id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 38
232
⌀ |
---|---|---|---|---|---|---|---|---|
CVE-2025-25792
|
SeaCMS v13.3 was discovered to contain a remote code execution (RCE) vulnerability via the isopen parameter at admin_weixin.php.
|
[] | null | 4.4 | null | null | null |
|
GHSA-6f58-2f4p-jjcw
|
The BGP implementation in bgpd in Quagga before 0.99.20.1 does not properly use message buffers for OPEN messages, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a message associated with a malformed Four-octet AS Number Capability (aka AS4 capability).
|
[] | null | null | null | null | null |
|
CVE-2018-14326
|
In MP4v2 2.0.0, there is an integer overflow (with resultant memory corruption) when resizing MP4Array for the ftyp atom in mp4array.h.
|
[
"cpe:2.3:a:techsmith:mp4v2:2.0.0:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.8 | null |
|
CVE-2023-37989
|
WordPress Easyship WooCommerce Shipping Rates plugin <= 0.9.0 - Broken Access Control vulnerability
|
Missing Authorization vulnerability in Easyship Easyship WooCommerce Shipping Rates allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Easyship WooCommerce Shipping Rates: from n/a through 0.9.0.
|
[] | null | 5.4 | null | null | null |
GHSA-23mm-fp65-w636
|
Null pointer dereference in the Intel(R) VROC software before version 7.7.6.1003 may allow an authenticated user to potentially enable escalation of privilege via local access.
|
[] | null | 6.3 | null | null | null |
|
CVE-2024-2019
|
WP-DB-Table-Editor <= 1.8.4 - Missing Authorization to Authenticated(Contributor+) Database Access
|
The WP-DB-Table-Editor plugin for WordPress is vulnerable to unauthorized access of data, modification of data, and loss of data due to lack of a default capability requirement on the 'dbte_render' function in all versions up to, and including, 1.8.4. This makes it possible for authenticated attackers, with contributor access and above, to modify database tables that the theme has been configured to use the plugin to edit.
|
[
"cpe:2.3:a:acceleration:wp-db-table-editor:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
GHSA-8r2c-r3r4-4hcp
|
In the GNU C Library (aka glibc or libc6) through 2.28, the getaddrinfo function would successfully parse a string that contained an IPv4 address followed by whitespace and arbitrary characters, which could lead applications to incorrectly assume that it had parsed a valid string, without the possibility of embedded HTTP headers or other potentially dangerous substrings.
|
[] | null | null | 5.3 | null | null |
|
CVE-2014-4213
|
Unspecified vulnerability in the Oracle Applications Manager component in Oracle E-Business Suite 12.0.6, 12.1.3, 12.2.2, and 12.2.3 allows remote attackers to affect integrity via unknown vectors.
|
[
"cpe:2.3:a:oracle:e-business_suite:12.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:e-business_suite:12.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:e-business_suite:12.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:e-business_suite:12.2.3:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-7gcv-jcm7-qcc8
|
H3C GR-1200W MiniGRW1A0V100R006 was discovered to contain a stack overflow via the function UpdateDDNS.
|
[] | null | 9.8 | null | null | null |
|
GHSA-f2hg-7qhr-2xhq
|
Vulnerability in a script in Texas A&M University (TAMU) Tiger allows local users to execute arbitrary commands as the Tiger user, usually root.
|
[] | null | null | null | null | null |
|
CVE-2024-37987
|
Secure Boot Security Feature Bypass Vulnerability
|
Secure Boot Security Feature Bypass Vulnerability
|
[
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_23h2:*:*:*:*:*:*:*:*"
] | null | 8 | null | null | null |
CVE-2014-2928
|
The iControl API in F5 BIG-IP LTM, APM, ASM, GTM, Link Controller, and PSM 10.0.0 through 10.2.4 and 11.0.0 through 11.5.1, BIG-IP AAM 11.4.0 through 11.5.1, BIG-IP AFM and PEM 11.3.0 through 11.5.1, BIG-IP Analytics 11.0.0 through 11.5.1, BIG-IP Edge Gateway, WebAccelerator, WOM 10.1.0 through 10.2.4 and 11.0.0 through 11.3.0, Enterprise Manager 2.1.0 through 2.3.0 and 3.0.0 through 3.1.1, and BIG-IQ Cloud, Device, and Security 4.0.0 through 4.3.0 allows remote administrators to execute arbitrary commands via shell metacharacters in the hostname element in a SOAP request.
