id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
PYSEC-2022-92 | null | Tensorflow is an Open Source Machine Learning Framework. A malicious user can cause a denial of service by altering a `SavedModel` such that any binary op would trigger `CHECK` failures. This occurs when the protobuf part corresponding to the tensor arguments is modified such that the `dtype` no longer matches the `dtype` expected by the op. In that case, calling the templated binary operator for the binary op would receive corrupted data, due to the type confusion involved. If `Tin` and `Tout` don't match the type of data in `out` and `input_*` tensors then `flat<*>` would interpret it wrongly. In most cases, this would be a silent failure, but we have noticed scenarios where this results in a `CHECK` crash, hence a denial of service. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range. | [] | null | null | null | null |
RHSA-2019:3673 | Red Hat Security Advisory: lldpad security and bug fix update | lldptool: improper sanitization of shell-escape codes | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | null | 4.3 | null |
GHSA-cpg7-wf7f-wc2r | The setgid wrapper libx2go-server-db-sqlite3-wrapper.c in X2Go Server before 4.0.0.2 allows remote attackers to execute arbitrary code via unspecified vectors, related to the path to libx2go-server-db-sqlite3-wrapper.pl. | [] | null | null | null | null |
|
CVE-2023-37962 | A cross-site request forgery (CSRF) vulnerability in Jenkins Benchmark Evaluator Plugin 1.0.1 and earlier allows attackers to connect to an attacker-specified URL and to check for the existence of directories, `.csv`, and `.ycsb` files on the Jenkins controller file system. | [
"cpe:2.3:a:jenkins:benchmark_evaluator:*:*:*:*:*:jenkins:*:*"
] | null | 8.8 | null | null |
|
CVE-2024-28089 | Hitron CODA-4582 2AHKM-CODA4589 7.2.4.5.1b8 devices allow a remote attacker within Wi-Fi proximity (who has access to the router admin panel) to conduct a DOM-based stored XSS attack that can fetch remote resources. The payload is executed at index.html#advanced_location (aka the Device Location page). This can cause a denial of service or lead to information disclosure. | [
"cpe:2.3:o:hitrontech:coda-4582u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:hitrontech:coda-4589_firmware:*:*:*:*:*:*:*:*"
] | null | 5.2 | null | null |
|
CVE-2010-3992 | Unspecified vulnerability in HP Insight Control Server Migration before 6.2 allows remote authenticated users to gain privileges via unknown vectors. | [
"cpe:2.3:a:hp:insight_control_server_migration:*:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:insight_control_server_migration:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:insight_control_server_migration:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:insight_control_server_migration:6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:insight_control_server_migration6.0.1:*:*:*:*:*:*:*:*"
] | null | null | null | 9 |
|
CVE-2009-4815 | Directory traversal vulnerability in Serv-U before 9.2.0.1 allows remote authenticated users to read arbitrary files via unspecified vectors. | [
"cpe:2.3:a:solarwinds:serv-u_file_server:3.0.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:solarwinds:serv-u_file_server:3.0.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:solarwinds:serv-u_file_server:3.1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:solarwinds:serv-u_file_server:3.1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:solarwinds:serv-u_file_server:3.1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:solarwinds:serv-u_file_server:4.0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:solarwinds:serv-u_file_server:4.1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:solarwinds:serv-u_file_server:4.1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:solarwinds:serv-u_file_server:5.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:solarwinds:serv-u_file_server:5.0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:solarwinds:serv-u_file_server:5.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:solarwinds:serv-u_file_server:5.0.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:solarwinds:serv-u_file_server:5.1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:solarwinds:serv-u_file_server:5.2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:solarwinds:serv-u_file_server:5.2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:solarwinds:serv-u_file_server:6.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:solarwinds:serv-u_file_server:6.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:solarwinds:serv-u_file_server:6.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:solarwinds:serv-u_file_server:6.1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:solarwinds:serv-u_file_server:6.1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:solarwinds:serv-u_file_server:6.1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:solarwinds:serv-u_file_server:6.1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:solarwinds:serv-u_file_server:6.2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:solarwinds:serv-u_file_server:6.2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:solarwinds:serv-u_file_server:6.3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:solarwinds:serv-u_file_server:6.3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:solarwinds:serv-u_file_server:6.4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:solarwinds:serv-u_file_server:6.4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:solarwinds:serv-u_file_server:6.4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:solarwinds:serv-u_file_server:6.4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:solarwinds:serv-u_file_server:6.4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:solarwinds:serv-u_file_server:6.4.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:solarwinds:serv-u_file_server:6.4.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:solarwinds:serv-u_file_server:7.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:solarwinds:serv-u_file_server:7.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:solarwinds:serv-u_file_server:7.0.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:solarwinds:serv-u_file_server:7.0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:solarwinds:serv-u_file_server:7.1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:solarwinds:serv-u_file_server:7.1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:solarwinds:serv-u_file_server:7.1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:solarwinds:serv-u_file_server:7.2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:solarwinds:serv-u_file_server:7.2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:solarwinds:serv-u_file_server:7.3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:solarwinds:serv-u_file_server:7.3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:solarwinds:serv-u_file_server:7.3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:solarwinds:serv-u_file_server:7.4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:solarwinds:serv-u_file_server:7.4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:solarwinds:serv-u_file_server:8.