id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
57.2k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2022-22161 | Junos OS: MX104 might become unresponsive if the out-of-band management port receives a flood of traffic | An Uncontrolled Resource Consumption vulnerability in the kernel of Juniper Networks Junos OS allows an unauthenticated network based attacker to cause 100% CPU load and the device to become unresponsive by sending a flood of traffic to the out-of-band management ethernet port. Continued receipted of a flood will create a sustained Denial of Service (DoS) condition. Once the flood subsides the system will recover by itself. An indication that the system is affected by this issue would be that an irq handled by the fman process is shown to be using a high percentage of CPU cycles like in the following example output: user@host> show system processes extensive ... PID USERNAME PRI NICE SIZE RES STATE TIME WCPU COMMAND 31 root -84 -187 0K 16K WAIT 22.2H 56939.26% irq96: fman0 This issue affects Juniper Networks Junos OS: All versions prior to 18.3R3-S6; 18.4 versions prior to 18.4R2-S9, 18.4R3-S9; 19.1 versions prior to 19.1R2-S3, 19.1R3-S7; 19.2 versions prior to 19.2R1-S7, 19.2R3-S3; 19.3 versions prior to 19.3R2-S7, 19.3R3-S4; 19.4 versions prior to 19.4R2-S5, 19.4R3-S5; 20.1 versions prior to 20.1R3-S1; 20.2 versions prior to 20.2R3-S2; 20.3 versions prior to 20.3R3-S1; 20.4 versions prior to 20.4R2-S2, 20.4R3; 21.1 versions prior to 21.1R2; 21.2 versions prior to 21.2R1-S1, 21.2R2. | [
"cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r1-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r1-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r1-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r1-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r2-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r2-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r3-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r3-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r1-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r1-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r1-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r1-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r1-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r2-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r2-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r2-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r2-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r2-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r2-s8:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r3-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r3-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r3-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r3-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r3-s8:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r1-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r1-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r1-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r1-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r3-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r3-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r3-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r1-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r1-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r1-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r1-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r2-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r2-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r2-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r2-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r1-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r1-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r2-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r2-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r3-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r1-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r1-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r1-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r2-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.3:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.3:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.3:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.3:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.3:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.1:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.1:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.1:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*",
"cpe:2.3:h:juniper:mx104:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
GHSA-r5vj-6v5w-753q | Unrestricted file upload vulnerability in Infinite Automation Mango Automation 2.5.x and 2.6.x before 2.6.0 build 430 allows remote authenticated users to execute arbitrary JSP code via vectors involving an upload of an image file. | [] | null | null | null | null |
|
RHSA-2016:1630 | Red Hat Security Advisory: rh-python34-python security update | python: smtplib StartTLS stripping attack python: http protocol steam injection attack CGIHandler: sets environmental variable based on user supplied Proxy request header | [
"cpe:/a:redhat:rhel_software_collections:2::el6",
"cpe:/a:redhat:rhel_software_collections:2::el7"
] | null | null | 5 | null |
CVE-2024-9049 | Beaver Builder – WordPress Page Builder <= 2.8.3.6 - Authenticated (Contributor+) Stored DOM-Based Cross-Site Scripting via Button Group Module | The Beaver Builder – WordPress Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Button Group module in all versions up to, and including, 2.8.3.6 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [
"cpe:2.3:a:fastlinemedia:beaver_builder:*:*:*:*:*:wordpress:*:*"
] | null | 6.4 | null | null |
CVE-2017-11126 | The III_i_stereo function in libmpg123/layer3.c in mpg123 through 1.25.1 allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted audio file that is mishandled in the code for the "block_type != 2" case, a similar issue to CVE-2017-9870. | [
"cpe:2.3:a:mpg123:mpg123:*:*:*:*:*:*:*:*"
] | null | null | 5.5 | 4.3 |
|
GHSA-2hj4-ccw5-92h5 | A vulnerability in the Authentication, Authorization, and Accounting (AAA) feature of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, remote attacker to bypass command authorization and copy files to or from the file system of an affected device using the Secure Copy Protocol (SCP).This vulnerability is due to incorrect processing of SCP commands in AAA command authorization checks. An attacker with valid credentials and level 15 privileges could exploit this vulnerability by using SCP to connect to an affected device from an external machine. A successful exploit could allow the attacker to obtain or change the configuration of the affected device and put files on or retrieve files from the affected device. | [] | null | 8 | null | null |
|
GHSA-r32h-q4vw-rvf3 | In the Linux kernel, the following vulnerability has been resolved:mlxsw: spectrum_acl_tcam: Fix memory leak when canceling rehash workThe rehash delayed work is rescheduled with a delay if the number of
credits at end of the work is not negative as supposedly it means that
the migration ended. Otherwise, it is rescheduled immediately.After "mlxsw: spectrum_acl_tcam: Fix possible use-after-free during
rehash" the above is no longer accurate as a non-negative number of
credits is no longer indicative of the migration being done. It can also
happen if the work encountered an error in which case the migration will
resume the next time the work is scheduled.The significance of the above is that it is possible for the work to be
pending and associated with hints that were allocated when the migration
started. This leads to the hints being leaked [1] when the work is
canceled while pending as part of ACL region dismantle.Fix by freeing the hints if hints are associated with a work that was
canceled while pending.Blame the original commit since the reliance on not having a pending
work associated with hints is fragile.[1]
unreferenced object 0xffff88810e7c3000 (size 256):
comm "kworker/0:16", pid 176, jiffies 4295460353
hex dump (first 32 bytes):
00 30 95 11 81 88 ff ff 61 00 00 00 00 00 00 80 .0......a.......