|
[
"cpe:2.3:a:f5:big-ip_webaccelerator:9.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_webaccelerator:9.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_webaccelerator:9.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_webaccelerator:9.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_webaccelerator:9.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_webaccelerator:9.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_webaccelerator:9.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_webaccelerator:9.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_webaccelerator:9.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_webaccelerator:10.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_webaccelerator:10.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_webaccelerator:10.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_webaccelerator:10.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_webaccelerator:10.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_webaccelerator:10.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_webaccelerator:10.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_webaccelerator:10.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_webaccelerator:11.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_webaccelerator:11.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_webaccelerator:11.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_webaccelerator:11.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_webaccelerator:11.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_local_traffic_manager:10.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_local_traffic_manager:10.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_local_traffic_manager:10.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_local_traffic_manager:10.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_local_traffic_manager:10.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_local_traffic_manager:10.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_local_traffic_manager:11.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_protocol_security_module:9.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_protocol_security_module:9.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_protocol_security_module:9.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_protocol_security_module:9.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_protocol_security_module:10.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_protocol_security_module:10.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_protocol_security_module:10.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_protocol_security_module:10.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_protocol_security_module:10.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_protocol_security_module:10.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_protocol_security_module:10.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_protocol_security_module:10.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_protocol_security_module:11.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_protocol_security_module:11.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_protocol_security_module:11.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_protocol_security_module:11.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_protocol_security_module:11.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_protocol_security_module:11.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_protocol_security_module:11.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_link_controller:10.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_link_controller:10.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_link_controller:10.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_link_controller:10.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_link_controller:10.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_link_controller:10.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_link_controller:11.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:10.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:10.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:10.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:10.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:10.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:10.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:11.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_global_traffic_manager:10.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_global_traffic_manager:10.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_global_traffic_manager:10.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_global_traffic_manager:10.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_global_traffic_manager:10.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_global_traffic_manager:10.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_global_traffic_manager:11.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_wan_optimization_manager:10.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_wan_optimization_manager:10.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_wan_optimization_manager:10.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_wan_optimization_manager:10.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_wan_optimization_manager:10.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_wan_optimization_manager:10.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_wan_optimization_manager:11.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_access_policy_manager:10.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_access_policy_manager:10.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_access_policy_manager:10.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_access_policy_manager:10.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_access_policy_manager:11.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_edge_gateway:10.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_edge_gateway:10.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_edge_gateway:10.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_edge_gateway:10.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_edge_gateway:11.0.0:*:*:*:*:*:*:*"
] | null | null | null | 7.1 | null |
|
RHSA-2025:1331
|
Red Hat Security Advisory: Gatekeeper v3.17.1
|
golang.org/x/crypto/ssh: Misuse of ServerConfig.PublicKeyCallback may cause authorization bypass in golang.org/x/crypto golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html
|
[
"cpe:/a:redhat:gatekeeper:3.17::el9"
] | null | 7.5 | null | null | null |
CVE-2022-35264
|
A denial of service vulnerability exists in the web_server hashFirst functionality of Robustel R1510 3.1.16 and 3.3.0. A specially-crafted network request can lead to denial of service. An attacker can send a sequence of requests to trigger this vulnerability.This denial of service is in the `/action/import_aaa_cert_file/` API.
|
[
"cpe:2.3:o:robustel:r1510_firmware:3.1.16:*:*:*:*:*:*:*",
"cpe:2.3:o:robustel:r1510_firmware:3.3.0:*:*:*:*:*:*:*",
"cpe:2.3:h:robustel:r1510:-:*:*:*:*:*:*:*"
] | null | null | 4.9 | null | null |
|
CVE-2024-1252
|
Tongda OA 2017 delete.php sql injection
|
A vulnerability classified as critical was found in Tongda OA 2017 up to 11.9. Affected by this vulnerability is an unknown functionality of the file /general/attendance/manage/ask_duty/delete.php. The manipulation of the argument ASK_DUTY_ID leads to sql injection. The exploit has been disclosed to the public and may be used. Upgrading to version 11.10 is able to address this issue. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-252991.
|
[
"cpe:2.3:a:tongda2000:tongda_office_anywhere:*:*:*:*:*:*:*:*"
] | null | 5.5 | 5.5 | 5.2 | null |
GHSA-8gc3-xq83-phww
|
A misconfiguration in the Service Mode profile directory of Clash for Windows v0.19.9 allows attackers to escalate privileges and execute arbitrary commands when Service Mode is activated.
|
[] | null | 7.8 | null | null | null |
|
CVE-2007-4747
|
The telnet service in Cisco Video Surveillance IP Gateway Encoder/Decoder (Standalone and Module) firmware 1.8.1 and earlier, Video Surveillance SP/ISP Decoder Software firmware 1.11.0 and earlier, and the Video Surveillance SP/ISP firmware 1.23.7 and earlier does not require authentication, which allows remote attackers to perform administrative actions, aka CSCsj31729.
|
[
"cpe:2.3:a:cisco:video_surveillance_ip_gateway_encoder_decoder:*:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:video_surveillance_sp_isp_decoder_software:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:video_surveillance_sp_isp:*:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
CVE-2015-5406
|
HP CentralView Fraud Risk Management 11.1, 11.2, and 11.3; CentralView Revenue Leakage Control 4.1, 4.2, and 4.3; CentralView Dealer Performance Audit 2.0 and 2.1; CentralView Credit Risk Control 2.1, 2.2, and 2.3; CentralView Roaming Fraud Control 2.1, 2.2, and 2.3; and CentralView Subscription Fraud Prevention 2.0 and 2.1 allow remote attackers to obtain sensitive information via unspecified vectors, a different vulnerability than CVE-2015-5407 and CVE-2015-5408.
|
[
"cpe:2.3:a:hp:centralview_revenue_leakage_control:4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:centralview_revenue_leakage_control:4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:centralview_revenue_leakage_control:4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:centralview_credit_risk_control:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:centralview_credit_risk_control:2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:centralview_credit_risk_control:2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:centralview_subscription_fraud_prevention:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:centralview_subscription_fraud_prevention:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:centralview_dealer_performance_audit:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:centralview_dealer_performance_audit:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:centralview_roaming_fraud_control:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:centralview_roaming_fraud_control:2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:centralview_roaming_fraud_control:2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:centralview_fraud_risk_management:11.1:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:centralview_fraud_risk_management:11.2:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:centralview_fraud_risk_management:11.3:*:*:*:*:*:*:*"
] | null | null | null | 9 | null |
|
RHSA-2022:5664
|
Red Hat Security Advisory: OpenShift Container Platform 4.10.24 bug fix and security update
|
openshift: oauth-serving-cert configmap contains cluster certificate private key
|
[
"cpe:/a:redhat:openshift:4.10::el8"
] | null | 7.7 | null | null | null |
CVE-2024-40626
|
Stored Cross-site Scripting (XSS) vulnerability in Outline editor
|
Outline is an open source, collaborative document editor. A type confusion issue was found in ProseMirror’s rendering process that leads to a Stored Cross-Site Scripting (XSS) vulnerability in Outline. An authenticated user can create a document containing a malicious JavaScript payload. When other users view this document, the malicious Javascript can execute in the origin of Outline. Outline includes CSP rules to prevent third-party code execution, however in the case of self-hosting and having your file storage on the same domain as Outline a malicious payload can be uploaded as a file attachment and bypass those CSP restrictions. This issue has been addressed in release version 0.77.3. Users are advised to upgrade. There are no known workarounds for this vulnerability.
