|
Analysis of the Bomgar Remote Support Portal JavaStart.jar Applet 52790 and earlier revealed that it is vulnerable to a path traversal vulnerability. The archive can be downloaded from a given Bomgar Remote Support Portal deployment at https://domain/api/content/JavaStart.jar and is callable from an arbitrary website using <object> and/or <appletHTML> tags. Successful exploitation results in file creation/modification/deletion in the operating system and with privileges of the user that ran the Java applet.
|
[] | null | null | 10 | null | null |
|
CVE-2010-3313
|
phpgwapi/js/fckeditor/editor/dialog/fck_spellerpages/spellerpages/serverscripts/spellchecker.php in EGroupware 1.4.001+.002; 1.6.001+.002 and possibly other versions before 1.6.003; and EPL 9.1 before 9.1.20100309 and 9.2 before 9.2.20100309; allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) aspell_path or (2) spellchecker_lang parameters.
|
[
"cpe:2.3:a:egroupware:egroupware:1.4.001:*:*:*:*:*:*:*",
"cpe:2.3:a:egroupware:egroupware:1.4.001\\+.002:*:*:*:*:*:*:*",
"cpe:2.3:a:egroupware:egroupware:1.4.002:*:*:*:*:*:*:*",
"cpe:2.3:a:egroupware:egroupware:1.6.001:*:*:*:*:*:*:*",
"cpe:2.3:a:egroupware:egroupware:1.6.001\\+.002:*:*:*:*:*:*:*",
"cpe:2.3:a:egroupware:egroupware:1.6.002:*:*:*:*:*:*:*",
"cpe:2.3:a:egroupware:egroupware:9.1:-:commercial_epl:*:*:*:*:*",
"cpe:2.3:a:egroupware:egroupware:9.2:-:commercial_epl:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-x4p3-9wcx-48ww
|
In PAN_WriteBuf of pan_api.cc, there is a possible out of bounds read due to a use after free. This could lead to remote information disclosure over Bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-233604485
|
[] | null | 6.5 | null | null | null |
|
cisco-sa-sb-wap-multi-ZAfKGXhF
|
Cisco Small Business 100, 300, and 500 Series Wireless Access Points Vulnerabilities
|
Multiple vulnerabilities in the web-based management interface of certain Cisco Small Business 100, 300, and 500 Series Wireless Access Points could allow an authenticated, remote attacker to obtain sensitive information from or inject arbitrary commands on an affected device.
For more information about these vulnerabilities, see the Details ["#details"] section of this advisory.
Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-wap-multi-ZAfKGXhF ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-wap-multi-ZAfKGXhF"]
|
[] | null | 5.5 | null | null | null |
GHSA-394v-2hqm-x86g
|
Stack-based buffer overflow in http.c in Karl Dahlke Edbrowse (aka Command line editor browser) 3.1.3 allows remote attackers to execute arbitrary code by operating an FTP server that sends directory listings with (1) long user names or (2) long group names.
|
[] | null | null | null | null | null |
|
GHSA-m25w-37x6-fpxv
|
Off-by-one buffer overflow in ModSecurity (mod_security) 1.7.4 for Apache 2.x, when SecFilterScanPost is enabled, allows remote attackers to execute arbitrary code via crafted POST requests.
|
[] | null | null | null | null | null |
|
CVE-2024-21831
|
Uncontrolled search path in some Intel(R) Processor Diagnostic Tool software before version 4.1.9.41 may allow an authenticated user to potentially enable escalation of privilege via local access.
|
[
"cpe:2.3:a:intel:processor_diagnostic_tool:*:*:*:*:*:*:*:*"
] | null | 6.7 | null | null | null |
|
CVE-2025-50692
|
FoxCMS <=v1.2.5 is vulnerable to Code Execution in admin/template_file/editFile.html.
|
[] | null | 9.8 | null | null | null |
|
GHSA-vfvr-qwmh-f4c8
|
Cross-site scripting (XSS) vulnerability in the email APP in Huawei PLK smartphones with software AL10C00 before AL10C00B211 and AL10C92 before AL10C92B211; ATH smartphones with software AL00C00 before AL00C00B361, CL00C92 before CL00C92B361, TL00HC01 before TL00HC01B361, and UL00C00 before UL00C00B361; CherryPlus smartphones with software TL00C00 before TL00C00B553, UL00C00 before UL00C00B553, and TL00MC01 before TL00MC01B553; and RIO smartphones with software AL00C00 before AL00C00B360 allows remote attackers to inject arbitrary web script or HTML via an email message.
|
[] | null | null | 6.1 | null | null |
|
CVE-2017-2856
|
An exploitable buffer overflow vulnerability exists in the DDNS client used by the Foscam C1 Indoor HD Camera running application firmware 2.52.2.43. On devices with DDNS enabled, an attacker who is able to intercept HTTP connections will be able to fully compromise the device by creating a rogue HTTP server.