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:solarwinds:serv-u_file_server:8.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:solarwinds:serv-u_file_server:8.0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:solarwinds:serv-u_file_server:8.0.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:solarwinds:serv-u_file_server:8.0.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:solarwinds:serv-u_file_server:8.1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:solarwinds:serv-u_file_server:8.1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:solarwinds:serv-u_file_server:8.2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:solarwinds:serv-u_file_server:8.2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:solarwinds:serv-u_file_server:8.2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:solarwinds:serv-u_file_server:9.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:solarwinds:serv-u_file_server:9.0.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:solarwinds:serv-u_file_server:9.0.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:solarwinds:serv-u_file_server:9.1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:solarwinds:serv-u_file_server:9.1.0.2:*:*:*:*:*:*:*"
] | null | null | null | 4 |
|
CVE-2021-3314 | Oracle GlassFish Server 3.1.2.18 and below allows /common/logViewer/logViewer.jsf XSS. A malicious user can cause an administrator user to supply dangerous content to the vulnerable page, which is then reflected back to the user and executed by the web browser. The most common mechanism for delivering malicious content is to include it as a parameter in a URL that is posted publicly or e-mailed directly to victims. NOTE: This vulnerability only affects products that are no longer supported by the maintainer | [
"cpe:2.3:a:oracle:glassfish_server:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 |
|
CVE-2011-5213 | Multiple SQL injection vulnerabilities in BrowserCRM 5.100.01 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) login[username] parameter to index.php, (2) parent_id parameter to modules/Documents/version_list.php, or (3) contact_id parameter to modules/Documents/index.php. | [
"cpe:2.3:a:browsercrm:browsercrm:*:*:*:*:*:*:*:*",
"cpe:2.3:a:browsercrm:browsercrm:4.604.01:*:*:*:*:*:*:*",
"cpe:2.3:a:browsercrm:browsercrm:4.605.00:*:*:*:*:*:*:*",
"cpe:2.3:a:browsercrm:browsercrm:4.607.00:*:*:*:*:*:*:*",
"cpe:2.3:a:browsercrm:browsercrm:4.610.00:*:*:*:*:*:*:*",
"cpe:2.3:a:browsercrm:browsercrm:4.611.01:*:*:*:*:*:*:*",
"cpe:2.3:a:browsercrm:browsercrm:4.612.00:*:*:*:*:*:*:*",
"cpe:2.3:a:browsercrm:browsercrm:4.614.00:*:*:*:*:*:*:*",
"cpe:2.3:a:browsercrm:browsercrm:4.615.10:*:*:*:*:*:*:*",
"cpe:2.3:a:browsercrm:browsercrm:4.615.11:*:*:*:*:*:*:*",
"cpe:2.3:a:browsercrm:browsercrm:4.616.00:*:*:*:*:*:*:*",
"cpe:2.3:a:browsercrm:browsercrm:4.617.00:*:*:*:*:*:*:*",
"cpe:2.3:a:browsercrm:browsercrm:4.619.00:*:*:*:*:*:*:*",
"cpe:2.3:a:browsercrm:browsercrm:4.620.01:*:*:*:*:*:*:*",
"cpe:2.3:a:browsercrm:browsercrm:4.622.00:*:*:*:*:*:*:*",
"cpe:2.3:a:browsercrm:browsercrm:4.624.00:*:*:*:*:*:*:*",
"cpe:2.3:a:browsercrm:browsercrm:4.624.01:*:*:*:*:*:*:*",
"cpe:2.3:a:browsercrm:browsercrm:4.624.50:*:*:*:*:*:*:*",
"cpe:2.3:a:browsercrm:browsercrm:4.624.60:*:*:*:*:*:*:*",
"cpe:2.3:a:browsercrm:browsercrm:4.624.70:*:*:*:*:*:*:*",
"cpe:2.3:a:browsercrm:browsercrm:4.624.80:*:*:*:*:*:*:*",
"cpe:2.3:a:browsercrm:browsercrm:4.624.90:*:*:*:*:*:*:*",
"cpe:2.3:a:browsercrm:browsercrm:4.691.01:*:*:*:*:*:*:*",
"cpe:2.3:a:browsercrm:browsercrm:4.999.20:*:*:*:*:*:*:*",
"cpe:2.3:a:browsercrm:browsercrm:5.000.00:*:*:*:*:*:*:*",
"cpe:2.3:a:browsercrm:browsercrm:5.000.01:*:*:*:*:*:*:*",
"cpe:2.3:a:browsercrm:browsercrm:5.001.00:*:*:*:*:*:*:*",
"cpe:2.3:a:browsercrm:browsercrm:5.002.00:*:*:*:*:*:*:*",
"cpe:2.3:a:browsercrm:browsercrm:5.100.00:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-r942-4w9p-298q | In the Linux kernel, the following vulnerability has been resolved:net: sched: sch: Bounds check priorityNothing was explicitly bounds checking the priority index used to access
clpriop[]. WARN and bail out early if it's pathological. Seen with GCC 13:../net/sched/sch_htb.c: In function 'htb_activate_prios':
../net/sched/sch_htb.c:437:44: warning: array subscript [0, 31] is outside array bounds of 'struct htb_prio[8]' [-Warray-bounds=]
437 | if (p->inner.clprio[prio].feed.rb_node)
| ~~~~~~~~~~~~~~~^~~~~~
../net/sched/sch_htb.c:131:41: note: while referencing 'clprio'
131 | struct htb_prio clprio[TC_HTB_NUMPRIO];
| ^~~~~~ | [] | null | null | null | null |
|
CVE-2024-37219 | WordPress Page Builder Sandwich plugin <= 5.1.0 - Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in PBN Hosting SL Page Builder Sandwich – Front-End Page Builder allows Stored XSS.This issue affects Page Builder Sandwich – Front-End Page Builder: from n/a through 5.1.0. | [
"cpe:2.3:a:pagebuildersandwich:page_builder_sandwich:*:*:*:*:*:wordpress:*:*"
] | null | 6.5 | null | null |
CVE-2011-2801 | Use-after-free vulnerability in Google Chrome before 13.0.782.107 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the frame loader. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
CVE-2022-27653 | A vulnerability has been identified in Simcenter Femap (All versions < V2022.2). The affected application contains an out of bounds write past the end of an allocated structure while parsing specially crafted .NEU files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-15594) | [
"cpe:2.3:a:siemens:simcenter_femap:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | 6.8 |
|
CVE-2023-52384 | Double-free vulnerability in the RSMC module
Impact: Successful exploitation of this vulnerability will affect availability. | [
"cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:14.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*"
] | null | 4.7 | null | null |
|
GHSA-f7qm-gqrg-3gwj | The P1 dissector in Wireshark 1.10.x before 1.10.1 does not properly initialize a global variable, which allows remote attackers to cause a denial of service (application crash) via a crafted packet. | [] | null | null | null | null |
|
GHSA-mx3h-88ww-4mqq | Double free vulnerability in libxml2, as used in Google Chrome before 13.0.782.215, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted XPath expression. | [] | null | null | null | null |