|
[
"cpe:2.3:a:getoutline:outline:*:*:*:*:*:*:*:*"
] | null | 7.3 | null | null | null |
ICSA-25-135-01
|
Siemens RUGGEDCOM APE1808 Devices
|
An insufficiently protected credentials vulnerability in FortiOS may allow a privileged authenticated attacker to retrieve LDAP credentials via modifying the LDAP server IP address in the FortiOS configuration to point to a malicious attacker-controlled server. An Insufficient Session Expiration vulnerability [CWE-613] in FortiOS SSL-VPN version 7.6.0, version 7.4.6 and below, version 7.2.10 and below, 7.0 all versions, 6.4 all versions may allow an attacker in possession of a cookie used to log in the SSL-VPN portal to log in again, although the session has expired or was logged out. A out-of-bounds write in Fortinet FortiOS versions 7.6.0, 7.4.0 through 7.4.6, 7.2.0 through 7.2.10, 7.0.0 through 7.0.16, 6.4.0 through 6.4.15 allows attacker to trigger a denial of service via specially crafted packets. An Improperly Implemented Security Check for Standard vulnerability [CWE-358] in FortiOS version 7.6.0, version 7.4.7 and below, 7.0 all versions, 6.4 all versions and FortiProxy version 7.6.1 and below, version 7.4.8 and below, 7.2 all versions, 7.0 all versions may allow a remote unauthenticated user to bypass the DNS filter via Apple devices. An Authentication Bypass Using an Alternate Path or Channel vulnerability in FortiOS and FortiProxy may allow an authenticated attacker to elevate their privileges via triggering a malicious Webhook action in the Automation Stitch component. An Improper Certificate Validation vulnerability [CWE-295] in FortiOS version 7.6.1 and below, version 7.4.7 and below may allow an EAP verified remote user to connect from FortiClient via revoked certificate. An Exposure of Sensitive Information to an Unauthorized Actor vulnerability [CWE-200] in FortiOS version 7.6.0, version 7.4.7 and below, 7.2 all versions, 7.0 all versions, 6.4 all versions SSL-VPN web-mode may allow an authenticated user to access full SSL-VPN settings via crafted URL.
|
[] | null | 4.3 | null | null | null |
GHSA-hhf3-3r37-7hf8
|
In addProviderRequestListener of LocationManagerService.java, there is a possible way to learn which packages request location information due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12 Android-12LAndroid ID: A-222473855
|
[] | null | 5.5 | null | null | null |
|
CVE-2018-18327
|
A KERedirect Untrusted Pointer Dereference Privilege Escalation vulnerability in Trend Micro Antivirus for Mac (Consumer) 7.0 (2017) and above could allow a local attacker to escalate privileges on vulnerable installations. The issue results from the lack of proper validation function on 0x6eDC offset user-supplied buffer. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
|
[
"cpe:2.3:a:trendmicro:antivirus_for_mac_2017:*:*:*:*:*:*:*:*",
"cpe:2.3:a:trendmicro:antivirus_for_mac_2018:*:*:*:*:*:*:*:*",
"cpe:2.3:a:trendmicro:antivirus_for_mac_2019:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | 7.2 | null |
|
CVE-2022-49185
|
pinctrl: nomadik: Add missing of_node_put() in nmk_pinctrl_probe
|
In the Linux kernel, the following vulnerability has been resolved:
pinctrl: nomadik: Add missing of_node_put() in nmk_pinctrl_probe
This node pointer is returned by of_parse_phandle() with refcount
incremented in this function. Calling of_node_put() to avoid
the refcount leak.
|
[] | null | 5.5 | null | null | null |
CVE-2021-45231
|
A link following privilege escalation vulnerability in Trend Micro Apex One (on-prem and SaaS) and Trend Micro Worry-Free Business Security (10.0 SP1 and Services) could allow a local attacker to create a specially crafted file with arbitrary content which could grant local privilege escalation on the affected system. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
|
[
"cpe:2.3:a:trendmicro:apex_one:2019:*:*:*:-:*:*:*",
"cpe:2.3:a:trendmicro:apex_one:2019:*:*:*:saas:*:*:*",
"cpe:2.3:a:trendmicro:worry-free_business_security:10.0:sp1:*:*:*:*:*:*",
"cpe:2.3:a:trendmicro:worry-free_business_security_services:-:*:*:*:saas:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | 7.2 | null |
|
CVE-2022-26143
|
The TP-240 (aka tp240dvr) component in Mitel MiCollab before 9.4 SP1 FP1 and MiVoice Business Express through 8.1 allows remote attackers to obtain sensitive information and cause a denial of service (performance degradation and excessive outbound traffic). This was exploited in the wild in February and March 2022 for the TP240PhoneHome DDoS attack.
|
[
"cpe:2.3:a:mitel:micollab:*:*:*:*:*:-:*:*",
"cpe:2.3:a:mitel:micollab:9.4:-:*:*:*:-:*:*",
"cpe:2.3:a:mitel:micollab:9.4:sp1:*:*:*:-:*:*",
"cpe:2.3:a:mitel:mivoice_business_express:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | 9 | null |
|
CVE-2018-11961
|
In all android releases(Android for MSM, Firefox OS for MSM, QRD Android) from CAF using the linux kernel, Possibility of accessing out of bound vector index When updating some GNSS configurations.
|
[
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] | null | null | 7.8 | 7.2 | null |
|
CVE-2015-3420
|
The ssl-proxy-openssl.c function in Dovecot before 2.2.17, when SSLv3 is disabled, allow remote attackers to cause a denial of service (login process crash) via vectors related to handshake failures.
|
[
"cpe:2.3:a:dovecot:dovecot:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*"
] | null | null | 5.9 | 4.3 | null |
|
CVE-2024-11504
|
SQL Injection in Streamsoft Prestiż
|
Input from multiple fields in Streamsoft Prestiż is not sanitized properly, leading to an SQL injection vulnerability, which might be exploited by an authenticated remote attacker.