00 00 61 00 40 00 00 00 00 00 00 00 04 00 00 00 ..a.@...........
backtrace (crc 2544ddb9):
[<00000000cf8cfab3>] kmalloc_trace+0x23f/0x2a0
[<000000004d9a1ad9>] objagg_hints_get+0x42/0x390
[<000000000b143cf3>] mlxsw_sp_acl_erp_rehash_hints_get+0xca/0x400
[<0000000059bdb60a>] mlxsw_sp_acl_tcam_vregion_rehash_work+0x868/0x1160
[<00000000e81fd734>] process_one_work+0x59c/0xf20
[<00000000ceee9e81>] worker_thread+0x799/0x12c0
[<00000000bda6fe39>] kthread+0x246/0x300
[<0000000070056d23>] ret_from_fork+0x34/0x70
[<00000000dea2b93e>] ret_from_fork_asm+0x1a/0x30 | [] | null | 5.5 | null | null |
|
GHSA-8crw-6mr7-v864 | In PackageManager, there is a missing permission check. This could lead to local information disclosure across users with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-153996866 | [] | null | null | null | null |
|
GHSA-9m9r-rw59-qh84 | The System Dashboard WordPress plugin before 2.8.15 does not sanitise and escape some parameters when outputting them in the page, which could allow unauthenticated users to perform Cross-Site Scripting attacks. | [] | null | 6.1 | null | null |
|
CVE-2005-3550 | Directory traversal vulnerability in admin.php in toendaCMS before 0.6.2 allows remote attackers to access arbitrary files via a .. (dot dot) in the id_user parameter. | [
"cpe:2.3:a:toenda_software_development:toendacms:*:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2022-24126 | A buffer overflow in the NRSessionSearchResult parser in Bandai Namco FromSoftware Dark Souls III through 2022-03-19 allows remote attackers to execute arbitrary code via matchmaking servers, a different vulnerability than CVE-2021-34170. | [
"cpe:2.3:a:fromsoftware:dark_souls_iii:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
|
GHSA-r928-prgx-2wf8 | Vulnerability in the Oracle CRM Technical Foundation product of Oracle E-Business Suite (component: Preferences). Supported versions that are affected are 12.1.3 and 12.2.3-12.2.9. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle CRM Technical Foundation. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle CRM Technical Foundation, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle CRM Technical Foundation accessible data. CVSS 3.1 Base Score 4.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N). | [] | null | null | null | null |
|
CVE-2023-26588 | Use of hard-coded credentials vulnerability in Buffalo network devices allows an attacker to access the debug function of the product. The affected products and versions are as follows: BS-GSL2024 firmware Ver. 1.10-0.03 and earlier, BS-GSL2016P firmware Ver. 1.10-0.03 and earlier, BS-GSL2016 firmware Ver. 1.10-0.03 and earlier, BS-GS2008 firmware Ver. 1.0.10.01 and earlier, BS-GS2016 firmware Ver. 1.0.10.01 and earlier, BS-GS2024 firmware Ver. 1.0.10.01 and earlier, BS-GS2048 firmware Ver. 1.0.10.01 and earlier, BS-GS2008P firmware Ver. 1.0.10.01 and earlier, BS-GS2016P firmware Ver. 1.0.10.01 and earlier, and BS-GS2024P firmware Ver. 1.0.10.01 and earlier | [
"cpe:2.3:o:buffalo:bs-gsl2024_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:buffalo:bs-gsl2024:-:*:*:*:*:*:*:*",
"cpe:2.3:o:buffalo:bs-gsl2016p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:buffalo:bs-gsl2016p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:buffalo:bs-gsl2016_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:buffalo:bs-gsl2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:buffalo:bs-gs2008_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:buffalo:bs-gs2008:-:*:*:*:*:*:*:*",
"cpe:2.3:o:buffalo:bs-gs2016_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:buffalo:bs-gs2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:buffalo:bs-gs2024_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:buffalo:bs-gs2024:-:*:*:*:*:*:*:*",
"cpe:2.3:o:buffalo:bs-gs2048_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:buffalo:bs-gs2048:-:*:*:*:*:*:*:*",
"cpe:2.3:o:buffalo:bs-gs2008p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:buffalo:bs-gs2008p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:buffalo:bs-gs2016p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:buffalo:bs-gs2016p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:buffalo:bs-gs2024p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:buffalo:bs-gs2024p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:buffalo:bs-gsl2005_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:buffalo:bs-gsl2005:-:*:*:*:*:*:*:*",
"cpe:2.3:o:buffalo:bs-gsl2008_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:buffalo:bs-gsl2008:-:*:*:*:*:*:*:*",
"cpe:2.3:o:buffalo:bs-gsl2005p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:buffalo:bs-gsl2005p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:buffalo:bs-gsl2008p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:buffalo:bs-gsl2008p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:buffalo:bs-gs2016hp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:buffalo:bs-gs2016hp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:buffalo:bs-gs2024hp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:buffalo:bs-gs2024hp:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
|
GHSA-5vpv-xmcj-9q85 | Fix for arbitrary file deletion in customer media allows for remote code execution | ImpactMagento admin users with access to the customer media could execute code on the server. | [] | null | 7.2 | null | null |
GHSA-53gq-4mvm-23rp | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2024-34467. Reason: This candidate is a reservation duplicate of CVE-2024-34467. Notes: All CVE users should reference CVE-2024-34467 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage. | [] | null | null | null | null |
|
GHSA-gjr5-xrxx-mv2c | Pheap 2.0 allows remote attackers to bypass authentication by setting a pheap_login cookie value to the administrator's username, which can be used to (1) obtain sensitive information, including the administrator password, via settings.php or (2) upload and execute arbitrary PHP code via an update_doc action in edit.php. | [] | null | null | null | null |
|
CVE-2008-0369 | Multiple unspecified programs in IBM Informix Dynamic Server (IDS) 10.x before 10.00.xC8 allow local users to create arbitrary files by specifying the target file in the SQLIDEBUG environment variable, whose ownership is changed to the user invoking the programs. | [
"cpe:2.3:a:ibm:informix_dynamic_server:10.00:*:*:*:*:*:*:*"
] | null | null | null | 6.9 |
|
CVE-2021-1470 | Cisco SD-WAN SQL Injection Vulnerability | A vulnerability in the web-based management interface of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to conduct SQL injection attacks on an affected system.
