id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 38
232
⌀ |
---|---|---|---|---|---|---|---|---|
CVE-2009-3959
|
Integer overflow in the U3D implementation in Adobe Reader and Acrobat 9.x before 9.3, and 8.x before 8.2 on Windows and Mac OS X, allows remote attackers to execute arbitrary code via a malformed PDF document.
|
[
"cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:4.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:4.0.5a:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:4.0.5c:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:5.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:5.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:5.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:6.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:6.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:6.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:6.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:3.01:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:3.02:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:4.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:4.0.5a:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:4.0.5c:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:5.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:5.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:5.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:5.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:5.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:5.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:6.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:6.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:6.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:7.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:7.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:7.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:7.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:7.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:7.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:7.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:7.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:7.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:7.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:unix:unix:*:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
CVE-2025-47697
|
Client-side enforcement of server-side security issue exists in wivia 5 all versions. If exploited, an unauthenticated attacker may bypass authentication and operate the affected device as the moderator user.
|
[] | 6.9 | null | 6.5 | null | null |
|
GHSA-jf6r-2jh6-5f5q
|
Array index error in AcroForm.api in Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allows remote attackers to execute arbitrary code via a crafted GIF image in a PDF file, which bypasses a size check and triggers a heap-based buffer overflow.
|
[] | null | null | null | null | null |
|
CVE-2022-40854
|
Tenda AC18 router contained a stack overflow vulnerability in /goform/fast_setting_wifi_set
|
[
"cpe:2.3:o:tenda:ac18_firmware:15.03.05.19\\(6318\\):*:*:*:*:*:*:*",
"cpe:2.3:h:tenda:ac18:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
|
GHSA-2j4g-q4pc-fmcw
|
Church Management System version 1.0 is affected by a SQL anjection vulnerability through creating a user with a PHP file as an avatar image, which is accessible through the /uploads directory. This can lead to RCE on the web server by uploading a PHP webshell.
|
[] | null | 9.8 | null | null | null |
|
CVE-2020-16992
|
Azure Sphere Elevation of Privilege Vulnerability
|
Azure Sphere Elevation of Privilege Vulnerability
|
[
"cpe:2.3:a:microsoft:azure_sphere:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
CVE-2007-2424
|
PHP remote file inclusion vulnerability in help/index.php in The Merchant (themerchant) 2.2 allows remote attackers to execute arbitrary PHP code via a URL in the show parameter.
|
[
"cpe:2.3:a:the_merchant_project:the_merchant:2.2:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2014-3828
|
Multiple SQL injection vulnerabilities in Centreon 2.5.1 and Centreon Enterprise Server 2.2 (fixed in Centreon web 2.5.3) allow remote attackers to execute arbitrary SQL commands via (1) the index_id parameter to views/graphs/common/makeXML_ListMetrics.php, (2) the sid parameter to views/graphs/GetXmlTree.php, (3) the session_id parameter to views/graphs/graphStatus/displayServiceStatus.php, (4) the mnftr_id parameter to configuration/configObject/traps/GetXMLTrapsForVendor.php, or (5) the index parameter to common/javascript/commandGetArgs/cmdGetExample.php in include/.
|
[
"cpe:2.3:a:merethis:centreon:2.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:merethis:centreon_enterprise_server:2.2:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
GHSA-fmhx-jh46-8mxr
|
SQL injection vulnerability in account.asp in Active Membership 2.0 allows remote attackers to execute arbitrary SQL commands via the (1) username and (2) password parameters, possibly related to start.asp. NOTE: some of these details are obtained from third party information.
|
[] | null | null | null | null | null |
|
RHSA-2025:1137
|
Red Hat Security Advisory: firefox security update
|
firefox: thunderbird: Use-after-free in XSLT firefox: thunderbird: Use-after-free in Custom Highlight firefox: thunderbird: A bug in WebAssembly code generation could result in a crash firefox: thunderbird: Use-after-free during concurrent delazification firefox: thunderbird: Potential opening of private browsing tabs in normal browsing windows firefox: thunderbird: Certificate length was not properly checked firefox: thunderbird: Memory safety bugs fixed in Firefox 135, Thunderbird 135, Firefox ESR 115.20, Firefox ESR 128.7, Thunderbird 115.20, and Thunderbird 128.7 firefox: thunderbird: Memory safety bugs fixed in Firefox 135, Thunderbird 135, Firefox ESR 128.7, and Thunderbird 128.7
|
[
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 8.8 | null | null | null |
CVE-2006-3599
|
SQL injection vulnerability in the Nuke Advanced Classifieds module for PHP-Nuke allows remote attackers to execute arbitrary SQL commands via the id_ads parameter in an EditAds op.