|
[
"cpe:2.3:o:foscam:c1_firmware:2.52.2.43:*:*:*:*:*:*:*",
"cpe:2.3:h:foscam:c1:-:*:*:*:*:*:*:*"
] | null | null | 8.1 | null | null |
|
ICSA-24-137-05
|
Siemens Simcenter Nastran
|
The affected applications contain a stack overflow vulnerability while parsing specially strings as argument for one of the application binaries. This could allow an attacker to execute code in the context of the current process.
|
[] | null | 7.8 | null | null | null |
CVE-2023-45869
|
ILIAS 7.25 (2023-09-12) allows any authenticated user to execute arbitrary operating system commands remotely, when a highly privileged account accesses an XSS payload. The injected commands are executed via the exec() function in the execQuoted() method of the ilUtil class (/Services/Utilities/classes/class.ilUtil.php) This allows attackers to inject malicious commands into the system, potentially compromising the integrity, confidentiality, and availability of the ILIAS installation and the underlying operating system.
|
[
"cpe:2.3:a:ilias:ilias:7.25:*:*:*:*:*:*:*"
] | null | 9 | null | null | null |
|
GHSA-xw5q-g62x-2qjc
|
electron ASAR Integrity bypass by just modifying the content
|
electron's ASAR Integrity can be bypass by modifying the content.ImpactThis only impacts apps that have the `embeddedAsarIntegrityValidation` and `onlyLoadAppFromAsar` [fuses](https://www.electronjs.org/docs/latest/tutorial/fuses) enabled. Apps without these fuses enabled are not impacted. This issue is specific to Windows, apps using these fuses on macOS are unimpacted.Specifically this issue can only be exploited if your app is launched from a filesystem the attacker has write access too. i.e. the ability to edit files inside the .app bundle on macOS which these fuses are supposed to protect against.WorkaroundsThere are no app side workarounds, you must update to a patched version of Electron.Fixed Versions`30.0.5``31.0.0-beta.1`For more informationIf you have any questions or comments about this advisory, email us at [[email protected]](mailto:[email protected])
|
[] | null | 7.8 | null | null | null |
CVE-2025-7090
|
Belkin F9K1122 webs formConnectionSetting stack-based overflow
|
A vulnerability, which was classified as critical, has been found in Belkin F9K1122 1.00.33. Affected by this issue is the function formConnectionSetting of the file /goform/formConnectionSetting of the component webs. The manipulation of the argument max_Conn/timeOut leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
|
[] | 8.7 | 8.8 | 8.8 | 9 | null |
RHSA-2006:0271
|
Red Hat Security Advisory: freeradius security update
|
security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::es"
] | null | null | null | null | null |
GHSA-76hj-25wr-pvgg
|
Tridium Niagara Enterprise Security 2.3u1, all versions prior to 2.3.118.6, Niagara AX 3.8u4, all versions prior to 3.8.401.1, Niagara 4.4u2, all versions prior to 4.4.93.40.2, and Niagara 4.6, all versions prior to 4.6.96.28.4 a cross-site scripting vulnerability has been identified that may allow a remote attacker to inject code to some web pages affecting confidentiality.
|
[] | null | null | 5.4 | null | null |
|
CVE-2023-37257
|
The DataEase panel and dataset have a stored XSS vulnerability
|
DataEase is an open source data visualization analysis tool. Prior to version 1.18.9, the DataEase panel and dataset have a stored cross-site scripting vulnerability. The vulnerability has been fixed in v1.18.9. There are no known workarounds.
|
[
"cpe:2.3:a:dataease:dataease:*:*:*:*:*:*:*:*"
] | null | 5.4 | null | null | null |
CVE-2024-44228
|
This issue was addressed with improved permissions checking. This issue is fixed in Xcode 16. An app may be able to inherit Xcode permissions and access user data.
|
[
"cpe:2.3:a:apple:xcode:-:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:xcode:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
|
GHSA-7g56-f7p4-fmcq
|
Mbed TLS before 3.0.1 has a double free in certain out-of-memory conditions, as demonstrated by an mbedtls_ssl_set_session() failure.
|
[] | null | 9.8 | null | null | null |
|
CVE-2002-2426
|
Cross-site request forgery (CSRF) vulnerability in Citrix Presentation Server 4.0 and 4.5, MetaFrame Presentation Server 3.0, and Access Essentials 1.0 through 2.0 allows remote attackers to execute arbitrary published applications, and possibly other programs, as authenticated users via the InitialProgram key in an ICA connection. NOTE: some of these details are obtained from third party information.
|
[
"cpe:2.3:a:citrix:access_essentials:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:citrix:access_essentials:1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:citrix:access_essentials:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:citrix:metaframe_presentation_server:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:citrix:presentation_server:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:citrix:presentation_server:4.5:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-r5r8-fxfq-hj6q
|
Auth. (author+) Stored Cross-Site Scripting (XSS) vulnerability in simonpedge Slide Anything – Responsive Content / HTML Slider and Carousel plugin <= 2.4.9 versions.