This vulnerability is due to improper input validation of SQL queries to an affected system. An attacker could exploit this vulnerability by authenticating to the application and sending malicious SQL queries to an affected system. A successful exploit could allow the attacker to modify values on or return values from the vManage database or the underlying operating system.Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities. | [] | null | 4.9 | null | null |
GHSA-pcph-v7q2-77cx | INSERT ... ON CONFLICT DO UPDATE commands in PostgreSQL 10.x before 10.1, 9.6.x before 9.6.6, and 9.5.x before 9.5.10 disclose table contents that the invoker lacks privilege to read. These exploits affect only tables where the attacker lacks full read access but has both INSERT and UPDATE privileges. Exploits bypass row level security policies and lack of SELECT privilege. | [] | null | null | 6.5 | null |
|
CVE-2021-21891 | A stack-based buffer overflow vulnerability exists in the Web Manager FsBrowseClean functionality of Lantronix PremierWave 2050 8.9.0.0R4 (in QEMU). A specially crafted HTTP request can lead to remote code execution in the vulnerable portion of the branch (deletefile). An attacker can make an authenticated HTTP request to trigger this vulnerability. | [
"cpe:2.3:o:lantronix:premierwave_2050_firmware:8.9.0.0:r4:*:*:*:*:*:*",
"cpe:2.3:h:lantronix:premierwave_2050:-:*:*:*:*:*:*:*"
] | null | null | 9.1 | null |
|
CVE-2021-36542 | Cross-Site Request Forgery (CSRF) vulnerability in the /op/op.LockDocument.php in SeedDMS v5.1.x<5.1.23 and v6.0.x <6.0.16 allows a remote attacker to lock any document without victim's knowledge, by enticing an authenticated user to visit an attacker's web page. | [
"cpe:2.3:a:seeddms:seeddms:*:*:*:*:*:*:*:*",
"cpe:2.3:a:seeddms:seeddms:6.0.6:beta:*:*:*:*:*:*"
] | null | 4.3 | null | 4.3 |
|
CVE-2018-17997 | LayerBB 1.1.1 allows XSS via the titles of conversations (PMs). | [
"cpe:2.3:a:layerbb:layerbb:1.1.1:*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 |
|
CVE-2020-14210 | Reflected Cross-Site Scripting (XSS) vulnerability in MONITORAPP WAF in which script can be executed when responding to Request URL information. It provides a function to response to Request URL information when blocking. | [
"cpe:2.3:a:monitorapp:application_insight_web_application:*:*:*:*:virtual:*:*:*",
"cpe:2.3:a:monitorapp:web_application_firewall:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 |
|
GHSA-8qq4-4mf9-45qp | An issue was discovered in Maxum Rumpus before 8.2.12 on macOS. Authenticated users can perform a path traversal using double escaped characters, enabling read access to arbitrary files on the server. | [] | null | null | null | null |
|
CVE-2022-1265 | BulletProof Security < 6.1 - Admin+ Stored Cross-Site Scripting | The BulletProof Security WordPress plugin before 6.1 does not sanitize and escape some of its CAPTCHA settings, which could allow high-privileged users to perform Cross-Site Scripting attacks even when unfiltered_html is disallowed | [
"cpe:2.3:a:ait-pro:bulletproof_security:*:*:*:*:*:wordpress:*:*"
] | null | 4.8 | null | 3.5 |
CVE-2024-43151 | WordPress Ultimate Addons for Beaver Builder – Lite plugin <= 1.5.9 - Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Brainstorm Force Ultimate Addons for Beaver Builder – Lite allows Stored XSS.This issue affects Ultimate Addons for Beaver Builder – Lite: from n/a through 1.5.9. | [] | null | 6.5 | null | null |
CVE-2014-2776 | Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2014-1769, CVE-2014-1782, CVE-2014-1785, CVE-2014-2753, CVE-2014-2755, CVE-2014-2760, CVE-2014-2761, and CVE-2014-2772. | [
"cpe:2.3:a:microsoft:internet_explorer:11:*:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
cisco-sa-wsa-xss-RuB5WGqL | Cisco Web Security Appliance Stored Cross-Site Scripting Vulnerability | A vulnerability in the web-based management interface of Cisco AsyncOS for Cisco Web Security Appliance (WSA) could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device.
The vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by inserting malicious data into a specific data field in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
| [] | null | 4.8 | null | null |
GHSA-62gw-p866-4mj6 | SQL injection vulnerability in the NinjaMonials (com_ninjamonials) component for Joomla! allows remote attackers to execute arbitrary SQL commands via the Itemid parameter in a display action to index.php. | [] | null | null | null | null |
|
RHSA-2024:4379 | Red Hat Security Advisory: gvisor-tap-vsock security update | golang-fips/openssl: Memory leaks in code encrypting and decrypting RSA payloads | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
GHSA-rxx7-mqqx-phw8 | sympa version 6.2.16 and later contains a CWE-601: URL Redirection to Untrusted Site ('Open Redirect') vulnerability in The "referer" parameter of the wwsympa.fcgi login action. that can result in Open redirection and reflected XSS via data URIs. This attack appear to be exploitable via Victim's browser must follow a URL supplied by the attacker. This vulnerability appears to have been fixed in none available. | [] | null | null | 6.1 | null |
|
CVE-2021-4212 | A potential vulnerability in the SMI callback function used in the Legacy BIOS mode driver in some Lenovo Notebook models may allow an attacker with local access and elevated privileges to execute arbitrary code. | [
"cpe:2.3:o:lenovo:c340-14iml_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:c340-14iml:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:c340-15iml_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:c340-15iml:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:d330-10igm_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:d330-10igm:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:duet_3-10igl5_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:duet_3-10igl5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:e41-50_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:e41-50:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:flex-14iml_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:flex-14iml:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:flex-15iml_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:flex-15iml:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_3-14are05_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_3-14are05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_3-15are05_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_3-15are05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_3-17are05_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_3-17are05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_5-14alc05_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_5-14alc05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_5-14are05_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_5-14are05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_5-15itl05_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_5-15itl05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_5_pro-14acn6_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_5_pro-14acn6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_5_pro-14itl6_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_5_pro-14itl6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_5_pro-16ihu6_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_5_pro-16ihu6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_creator_5-15imh05_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_creator_5-15imh05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_gaming_3-15ach6_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_gaming_3-15ach6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_gaming_3-15arh05_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_gaming_3-15arh05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_gaming_3-15imh05_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_gaming_3-15imh05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:l340-15irh_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:l340-15irh:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:l340-15iwl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:l340-15iwl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:l340-15iwl_touch_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