|
[
"cpe:2.3:a:php-nuke:advanced_classified_module:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-cm5p-vcj3-gv4c
|
Multiple race conditions in the font initialization could have led to memory corruption and execution of attacker-controlled code. This vulnerability affects Firefox for Android < 112, Firefox < 112, and Focus for Android < 112.
|
[] | null | 7.5 | null | null | null |
|
ICSA-20-224-08
|
Siemens SICAM A8000 RTUs
|
The login screen does not sufficiently sanitize input, which enables an attacker to generate specially crafted log messages. If an unsuspecting victim views the log messages via the web browser, these log messages might be interpreted and executed as code by the web application. This Cross-Site-Scripting (XSS) vulnerability might compromize the confidentiality, integrity and availability of the web application.
|
[] | null | 8.3 | null | null | null |
GHSA-vr29-mm4v-x5ph
|
page/EventHandler.cpp in WebCore in WebKit in Google Chrome before 5.0.375.70 does not properly handle a change of the focused frame during the dispatching of keydown, which allows user-assisted remote attackers to redirect keystrokes via a crafted HTML document, aka rdar problem 7018610. NOTE: this might overlap CVE-2010-1422.
|
[] | null | null | null | null | null |
|
GHSA-jcjc-m39p-5c5c
|
XNU in the kernel in Apple iOS before 9 does not properly validate the headers of TCP packets, which allows remote attackers to bypass the sequence-number protection mechanism and cause a denial of service (TCP connection disruption) via a crafted header.
|
[] | null | null | null | null | null |
|
GHSA-cpvm-9533-ww22
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WPify s.R.O. WPify Woo Czech allows Reflected XSS.This issue affects WPify Woo Czech: from n/a through 4.0.10.
|
[] | null | 7.1 | null | null | null |
|
CVE-2021-38637
|
Windows Storage Information Disclosure Vulnerability
|
Windows Storage Information Disclosure Vulnerability
|
[
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2183:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2183:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2183:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2183:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1801:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1801:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.18363.1801:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1237:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1237:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1237:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.230:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.19041.1237:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2004:10.0.19041.1237:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_20h2:10.0.19042.1237:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_20h2:10.0.19042.1237:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_20h2:10.0.19042.1237:*:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
CVE-2022-43275
|
Canteen Management System v1.0 was discovered to contain an arbitrary file upload vulnerability via /youthappam/php_action/editProductImage.php. This vulnerability allows attackers to execute arbitrary code via a crafted PHP file.
|
[
"cpe:2.3:a:canteen_management_system_project:canteen_management_system:1.0:*:*:*:*:*:*:*"
] | null | 7.2 | null | null | null |
|
CVE-2020-7355
|
Rapid7 Metasploit Pro Stored XSS in 'notes' field
|
Cross-site Scripting (XSS) vulnerability in the 'notes' field of a discovered scan asset in Rapid7 Metasploit Pro allows an attacker with a specially-crafted network service of a scan target store an XSS sequence in the Metasploit Pro console, which will trigger when the operator views the record of that scanned host in the Metasploit Pro interface. This issue affects Rapid7 Metasploit Pro version 4.17.1-20200427 and prior versions, and is fixed in Metasploit Pro version 4.17.1-20200514. See also CVE-2020-7354, which describes a similar issue, but involving the generated 'host' field of a discovered scan asset.