|
[] | null | 5.4 | null | null | null |
|
CVE-2009-4337
|
SQL injection vulnerability in the Diocese of Portsmouth Calendar (pd_calendar) extension 0.4.1 and earlier for TYPO3 allows remote attackers to execute arbitrary SQL commands via unknown vectors, a different issue than CVE-2008-6691.
|
[
"cpe:2.3:a:simon_rundell:pd_calendar_today:*:*:*:*:*:*:*:*",
"cpe:2.3:a:simon_rundell:pd_calendar_today:0.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-gwfg-4782-gv5m
|
The Ultimate Member plugin for WordPress is vulnerable to open redirects due to insufficient validation on supplied URLs in the social fields of the Profile Page, which makes it possible for attackers to redirect unsuspecting victims in versions up to, and including, 2.3.1 granted the victim clicks on a social icon on a user's profile page.
|
[] | null | 5.4 | null | null | null |
|
CVE-2025-6517
|
Dromara MaxKey Meta URL SAML20DetailsController.java add server-side request forgery
|
A vulnerability was found in Dromara MaxKey up to 4.1.7 and classified as critical. This issue affects the function Add of the file maxkey-webs\maxkey-web-mgt\src\main\java\org\dromara\maxkey\web\apps\contorller\SAML20DetailsController.java of the component Meta URL Handler. The manipulation of the argument post leads to server-side request forgery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
|
[] | 5.3 | 6.3 | 6.3 | 6.5 | null |
CVE-2000-0259
|
The default permissions for the Cryptography\Offload registry key used by the OffloadModExpo in Windows NT 4.0 allows local users to obtain compromise the cryptographic keys of other users.
|
[
"cpe:2.3:a:microsoft:terminal_server:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*"
] | null | null | null | 7.2 | null |
|
GHSA-jpj5-hg26-6jgc
|
Cross-site Scripting in Alist
|
Alist versions 2.0.10 through 2.1.0 were discovered to contain a cross-site scripting (XSS) vulnerability via /i/:data/ipa.plist. This issue was fixed in version 2.1.1.
|
[] | null | 6.1 | null | null | null |
CVE-2021-4123
|
Cross-Site Request Forgery (CSRF) in livehelperchat/livehelperchat
|
livehelperchat is vulnerable to Cross-Site Request Forgery (CSRF)
|
[
"cpe:2.3:a:livehelperchat:live_helper_chat:*:*:*:*:*:*:*:*"
] | null | null | 6.5 | null | null |
CVE-2011-3463
|
WebDAV Sharing in Apple Mac OS X 10.7.x before 10.7.3 does not properly perform authentication, which allows local users to gain privileges by leveraging access to (1) the server or (2) a bound directory.
|
[
"cpe:2.3:o:apple:mac_os_x:10.7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.7.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.7.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.7.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.7.2:*:*:*:*:*:*:*"
] | null | null | null | 7.2 | null |
|
CVE-2017-6781
|
A vulnerability in the management of shell user accounts for Cisco Policy Suite (CPS) Software for CPS appliances could allow an authenticated, local attacker to gain elevated privileges on an affected system. The affected privilege level is not at the root level. The vulnerability is due to incorrect role-based access control (RBAC) for shell user accounts. An attacker could exploit this vulnerability by authenticating to an affected appliance and providing crafted user input via the CLI. A successful exploit could allow the attacker to acquire a higher privilege level than should have been granted. To exploit this vulnerability, the attacker must log in to the appliance with valid credentials. Cisco Bug IDs: CSCve37724. Known Affected Releases: 9.0.0, 9.1.0, 10.0.0, 11.0.0, 12.0.0.
|
[
"cpe:2.3:a:cisco:policy_suite:9.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:policy_suite:9.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:policy_suite:10.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:policy_suite:11.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:policy_suite:12.0.0:*:*:*:*:*:*:*"
] | null | null | 5.3 | 4.6 | null |
|
RHSA-2023:6842
|
Red Hat Security Advisory: OpenShift Container Platform 4.12.43 bug fix and security update
|
OpenShift: modification of node role labels golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)
|
[
"cpe:/a:redhat:openshift:4.12::el8"
] | null | 7.5 | null | null | null |
CVE-2018-19067
|
An issue was discovered on Foscam C2 devices with System Firmware 1.11.1.8 and Application Firmware 2.72.1.32, and Opticam i5 devices with System Firmware 1.5.2.11 and Application Firmware 2.21.1.128. There is a hardcoded Ak47@99 password for the factory~ account.