:l340-15iwl_touch:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:l340-17irh_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:l340-17irh:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:l340-17iwl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:l340-17iwl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:legion_y540-15irh_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:legion_y540-15irh:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:legion_y540-15irh-pg0_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:legion_y540-15irh-pg0:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:legion_y540-17irh_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:legion_y540-17irh:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:legion_y540-17irh-pg0_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:legion_y540-17irh-pg0:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:legion_y545_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:legion_y545:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:legion_y545-pg0_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:legion_y545-pg0:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:legion_y7000-2019_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:legion_y7000-2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:legion_y7000-2019-pg0_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:legion_y7000-2019-pg0:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:s340-13iml_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:s340-13iml:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:s340-14api_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:s340-14api:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:s340-14iml_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:s340-14iml:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:s340-15api_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:s340-15api:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:s340-15api_touch_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:s340-15api_touch:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:s340-15iml_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:s340-15iml:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:s540-14iml_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:s540-14iml:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:s540-14iml_touch_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:s540-14iml_touch:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:s540-15iml_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:s540-15iml:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:slim_7-14are05_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:slim_7-14are05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:slim_7-14itl05_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:slim_7-14itl05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:slim_7-15iil05_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:slim_7-15iil05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:slim_7-15imh05_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:slim_7-15imh05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:slim_7-15itl05_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:slim_7-15itl05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkbook_13x_itg_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkbook_13x_itg:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkbook_14_g3_itl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkbook_14_g3_itl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkbook_plus_g2_itg_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkbook_plus_g2_itg:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v14-are_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v14-are:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v140-15iwl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v140-15iwl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v340-17iwl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v340-17iwl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:yoga_6-13alc6_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:yoga_6-13alc6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:yoga_creator_7-15imh05_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:yoga_creator_7-15imh05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:yoga_slim_7-14are05_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:yoga_slim_7-14are05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:yoga_slim_7-14iil05_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:yoga_slim_7-14iil05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:yoga_slim_7-14itl05_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:yoga_slim_7-14itl05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:yoga_slim_7-15iil05_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:yoga_slim_7-15iil05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:yoga_slim_7-15imh05_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:yoga_slim_7-15imh05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:yoga_slim_7-15itl05_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:yoga_slim_7-15itl05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:yoga_slim_7_carbon_13itl5_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:yoga_slim_7_carbon_13itl5:-:*:*:*:*:*:*:*"
] | null | 6.7 | null | null |
|
GHSA-h7vp-qvfw-h2f3 | Mail::Audit module in libmail-audit-perl 2.1-5, when logging is enabled without a default log file specified, uses predictable log filenames, which allows local users to overwrite arbitrary files via a symlink attack on the [PID]-audit.log temporary file. | [] | null | null | null | null |
|
GHSA-qx4x-jg45-h572 | In Emerson Rosemount GC370XA, GC700XA, and GC1500XA products, an unauthenticated user with network access could obtain access to sensitive information or cause a denial-of-service condition. | [] | null | 6.9 | null | null |
|
GHSA-7hmg-vfm5-895r | MotionPro in Array ArrayOS AG before 9.4.0.505 on AG and vxAG allows remote command execution via crafted packets. AG and vxAG 9.3.0.259.x are unaffected. | [] | null | 9.8 | null | null |
|
GHSA-h3cw-j9j9-5pc4 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, and OpenJDK 7, allows user-assisted remote attackers to bypass the Java security sandbox via unspecified vectors related to JMX, aka "Issue 52," a different vulnerability than CVE-2013-1490. | [] | null | 5.3 | null | null |
|
GHSA-vxg3-frf4-qwph | Windows NTLM Elevation of Privilege Vulnerability. | [] | null | 7.8 | null | null |
|
CVE-2015-9261 | huft_build in archival/libarchive/decompress_gunzip.c in BusyBox before 1.27.2 misuses a pointer, causing segfaults and an application crash during an unzip operation on a specially crafted ZIP file. | [
"cpe:2.3:a:busybox:busybox:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"
] | null | 5.5 | null | 4.3 |
|
GHSA-h5x9-6828-fhq5 | This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley MicroStation CONNECT 10.16.0.80. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of J2K images. Crafted data in a J2K image can trigger a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-15377. | [] | null | null | null | null |
|
CVE-2022-46364 | Apache CXF SSRF Vulnerability | A SSRF vulnerability in parsing the href attribute of XOP:Include in MTOM requests in versions of Apache CXF before 3.5.5 and 3.4.10 allows an attacker to perform SSRF style attacks on webservices that take at least one parameter of any type. | [
"cpe:2.3:a:apache:cxf:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
CVE-2015-8223 | Huawei P7 before P7-L00C17B851, P7-L05C00B851, and P7-L09C92B85, and P8 ALE-UL00 before ALE-UL00B211 allows local users to cause a denial of service (OS crash) by leveraging camera permissions and via crafted input to the camera driver. | [
"cpe:2.3:o:huawei:p7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:p7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:p8_ale-ul00_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:p8_ale-ul00:-:*:*:*:*:*:*:*"
] | null | null | 5.5 | 4.9 |
|
GHSA-jf9v-867q-hmcf | School Management System commit bae5aa was discovered to contain a SQL injection vulnerability via the password parameter at login.php | [] | null | 8.8 | null | null |