|
RHSA-2008:0144 | Red Hat Security Advisory: acroread security update | Acrobat Reader Universal CSRF and session riding acroread Multiple buffer overflows acroread JavaScript Insecure Method Exposure acroread JavaScript Insecure Libary Search Path acroread: unspecified vulnerabilities acroread: silent print vulnerability Acroread memory corruption | [
"cpe:/a:redhat:rhel_extras:3",
"cpe:/a:redhat:rhel_extras:4",
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
] | null | null | null | null |
GHSA-m362-99m5-p5fq | The MStore API – Create Native Android & iOS Apps On The Cloud plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 4.15.2. This is due to the use of loose comparison in the 'verify_id_token' function. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to an @flutter.io email address or phone number. This also requires firebase to be configured on the website and the user to have set up firebase for their account. | [] | null | 8.1 | null | null |
|
CVE-2008-2874 | SQL injection vulnerability in index.php in Softbiz Jokes & Funny Pics Script allows remote attackers to execute arbitrary SQL commands via the sbjoke_id parameter, a different vector than CVE-2008-1050. | [
"cpe:2.3:a:softbizscripts:softbiz_jokes_and_funny_pics_script:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2022-4355 | LetsRecover < 1.2.0 - Admin+ SQLi | The LetsRecover WordPress plugin before 1.2.0 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users such as admin | [
"cpe:2.3:a:letsrecover_project:letsrecover:*:*:*:*:*:wordpress:*:*"
] | null | 7.2 | null | null |
CVE-2018-12026 | During the spawning of a malicious Passenger-managed application, SpawningKit in Phusion Passenger 5.3.x before 5.3.2 allows such applications to replace key files or directories in the spawning communication directory with symlinks. This then could result in arbitrary reads and writes, which in turn can result in information disclosure and privilege escalation. | [
"cpe:2.3:a:phusion:passenger:*:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 |
|
CVE-2008-4384 | Multiple stack-based buffer overflows in MGI Software LPViewer ActiveX control (LPControl.dll), as acquired by Roxio and iseemedia, allow remote attackers to execute arbitrary code via the (1) url, (2) toolbar, and (3) enableZoomPastMax methods. | [
"cpe:2.3:a:iseemedia:lpviewer:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mgi_software:lpviewer:*:*:*:*:*:*:*:*",
"cpe:2.3:a:roxio:lpviewer:*:*:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
GHSA-3xqm-x8h3-fh3m | Due to insufficient input validation, SAP NetWeaver AS for ABAP and ABAP Platform - versions 740, 750, 751, 752, 753, 754, 755, 756, 757, 789, 790, allows an unauthenticated attacker to send a crafted URL to a user, and by clicking the URL, the tricked user accesses SAP and might be directed with the response to somewhere out-side SAP and enter sensitive data. This could cause a limited impact on confidentiality and integrity of the application. | [] | null | 6.1 | null | null |
|
CVE-2014-8921 | The IBM Notes Traveler Companion application 1.0 and 1.1 before 201411010515 for Window Phone, as distributed in IBM Notes Traveler 9.0.1, does not properly restrict the number of executions of the automatic configuration option, which makes it easier for remote attackers to capture credentials by conducting a phishing attack involving an encrypted e-mail message. | [
"cpe:2.3:a:ibm:notes_traveler_companion:1.0:*:*:*:*:windows_phone:*:*",
"cpe:2.3:a:ibm:notes_traveler_companion:1.1:*:*:*:*:windows_phone:*:*"
] | null | null | null | 4.3 |
|
GHSA-c9gh-426m-j894 | Cross-site scripting (XSS) vulnerability in forum.php in Jamroom before 4.1.9 allows remote attackers to inject arbitrary web script or HTML via the post_id parameter in a modify action. | [] | null | null | null | null |
|
GHSA-5c5q-xj8p-hrg3 | An issue was discovered in Independentsoft JWord before 1.1.110. The API is prone to XML external entity (XXE) injection via a remote DTD in a DOCX file. | [] | null | 9.8 | null | null |
|
CVE-2025-23006 | Pre-authentication deserialization of untrusted data vulnerability has been identified in the SMA1000 Appliance Management Console (AMC) and Central Management Console (CMC), which in specific conditions could potentially enable a remote unauthenticated attacker to execute arbitrary OS commands. | [] | null | 9.8 | null | null |
|
CVE-2018-0104 | A vulnerability in Cisco WebEx Network Recording Player for Advanced Recording Format (ARF) files could allow a remote attacker to execute arbitrary code on the system of a targeted user. The attacker could exploit this vulnerability by sending the user a link or email attachment with a malicious ARF file and persuading the user to follow the link or launch the file. Successful exploitation could allow the attacker to execute arbitrary code on the user's system. This vulnerability affects Cisco WebEx Business Suite meeting sites, Cisco WebEx Meetings sites, Cisco WebEx Meetings Server, and Cisco WebEx ARF players. Cisco Bug IDs: CSCvg78853, CSCvg78856, CSCvg78857. | [
"cpe:2.3:a:cisco:webex_business_suite:-:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_meetings:-:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_meetings_server:-:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_network_recording_player:-:*:*:*:*:*:*:*"
] | null | null | 9.6 | 9.3 |
|
GHSA-hx37-538m-7q9c | In the Linux kernel, the following vulnerability has been resolved:dmaengine: ti: Fix refcount leak in ti_dra7_xbar_route_allocateof_parse_phandle() returns a node pointer with refcount
incremented, we should use of_node_put() on it when not needed anymore.Add missing of_node_put() in to fix this. | [] | null | 5.5 | null | null |
|
CVE-2017-5229 | All editions of Rapid7 Metasploit prior to version 4.13.0-2017020701 contain a directory traversal vulnerability in the Meterpreter extapi Clipboard.parse_dump() function. By using a specially-crafted build of Meterpreter, it is possible to write to an arbitrary directory on the Metasploit console with the permissions of the running Metasploit instance. | [
"cpe:2.3:a:rapid7:metasploit:*:*:*:*:*:*:*:*"
] | null | null | 7.1 | 5.1 |
|
CVE-2008-6767 | wp-admin/upgrade.php in WordPress, probably 2.6.x, allows remote attackers to upgrade the application, and possibly cause a denial of service (application outage), via a direct request. | [
"cpe:2.3:a:wordpress:wordpress:2.6:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
ICSA-22-286-16 | Siemens Desigo CC and Cerberus DMS | Affected applications use client-side only authentication, when neither server-side authentication (SSA) nor Kerberos authentication is enabled.