This issue was fixed in 18.1.376.37 version of the software.
|
[] | 8.6 | null | null | null | null |
GHSA-hc9c-hrj7-72p6
|
An issue was discovered in BTITeam XBTIT. PHP error logs are stored in an open directory (/include/logs) using predictable file names, which can lead to full path disclosure and leakage of sensitive data.
|
[] | null | null | 5.3 | null | null |
|
CVE-2023-3393
|
Code Injection in fossbilling/fossbilling
|
Code Injection in GitHub repository fossbilling/fossbilling prior to 0.5.1.
|
[
"cpe:2.3:a:fossbilling:fossbilling:*:*:*:*:*:*:*:*"
] | null | null | 8 | null | null |
CVE-2019-9702
|
Symantec Endpoint Encryption, prior to SEE 11.3.0, may be susceptible to a privilege escalation vulnerability, which is a type of issue that allows a user to gain elevated access to resources that are normally protected at lower access levels.
|
[
"cpe:2.3:a:symantec:endpoint_encryption:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | 4.6 | null |
|
CVE-2018-5823
|
In Qualcomm Android for MSM, Firefox OS for MSM, and QRD Android with all Android releases from CAF using the Linux kernel before security patch level 2018-04-05, improper buffer length validation in extscan hotlist event can lead to potential buffer overflow.
|
[
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] | null | null | 7.8 | 4.6 | null |
|
RHSA-2023:6420
|
Red Hat Security Advisory: grafana security and enhancement update
|
grafana: persistent xss in grafana core plugins grafana: plugin signature bypass grafana: data source and plugin proxy endpoints leaking authentication tokens to some destination plugins grafana: Data source and plugin proxy endpoints could leak the authentication cookie to some destination plugins grafana: email addresses and usernames cannot be trusted grafana: User enumeration via forget password grafana: Spoofing of the originalUrl parameter of snapshots golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests golang: net/http, net/textproto: denial of service from excessive memory allocation
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null | null |
GHSA-9r74-cmm5-qv85
|
The "OpenID Connect Relying Party and OAuth 2.0 Resource Server" (aka mod_auth_openidc) module before 2.1.6 for the Apache HTTP Server does not skip OIDC_CLAIM_ and OIDCAuthNHeader headers in an "AuthType oauth20" configuration, which allows remote attackers to bypass authentication via crafted HTTP traffic.
|
[] | null | null | 8.6 | null | null |
|
CVE-2013-6386
|
Drupal 6.x before 6.29 and 7.x before 7.24 uses the PHP mt_rand function to generate random numbers, which uses predictable seeds and allows remote attackers to predict security strings and bypass intended restrictions via a brute force attack.
|
[
"cpe:2.3:a:drupal:drupal:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:7.0:alpha1:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:7.0:alpha2:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:7.0:alpha3:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:7.0:alpha4:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:7.0:alpha5:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:7.0:alpha6:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:7.0:alpha7:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:7.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:7.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:7.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:7.0:dev:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:7.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:7.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:7.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:7.0:rc4:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:7.5:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:7.6:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:7.7:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:7.8:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:7.9:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:7.10:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:7.11:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:7.12:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:7.13:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:7.14:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:7.15:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:7.16:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:7.17:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:7.18:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:7.19:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:7.20:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:7.21:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:7.22:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:7.23:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:7.x-dev:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:6.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:6.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:6.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:6.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:6.0:dev:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:6.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:6.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:6.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:6.0:rc4:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:6.7:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:6.8:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:6.9:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:6.10:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:6.11:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:6.12:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:6.13:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:6.14:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:6.15:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:6.16:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:6.17:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:6.18:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:6.19:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:6.20:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:6.21:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:6.22:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:6.23:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:6.24:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:6.25:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:6.26:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:6.27:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:6.28:*:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
CVE-2017-13789
|
An issue was discovered in certain Apple products. Safari before 11.0.1 is affected. The issue involves the "Safari" component. It allows remote attackers to spoof the address bar via a crafted web site.
|
[
"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*"
] | null | null | 6.5 | 4.3 | null |
|
GHSA-3rp6-rjw4-cq39
|
Cross-origin Resource Sharing bypass in ASP.NET Core
|
ASP.NET Core 1.0, 1.1, and 2.0 allow an attacker to bypass Cross-origin Resource Sharing (CORS) configurations and retrieve normally restricted content from a web application, aka "ASP.NET Core Information Disclosure Vulnerability".
|
[] | null | null | 7.5 | null | null |
GHSA-28cq-rjgp-gc9m
|
GleamTech FileVista before 6.1 allows remote authenticated users to create arbitrary files and possibly execute arbitrary code via a crafted path in a zip archive, which is not properly handled during extraction.
|
[] | null | null | null | null | null |
|
GHSA-r66j-9v9r-h3h9
|
The Product Enquiry for WooCommerce WordPress plugin before 3.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
|
[] | null | 4.8 | null | null | null |
|
RHSA-2017:3124
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.0 security update
|
Solr: Code execution via entity expansion
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7"
] | null | null | 9.8 | null | null |
GHSA-g3fq-pgcr-r7w6
|
The idnsGrokReply function in Squid before 3.1.16 does not properly free memory, which allows remote attackers to cause a denial of service (daemon abort) via a DNS reply containing a CNAME record that references another CNAME record that contains an empty A record.