|
CVE-2013-4534 | Buffer overflow in hw/intc/openpic.c in QEMU before 1.7.2 allows remote attackers to cause a denial of service or possibly execute arbitrary code via vectors related to IRQDest elements. | [
"cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.9.1-5:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.10.2:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.10.3:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.10.4:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.10.5:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.10.6:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.11.0:rc0:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.11.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.11.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.11.0-rc0:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.11.0-rc1:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.11.0-rc2:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.11.1:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.12.0:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.12.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.12.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.12.1:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.12.2:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.12.3:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.12.4:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.12.5:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.13.0:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.13.0:rc0:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.13.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.14.0:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.14.0:rc0:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.14.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.14.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.14.1:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.15.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.15.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.15.1:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.15.2:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.0:rc4:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.1:rc1:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.1:rc2:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.1:rc3:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.1:rc4:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.5.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.5.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.5.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.6.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.6.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.6.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.6.2:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-7ffc-hwfp-9xhq | ** UNSUPPORTED WHEN ASSIGNED ** ThinkUp 2.0-beta.10 is affected by a path manipulation vulnerability in Smarty.class.php. | [] | null | 9.8 | null | null |
|
CVE-2022-22401 | IBM Aspera Faspex information disclosure | IBM Aspera Faspex 5.0.5 could allow a remote attacker to gather or persuade a naive user to supply sensitive information. IBM X-Force ID: 222567. | [
"cpe:2.3:a:ibm:aspera_faspex:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"
] | null | 5.9 | null | null |
CVE-2019-15258 | Cisco SPA100 Series Analog Telephone Adapters Web Management Interface Denial of Service Vulnerability | A vulnerability in the web-based management interface of Cisco SPA100 Series Analog Telephone Adapters (ATAs) could allow an authenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to improper validation of user-supplied requests to the web-based management interface. An attacker could exploit this vulnerability by sending a crafted request to the web-based management interface of an affected device. A successful exploit could allow the attacker to cause the device to stop responding, requiring manual intervention for recovery. | [
"cpe:2.3:o:cisco:spa112_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:spa112_firmware:1.4.1:-:*:*:*:*:*:*",
"cpe:2.3:o:cisco:spa112_firmware:1.4.1:sr1:*:*:*:*:*:*",
"cpe:2.3:o:cisco:spa112_firmware:1.4.1:sr2:*:*:*:*:*:*",
"cpe:2.3:o:cisco:spa112_firmware:1.4.1:sr3:*:*:*:*:*:*",
"cpe:2.3:h:cisco:spa112:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:spa122_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:spa122_firmware:1.4.1:-:*:*:*:*:*:*",
"cpe:2.3:o:cisco:spa122_firmware:1.4.1:sr1:*:*:*:*:*:*",
"cpe:2.3:o:cisco:spa122_firmware:1.4.1:sr2:*:*:*:*:*:*",
"cpe:2.3:o:cisco:spa122_firmware:1.4.1:sr3:*:*:*:*:*:*",
"cpe:2.3:h:cisco:spa122:-:*:*:*:*:*:*:*"
] | null | null | 6.5 | null |
CVE-2017-12348 | Multiple vulnerabilities in the web-based management interface of Cisco UCS Central Software could allow a remote attacker to conduct a cross-site scripting (XSS) attack against a user of the affected interface or hijack a valid session ID from a user of the affected interface. Cisco Bug IDs: CSCvf71978, CSCvf71986. | [
"cpe:2.3:a:cisco:unified_computing_system_central_software:2.2\\(1a\\)a:*:*:*:*:*:*:*"
] | null | null | 5.4 | 3.5 |
|
GHSA-hjxm-p5wf-9v7p | Integer underflow in lzhsr.dll in Autonomy KeyView, as used in IBM Lotus Notes before 8.5.2 FP3, allows remote attackers to execute arbitrary code via a crafted header in a .lzh attachment that triggers a stack-based buffer overflow, aka SPR PRAD88MJ2W. | [] | null | null | null | null |
|
GHSA-7wxc-mh8q-7484 | An issue found in IXP Data Easy Install v.6.6.14884.0 allows an attacker to escalate privileges via lack of permissions applied to sub directories. | [] | null | 7.8 | null | null |
|
CVE-2019-19637 | An issue was discovered in libsixel 1.8.2. There is an integer overflow in the function sixel_decode_raw_impl at fromsixel.c. | [
"cpe:2.3:a:libsixel_project:libsixel:1.8.2:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
|
CVE-2025-23846 | WordPress Flexible Blogtitle Plugin <= 0.1 - Reflected Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Kolja Nolte Flexible Blogtitle allows Reflected XSS. This issue affects Flexible Blogtitle: from n/a through 0.1. | [] | null | 7.1 | null | null |
GHSA-p8mc-767v-qwwh | Unspecified vulnerability in the PeopleSoft Enterprise HRMS component in Oracle PeopleSoft and JDEdwards Suite 9.0 Bundle #14 and 9.1 Bundle #4 allows remote authenticated users to affect confidentiality via unknown vectors related to Talent Acquisition Manager. | [] | null | null | null | null |
|
CVE-2023-25520 |
NVIDIA Jetson Linux Driver Package contains a vulnerability in nvbootctrl, where a privileged local attacker can configure invalid settings, resulting in denial of service.
| [
"cpe:2.3:o:nvidia:jetson_linux:*:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:jetson_agx_xavier:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:jetson_tx2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:jetson_tx2_nx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:jetson_xavier_nx:-:*:*:*:*:*:*:*"
] | null | 4.4 | null | null |
|
GHSA-3724-xmqw-2wwv | Zulip Server before 2.1.3 allows XSS via the modal_link feature in the Markdown functionality. | [] | null | null | null | null |
|
CVE-2024-11895 | Online Payments – Get Paid with PayPal, Square & Stripe <= 3.20.0 - Authenticated (Contributor+) Stored Cross-Site Scripting | The Online Payments – Get Paid with PayPal, Square & Stripe plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcodes in all versions up to, and including, 3.20.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] | null | 6.4 | null | null |
GHSA-5ch5-4vm6-3g39 | Multiple unspecified vulnerabilities in Attachmate Reflection for Secure IT UNIX Client and Server before 7.0 SP1 have unknown impact and attack vectors, aka "security vulnerabilities found by 3rd party analysis." | [] | null | null | null | null |
|
cisco-sa-fmc-xss-yT8LNSeA | Cisco Firepower Management Center Software Cross-Site Scripting Vulnerabilities | Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface.
These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information.
Cisco has released software updates to address these vulnerabilities. There are no workarounds that address these vulnerabilities.