|
[
"cpe:2.3:a:rapid7:metasploit:*:*:*:*:pro:*:*:*",
"cpe:2.3:a:rapid7:metasploit:4.17.1:-:*:*:pro:*:*:*",
"cpe:2.3:a:rapid7:metasploit:4.17.1:20170221:*:*:pro:*:*:*",
"cpe:2.3:a:rapid7:metasploit:4.17.1:20170323:*:*:pro:*:*:*",
"cpe:2.3:a:rapid7:metasploit:4.17.1:20170405:*:*:pro:*:*:*",
"cpe:2.3:a:rapid7:metasploit:4.17.1:20170419:*:*:pro:*:*:*",
"cpe:2.3:a:rapid7:metasploit:4.17.1:20170510:*:*:pro:*:*:*",
"cpe:2.3:a:rapid7:metasploit:4.17.1:20170518:*:*:pro:*:*:*",
"cpe:2.3:a:rapid7:metasploit:4.17.1:20170530:*:*:pro:*:*:*",
"cpe:2.3:a:rapid7:metasploit:4.17.1:20170613:*:*:pro:*:*:*",
"cpe:2.3:a:rapid7:metasploit:4.17.1:20170627:*:*:pro:*:*:*",
"cpe:2.3:a:rapid7:metasploit:4.17.1:20170718:*:*:pro:*:*:*",
"cpe:2.3:a:rapid7:metasploit:4.17.1:20170731:*:*:pro:*:*:*",
"cpe:2.3:a:rapid7:metasploit:4.17.1:20170816:*:*:pro:*:*:*",
"cpe:2.3:a:rapid7:metasploit:4.17.1:20170828:*:*:pro:*:*:*",
"cpe:2.3:a:rapid7:metasploit:4.17.1:20170914:*:*:pro:*:*:*",
"cpe:2.3:a:rapid7:metasploit:4.17.1:20170926:*:*:pro:*:*:*",
"cpe:2.3:a:rapid7:metasploit:4.17.1:20171009:*:*:pro:*:*:*",
"cpe:2.3:a:rapid7:metasploit:4.17.1:20171030:*:*:pro:*:*:*",
"cpe:2.3:a:rapid7:metasploit:4.17.1:20171115:*:*:pro:*:*:*",
"cpe:2.3:a:rapid7:metasploit:4.17.1:20171129:*:*:pro:*:*:*",
"cpe:2.3:a:rapid7:metasploit:4.17.1:20171206:*:*:pro:*:*:*",
"cpe:2.3:a:rapid7:metasploit:4.17.1:20171220:*:*:pro:*:*:*",
"cpe:2.3:a:rapid7:metasploit:4.17.1:20180108:*:*:pro:*:*:*",
"cpe:2.3:a:rapid7:metasploit:4.17.1:20180124:*:*:pro:*:*:*",
"cpe:2.3:a:rapid7:metasploit:4.17.1:20180206:*:*:pro:*:*:*",
"cpe:2.3:a:rapid7:metasploit:4.17.1:20180301:*:*:pro:*:*:*",
"cpe:2.3:a:rapid7:metasploit:4.17.1:20180312:*:*:pro:*:*:*",
"cpe:2.3:a:rapid7:metasploit:4.17.1:20180327:*:*:pro:*:*:*",
"cpe:2.3:a:rapid7:metasploit:4.17.1:20180410:*:*:pro:*:*:*",
"cpe:2.3:a:rapid7:metasploit:4.17.1:20180501:*:*:pro:*:*:*",
"cpe:2.3:a:rapid7:metasploit:4.17.1:20180511:*:*:pro:*:*:*",
"cpe:2.3:a:rapid7:metasploit:4.17.1:20180526:*:*:pro:*:*:*",
"cpe:2.3:a:rapid7:metasploit:4.17.1:20180618:*:*:pro:*:*:*",
"cpe:2.3:a:rapid7:metasploit:4.17.1:20180704:*:*:pro:*:*:*",
"cpe:2.3:a:rapid7:metasploit:4.17.1:20180716:*:*:pro:*:*:*",
"cpe:2.3:a:rapid7:metasploit:4.17.1:20180727:*:*:pro:*:*:*",
"cpe:2.3:a:rapid7:metasploit:4.17.1:20180813:*:*:pro:*:*:*",
"cpe:2.3:a:rapid7:metasploit:4.17.1:20180827:*:*:pro:*:*:*",
"cpe:2.3:a:rapid7:metasploit:4.17.1:20180907:*:*:pro:*:*:*",
"cpe:2.3:a:rapid7:metasploit:4.17.1:20180924:*:*:pro:*:*:*",
"cpe:2.3:a:rapid7:metasploit:4.17.1:20181009:*:*:pro:*:*:*",
"cpe:2.3:a:rapid7:metasploit:4.17.1:20181022:*:*:pro:*:*:*",