|
[] | null | null | null | null | null |
|
GHSA-474h-vp2m-gmq9
|
Unspecified vulnerability in Oracle Sun Solaris 11.2 allows local users to affect confidentiality, integrity, and availability via vectors related to ZFS File system.
|
[] | null | null | null | null | null |
|
GHSA-mc32-mvw8-hcj8
|
Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE 7 update 4 and earlier and 6 update 32 and earlier, and the GlassFish Enterprise Server component in Oracle Sun Products Suite GlassFish Enterprise Server 3.1.1, allows remote attackers to affect confidentiality and integrity via unknown vectors related to Web Container or Deployment.
|
[] | null | null | null | null | null |
|
GHSA-hjg8-pr7m-gj33
|
uev (aka libuev) before 2.4.1 has a buffer overflow in epoll_wait if maxevents is a large number.
|
[] | null | 9.8 | null | null | null |
|
GHSA-q58c-x76h-3jhc
|
A flaw was found in, ghostscript versions prior to 9.28, in the .pdf_hook_DSC_Creator procedure where it did not properly secure its privileged calls, enabling scripts to bypass `-dSAFER` restrictions. A specially crafted PostScript file could disable security protection and then have access to the file system, or execute arbitrary commands.
|
[] | null | 7.8 | null | null | null |
|
CVE-2025-8499
|
code-projects Online Medicine Guide cusfindambulence2.php sql injection
|
A vulnerability was found in code-projects Online Medicine Guide 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /cusfindambulence2.php. The manipulation of the argument Search leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
|
[] | 6.9 | 7.3 | 7.3 | 7.5 | null |
GHSA-v435-cx7h-xxqw
|
The ImageInputType::ensurePrimaryContent function in WebKit/Source/core/html/forms/ImageInputType.cpp in Blink, as used in Google Chrome before 49.0.2623.87, does not properly maintain the user agent shadow DOM, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that leverage "type confusion."
|
[] | null | null | 8.8 | null | null |
|
CVE-2010-4083
|
The copy_semid_to_user function in ipc/sem.c in the Linux kernel before 2.6.36 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via a (1) IPC_INFO, (2) SEM_INFO, (3) IPC_STAT, or (4) SEM_STAT command in a semctl system call.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*"
] | null | null | null | 1.9 | null |
|
CVE-2015-2672
|
The xsave/xrstor implementation in arch/x86/include/asm/xsave.h in the Linux kernel before 3.19.2 creates certain .altinstr_replacement pointers and consequently does not provide any protection against instruction faulting, which allows local users to cause a denial of service (panic) by triggering a fault, as demonstrated by an unaligned memory operand or a non-canonical address memory operand.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | null | 5.5 | 4.9 | null |
|
CVE-2016-5967
|
The installation component in IBM Rational Asset Analyzer (RAA) 6.1.0 before FP10 allows local users to discover the WAS Admin password by reading IM native logs.
|
[
"cpe:2.3:a:ibm:rational_asset_analyzer:6.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_asset_analyzer:6.1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_asset_analyzer:6.1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_asset_analyzer:6.1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_asset_analyzer:6.1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_asset_analyzer:6.1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_asset_analyzer:6.1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_asset_analyzer:6.1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_asset_analyzer:6.1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_asset_analyzer:6.1.0.9:*:*:*:*:*:*:*"
] | null | null | 5.5 | 2.1 | null |
|
GHSA-j33x-h3g2-cj67
|
Directory traversal vulnerability in help/index.php in X7 Chat 2.0 and earlier allows remote attackers to include arbitrary files via .. (dot dot) sequences in the help_file parameter.
|
[] | null | null | null | null | null |
|
CVE-2023-29950
|
swfrender v0.9.2 was discovered to contain a heap buffer overflow in the function enumerateUsedIDs_fillstyle at modules/swftools.c
|
[
"cpe:2.3:a:swftools:swftools:0.9.2:*:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
|
GHSA-7mp7-9qpg-63p9
|
An issue was discovered in LibSass through 3.5.4. An out-of-bounds read of a memory region was found in the function Sass::Prelexer::exactly() which could be leveraged by an attacker to disclose information or manipulated to read from unmapped memory causing a denial of service.
|
[] | null | null | 8.1 | null | null |
|
GHSA-xcj4-xfx8-7jqq
|
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Justin Saad Simple Tooltips plugin <= 2.1.4 versions.
|
[] | null | 5.9 | null | null | null |
|
CVE-2021-32528
|
QSAN Storage Manager - Exposure of Sensitive Information to an Unauthorized Actor
|
Observable behavioral discrepancy vulnerability in QSAN Storage Manager allows remote attackers to obtain the system information without permissions. Suggest contacting with QSAN and refer to recommendations in QSAN Document.
|
[
"cpe:2.3:a:qsan:storage_manager:*:*:*:*:*:*:*:*"
] | null | 5.3 | null | null | null |
GHSA-xv6v-72hh-g6g2
|
Moderate severity vulnerability that affects org.owasp.antisamy:antisamy
|
OWASP OWASP ANTISAMY version 1.5.7 and earlier contains a Cross Site Scripting (XSS) vulnerability in AntiSamy.scan() - for both SAX & DOM that can result in Cross Site Scripting.
|
[] | null | null | null | null | null |
CVE-2017-4925
|
VMware ESXi 6.5 without patch ESXi650-201707101-SG, ESXi 6.0 without patch ESXi600-201706101-SG, ESXi 5.5 without patch ESXi550-201709101-SG, Workstation (12.x before 12.5.3), Fusion (8.x before 8.5.4) contain a NULL pointer dereference vulnerability. This issue occurs when handling guest RPC requests. Successful exploitation of this issue may allow attackers with normal user privileges to crash their VMs.