| [] | null | 4.8 | null | null |
CVE-2008-1769 | VLC before 0.8.6f allow remote attackers to cause a denial of service (crash) via a crafted Cinepak file that triggers an out-of-bounds array access and memory corruption. | [
"cpe:2.3:a:videolan:vlc:0.1.99:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc:0.1.99a:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc:0.1.99b:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc:0.1.99c:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc:0.1.99d:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc:0.1.99e:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc:0.1.99f:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc:0.1.99g:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc:0.1.99h:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc:0.1.99i:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc:0.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc:0.2.50:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc:0.2.60:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc:0.2.61:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc:0.2.62:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc:0.2.63:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc:0.2.70:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc:0.2.71:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc:0.2.72:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc:0.2.73:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc:0.2.80:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc:0.2.81:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc:0.2.82:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc:0.2.83:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc:0.2.90:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc:0.2.91:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc:0.2.92:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc:0.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc:0.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc:0.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc:0.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc:0.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc:0.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc:0.4.3_ac3:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc:0.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc:0.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc:0.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc:0.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc:0.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc:0.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc:0.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc:0.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc:0.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc:0.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc:0.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc:0.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc:0.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc:0.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc:0.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc:0.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc:0.8.4:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc:0.8.4a:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc:0.8.5:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc:0.8.6:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc:0.8.6a:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc:0.8.6b:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc:0.8.6c:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc:0.8.6d:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc:0.8.6e:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc:0.8.1337:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
CVE-2005-1769 | Multiple cross-site scripting (XSS) vulnerabilities in SquirrelMail 1.4.0 through 1.4.4 allow remote attackers to inject arbitrary web script or HTML via unknown attack vectors in (1) the URL or (2) an e-mail message. | [
"cpe:2.3:a:squirrelmail:squirrelmail:1.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:squirrelmail:squirrelmail:1.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:squirrelmail:squirrelmail:1.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:squirrelmail:squirrelmail:1.4.3_rc1:*:*:*:*:*:*:*",
"cpe:2.3:a:squirrelmail:squirrelmail:1.4.3a:*:*:*:*:*:*:*",
"cpe:2.3:a:squirrelmail:squirrelmail:1.44:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2004-1075 | Cross-site scripting (XSS) vulnerability in standard_error_message.dtml for Zwiki after 0.10.0rc1 to 0.36.2 allows remote attackers to inject arbitrary HTML and web script via a malformed URL, which is not properly cleansed when generating an error message. | [
"cpe:2.3:a:zwiki:zwiki:0.10_rc1:*:*:*:*:*:*:*",
"cpe:2.3:a:zwiki:zwiki:0.36.2:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
CVE-2016-10332 | In all Android releases from CAF using the Linux kernel, stack protection was not enabled for secure applications. | [
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*"
] | null | null | 5.5 | 4.3 |
|
GHSA-59vq-j7xp-3fmj | Use-after-free vulnerability in Google Chrome before 20.0.1132.43 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to SVG resources. | [] | null | null | null | null |
|
CVE-2014-6923 | The Dubrovnik Guided Walking Tours (aka com.mytoursapp.android.app351) application 1.3.2 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [
"cpe:2.3:a:mobitrips:dubrovnik_guided_walking_tours:1.3.2:*:*:*:*:android:*:*"
] | null | null | null | 5.4 |
|
GHSA-6r69-3xcf-x5gg | IBM InfoSphere Information Server 11.7 could disclose sensitive user information to another user with physical access to the machine. IBM X-Force ID: 294727. | [] | null | 2.4 | null | null |
|
GHSA-vqrj-75mr-c9xv | In soter service, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with System execution privileges needed. | [] | null | 4.4 | null | null |
|
CVE-2025-2379 | PHPGurukul Apartment Visitors Management System create-pass.php sql injection | A vulnerability was found in PHPGurukul Apartment Visitors Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /create-pass.php. The manipulation of the argument visname leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. | [] | 6.9 | 7.3 | 7.3 | 7.5 |
CVE-2018-10824 | An issue was discovered on D-Link DWR-116 through 1.06, DIR-140L through 1.02, DIR-640L through 1.02, DWR-512 through 2.02, DWR-712 through 2.02, DWR-912 through 2.02, DWR-921 through 2.02, and DWR-111 through 1.01 devices. The administrative password is stored in plaintext in the /tmp/csman/0 file. An attacker having a directory traversal (or LFI) can easily get full router access. | [
"cpe:2.3:o:dlink:dwr-116_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dwr-116:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dir-140l_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dir-140l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dir-640l_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dir-640l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dwr-512_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dwr-512:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dwr-712_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dwr-712:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dwr-912_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dwr-921:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dwr-921_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dwr-111_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dwr-111:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | 5 |
|
GHSA-75p2-hgw4-g7f7 | AutoUpdater.NET allows XXE | AutoUpdater.cs in AutoUpdater.NET before 1.5.8 allows XXE. | [] | null | 9.8 | null | null |