|
[
"cpe:2.3:o:opticam:i5_application_firmware:2.21.1.128:*:*:*:*:*:*:*",
"cpe:2.3:o:opticam:i5_system_firmware:1.5.2.11:*:*:*:*:*:*:*",
"cpe:2.3:h:opticam:i5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:foscam:c2_application_firmware:2.72.1.32:*:*:*:*:*:*:*",
"cpe:2.3:o:foscam:c2_system_firmware:1.11.1.8:*:*:*:*:*:*:*",
"cpe:2.3:h:foscam:c2:-:*:*:*:*:*:*:*"
] | null | null | 9.8 | 10 | null |
|
GHSA-h78p-6x92-8qgr
|
An issue was discovered in Sprecher Automation SPRECON-E Service Program before 3.43 SP0. Under certain preconditions, it is possible to execute telegram simulation as a non-admin user. As prerequisites, a user must have created an online-connection, validly authenticated and authorized as administrator, and executed telegram simulation. After that, the online-connection must have been closed. Incorrect caching of client data then may lead to privilege escalation, where a subsequently acting non-admin user is permitted to do telegram simulation. In order to exploit this vulnerability, a potential attacker would need to have both a valid engineering-account in the SPRECON RBAC system as well as access to a service/maintenance computer with SPRECON-E Service Program running. Additionally, a valid admin-user must have closed the service connection beforehand without closing the program, having executed telegram simulation; the attacker then has access to the running software instance. Hence, there is no risk from external attackers.
|
[] | null | null | 7.5 | null | null |
|
CVE-2022-29358
|
epub2txt2 v2.04 was discovered to contain an integer overflow via the function bug in _parse_special_tag at sxmlc.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted XML file.
|
[
"cpe:2.3:a:epub2txt2_project:epub2txt2:2.04:*:*:*:*:*:*:*"
] | null | 5.5 | null | 4.3 | null |
|
CVE-2006-1406
|
Multiple cross-site scripting (XSS) vulnerabilities in wbadmlog.aspx in uniForum 4.0 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) txtuser or (2) txtpassword parameters.
|
[
"cpe:2.3:a:uniforum:uniforum:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
CVE-2021-32988
|
FATEK Automation WinProladder Versions 3.30 and prior are vulnerable to an out-of-bounds write, which may allow an attacker to execute arbitrary code.
|
[
"cpe:2.3:a:fatek:winproladder:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 | null |
|
GHSA-qh2w-vp8r-w5jg
|
SQL injection vulnerability in the Volunteer Management System (com_volunteer) module 2.0 for Joomla! allows remote attackers to execute arbitrary SQL commands via the job_id parameter in a jobshow action to index.php.
|
[] | null | null | null | null | null |
|
CVE-2005-4565
|
Format string vulnerability in the Internet Key Exchange version 1 (IKEv1) implementation in ADTRAN NetVanta before 10.03.03.E might allow remote attackers to have an unknown impact via format string specifiers in crafted IKE packets, as demonstrated by the PROTOS ISAKMP Test Suite for IKEv1.
|
[
"cpe:2.3:h:adtran:netvanta:3xxx:*:*:*:*:*:*:*",
"cpe:2.3:h:adtran:netvanta:4xxx:*:*:*:*:*:*:*",
"cpe:2.3:h:adtran:netvanta:5xxx:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
CVE-2022-42036
|
The d8s-urls package for Python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-csv package. The affected version is 0.1.0.
|
[
"cpe:2.3:a:democritus:d8s-urls:0.1.0:*:*:*:*:python:*:*"
] | null | 9.8 | null | null | null |
|
GHSA-qpxq-x4wv-xrc2
|
Some URIs in IBM API Connect 2018.1 and 2018.4.1.3 disclose system specification information like the machine id, system uuid, filesystem paths, network interface names along with their mac addresses. An attacker can use this information in targeted attacks. IBM X-Force ID: 156542.
|
[] | null | null | 5.3 | null | null |
|
CVE-2008-4403
|
The CGI modules in the server in Trend Micro OfficeScan 8.0 SP1 before build 2439 and 8.0 SP1 Patch 1 before build 3087 allow remote attackers to cause a denial of service (NULL pointer dereference and child process crash) via crafted HTTP headers, related to the "error handling mechanism."
|
[
"cpe:2.3:a:trend_micro:officescan:8.0:sp1:*:*:*:*:*:*",
"cpe:2.3:a:trend_micro:officescan:8.0:sp1_patch1:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
CVE-2023-33128
|
.NET and Visual Studio Remote Code Execution Vulnerability
|
.NET and Visual Studio Remote Code Execution Vulnerability
|
[
"cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*"
] | null | 7.3 | null | null | null |
CVE-2016-3650
|
Symantec Endpoint Protection Manager (SEPM) 12.1 before RU6 MP5 allows remote authenticated users to discover credentials via a brute-force attack.
|
[
"cpe:2.3:a:symantec:endpoint_protection_manager:*:mp4:*:*:*:*:*:*"
] | null | null | 8.8 | 4 | null |
|
CVE-2018-1167
|
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Spotify Music Player 1.0.69.336. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of URI handlers. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code under the context of the current process. Was ZDI-CAN-5501.