|
[
"cpe:2.3:o:vmware:esxi:5.5:-:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5:1:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5:2:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5:3a:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5:3b:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5:550-20170901001s:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:-:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:1:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:1a:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:1b:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:2:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:3:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:3a:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201504401:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201505401:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201507101:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201507102:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201507401:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201507402:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201507403:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201507404:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201507405:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201507406:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201507407:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201509101:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201509102:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201509201:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201509202:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201509203:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201509204:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201509205:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201509206:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201509207:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201509208:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201509209:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201509210:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201510401:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201511401:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201601101:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201601102:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201601401:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201601402:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201601403:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201601404:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201601405:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201602401:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201603101:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201603102:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201603201:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201603202:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201603203:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201603204:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201603205:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201603206:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201603207:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201603208:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201605401:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201608101:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201608401:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201608402:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201608403:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201608404:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201608405:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201610410:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201611401:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201611402:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201611403:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201702101:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201702102:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201702201:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201702202:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201702203:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201702204:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201702205:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201702206:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201702207:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201702208:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201702209:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201702210:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201702211:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201702212:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201703401:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:-:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201701001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201703001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201703002:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201704001:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workstation_pro:*:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*"
] | null | 5.5 | null | 2.1 | null |
|
GHSA-9464-hjjc-4v8w
|
A reflected Cross-site Scripting (XSS) vulnerability in 3DEXPERIENCE R2018x through R2023x allows an attacker to execute arbitrary script code.
|
[] | null | 6.1 | null | null | null |
|
CVE-2020-24511
|
Improper isolation of shared resources in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
|
[
"cpe:2.3:o:intel:microcode:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:fas\\/aff_bios:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:hci_compute_node_bios:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:solidfire_bios:-:*:*:*:*:*:*:*"
] | null | 6.5 | null | 2.1 | null |
|
GHSA-vxfx-x8fg-rmj4
|
In RPCMS v1.8 and below, the "nickname" variable is not properly sanitized before being displayed on page. When the API functions are enabled, the attacker can use API to update user nickname with XSS payload and achieve stored XSS. Users who view the articles published by the injected user will trigger the XSS.
|
[] | null | null | null | null | null |
|
GHSA-g3r7-6q5w-hfwj
|
MERAK Mail Server 8.2.4r with Icewarp Web Mail 5.5.1, and possibly earlier versions, allows remote attackers to obtain sensitive information via a direct request to bwlist_inc.html, which reveals the path in an error message.
|
[] | null | null | null | null | null |
|
GHSA-3xqp-cq53-77h7
|
Advantech WebAccess HMI Designer, Versions 2.1.9.31 and prior. Processing specially crafted project files lacking proper validation of user supplied data may cause a type confusion condition, which may allow remote code execution, disclosure/modification of information, or cause the application to crash.
|
[] | null | 7.8 | null | null | null |
|
CVE-2023-25934
|
DELL ECS prior to 3.8.0.2 contains an improper verification of cryptographic signature vulnerability. A network attacker with an ability to intercept the request could potentially exploit this vulnerability to modify the body data of the request.
|
[
"cpe:2.3:a:dell:elastic_cloud_storage:*:*:*:*:*:*:*:*"
] | null | 5.9 | null | null | null |
|
CVE-2017-10155
|
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Pluggable Auth). Supported versions that are affected are 5.6.37 and earlier and 5.7.19 and earlier. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
|
[
"cpe:2.3:a:oracle:mysql:5.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.6.7:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.6.8:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.6.9:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.6.10:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.6.11:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.6.12:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.6.13:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.6.14:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.6.15:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.6.16:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.6.17:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.6.21:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.6.22:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.6.23:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.6.26:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.6.27:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.6.28:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.6.29:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.6.30:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.6.31:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.6.32:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.6.33:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.6.34:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.6.35:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.6.36:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.6.37:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.7.5:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.7.6:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.7.7:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.7.8:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.7.9:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.7.10:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.7.11:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.7.12:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.7.13:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.7.14:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.7.15:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.7.16:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.7.17:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.7.18:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.7.19:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 | null |
|
GHSA-6jhh-vw54-9x76
|
Buffer overflow in X.org libXvMC 1.0.7 and earlier allows X servers to cause a denial of service (crash) and possibly execute arbitrary code via crafted length or index values to the XvMCGetDRInfo function.
|
[] | null | null | null | null | null |
|
CVE-2019-7921
|
A stored cross-site scripting vulnerability exists in the product catalog form of Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2. This could be exploited by an authenticated user with privileges to the product catalog to inject malicious javascript.
|
[
"cpe:2.3:a:magento:magento:*:*:*:*:open_source:*:*:*"
] | null | null | 5.4 | 3.5 | null |
|
CVE-2018-8607
|
A cross site scripting vulnerability exists when Microsoft Dynamics 365 (on-premises) version 8 does not properly sanitize a specially crafted web request to an affected Dynamics server, aka "Microsoft Dynamics 365 (on-premises) version 8 Cross Site Scripting Vulnerability." This affects Microsoft Dynamics 365. This CVE ID is unique from CVE-2018-8605, CVE-2018-8606, CVE-2018-8608.
|
[
"cpe:2.3:a:microsoft:dynamics_365:*:*:*:*:*:*:*:*"
] | null | null | 5.4 | 3.5 | null |
|
CVE-2017-2382
|
An issue was discovered in certain Apple products. macOS Server before 5.3 is affected. The issue involves the "Wiki Server" component. It allows remote attackers to enumerate user accounts via unspecified vectors.