GHSA-hp8q-38h9-gmmv | TOTOLINK CP300+ V5.2cu.7594_B20200910 and before is vulnerable to command injection. | [] | null | 9.8 | null | null |
|
GHSA-5pf6-cq2v-23ww | WhoDB Allows Unbounded Memory Consumption in Authentication Middleware Can Lead to Denial of Service | SummaryA Denial of Service (DoS) vulnerability in the authentication middleware allows any client to cause memory exhaustion by sending large request bodies. The server reads the entire request body into memory without size limits, creating multiple copies during processing, which can lead to Out of Memory conditions.Affects all versions up to the latest one (v0.43.0).DetailsThe vulnerability exists in the AuthMiddleware function in `core/src/auth/auth.go`. The middleware processes all API requests (`/api/*`) and reads the entire request body using `io.ReadAll` without any size limits:The issue is amplified by:A generous 10-minute timeout (`middleware.Timeout(10*time.Minute)`)High throttle limits (10000 concurrent requests, 1000 backlog)Multiple copies of the request body being created during processingNo per-client rate limitingPoCRun the latest WhoDB:Prepare a PoC Python script:Run the script and observe memory usage of the WhoDB container. Run it a few times in parallel, or increase the payload size. I was able to hit the OOM killer on a 8 GB VM quickly. Process "core" is the entrypoint of the container.ImpactSeverity: HighAuthentication Required: No (public API endpoint)Affected Components: All API endpoints (`/api/*`)Impact Type: Denial of ServiceAny client can send arbitrarily large request bodies to the API endpoints. Due to the multiple copies created during processing and lack of size limits, this can quickly exhaust server memory, potentially affecting all users of the system. The high concurrent request limits and long timeout make this particularly effective for DoS attacks.Fix considerations:Implement request body size limits using `http.MaxBytesReader`Reduce the request timeout from 10 minutesImplement per-client rate limitingConsider streaming body processing instead of loading entirely into memory | [] | null | 7.5 | null | null |
CVE-2013-3356 | Buffer overflow in Adobe Reader and Acrobat before 10.1.8 and 11.x before 11.0.04 on Windows and Mac OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2013-3353. | [
"cpe:2.3:a:adobe:acrobat:11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:11.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:11.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:11.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:11.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:11.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:11.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.0:-:pro:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.0.1:-:pro:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.1.7:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
GHSA-jh78-wfmg-g7qq | Improper access control and open directories in Ivanti LANDESK Management Suite (LDMS, aka Endpoint Manager) 10.0.1.168 Service Update 5 may lead to remote disclosure of administrator passwords. | [] | null | null | null | null |
|
GHSA-5p3m-cq5g-w2cc | Possible buffer overflow in data offload handler due to lack of check of keydata length when copying data in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking in APQ8009, APQ8017, APQ8053, APQ8064, APQ8096, APQ8096AU, IPQ6018, IPQ8074, MDM9206, MDM9207C, MDM9607, MDM9640, MDM9650, MSM8996AU, Nicobar, QCA4531, QCA6174A, QCA6564, QCA6574, QCA6574AU, QCA6584, QCA6584AU, QCA9377, QCA9379, QCA9886, QCS405, QCS605, Rennell, SA6155P, SC8180X, SDA660, SDM630, SDM636, SDM660, SDM670, SDM710, SDM845, SDX20, SDX24, SM6150, SM7150, SM8150, SXR1130, SXR2130 | [] | null | null | null | null |
|
GHSA-7cqv-r3p7-crpx | The Camera driver in Huawei Honor 4C smartphones with software CHM-UL00C00 before CHM-UL00C00B564, CHM-TL00C01 before CHM-TL00C01B564, and CHM-TL00C00 before CHM-TL00HC00B564 allows attackers to cause a denial of service (system crash) or gain privileges via a crafted application, a different vulnerability than CVE-2016-6180, CVE-2016-6182, CVE-2016-6183, and CVE-2016-6184. | [] | null | null | 7 | null |
|
CVE-2017-7735 | A Cross-Site Scripting vulnerability in Fortinet FortiOS versions 5.2.0 through 5.2.11 and 5.4.0 through 5.4.4 allows attackers to execute unauthorized code or commands via the "Groups" input while creating or editing User Groups. | [
"cpe:2.3:o:fortinet:fortios:5.2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:5.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:5.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:5.2.3:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:5.2.4:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:5.2.5:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:5.2.6:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:5.2.7:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:5.2.8:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:5.2.9:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:5.2.10:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:5.2.11:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:5.4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:5.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:5.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:5.4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:5.4.4:*:*:*:*:*:*:*"
] | null | null | 5.4 | 3.5 |
|
CVE-2023-32293 | WordPress WRC Pricing Tables plugin <= 2.3.7 - Broken Access Control vulnerability | Missing Authorization vulnerability in Realwebcare WRC Pricing Tables allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WRC Pricing Tables: from n/a through 2.3.7. | [
"cpe:2.3:a:realwebcare:wrc_pricing_tables:-:*:*:*:*:wordpress:*:*"
] | null | 5.3 | null | null |
GHSA-47r3-3h3h-gh9w | GE Gas Power ToolBoxST Version v04.07.05C suffers from an XML external entity (XXE) vulnerability using the DTD parameter entities technique that could result in disclosure and retrieval of arbitrary data on the affected node via an out-of-band (OOB) attack. The vulnerability is triggered when input passed to the XML parser is not sanitized while parsing the XML project/template file. | [] | null | 7.5 | null | null |
|
GHSA-56x7-v79h-p2jx | Cross-site scripting (XSS) vulnerability in the Server component in CA Host-Based Intrusion Prevention System (HIPS) before 8.0.0.93 allows remote attackers to inject arbitrary web script or HTML via requests that are written to logs for later display in the log viewer. | [] | null | null | null | null |
|
CVE-2019-13252 | ACDSee Free 1.1.21 has a User Mode Write AV starting at IDE_ACDStd!IEP_SetColorProfile+0x00000000001172b0. | [
"cpe:2.3:a:acdsee:acdsee:1.1.21:*:*:*:free:*:*:*"
] | null | null | 7.8 | 6.8 |
|
CVE-2005-3705 | Heap-based buffer overflow in WebKit in Mac OS X and OS X Server 10.3.9 and 10.4.3, as used in applications such as Safari, allows remote attackers to execute arbitrary code via unknown attack vectors. | [
"cpe:2.3:o:apple:mac_os_x:10.3.9:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.3.9:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.3:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-r9jr-jpgm-rcwh | The issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13.6, tvOS 17, macOS Monterey 12.7, watchOS 10, iOS 17 and iPadOS 17. An app may be able to execute arbitrary code with kernel privileges. | [] | null | 7.8 | null | null |
|
CVE-2019-16199 | eQ-3 Homematic CCU2 before 2.47.18 and CCU3 before 3.47.18 allow Remote Code Execution by unauthenticated attackers with access to the web interface via an HTTP POST request to certain URLs related to the ReGa core process. | [
"cpe:2.3:o:eq-3:homematic_ccu2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:eq-3:homematic_ccu2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:eq-3:homematic_ccu3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:eq-3:homematic_ccu3:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