|
[
"cpe:2.3:a:spotify:spotify:1.0.69.336:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.8 | null |
|
CVE-2024-48974
|
Life2000 Ventilator does not perform proper file integrity checks when adopting firmware updates
|
The ventilator does not perform proper file integrity checks when adopting firmware updates. This makes it possible for an attacker to force unauthorized changes to the device's configuration settings and/or compromise device functionality by pushing a compromised/illegitimate firmware file. This could disrupt the function of the device and/or cause unauthorized information disclosure.
|
[
"cpe:2.3:o:baxter:life2000_ventilator_firmware:*:*:*:*:*:*:*:*"
] | null | 9.3 | null | null | null |
CVE-2002-0419
|
Information leaks in IIS 4 through 5.1 allow remote attackers to obtain potentially sensitive information or more easily conduct brute force attacks via responses from the server in which (2) in certain configurations, the server IP address is provided as the realm for Basic authentication, which could reveal real IP addresses that were obscured by NAT, or (3) when NTLM authentication is used, the NetBIOS name of the server and its Windows NT domain are revealed in response to an Authorization request. NOTE: this entry originally contained a vector (1) in which the server reveals whether it supports Basic or NTLM authentication through 401 Access Denied error messages. CVE has REJECTED this vector; it is not a vulnerability because the information is already available through legitimate use, since authentication cannot proceed without specifying a scheme that is supported by both the client and the server.
|
[
"cpe:2.3:a:microsoft:internet_information_server:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_information_server:4.0:alpha:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_information_services:5.0:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-cprp-w79q-f798
|
Missing Authorization vulnerability in GS Plugins GS Pins for Pinterest allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects GS Pins for Pinterest: from n/a through 1.6.7.
|
[] | null | 5.4 | null | null | null |
|
CVE-2021-28622
|
Adobe Animate BMP File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability
|
Adobe Animate version 21.0.6 (and earlier) is affected by an Out-of-bounds Write vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[
"cpe:2.3:a:adobe:animate:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | null | 7.8 | null | null |
RHSA-2023:6023
|
Red Hat Security Advisory: varnish:6 security update
|
HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
|
[
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 7.5 | null | null | null |
GHSA-q7mm-qvfp-88hm
|
IceCMS v2.0.1 is vulnerable to Cross Site Request Forgery (CSRF).
|
[] | null | 6.5 | null | null | null |
|
GHSA-5mw4-q577-59hc
|
All versions of NVIDIA Windows GPU Display Driver contain a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgDdiEscape where the size of an input buffer is not validated, leading to denial of service or potential escalation of privileges.
|
[] | null | null | 7.8 | null | null |
|
GHSA-fgwf-vh6h-x6h6
|
Cross-site scripting (XSS) vulnerability in admin/classes/ui.dta.php in Drake CMS allows remote attackers to inject arbitrary web script or HTML via the desc[][title] field. NOTE: Drake CMS has only a beta version available, and the vendor has previously stated "We do not consider security reports valid until the first official release of Drake CMS."
|
[] | null | null | null | null | null |
|
GHSA-32qv-jwqq-5v6r
|
A vulnerability, which was classified as critical, was found in OTCMS 7.01. Affected is an unknown function of the file /admin/ind_backstage.php. The manipulation of the argument sqlContent leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-247908.
|
[] | null | 4.7 | null | null | null |
|
CVE-2024-28318
|
gpac 2.3-DEV-rev921-g422b78ecf-master was discovered to contain a out of boundary write vulnerability via swf_get_string at scene_manager/swf_parse.c:325
|
[
"cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*"
] | null | 7.1 | null | null | null |
|
CVE-2022-35621
|
Access control vulnerability in Evoh NFT EvohClaimable contract with sha256 hash code fa2084d5abca91a62ed1d2f1cad3ec318e6a9a2d7f1510a00d898737b05f48ae allows remote attackers to execute fraudulent NFT transfers.
|
[
"cpe:2.3:a:evohclaimable_project:evohclaimable:-:*:*:*:*:*:*:*"
] | null | 5.3 | null | null | null |
|
GHSA-26cr-h49j-77ch
|
A stored cross site scripting (XSS) vulnerability in phplist 3.5.4 and below allows authenticated attackers to execute arbitrary web scripts or HTML via a crafted payload in the "admin" parameter under the "Manage administrators" module.
|
[] | null | null | null | null | null |
|
GHSA-x6x2-p3pj-7mv4
|
The Local Security Authority Subsystem Service (LSASS) in Microsoft Windows XP SP2 and SP3 and Server 2003 SP2 does not properly process authentication requests, which allows local users to gain privileges via a request with a crafted length, aka "LSASS Length Validation Vulnerability."