In this configuration, attackers could impersonate other users or exploit the client-server protocol without being authenticated. | [] | null | 9.8 | null | null |
CVE-2021-30968 | A validation issue related to hard link behavior was addressed with improved sandbox restrictions. This issue is fixed in macOS Big Sur 11.6.2, tvOS 15.2, macOS Monterey 12.1, Security Update 2021-008 Catalina, iOS 15.2 and iPadOS 15.2, watchOS 8.3. A malicious application may be able to bypass certain Privacy preferences. | [
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-002:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-003:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-004:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-005:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-006:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-007:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | 4.3 |
|
CVE-2024-51528 | Vulnerability of improper log printing in the Super Home Screen module
Impact: Successful exploitation of this vulnerability may affect service confidentiality. | [
"cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:14.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:4.2.0:*:*:*:*:*:*:*"
] | null | 4 | null | null |
|
GHSA-256w-3jc2-hh38 | Advantech WebAccess HMI Designer, Versions 2.1.9.31 and prior. Processing specially crafted project files lacking proper validation of user supplied data may cause a stack-based buffer overflow, which may allow remote code execution, disclosure/modification of information, or cause the application to crash. | [] | null | null | null | null |
|
GHSA-f6mj-xf48-98pp | Certain NETGEAR devices are affected by a stack-based buffer overflow by an unauthenticated attacker. This affects R6700 before 1.0.1.48, R7900 before 1.0.2.16, R6900 before 1.0.1.48, R7000P before 1.3.1.44, R6900P before 1.3.1.44, R6250 before 1.0.4.30, R6300v2 before 1.0.4.32, R6400 before 1.0.1.44, R6400v2 before 1.0.2.60, R7000 before 1.0.9.34, R7100LG before 1.0.0.48, R7300 before 1.0.0.68, R8000 before 1.0.4.18, R8000P before 1.4.1.24, R7900P before 1.4.1.24, R8500 before 1.0.2.122, R8300 before 1.0.2.122, WN2500RPv2 before 1.0.1.54, EX3700 before 1.0.0.72, EX3800 before 1.0.0.72, EX6000 before 1.0.0.32, EX6100 before 1.0.2.24, EX6120 before 1.0.0.42, EX6130 before 1.0.0.24, EX6150v1 before 1.0.0.42, EX6200 before 1.0.3.88, EX7000 before 1.0.0.66, D7000v2 before 1.0.0.51, D6220 before 1.0.0.46, D6400 before 1.0.0.82, and D8500 before 1.0.3.42. | [] | null | null | null | null |
|
RHSA-2003:087 | Red Hat Security Advisory: file security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
CVE-2020-9522 | Cross Site Scripting (XSS) vulnerability in Micro Focus ArcSight Enterprise Security Manager (ESM) product, Affecting versions 7.0.x, 7.2 and 7.2.1 . The vulnerabilities could be remotely exploited resulting in Cross-Site Scripting (XSS) or information disclosure. | [
"cpe:2.3:a:microfocus:arcsight_enterprise_security_manager_express:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 |
|
RHSA-2024:1532 | Red Hat Security Advisory: kernel security and bug fix update | kernel: CIFS Filesystem Decryption Improper Input Validation Remote Code Execution Vulnerability in function receive_encrypted_standard of client kernel: sched/membarrier: reduce the ability to hammer on sys_membarrier | [
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/a:redhat:rhel_eus:9.2::crb",
"cpe:/o:redhat:rhel_eus:9.2::baseos"
] | null | 4.7 | null | null |
CVE-2023-28626 | Quadratic runtime when parsing Markdown in comrak | comrak is a CommonMark + GFM compatible Markdown parser and renderer written in rust. A range of quadratic parsing issues are present in Comrak. These can be used to craft denial-of-service attacks on services that use Comrak to parse Markdown. This issue has been addressed in version 0.17.0. Users are advised to upgrade. There are no known workarounds for this vulnerability. This issue is also tracked as `GHSL-2023-047` | [
"cpe:2.3:a:comrak_project:comrak:*:*:*:*:*:rust:*:*"
] | null | 5.3 | null | null |
CVE-2020-27464 | An insecure update feature in the /updater.php component of rConfig 3.9.6 and below allows attackers to execute arbitrary code via a crafted ZIP file. | [
"cpe:2.3:a:rconfig:rconfig:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | 6.8 |
|
GHSA-c475-923p-gg3c | Windows Graphics Component Elevation of Privilege Vulnerability | [] | null | 7.8 | null | null |
|
GHSA-23fp-fmrv-f5px | Uncontrolled Resource Consumption in strapi | A denial of service exists in strapi v3.0.0-beta.18.3 and earlier that can be abused in the admin console using admin rights can lead to arbitrary restart of the application. | [] | null | 4.9 | null | null |
CVE-2006-3464 | TIFF library (libtiff) before 3.8.2 allows context-dependent attackers to pass numeric range checks and possibly execute code, and trigger assert errors, via large offset values in a TIFF directory that lead to an integer overflow and other unspecified vectors involving "unchecked arithmetic operations". | [
"cpe:2.3:a:libtiff:libtiff:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2013-5315 | Cross-site scripting (XSS) vulnerability in the Resource Manager in the MEE submodule (mee.module) in the Scald module 6.x-1.x before 6.x-1.0-beta3 and 7.x-1.x before 7.x-1.1 for Drupal allows remote attackers to inject arbitrary web script or HTML via the atom title, a different vector than CVE-2013-4174. | [
"cpe:2.3:a:ows:scald:6.x-1.0:alpha1:*:*:*:*:*:*",
"cpe:2.3:a:ows:scald:6.x-1.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:ows:scald:6.x-1.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:ows:scald:6.x-1.x:dev:*:*:*:*:*:*",
"cpe:2.3:a:ows:scald:7.x-1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:-:*:*:*:*:*:*:*"
] | null | null | null | 2.6 |
|
GHSA-m6vq-7f4m-cw3p | Multiple cross-site scripting (XSS) vulnerabilities in myCare2x allow remote attackers to inject arbitrary web script or HTML via the (1) name_last, (2) name_first, (3) name_middle, or (4) name_maiden parameter to modules/patient/mycare_pid.php; (5) favorites or (6) lang parameter to modules/nursing/mycare_ward_print.php; (7) aktion or (8) callurl parameter to modules/patient/mycare2x_pat_info.php; or (9) ln parameter to modules/drg/mycare2x_proc_search.php. | [] | null | null | null | null |