|
[
"cpe:2.3:o:apple:mac_os_server:*:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 | null |
|
GHSA-gwq7-2mvv-mhcq
|
In multiple locations, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
|
[] | null | 7.8 | null | null | null |
|
CVE-2021-44036
|
Team Password Manager (aka TeamPasswordManager) before 10.135.236 has a CSRF vulnerability during import.
|
[
"cpe:2.3:a:teampasswordmanager:team_password_manager:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.8 | null |
|
CVE-2023-20837
|
In seninf, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07992786; Issue ID: ALPS07992786.
|
[
"cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*"
] | null | 6.7 | null | null | null |
|
RHSA-2022:6714
|
Red Hat Security Advisory: RHACS 3.72 enhancement and security update
|
golang: encoding/pem: fix stack overflow in Decode golang: regexp: stack exhaustion via a deeply nested expression golang: crypto/elliptic: panic caused by oversized scalar golang: syscall: faccessat checks wrong group golang: compress/gzip: stack exhaustion in Reader.Read
|
[
"cpe:/a:redhat:advanced_cluster_security:3.72::el8"
] | null | 7.5 | null | null | null |
GHSA-rh4q-6p8f-jm89
|
A remote code execution vulnerability in Mediaserver could enable an attacker using a specially crafted file to cause memory corruption during media file and data processing. This issue is rated as Critical due to the possibility of remote code execution within the context of the Mediaserver process. Product: Android. Versions: 6.0, 6.0.1, 7.0, 7.1.1. Android ID: A-33351708.
|
[] | null | null | 7.8 | null | null |
|
CVE-2024-21401
|
Microsoft Entra Jira Single-Sign-On Plugin Elevation of Privilege Vulnerability
|
Microsoft Entra Jira Single-Sign-On Plugin Elevation of Privilege Vulnerability
|
[
"cpe:2.3:a:microsoft:entra_jira_sso_plugin:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
RHSA-2020:3574
|
Red Hat Security Advisory: CloudForms 4.7.16 security, bug fix and enhancement update
|
CloudForms: Business logic bypass through widgets CloudForms: Missing access control leads to escalation of admin group privileges CloudForms: Out-of-band OS Command Injection through conversion host CloudForms: User Impersonation in the API for OIDC and SAML
|
[
"cpe:/a:redhat:cloudforms_managementengine:5.10::el7"
] | null | 9.9 | null | null | null |
CVE-2025-28927
|
WordPress Display Template Name plugin <= 1.7.1 - Cross Site Request Forgery (CSRF) vulnerability
|
Cross-Site Request Forgery (CSRF) vulnerability in A. Chappard Display Template Name allows Cross Site Request Forgery. This issue affects Display Template Name: from n/a through 1.7.1.
|
[] | null | 4.3 | null | null | null |
CVE-2019-8747
|
A memory corruption vulnerability was addressed with improved locking. This issue is fixed in watchOS 6.1. An application may be able to execute arbitrary code with kernel privileges.
|
[
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | 9.3 | null |
|
GHSA-9pp6-7chj-q7jg
|
Microsoft Publisher 2003 SP3 does not properly validate the size of an unspecified array, which allows remote attackers to execute arbitrary code via a crafted Publisher file, aka "Publisher Negative Value Allocation Vulnerability."
|
[] | null | null | null | null | null |
|
GHSA-2g66-93q3-jx9r
|
Directory Service in Apple Mac OS X through 10.6.8 allows remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via a crafted message.
|
[] | null | null | null | null | null |
|
GHSA-3j4m-97f8-qmph
|
Cross-site scripting (XSS) vulnerability in the table feature in PmWiki 2.2.15 allows remote authenticated users to inject arbitrary web script or HTML via the width attribute.
|
[] | null | null | null | null | null |
|
CVE-2020-15478
|
The Journal theme before 3.1.0 for OpenCart allows exposure of sensitive data via SQL errors.
|
[
"cpe:2.3:a:journal-theme:journal:*:*:*:*:*:opencart:*:*"
] | null | 7.5 | null | 5 | null |
|
CVE-2018-18776
|
Microstrategy Web, version 7, does not sufficiently encode user-controlled inputs, resulting in a Cross-Site Scripting (XSS) vulnerability via the admin/admin.asp ShowAll parameter. NOTE: this is a deprecated product.
|
[
"cpe:2.3:a:microstrategy:microstrategy_web:7:*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 | null |
|
CVE-2018-21270
|
Versions less than 0.0.6 of the Node.js stringstream module are vulnerable to an out-of-bounds read because of allocation of uninitialized buffers when a number is passed in the input stream (when using Node.js 4.x).
|
[
"cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*"
] | null | 6.5 | null | 5.8 | null |
|
CVE-2025-4443
|
D-Link DIR-605L sub_454F2C command injection
|
A vulnerability was found in D-Link DIR-605L 2.13B01. It has been rated as critical. This issue affects the function sub_454F2C. The manipulation of the argument sysCmd leads to command injection. The attack may be initiated remotely. The vendor was contacted early about this disclosure. This vulnerability only affects products that are no longer supported by the maintainer.
|
[] | 5.3 | 6.3 | 6.3 | 6.5 | null |
CVE-2008-6474
|
The management interface in F5 BIG-IP 9.4.3 allows remote authenticated users with Resource Manager privileges to inject arbitrary Perl code via unspecified configuration settings related to Perl EP3 with templates, probably triggering static code injection.
|
[
"cpe:2.3:o:f5:tmos:9.4.3:*:*:*:*:*:*:*"
] | null | null | null | 9 | null |
|
CVE-2016-1015
|
Adobe Flash Player before 18.0.0.343 and 19.x through 21.x before 21.0.0.213 on Windows and OS X and before 11.2.202.616 on Linux allows attackers to execute arbitrary code by overriding NetConnection object properties to leverage an unspecified "type confusion," a different vulnerability than CVE-2016-1019.