|
[] | null | null | null | null | null |
|
CVE-2024-36495
|
Read/Write Permissions for Everyone on Configuration File
|
The application Faronics WINSelect (Standard + Enterprise) saves its configuration in an encrypted file on the file system which "Everyone" has read and write access to, path to file:
C:\ProgramData\WINSelect\WINSelect.wsd
The path for the affected WINSelect Enterprise configuration file is:
C:\ProgramData\Faronics\StorageSpace\WS\WINSelect.wsd
|
[
"cpe:2.3:a:faronics:winselect:*:*:*:*:*:*:*:*"
] | null | 7.7 | null | null | null |
CVE-2017-11141
|
The ReadMATImage function in coders\mat.c in ImageMagick 7.0.5-6 has a memory leak vulnerability that can cause memory exhaustion via a crafted MAT file, related to incorrect ordering of a SetImageExtent call.
|
[
"cpe:2.3:a:imagemagick:imagemagick:7.0.5-6:*:*:*:*:*:*:*"
] | null | null | 6.5 | 7.1 | null |
|
GHSA-8c77-8rhw-f4x7
|
A vulnerability in the web-based management interface of Cisco Meeting Server could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack and perform arbitrary actions on an affected device. The vulnerability is due to insufficient CSRF protections for the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to follow a customized link. A successful exploit could allow the attacker to perform arbitrary actions on an affected device by using a web browser and with the privileges of the user.
|
[] | null | null | 8.8 | null | null |
|
CVE-2010-2844
|
Cross-site scripting (XSS) vulnerability in news_show.php in Newanz NewsOffice 2.0.18 allows remote attackers to inject arbitrary web script or HTML via the n-cat parameter.
|
[
"cpe:2.3:a:newanz:newsoffice:2.0.18:beta:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
CVE-2012-4019
|
Cross-site scripting (XSS) vulnerability in tokyo_bbs.cgi in Come on Girls Interface (CGI) Tokyo BBS allows remote attackers to inject arbitrary web script or HTML via vectors related to the error page.
|
[
"cpe:2.3:a:c61:tokyo_bbs:-:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-9r23-xjjv-gr5j
|
Authenticated (author or higher user role) Arbitrary File Upload vulnerability in ideasToCode Enable SVG, WebP & ICO Upload plugin <= 1.0.1 at WordPress.
|
[] | null | 8.8 | null | null | null |
|
CVE-2022-24609
|
Luocms v2.0 is affected by an incorrect access control vulnerability. Through /admin/templates/template_manage.php, an attacker can write an arbitrary shell file.
|
[
"cpe:2.3:a:luocms_project:luocms:2.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | 10 | null |
|
CVE-2003-1148
|
Multiple PHP remote file inclusion vulnerabilities in J-Pierre DEZELUS Les Visiteurs 2.0.1, as used in phpMyConferences (phpMyConference) 8.0.2 and possibly other products, allow remote attackers to execute arbitrary PHP code via a URL in the lvc_include_dir parameter to (1) config.inc.php or (2) new-visitor.inc.php in common/visiteurs/include/.
|
[
"cpe:2.3:a:les_visiteurs:les_visiteurs:2.0.1:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-6fc2-x5pj-mq44
|
Absolute path directory traversal vulnerability in (1) MERAK Mail Server for Windows 8.3.8r with before IceWarp Web Mail 5.6.1 and (2) VisNetic MailServer before 8.5.0.5 allows remote authenticated users to include arbitrary files via a modified language parameter and a full Windows or UNC pathname in the lang_settings parameter to mail/index.html, which is not properly sanitized by the validatefolder PHP function, possibly due to an incomplete fix for CVE-2005-4558.
|
[] | null | null | null | null | null |
|
CVE-2003-0444
|
Heap-based buffer overflow in GTKSee 0.5 and 0.5.1 allows remote attackers to execute arbitrary code via a PNG image of certain color depths.
|
[
"cpe:2.3:a:gtksee:gtksee:0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:gtksee:gtksee:0.5.1:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-vgj8-9328-h497
|
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 25.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
|
[] | null | null | null | null | null |
|
CVE-2018-1000862
|
An information exposure vulnerability exists in Jenkins 2.153 and earlier, LTS 2.138.3 and earlier in DirectoryBrowserSupport.java that allows attackers with the ability to control build output to browse the file system on agents running builds beyond the duration of the build using the workspace browser.
|
[
"cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*",
"cpe:2.3:a:jenkins:jenkins:*:*:*:*:-:*:*:*",
"cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*"
] | null | null | 4.3 | 4 | null |
|
CVE-2011-0788
|
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 25 and earlier, when running on Windows, allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2011-0786.
|
[
"cpe:2.3:a:sun:jdk:*:update_25:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_17:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_18:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_19:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_20:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_21:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_22:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_23:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_24:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update1:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:*:update_25:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_17:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_18:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_19:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_20:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_21:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_22:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_23:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_24:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*"
] | null | null | null | 7.6 | null |
|
GHSA-644f-fx6f-4895
|
An issue was discovered on Wireless IP Camera 360 devices. Attackers can read recordings by navigating to /mnt/idea0 or /mnt/idea1 on the SD memory card.