"cpe:2.3:a:rapid7:metasploit:4.17.1:20181105:*:*:pro:*:*:*",
"cpe:2.3:a:rapid7:metasploit:4.17.1:20181130:*:*:pro:*:*:*",
"cpe:2.3:a:rapid7:metasploit:4.17.1:20181215:*:*:pro:*:*:*",
"cpe:2.3:a:rapid7:metasploit:4.17.1:20190108:*:*:pro:*:*:*",
"cpe:2.3:a:rapid7:metasploit:4.17.1:20190118:*:*:pro:*:*:*",
"cpe:2.3:a:rapid7:metasploit:4.17.1:20190201:*:*:pro:*:*:*",
"cpe:2.3:a:rapid7:metasploit:4.17.1:20190219:*:*:pro:*:*:*",
"cpe:2.3:a:rapid7:metasploit:4.17.1:20190303:*:*:pro:*:*:*",
"cpe:2.3:a:rapid7:metasploit:4.17.1:20190319:*:*:pro:*:*:*",
"cpe:2.3:a:rapid7:metasploit:4.17.1:20190331:*:*:pro:*:*:*",
"cpe:2.3:a:rapid7:metasploit:4.17.1:20190416:*:*:pro:*:*:*",
"cpe:2.3:a:rapid7:metasploit:4.17.1:20190426:*:*:pro:*:*:*",
"cpe:2.3:a:rapid7:metasploit:4.17.1:20190513:*:*:pro:*:*:*",
"cpe:2.3:a:rapid7:metasploit:4.17.1:20190603:*:*:pro:*:*:*",
"cpe:2.3:a:rapid7:metasploit:4.17.1:20190607:*:*:pro:*:*:*",
"cpe:2.3:a:rapid7:metasploit:4.17.1:20190626:*:*:pro:*:*:*",
"cpe:2.3:a:rapid7:metasploit:4.17.1:20190722:*:*:pro:*:*:*",
"cpe:2.3:a:rapid7:metasploit:4.17.1:20190805:*:*:pro:*:*:*",
"cpe:2.3:a:rapid7:metasploit:4.17.1:20190819:*:*:pro:*:*:*",
"cpe:2.3:a:rapid7:metasploit:4.17.1:20190910:*:*:pro:*:*:*",
"cpe:2.3:a:rapid7:metasploit:4.17.1:20190930:*:*:pro:*:*:*",
"cpe:2.3:a:rapid7:metasploit:4.17.1:20191014:*:*:pro:*:*:*",
"cpe:2.3:a:rapid7:metasploit:4.17.1:20191030:*:*:pro:*:*:*",
"cpe:2.3:a:rapid7:metasploit:4.17.1:20191108:*:*:pro:*:*:*",
"cpe:2.3:a:rapid7:metasploit:4.17.1:20191209:*:*:pro:*:*:*",
"cpe:2.3:a:rapid7:metasploit:4.17.1:20200113:*:*:pro:*:*:*",
"cpe:2.3:a:rapid7:metasploit:4.17.1:20200122:*:*:pro:*:*:*",
"cpe:2.3:a:rapid7:metasploit:4.17.1:20200131:*:*:pro:*:*:*",
"cpe:2.3:a:rapid7:metasploit:4.17.1:20200218:*:*:pro:*:*:*",
"cpe:2.3:a:rapid7:metasploit:4.17.1:20200302:*:*:pro:*:*:*",
"cpe:2.3:a:rapid7:metasploit:4.17.1:20200318:*:*:pro:*:*:*",
"cpe:2.3:a:rapid7:metasploit:4.17.1:20200330:*:*:pro:*:*:*",
"cpe:2.3:a:rapid7:metasploit:4.17.1:20200413:*:*:pro:*:*:*"
] | null | 6.1 | null | null | null |
RHSA-2018:0546
|
Red Hat Security Advisory: ceph security update
|
ceph: Unauthenticated malformed HTTP requests handled by rgw_civetweb.cc:RGW::init_env() can lead to denial of service
|
[
"cpe:/a:redhat:ceph_storage:3::el7"
] | null | null | 7.3 | null | null |
CVE-2013-2507
|
Multiple cross-site scripting (XSS) vulnerabilities in the Brother MFC-9970CDW printer with firmware G (1.03) allow remote attackers to inject arbitrary web script or HTML via the (1) id parameter to admin/log_to_net.html or (2) kind parameter to fax/copy_settings.html, a different vulnerability than CVE-2013-2670 and CVE-2013-2671.