|
RHSA-2013:0157 | Red Hat Security Advisory: tomcat6 security update | Web: Bypass of security constraints | [
"cpe:/a:redhat:jboss_enterprise_web_server:1.0.2"
] | null | null | null | null |
CVE-2016-10191 | Heap-based buffer overflow in libavformat/rtmppkt.c in FFmpeg before 2.8.10, 3.0.x before 3.0.5, 3.1.x before 3.1.6, and 3.2.x before 3.2.2 allows remote attackers to execute arbitrary code by leveraging failure to check for RTMP packet size mismatches. | [
"cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:3.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:3.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:3.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:3.2.1:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 |
|
CVE-2017-9248 | Telerik.Web.UI.dll in Progress Telerik UI for ASP.NET AJAX before R2 2017 SP1 and Sitefinity before 10.0.6412.0 does not properly protect Telerik.Web.UI.DialogParametersEncryptionKey or the MachineKey, which makes it easier for remote attackers to defeat cryptographic protection mechanisms, leading to a MachineKey leak, arbitrary file uploads or downloads, XSS, or ASP.NET ViewState compromise. | [
"cpe:2.3:a:progress:sitefinity:*:*:*:*:*:*:*:*",
"cpe:2.3:a:telerik:ui_for_asp.net_ajax:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
|
CVE-2020-20248 | Mikrotik RouterOs before stable 6.47 suffers from an uncontrolled resource consumption in the memtest process. An authenticated remote attacker can cause a Denial of Service due to overloading the systems CPU. | [
"cpe:2.3:o:mikrotik:routeros:6.47:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4 |
|
CVE-2019-10057 | Various Lexmark products have CSRF. | [
"cpe:2.3:o:lexmark:cs31x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:cs31x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:cs41x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:cs41x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:cx310_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:cx310:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:ms310_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms310:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:ms312_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms312:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:ms317_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms317:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:ms410_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms410:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:m1140_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:m1140:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:ms315_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms315:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:ms415_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms415:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:ms417_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms417:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:mx31x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mx31x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:xm1135_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xm1135:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:ms51x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms51x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:ms610dn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms610dn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:ms617_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms617:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:m1145_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:m1145:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:m3150dn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:m3150dn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:ms71x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms71x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:m5163dn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:m5163dn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:ms810_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms810:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:ms811_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms811:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:ms812_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms812:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:ms817_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms817:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:ms818_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms818:-:*:*:*:*:*:*:*"
] | null | null | 6.5 | 4.3 |
|
GHSA-2523-v9j2-g44c | Authenticated (admin+) Persistent Cross-Site Scripting (XSS) vulnerability discovered in Download Monitor WordPress plugin (versions <= 4.4.6) Vulnerable parameters: &post_title, &downloadable_file_version[0]. | [] | null | 4.8 | null | null |
|
CVE-2022-4030 | The Simple:Press plugin for WordPress is vulnerable to Path Traversal in versions up to, and including, 6.8 via the 'file' parameter which can be manipulated during user avatar deletion. This makes it possible with attackers, with minimal permissions such as a subscriber, to supply paths to arbitrary files on the server that will subsequently be deleted. This can be used to delete the wp-config.php file that can allow an attacker to configure the site and achieve remote code execution. | [
"cpe:2.3:a:simple-press:simple\\:press:*:*:*:*:*:wordpress:*:*"
] | null | 8.1 | null | null |
|
CVE-2023-31170 | Inclusion of Functionality from Untrusted Control Sphere |
An Inclusion of Functionality from Untrusted Control Sphere vulnerability in the Schweitzer Engineering Laboratories SEL-5030 acSELerator QuickSet Software could allow an attacker to embed instructions that could be executed by an authorized device operator.
See Instruction Manual Appendix A and Appendix E dated 20230615 for more details.
This issue affects SEL-5030 acSELerator QuickSet Software: through 7.1.3.0.