|
GHSA-37wj-v394-2xvc | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Drupal Facets allows Cross-Site Scripting (XSS).This issue affects Facets: from 0.0.0 before 2.0.9. | [] | null | 6.1 | null | null |
|
GHSA-pf33-mp3w-9986 | Unspecified vulnerability in the LDAP dissector in Wireshark (formerly Ethereal) 0.99.3 allows remote attackers to cause a denial of service (crash) via a crafted LDAP packet. | [] | null | null | null | null |
|
CVE-2009-4855 | SQL injection vulnerability in index.php in TYPO3 4.0 allows remote attackers to execute arbitrary SQL commands via the showUid parameter. NOTE: the TYPO3 Security Team disputes this report, stating that "there is no such vulnerability... The showUid parameter is generally used in third-party TYPO3 extensions - not in TYPO3 Core. | [
"cpe:2.3:a:typo3:typo3:4.0:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-p6jx-jgrw-xrp7 | Trango Apex <= 2.1.1, ApexLynx < 2.0, ApexOrion < 2.0, ApexPlus <= 3.2.0, Giga <= 2.6.1, GigaLynx < 2.0, GigaOrion < 2.0, GigaPlus <= 3.2.3, GigaPro <= 1.4.1, StrataLink < 3.0, and StrataPro devices have a built-in, hidden root account, with a default password that was once stored in cleartext within a software update package on a Trango FTP server. This account is accessible via SSH and/or TELNET, and grants access to the underlying embedded UNIX OS on the device, allowing full control over it. | [] | null | 9.8 | null | null |
|
GHSA-7752-h8p6-727f | Microsoft Internet Explorer 7 through 11 and Microsoft Edge allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Memory Corruption Vulnerability," a different vulnerability than CVE-2015-2487, CVE-2015-2490, CVE-2015-2492, CVE-2015-2494, CVE-2015-2498, and CVE-2015-2499. | [] | null | null | null | null |
|
GHSA-jgjj-vmw4-3g37 | In the Linux kernel, the following vulnerability has been resolved:md: Don't ignore suspended array in md_check_recovery()mddev_suspend() never stop sync_thread, hence it doesn't make sense to
ignore suspended array in md_check_recovery(), which might cause
sync_thread can't be unregistered.After commit f52f5c71f3d4 ("md: fix stopping sync thread"), following
hang can be triggered by test shell/integrity-caching.sh:suspend the array:
raid_postsuspend
mddev_suspendstop the array:
raid_dtr
md_stop
__md_stop_writes
stop_sync_thread
set_bit(MD_RECOVERY_INTR, &mddev->recovery);
md_wakeup_thread_directly(mddev->sync_thread);
wait_event(..., !test_bit(MD_RECOVERY_RUNNING, &mddev->recovery))sync thread done:
md_do_sync
set_bit(MD_RECOVERY_DONE, &mddev->recovery);
md_wakeup_thread(mddev->thread);daemon thread can't unregister sync thread:
md_check_recovery
if (mddev->suspended)
return; -> return directly
md_read_sync_thread
clear_bit(MD_RECOVERY_RUNNING, &mddev->recovery);
-> MD_RECOVERY_RUNNING can't be cleared, hence step 2 hang;This problem is not just related to dm-raid, fix it by ignoring
suspended array in md_check_recovery(). And follow up patches will
improve dm-raid better to frozen sync thread during suspend. | [] | null | 5.5 | null | null |
|
CVE-2017-2357 | An issue was discovered in certain Apple products. macOS before 10.12.3 is affected. The issue involves the "IOAudioFamily" component. It allows attackers to obtain sensitive kernel memory-layout information via a crafted app. | [
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
] | null | null | 3.3 | 4.3 |
|
GHSA-ch74-qvc9-j4fg | The Buzzsprout Podcasting plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'buzzsprout' shortcode in versions up to, and including, 1.8.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] | null | 6.4 | null | null |
|
CVE-2017-8083 | CompuLab Intense PC and MintBox 2 devices with BIOS before 2017-05-21 do not use the CloseMnf protection mechanism for write protection of flash memory regions, which allows local users to install a firmware rootkit by leveraging administrative privileges. | [
"cpe:2.3:o:compulab:intense_pc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:compulab:intense_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:compulab:mintbox_2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:compulab:mintbox_2:-:*:*:*:*:*:*:*"
] | null | null | 6.7 | 7.2 |
|
CVE-2018-13597 | The mintToken function of a smart contract implementation for testcoin, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value. | [
"cpe:2.3:a:testcoin_project:testcoin:-:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
CVE-2008-1226 | Multiple cross-site scripting (XSS) vulnerabilities in Zimbra Collaboration Suite (ZCS) 4.0.3, 4.5.6, and possibly other versions before 4.5.10 allow remote attackers to inject arbitrary web script or HTML via an e-mail attachment, possibly involving a (1) .jpg or (2) .gif image attachment. | [
"cpe:2.3:a:zimbra:collaboration_suite:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration_suite:4.5.6:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2021-33676 | A missing authority check in SAP CRM, versions - 700, 701, 702, 712, 713, 714, could be leveraged by an attacker with high privileges to compromise confidentiality, integrity, or availability of the system. | [
"cpe:2.3:a:sap:customer_relationship_management:700:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:customer_relationship_management:701:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:customer_relationship_management:702:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:customer_relationship_management:712:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:customer_relationship_management:713:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:customer_relationship_management:714:*:*:*:*:*:*:*"
] | null | null | 6.8 | null |
|
GHSA-p9qg-6v6v-2g47 | zhimengzhe iBarn v1.5 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the $search parameter at /pay.php. | [] | null | 6.3 | null | null |
|
GHSA-2mg7-924f-g32v | The srtp_add_address function in epan/dissectors/packet-rtp.c in the RTP dissector in Wireshark 1.10.x before 1.10.7 does not properly update SRTP conversation data, which allows remote attackers to cause a denial of service (application crash) via a crafted packet. | [] | null | null | null | null |
|
CVE-2018-10430 | An issue was discovered in DiliCMS (aka DiligentCMS) 2.4.0. There is a Stored XSS Vulnerability in the fourth textbox of "System setting->site setting" of admin/index.php. | [
"cpe:2.3:a:dilicms:dilicms:2.4.0:*:*:*:*:*:*:*"
] | null | null | 4.8 | 3.5 |
|
CVE-2019-8922 | A heap-based buffer overflow was discovered in bluetoothd in BlueZ through 5.48. There isn't any check on whether there is enough space in the destination buffer. The function simply appends all data passed to it. The values of all attributes that are requested are appended to the output buffer. There are no size checks whatsoever, resulting in a simple heap overflow if one can craft a request where the response is large enough to overflow the preallocated buffer. This issue exists in service_attr_req gets called by process_request (in sdpd-request.c), which also allocates the response buffer. | [
"cpe:2.3:a:bluez:bluez:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
] | null | 8.8 | null | 5.8 |
|
GHSA-p5fq-87jh-gjq8 | Information disclosure vulnerability in Verizon Fios Quantum Gateway (G1100) firmware version 02.01.00.05 allows an remote, unauthenticated attacker to retrieve the value of the password salt by simply requesting an API URL in a web browser (e.g. /api). | [] | null | null | 7.5 | null |
|
GHSA-jqhv-47hf-83hh | The TS Poll WordPress plugin before 2.4.0 does not sanitize and escape a parameter before using it in a SQL statement, allowing admins to perform SQL injection attacks | [] | null | 7.2 | null | null |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.