|
[
"cpe:2.3:o:brother:mfc-9970cdw_firmware:g\\(1.03\\):*:*:*:*:*:*:*",
"cpe:2.3:h:brother:mfc-9970cdw:-:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
CVE-2022-28656
|
is_closing_session() allows users to consume RAM in the Apport process
|
[
"cpe:2.3:a:apport_project:apport:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:21.10:*:*:*:-:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:22.04:*:*:*:lts:*:*:*"
] | null | 5.5 | null | null | null |
|
GHSA-pcq6-7678-76ww
|
A vulnerability in the detection engine parsing of Pragmatic General Multicast (PGM) protocol packets for Cisco Firepower System Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition due to the Snort process unexpectedly restarting. The vulnerability is due to improper input validation of the fields in the PGM protocol packet. An attacker could exploit this vulnerability by sending a crafted PGM packet to the detection engine on the targeted device. An exploit could allow the attacker to cause a DoS condition if the Snort process restarts and traffic inspection is bypassed or traffic is dropped. This vulnerability affects Cisco Firepower System Software that has one or more file action policies configured and is running on any of the following Cisco products: Adaptive Security Appliance (ASA) 5500-X Series with FirePOWER Services; Adaptive Security Appliance (ASA) 5500-X Series Next-Generation Firewalls; Advanced Malware Protection (AMP) for Networks, 7000 Series Appliances; Advanced Malware Protection (AMP) for Networks, 8000 Series Appliances; Firepower 4100 Series Security Appliances; FirePOWER 7000 Series Appliances; FirePOWER 8000 Series Appliances; Firepower 9300 Series Security Appliances; FirePOWER Threat Defense for Integrated Services Routers (ISRs); Industrial Security Appliance 3000; Sourcefire 3D System Appliances; Virtual Next-Generation Intrusion Prevention System (NGIPSv) for VMware. Fixed versions: 5.4.0.10 5.4.1.9 6.0.1.3 6.1.0 6.2.0. Cisco Bug IDs: CSCuz00876.
|
[] | null | null | 8.6 | null | null |
|
GHSA-gx58-6vgh-h446
|
SQL injection vulnerability in Site Sift Listings allows remote attackers to execute arbitrary SQL commands via the id parameter in a detail action to index.php. NOTE: this issue might be site-specific.
|
[] | null | null | null | null | null |
|
CVE-2020-4851
|
IBM Spectrum Scale 5.0.0 through 5.0.5.5 and 5.1.0 through 5.1.0.2 could allow a local user to poison log files which could impact support and development efforts. IBM X-Force ID: 190450.
|
[
"cpe:2.3:a:ibm:spectrum_scale:*:*:*:*:*:*:*:*"
] | null | null | 4 | null | null |
|
GHSA-x86f-c5g7-4mrq
|
When copying a network request from the developer tools panel as a curl command the output was not being properly sanitized and could allow arbitrary commands to be hidden within. This vulnerability affects Firefox < 109, Thunderbird < 102.7, and Firefox ESR < 102.7.
|
[] | null | 6.5 | null | null | null |
|
CVE-2019-11686
|
Western Digital SanDisk X300, X300s, X400, and X600 devices: A vulnerability in the wear-leveling algorithm of the drive may cause cryptographically sensitive parameters (such as data encryption keys) to remain on the drive media after their intended erasure.
|
[
"cpe:2.3:o:westerndigital:sandisk_x600_sd9tb8w-128g_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:westerndigital:sandisk_x600_sd9tb8w-128g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:westerndigital:sandisk_x600_sd9tb8w-256g_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:westerndigital:sandisk_x600_sd9tb8w-256g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:westerndigital:sandisk_x600_sd9tb8w-512g_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:westerndigital:sandisk_x600_sd9tb8w-512g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:westerndigital:sandisk_x600_sd9tb8w-1t00_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:westerndigital:sandisk_x600_sd9tb8w-1t00:-:*:*:*:*:*:*:*",
"cpe:2.3:o:westerndigital:sandisk_x600_sd9tb8w-2t00_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:westerndigital:sandisk_x600_sd9tb8w-2t00:-:*:*:*:*:*:*:*",
"cpe:2.3:o:westerndigital:sandisk_x600_sd9tn8w-128g_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:westerndigital:sandisk_x600_sd9tn8w-128g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:westerndigital:sandisk_x600_sd9tn8w-256g_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:westerndigital:sandisk_x600_sd9tn8w-256g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:westerndigital:sandisk_x600_sd9tn8w-512g_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:westerndigital:sandisk_x600_sd9tn8w-512g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:westerndigital:sandisk_x600_sd9tn8w-1t00_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:westerndigital:sandisk_x600_sd9tn8w-1t00:-:*:*:*:*:*:*:*",
"cpe:2.3:o:westerndigital:sandisk_x600_sd9tn8w-2t00_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:westerndigital:sandisk_x600_sd9tn8w-2t00:-:*:*:*:*:*:*:*",