| [
"cpe:2.3:a:selinc:sel-5030_acselerator_quickset:*:*:*:*:*:*:*:*"
] | null | 5.9 | null | null |
CVE-2016-1755 | The kernel in Apple iOS before 9.3, OS X before 10.11.4, tvOS before 9.2, and watchOS before 2.2 allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app, a different vulnerability than CVE-2016-1754. | [
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | 9.3 |
|
CVE-2013-5482 | Cisco Prime LAN Management Solution (LMS) does not properly restrict use of IFRAME elements, which makes it easier for remote attackers to conduct clickjacking attacks and unspecified other attacks via a crafted web site, related to a "cross-frame scripting (XFS)" issue, aka Bug ID CSCug77823. | [
"cpe:2.3:a:cisco:prime_lan_management_solution:-:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2009-4980 | Multiple cross-site scripting (XSS) vulnerabilities in Photokorn Gallery 1.81 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) where[] parameter to search.php and (2) qc parameter to admin.php. | [
"cpe:2.3:a:keil-software:photokorn_gallery:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2023-4535 | Opensc: out-of-bounds read in myeid driver handling encryption using symmetric keys | An out-of-bounds read vulnerability was found in OpenSC packages within the MyEID driver when handling symmetric key encryption. Exploiting this flaw requires an attacker to have physical access to the computer and a specially crafted USB device or smart card. This flaw allows the attacker to manipulate APDU responses and potentially gain unauthorized access to sensitive data, compromising the system's security. | [
"cpe:2.3:a:opensc_project:opensc:0.23.0:-:*:*:*:*:*:*",
"cpe:2.3:a:opensc_project:opensc:0.23.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:opensc_project:opensc:0.23.0:rc2:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
"cpe:/o:redhat:enterprise_linux:9::baseos",
"cpe:/o:redhat:enterprise_linux:7",
"cpe:/o:redhat:enterprise_linux:8"
] | null | 4.5 | null | null |
GHSA-3v5g-chfr-w797 | An issue was discovered in Luvion Grand Elite 3 Connect through 2020-02-25. Clients can authenticate themselves to the device using a username and password. These credentials can be obtained through an unauthenticated web request, e.g., for a JavaScript file. Also, the disclosed information includes the SSID and WPA2 key for the Wi-Fi network the device is connected to. | [] | null | 7.5 | null | null |
|
CVE-2019-18246 | BIOTRONIK CardioMessenger II, The affected products do not properly enforce mutual authentication with the BIOTRONIK Remote Communication infrastructure. | [
"cpe:2.3:o:biotronik:cardiomessenger_ii-s_gsm_firmware:2.20:*:*:*:*:*:*:*",
"cpe:2.3:h:biotronik:cardiomessenger_ii-s_gsm:-:*:*:*:*:*:*:*",
"cpe:2.3:o:biotronik:cardiomessenger_ii-s_t-line_firmware:2.20:*:*:*:*:*:*:*",
"cpe:2.3:h:biotronik:cardiomessenger_ii-s_t-line:-:*:*:*:*:*:*:*"
] | null | 4.3 | null | 3.3 |
|
RHSA-2023:7791 | Red Hat Security Advisory: gstreamer1-plugins-bad-free security update | gstreamer: AV1 codec parser heap-based buffer overflow gstreamer: MXF demuxer use-after-free vulnerability | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 8.8 | null | null |
GHSA-mv4j-jp28-hffr | Use after free in Microsoft Streaming Service allows an authorized attacker to elevate privileges locally. | [] | null | 7.8 | null | null |
|
CVE-2018-19514 | In Webgalamb through 7.0, an arbitrary code execution vulnerability could be exploited remotely without authentication. Exploitation requires authentication bypass to access administrative functions of the site to upload a crafted CSV file with a malicious payload that becomes part of a PHP eval() expression in the subscriber.php file. | [
"cpe:2.3:a:ens:webgalamb:*:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 |
|
CVE-2023-45140 | Group-based JIT MFA bypass on scp and sftp in The Bastion | The Bastion provides authentication, authorization, traceability and auditability for SSH accesses. SCP and SFTP plugins don't honor group-based JIT MFA. Establishing a SCP/SFTP connection through The Bastion via a group access where MFA is enforced does not ask for additional factor. This abnormal behavior only applies to per-group-based JIT MFA. Other MFA setup types, such as Immediate MFA, JIT MFA on a per-plugin basis and JIT MFA on a per-account basis are not affected. This issue has been patched in version 3.14.15. | [
"cpe:2.3:a:ovh:the-bastion:*:*:*:*:*:*:*:*"
] | null | 4.8 | null | null |
GHSA-4qjx-wpr6-v7fg | Unrestricted Upload of File with Dangerous Type vulnerability in Dogu Pekgoz AI Image Generator for Your Content & Featured Images – AI Postpix allows Upload a Web Shell to a Web Server.This issue affects AI Image Generator for Your Content & Featured Images – AI Postpix: from n/a through 1.1.8. | [] | null | 9.9 | null | null |
|
CVE-2023-1203 | Improper removal of sensitive data in the entry edit feature of Hub Business submodule in Devolutions Remote Desktop Manager PowerShell Module 2022.3.1.5 and earlier allows an authenticated user to access sensitive data on entries that were edited using the affected submodule.
| [
"cpe:2.3:a:devolutions:remote_desktop_manager:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | null |
|
CVE-2022-4822 | FlatPress Setup main.lib.php cross site scripting | A vulnerability, which was classified as problematic, has been found in FlatPress. This issue affects some unknown processing of the file setup/lib/main.lib.php of the component Setup. The manipulation leads to cross site scripting. The attack may be initiated remotely. The name of the patch is 5f23b4c2eac294cc0ba5e541f83a6f8a26f9fed1. It is recommended to apply a patch to fix this issue. The identifier VDB-217001 was assigned to this vulnerability. | [
"cpe:2.3:a:flatpress:flatpress:-:*:*:*:*:*:*:*"
] | null | 2.4 | 2.4 | null |
RHSA-2023:4290 | Red Hat Security Advisory: OpenShift sandboxed containers 1.4.1 security update | openshift: OCP & FIPS mode | [
"cpe:/a:redhat:openshift_sandboxed_containers:1.4.0::el9"
] | null | 6.5 | null | null |