|
[] | null | null | 7.5 | null | null |
|
GHSA-q2r3-58jv-x99w
|
Missing Authorization vulnerability in Brainstorm Force Convert Pro.This issue affects Convert Pro: from n/a through 1.7.5.
|
[] | null | 7.1 | null | null | null |
|
GHSA-jqmj-x6r6-q24p
|
The Fiksu library for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
|
[] | null | null | null | null | null |
|
GHSA-jff7-fm48-4mpp
|
Synaesthesia 2.1 and earlier, and possibly other versions, when installed setuid root, does not drop privileges before processing configuration and mixer files, which allows local users to read arbitrary files.
|
[] | null | null | null | null | null |
|
CVE-2020-14491
|
OpenClinic GA versions 5.09.02 and 5.89.05b do not properly check permissions before executing SQL queries, which may allow a low-privilege user to access privileged information.
|
[
"cpe:2.3:a:openclinic_ga_project:openclinic_ga:5.09.02:*:*:*:*:*:*:*",
"cpe:2.3:a:openclinic_ga_project:openclinic_ga:5.89.05b:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4 | null |
|
RHSA-2007:0085
|
Red Hat Security Advisory: kernel security update
|
security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null | null |
RHSA-2023:5429
|
Red Hat Security Advisory: thunderbird security update
|
firefox: use-after-free in workers Mozilla: Out-of-bounds write in PathOps Mozilla: Use-after-free in Ion Compiler Mozilla: Memory safety bugs fixed in Firefox 118, Firefox ESR 115.3, and Thunderbird 115.3 libvpx: Heap buffer overflow in vp8 encoding in libvpx
|
[
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 8.8 | null | null | null |
CVE-2023-23978
|
WordPress WP Client Reports Plugin <= 1.0.16 is vulnerable to Sensitive Data Exposure
|
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in SwitchWP WP Client Reports plugin <= 1.0.16 versions.
|
[
"cpe:2.3:a:switchwp:wp_client_reports:*:*:*:*:*:wordpress:*:*"
] | null | 4.3 | null | null | null |
GHSA-7v3x-h7r2-34jv
|
Insufficient Session Expiration in Pterodactyl API
|
ImpactA vulnerability exists in Pterodactyl Panel `<= 1.6.6` that could allow a malicious attacker that compromises an API key to generate an authenticated user session that is not revoked when the API key is deleted, thus allowing the malicious user to remain logged in as the user the key belonged to.It is important to note that **a malicious user must first compromise an existing API key for a user to exploit this issue**. It cannot be exploited by chance, and requires a coordinated attack against an individual account using a known API key.PatchesThis issue has been addressed in the `v1.7.0` release of Pterodactyl Panel.WorkaroundsThose not wishing to upgrade may apply the change below:For more informationIf you have any questions or comments about this advisory please reach out to `Tactical Fish#8008` on [Discord](https://discord.gg/pterodactyl) or email `[email protected]`.
|
[] | null | 6 | null | null | null |
GHSA-mwr4-4gh4-7m8j
|
A vulnerability in the web-based management interface of Cisco ISE could allow an unauthenticated, remote attacker to conduct an XSS attack against a user of the interface.This vulnerability exists because the web-based management interface does not sufficiently validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of the interface on an affected system to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
|
[] | null | 6.1 | null | null | null |
|
CVE-2015-1187
|
The ping tool in multiple D-Link and TRENDnet devices allow remote attackers to execute arbitrary code via the ping_addr parameter to ping.ccp.
|
[
"cpe:2.3:o:dlink:dir-626l_firmware:1.04:b04:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dir-626l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dir-636l_firmware:1.04:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dir-636l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dir-808l_firmware:1.03:b05:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dir-808l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dir-810l_firmware:1.01:b04:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dir-810l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dir-810l_firmware:2.02:b01:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dir-820l_firmware:1.02:b10:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dir-820l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dir-820l_firmware:1.05:b03:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dir-820l_firmware:2.01:b02:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dir-826l_firmware:1.00:b23:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dir-826l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dir-830l_firmware:1.00:b07:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dir-830l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dir-836l_firmware:1.01:b03:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dir-836l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:trendnet:tew-731br_firmware:2.01:b01:*:*:*:*:*:*",
"cpe:2.3:h:trendnet:tew-731br:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dir-651_firmware:1.10na:b02:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dir-651:-:*:*:*:*:*:*:*",
"cpe:2.3:o:trendnet:tew-651br_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:trendnet:tew-651br:-:*:*:*:*:*:*:*",
"cpe:2.3:o:trendnet:tew-652br_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:trendnet:tew-652br:-:*:*:*:*:*:*:*",
"cpe:2.3:o:trendnet:tew-711br_firmware:1.00:b31:*:*:*:*:*:*",
"cpe:2.3:h:trendnet:tew-711br:-:*:*:*:*:*:*:*",
"cpe:2.3:o:trendnet:tew-810dr_firmware:1.00:b19:*:*:*:*:*:*",
"cpe:2.3:h:trendnet:tew-810dr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:trendnet:tew-813dru_firmware:1.00:b23:*:*:*:*:*:*",
"cpe:2.3:h:trendnet:tew-813dru:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | 10 | null |
|
GHSA-p7rw-cjjv-6cc4
|
JSCAPE Secure FTP Applet 4.8.0 and earlier does not ask the user to verify a new or mismatched SSH host key, which makes it easier for remote attackers to perform man-in-the-middle attacks.