|
[
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player_desktop_runtime:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:esr:*:*:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:internet_explorer:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:chrome:*:*",
"cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:edge:*:*",
"cpe:2.3:a:adobe:air_desktop_runtime:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:-:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | 9.3 | null |
|
CVE-2018-18743
|
An XSS issue was discovered in SEMCMS 3.4 via the second text field to the admin/SEMCMS_Categories.php?pid=1&lgid=1 URI.
|
[
"cpe:2.3:a:sem-cms:semcms:3.4:*:*:*:*:*:*:*"
] | null | null | 4.8 | 3.5 | null |
|
CVE-2022-44518
|
Acrobat Reader | Use After Free (CWE-416)
|
Acrobat Reader DC version 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by a use-after-free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[] | null | 7.8 | null | null | null |
GHSA-7rjp-fgwj-47rw
|
Missing authentication in ShenYu
|
Missing authentication on ShenYu Admin when register by HTTP. This issue affected Apache ShenYu 2.4.0 and 2.4.1.
|
[] | null | 7.5 | null | null | null |
GHSA-c262-jhgm-qjp4
|
Vulnerability in the Oracle WebCenter Sites product of Oracle Fusion Middleware (component: Advanced UI). The supported version that is affected is 12.2.1.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebCenter Sites. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle WebCenter Sites, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle WebCenter Sites accessible data as well as unauthorized read access to a subset of Oracle WebCenter Sites accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).
|
[] | null | 6.1 | null | null | null |
|
CVE-2024-1880
|
OS Command Injection in MacOS Text-To-Speech Class in significant-gravitas/autogpt
|
An OS command injection vulnerability exists in the MacOS Text-To-Speech class MacOSTTS of the significant-gravitas/autogpt project, affecting versions up to v0.5.0. The vulnerability arises from the improper neutralization of special elements used in an OS command within the `_speech` method of the MacOSTTS class. Specifically, the use of `os.system` to execute the `say` command with user-supplied text allows for arbitrary code execution if an attacker can inject shell commands. This issue is triggered when the AutoGPT instance is run with the `--speak` option enabled and configured with `TEXT_TO_SPEECH_PROVIDER=macos`, reflecting back a shell injection snippet. The impact of this vulnerability is the potential execution of arbitrary code on the instance running AutoGPT. The issue was addressed in version 5.1.0.
|
[
"cpe:2.3:a:significant-gravitas:autogpt:*:*:*:*:*:*:*:*",
"cpe:2.3:a:agpt:autogpt:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | null | null |
CVE-2023-41532
|
Hospital Management System v4 was discovered to contain a SQL injection vulnerability via the doctor_contact parameter in doctorsearch.php.
|
[] | null | 8.8 | null | null | null |
|
CVE-2021-44743
|
Adobe Bridge JPEG2000 Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability
|
Adobe Bridge version 11.1.2 (and earlier) and version 12.0 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[
"cpe:2.3:a:adobe:bridge:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:bridge:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | null | 7.8 | null | null |
CVE-2023-21705
|
Microsoft SQL Server Remote Code Execution Vulnerability
|
Microsoft SQL Server Remote Code Execution Vulnerability
|
[
"cpe:2.3:a:microsoft:sql_server:2012:sp4:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sql_server:2014:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sql_server:2016:sp3:*:*:*:*:x64:*",
"cpe:2.3:a:microsoft:sql_server:2017:*:*:*:*:*:x64:*",
"cpe:2.3:a:microsoft:sql_server:2019:*:*:*:*:*:x64:*",
"cpe:2.3:a:microsoft:sql_server:2022:*:*:*:*:*:x64:*"
] | null | 8.8 | null | null | null |
GHSA-9vxj-q9qf-h6p2
|
An elevation of privilege vulnerability exists when DirectX improperly handles objects in memory, aka 'DirectX Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0784.
|
[] | null | null | null | null | null |
|
CVE-2015-5091
|
Adobe Reader and Acrobat 10.x before 10.1.15 and 11.x before 11.0.12, Acrobat and Acrobat Reader DC Classic before 2015.006.30060, and Acrobat and Acrobat Reader DC Continuous before 2015.008.20082 on Windows and OS X allow attackers to cause a denial of service via invalid data.
|
[
"cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | null | null | 7.8 | null |
|
CVE-2022-24939
|
Malformed Zigbee packet with invalid destination address causes Assert
|
A malformed packet containing an invalid destination address, causes a stack overflow in the Ember ZNet stack. This causes an assert which leads to a reset, immediately clearing the error.
|
[
"cpe:2.3:a:silabs:gecko_software_development_kit:-:*:*:*:*:*:*:*",
"cpe:2.3:a:silabs:zigbee_emberznet:-:*:*:*:*:*:*:*"
] | null | 5.7 | null | null | null |
GHSA-49mf-7m55-94wm
|
The (1) JSAFE and (2) JSSE APIs in EMC RSA BSAFE SSL-J 5.x before 5.1.3 and 6.x before 6.0.2 make it easier for remote attackers to bypass intended cryptographic protection mechanisms by triggering application-data processing during the TLS handshake, a time at which the data is both unencrypted and unauthenticated.
|
[] | null | null | null | null | null |
|
CVE-2021-34616
|
A remote arbitrary command execution vulnerability was discovered in Aruba ClearPass Policy Manager version(s): Prior to 6.10.0, 6.9.6 and 6.8.9. Aruba has released updates to ClearPass Policy Manager that address this security vulnerability.
|
[
"cpe:2.3:a:arubanetworks:clearpass_policy_manager:*:*:*:*:*:*:*:*"
] | null | 6.3 | null | 6.5 | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.