GHSA-fh84-33w2-qrx7 | A CWE-200: Exposure of Sensitive Information to an Unauthorized Actor vulnerability exists in Telit Cinterion BGS5, Telit Cinterion EHS5/6/8, Telit Cinterion PDS5/6/8, Telit Cinterion ELS61/81, Telit Cinterion PLS62 that could allow an attacker with physical access to the target system to get access to a sensitive data on the targeted system. | [] | null | 2.4 | null | null |
|
CVE-2024-48743 | Cross Site Scripting vulnerability in Sentry v.6.0.9 allows a remote attacker to execute arbitrary code via the z parameter. | [
"cpe:2.3:a:tektronix:sentry:6.0.9:*:*:*:*:*:*:*"
] | null | 6.5 | null | null |
|
GHSA-35p3-6j45-prwm | Aim Uncontrolled Resource Consumption vulnerability | A vulnerability in aimhubio/aim version 3.25.0 allows for a denial of service (DoS) attack. The issue arises when a large number of tracked metrics are retrieved simultaneously from the Aim web API, causing the web server to become unresponsive. The root cause is the lack of a limit on the number of metrics that can be requested per call, combined with the server's single-threaded nature, leading to excessive resource consumption and blocking of the server. | [] | null | null | 7.5 | null |
GHSA-67q2-r7xw-j63p | SQL injection vulnerability in the web framework in Cisco Identity Services Engine (ISE) 1.2 and earlier allows remote authenticated users to execute arbitrary SQL commands via unspecified vectors, aka Bug ID CSCug90502. | [] | null | null | null | null |
|
CVE-2000-0292 | The Adtran MX2800 M13 Multiplexer allows remote attackers to cause a denial of service via a ping flood to the Ethernet interface, which causes the device to crash. | [
"cpe:2.3:h:adtran:mx2800:m13:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2006-5550 | The kernel in FreeBSD 6.1 and OpenBSD 4.0 allows local users to cause a denial of service via unspecified vectors involving certain ioctl requests to /dev/crypto. | [
"cpe:2.3:o:freebsd:freebsd:6.1:release:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:6.1:release_p10:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:6.1:stable:*:*:*:*:*:*",
"cpe:2.3:o:openbsd:openbsd:4.0:*:*:*:*:*:*:*"
] | null | null | null | 4.9 |
|
CVE-2016-6362 | Cisco Aironet 1800, 2800, and 3800 devices with software before 8.2.110.0, 8.2.12x before 8.2.121.0, and 8.3.x before 8.3.102.0 allow local users to gain privileges via crafted CLI parameters, aka Bug ID CSCuz24725. | [
"cpe:2.3:a:cisco:aironet_access_point_software:8.1\\(15.14\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:aironet_access_point_software:8.1\\(112.3\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:aironet_access_point_software:8.1\\(112.4\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:aironet_access_point_software:8.1\\(131.0\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:aironet_access_point_software:8.2\\(100.0\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:aironet_access_point_software:8.2\\(102.43\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:aironet_access_point_software:8.3.0:*:*:*:*:*:*:*"
] | null | null | 7.8 | 7.2 |
|
GHSA-mjq4-j36x-7h6p | FreeType 2 before 2.4.7, as used in CoreGraphics in Apple iOS before 5, Mandriva Enterprise Server 5, and possibly other products, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted font, a different vulnerability than CVE-2011-0226. | [] | null | null | null | null |
|
GHSA-2752-qr49-v2qw | Buffer overflow in the Strcmp function in the XKEYBOARD extension in X Window System X11R6.4 and earlier, as used in SCO UnixWare 7.1.3 and Sun Solaris 8 through 10, allows local users to gain privileges via a long _XKB_CHARSET environment variable value. | [] | null | null | null | null |
|
CVE-2019-18205 | Multiple Reflected Cross-site Scripting (XSS) vulnerabilities exist in Zucchetti InfoBusiness before and including 4.4.1. The browsing component did not properly sanitize user input (encoded in base64). This also applies to the search functionality for the searchKey parameter. | [
"cpe:2.3:a:zucchetti:infobusiness:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 |
|
CVE-2022-4519 | The WP User plugin for WordPress is vulnerable to Stored Cross-Site Scripting via its settings parameters in versions up to, and including, 7.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. | [
"cpe:2.3:a:wpseeds:wp_user:*:*:*:*:*:wordpress:*:*"
] | null | 5.5 | null | null |
|
GHSA-p5gm-5mcg-gjxp | Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35774, CVE-2022-35775, CVE-2022-35780, CVE-2022-35782, CVE-2022-35783, CVE-2022-35784, CVE-2022-35785, CVE-2022-35786, CVE-2022-35787, CVE-2022-35788, CVE-2022-35789, CVE-2022-35790, CVE-2022-35791, CVE-2022-35799, CVE-2022-35800, CVE-2022-35801, CVE-2022-35802, CVE-2022-35807, CVE-2022-35808, CVE-2022-35809, CVE-2022-35810, CVE-2022-35811, CVE-2022-35812, CVE-2022-35813, CVE-2022-35814, CVE-2022-35815, CVE-2022-35816, CVE-2022-35817, CVE-2022-35818, CVE-2022-35819. | [] | null | 6.5 | null | null |
|
CVE-2022-28289 | Mozilla developers and community members Nika Layzell, Andrew McCreight, Gabriele Svelto, and the Mozilla Fuzzing Team reported memory safety bugs present in Thunderbird 91.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird < 91.8, Firefox < 99, and Firefox ESR < 91.8. | [
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
|
CVE-2017-1679 | IBM OpenPages GRC Platform 7.2, 7.3, 7.4, and 8.0 could allow an attacker to obtain sensitive information from error log files. IBM X-Force ID: 134001. | [
"cpe:2.3:a:ibm:openpages_grc_platform:7.2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:openpages_grc_platform:7.3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:openpages_grc_platform:7.4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:openpages_grc_platform:8.0.0.0:*:*:*:*:*:*:*"
] | null | null | 6.2 | null |
|
GHSA-r6gx-g2r9-8q8m | w_export.c in XWine 1.0.1 on Debian GNU/Linux sets insecure permissions (0666) for /etc/wine/config, which might allow local users to execute arbitrary commands or cause a denial of service by modifying the file. | [] | null | null | null | null |
|
CVE-2023-3517 | Hitachi Vantara Pentaho Data Integration & Analytics - Improper Control of Resource Identifiers ('Resource Injection') |
Hitachi Vantara Pentaho Data Integration & Analytics versions before 9.5.0.1 and 9.3.0.5, including
8.3.x does not restrict JNDI identifiers during the creation of XActions, allowing control of system level data sources.