|
[] | null | null | null | null | null |
|
CVE-2022-4495
|
collective.dms.basecontent column.py renderCell cross site scripting
|
A vulnerability, which was classified as problematic, has been found in collective.dms.basecontent up to 1.6. This issue affects the function renderCell of the file src/collective/dms/basecontent/browser/column.py. The manipulation leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 1.7 is able to address this issue. The name of the patch is 6c4d616fcc771822a14ebae5e23f3f6d96d134bd. It is recommended to upgrade the affected component. The identifier VDB-215813 was assigned to this vulnerability.
|
[
"cpe:2.3:a:collective.dms.basecontent_project:collective.dms.basecontent:*:*:*:*:*:*:*:*"
] | null | 3.5 | 3.5 | null |
https://github.com/collective/collective.dms.basecontent/commit/6c4d616fcc771822a14ebae5e23f3f6d96d134bd
|
CVE-2001-0722
|
Internet Explorer 5.5 and 6.0 allows remote attackers to read and modify user cookies via Javascript in an about: URL, aka the "First Cookie Handling Vulnerability."
|
[
"cpe:2.3:a:microsoft:internet_explorer:5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:6.0:*:*:*:*:*:*:*"
] | null | null | null | 6.4 | null |
|
GHSA-mgf9-v7f6-c7w7
|
The issue was addressed with improved memory handling. This issue is fixed in iOS 16.2 and iPadOS 16.2, tvOS 16.2. Parsing a maliciously crafted TIFF file may lead to disclosure of user information.
|
[] | null | 5.5 | null | null | null |
|
CVE-2024-34550
|
WordPress Dynamics 365 Integration plugin <= 1.3.17 - Sensitive Data Exposure vulnerability
|
Insertion of Sensitive Information into Log File vulnerability in AlexaCRM Dynamics 365 Integration.This issue affects Dynamics 365 Integration: from n/a through 1.3.17.
|
[] | null | 5.3 | null | null | null |
GHSA-x92p-v52m-p9hc
|
Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2016-0102, CVE-2016-0103, CVE-2016-0106, CVE-2016-0109, and CVE-2016-0114.
|
[] | null | null | 7.5 | null | null |
|
CVE-2005-1809
|
Sony Ericsson P900 Beamer allows remote attackers to cause a denial of service (panic) via an obexftp session with a long filename in an OBEX File Transfer or OBEX Object Push.
|
[
"cpe:2.3:o:sony:p900_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:p900:-:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-2r7v-857w-j9f5
|
NetEpi Case Manager before 0.98 generates different error messages depending on whether or not a username is valid, which allows remote attackers to enumerate valid usernames.
|
[] | null | null | null | null | null |
|
CVE-2020-15715
|
rConfig 3.9.5 could allow a remote authenticated attacker to execute arbitrary code on the system, because of an error in the search.crud.php script. An attacker could exploit this vulnerability using the nodeId parameter.
|
[
"cpe:2.3:a:rconfig:rconfig:3.9.5:*:*:*:*:*:*:*"
] | null | 9.9 | null | 6.5 | null |
|
GHSA-3j27-rxr5-w58g
|
Memory leak in Libxul, as used in Mozilla Firefox 3.0.5 and other products, allows remote attackers to cause a denial of service (memory consumption and browser hang) via a long CLASS attribute in an HR element in an HTML document.
|
[] | null | null | null | null | null |
|
CVE-2019-15653
|
Comba AP2600-I devices through A02,0202N00PD2 are prone to password disclosure via an insecure authentication mechanism. The HTML source code of the login page contains values that allow obtaining the username and password. The username are password values are a double md5 of the plaintext real value, i.e., md5(md5(value)).
|
[
"cpe:2.3:o:comba:ap2600-i_-_a02_-_0202n00pd2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:comba:ap2600-i_-_a02_-_0202n00pd2:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null |
|
RHSA-2013:1147
|
Red Hat Security Advisory: Red Hat JBoss SOA Platform 5.3.1 update
|
jakarta-commons-httpclient: missing connection hostname check against X.509 certificate name rubygem-json: Denial of Service and SQL Injection ruby: entity expansion DoS vulnerability in REXML
|
[
"cpe:/a:redhat:jboss_enterprise_soa_platform:5.3"
] | null | null | 3.7 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.