| [
"cpe:2.3:a:hitachi:pentaho_data_integration_and_analytics:*:*:*:*:*:*:*:*"
] | null | 8.5 | null | null |
CVE-2012-3972 | The format-number functionality in the XSLT implementation in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to obtain sensitive information via unspecified vectors that trigger a heap-based buffer over-read. | [
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird_esr:*:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:-:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:-:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:-:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:vmware:*:*",
"cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp2:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:6.3:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-c98g-3j4g-pjfx | IBM Tivoli Endpoint Manager (IBM BigFix Platform 9.2 and 9.5) discloses sensitive information to unauthorized users. The information can be used to mount further attacks on the system. IBM X-Force ID: 123860. | [] | null | null | 5.3 | null |
|
GHSA-2rh9-mcg8-96mq | Sendmail before 8.13.7 allows remote attackers to cause a denial of service via deeply nested, malformed multipart MIME messages that exhaust the stack during the recursive mime8to7 function for performing 8-bit to 7-bit conversion, which prevents Sendmail from delivering queued messages and might lead to disk consumption by core dump files. | [] | null | null | null | null |
|
GHSA-7cwx-6wm5-r7m8 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability | [] | null | 8.8 | null | null |
|
CVE-2023-20674 | In wlan, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07588569; Issue ID: ALPS07588552. | [
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
"cpe:2.3:o:yoctoproject:yocto:3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:yoctoproject:yocto:3.3:*:*:*:*:*:*:*",
"cpe:2.3:o:yoctoproject:yocto:4.0:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8169:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8518:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8532:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8695:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8771:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.19:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt5221:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt7663:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt7668:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt7902:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt7921:-:*:*:*:*:*:*:*"
] | null | 4.4 | null | null |
|
CVE-2021-2204 | Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle WebLogic Server accessible data. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N). | [
"cpe:2.3:a:oracle:weblogic_server:10.3.6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:weblogic_server:12.1.3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:weblogic_server:12.2.1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:weblogic_server:14.1.1.0.0:*:*:*:*:*:*:*"
] | null | 5.3 | null | null |
|
CVE-2023-32091 | WordPress POEditor Plugin <= 0.9.4 is vulnerable to Cross Site Request Forgery (CSRF) | Cross-Site Request Forgery (CSRF) vulnerability in POEditor plugin <= 0.9.4 versions. | [
"cpe:2.3:a:poeditor:poeditor:*:*:*:*:*:wordpress:*:*"
] | null | 5.4 | null | null |
CVE-2018-5894 | Improper Validation of Array Index in Multimedia While parsing an mp4 file in Snapdragon Automobile, Snapdragon Mobile and Snapdragon Wear, an out-of-bounds access can occur. | [
"cpe:2.3:o:qualcomm:mdm9206_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9206:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9607_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9607:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9650:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8909w_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8909w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8996au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_210_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_210:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_212_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_212:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_205_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_205:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_425_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_425:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_430_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_430:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_450_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_450:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_600_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_600:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_615_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_615:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_616_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_616:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_415_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_415:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_617_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_617:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_625_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_625:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_650_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_650:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_652_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_652:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_820_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_820:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_820a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_820a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_835_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_835:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_845_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_845:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx20_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx20:-:*:*:*:*:*:*:*"
] | null | null | 6.5 | 4.3 |
|
GHSA-hj2x-qw32-q9rv | EZ-Blog Beta 1 does not require authentication, which allows remote attackers to create or delete arbitrary posts via requests to PHP scripts. | [] | null | null | null | null |
|
GHSA-v598-w7fw-659q | In FreeBSD before 11.1-STABLE, 11.1-RELEASE-p9, 10.4-STABLE, 10.4-RELEASE-p8 and 10.3-RELEASE-p28, due to insufficient initialization of memory copied to userland, small amounts of kernel memory may be disclosed to userland processes. Unprivileged users may be able to access small amounts privileged kernel data. | [] | null | null | 7.5 | null |
|
GHSA-x39m-p4wf-cv9f | There are multiple out of bounds (OOB) read vulnerabilities in the implementation of the Common Open Policy Service (COPS) protocol of some Huawei products. The specific decoding function may occur out-of-bounds read when processes an incoming data packet. Successful exploit of these vulnerabilities may disrupt service on the affected device. (Vulnerability ID: HWPSIRT-2018-12275,HWPSIRT-2018-12276,HWPSIRT-2018-12277,HWPSIRT-2018-12278,HWPSIRT-2018-12279,HWPSIRT-2018-12280 and HWPSIRT-2018-12289)The seven vulnerabilities have been assigned seven Common Vulnerabilities and Exposures (CVE) IDs: CVE-2020-1818, CVE-2020-1819, CVE-2020-1820, CVE-2020-1821, CVE-2020-1822, CVE-2020-1823 and CVE-2020-1824. | [] | null | 3.7 | null | null |
|
GHSA-r7cc-f77m-gvjj | Omron CS series, CJ series, and CP series PLCs through 2022-05-18 use cleartext passwords. They feature a UM Protection setting that allows users or system integrators to configure a password in order to restrict sensitive engineering operations (such as project/logic uploads and downloads). This password is set using the OMRON FINS command Program Area Protect and unset using the command Program Area Protect Clear, both of which are transmitted in cleartext. | [] | null | 7.5 | null | null |
|
CVE-2021-34243 | A stored cross site scripting (XSS) vulnerability was discovered in Ice Hrm 29.0.0.OS which allows attackers to execute arbitrary web scripts or HTML via a crafted file uploaded into the Document Management tab. The exploit is triggered when a user visits the upload location of the crafted file. | [
"cpe:2.3:a:icehrm:icehrm:29.0.0.os:*:*:*:*:*:*:*"
] | null | 5.4 | null | 3.5 |
|
CVE-2024-29275 | SQL injection vulnerability in SeaCMS version 12.9, allows remote unauthenticated attackers to execute arbitrary code and obtain sensitive information via the id parameter in class.php. | [
"cpe:2.3:a:seacms:seacms:12.9:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
GHSA-6rcf-98qc-gqqf | Media Player Framework in Android before 5.1.1 LMY48T allows attackers to gain privileges via a crafted application, aka internal bug 23223325. | [] | null | null | null | null |
|
GHSA-hmf5-7mhf-fpjh | The web interface in CUPS before 1.4.2, as used on Apple Mac OS X before 10.6.2 and other platforms, does not properly handle (1) HTTP headers and (2) HTML templates, which allows remote attackers to conduct cross-site scripting (XSS) attacks and HTTP response splitting attacks via vectors related to (a) the product's web interface, (b) the configuration of the print system, and (c) the titles of printed jobs, as demonstrated by an XSS attack that uses the kerberos parameter to the admin program, and leverages attribute injection and HTTP Parameter Pollution (HPP) issues. | [] | null | null | null | null |
Subsets and Splits