"cpe:2.3:o:westerndigital:sandisk_x600_sd9sb8w-128g_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:westerndigital:sandisk_x600_sd9sb8w-128g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:westerndigital:sandisk_x600_sd9sb8w-256g_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:westerndigital:sandisk_x600_sd9sb8w-256g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:westerndigital:sandisk_x600_sd9sb8w-512g_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:westerndigital:sandisk_x600_sd9sb8w-512g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:westerndigital:sandisk_x600_sd9sb8w-1t00_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:westerndigital:sandisk_x600_sd9sb8w-1t00:-:*:*:*:*:*:*:*",
"cpe:2.3:o:westerndigital:sandisk_x600_sd9sb8w-2t00_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:westerndigital:sandisk_x600_sd9sb8w-2t00:-:*:*:*:*:*:*:*",
"cpe:2.3:o:westerndigital:sandisk_x600_sd9sn8w-128g_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:westerndigital:sandisk_x600_sd9sn8w-128g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:westerndigital:sandisk_x600_sd9sn8w-256g_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:westerndigital:sandisk_x600_sd9sn8w-256g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:westerndigital:sandisk_x600_sd9sn8w-512g_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:westerndigital:sandisk_x600_sd9sn8w-512g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:westerndigital:sandisk_x600_sd9sn8w-1t00_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:westerndigital:sandisk_x600_sd9sn8w-1t00:-:*:*:*:*:*:*:*",
"cpe:2.3:o:westerndigital:sandisk_x600_sd9sn8w-2t00_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:westerndigital:sandisk_x600_sd9sn8w-2t00:-:*:*:*:*:*:*:*",
"cpe:2.3:o:westerndigital:sandisk_x300s_sd7sb3q-064g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:westerndigital:sandisk_x300s_sd7sb3q-064g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:westerndigital:sandisk_x300s_sd7sn3q-064g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:westerndigital:sandisk_x300s_sd7sn3q-064g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:westerndigital:sandisk_x300s_sd7ub2q-010t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:westerndigital:sandisk_x300s_sd7ub2q-010t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:westerndigital:sandisk_x300s_sd7ub2q-512g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:westerndigital:sandisk_x300s_sd7ub2q-512g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:westerndigital:sandisk_x300s_sd7ub3q-128g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:westerndigital:sandisk_x300s_sd7ub3q-128g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:westerndigital:sandisk_x300s_sd7ub3q-256g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:westerndigital:sandisk_x300s_sd7ub3q-256g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:westerndigital:sandisk_x300s_sd7un3q-128g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:westerndigital:sandisk_x300s_sd7un3q-128g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:westerndigital:sandisk_x300s_sd7un3q-256g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:westerndigital:sandisk_x300s_sd7un3q-256g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:westerndigital:sandisk_x300s_sd7un3q-512g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:westerndigital:sandisk_x300s_sd7un3q-512g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:westerndigital:sandisk_x400_sd8sb8u-128g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:westerndigital:sandisk_x400_sd8sb8u-128g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:westerndigital:sandisk_x400_sd8sb8u-128g-1122_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:westerndigital:sandisk_x400_sd8sb8u-128g-1122:-:*:*:*:*:*:*:*",
"cpe:2.3:o:westerndigital:sandisk_x400_sd8sb8u-1t00_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:westerndigital:sandisk_x400_sd8sb8u-1t00:-:*:*:*:*:*:*:*",
"cpe:2.3:o:westerndigital:sandisk_x400_sd8sb8u-1t00-1122_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:westerndigital:sandisk_x400_sd8sb8u-1t00-1122:-:*:*:*:*:*:*:*",
"cpe:2.3:o:westerndigital:sandisk_x400_sd8sb8u-256g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:westerndigital:sandisk_x400_sd8sb8u-256g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:westerndigital:sandisk_x400_sd8sb8u-256g-1122_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:westerndigital:sandisk_x400_sd8sb8u-256g-1122:-:*:*:*:*:*:*:*",
"cpe:2.3:o:westerndigital:sandisk_x400_sd8sb8u-512g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:westerndigital:sandisk_x400_sd8sb8u-512g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:westerndigital:sandisk_x400_sd8sb8u-512g-1122_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:westerndigital:sandisk_x400_sd8sb8u-512g-1122:-:*:*:*:*:*:*:*",
"cpe:2.3:o:westerndigital:sandisk_x400_sd8sn8u-128g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:westerndigital:sandisk_x400_sd8sn8u-128g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:westerndigital:sandisk_x400_sd8sn8u-128g-1122_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:westerndigital:sandisk_x400_sd8sn8u-128g-1122:-:*:*:*:*:*:*:*",
"cpe:2.3:o:westerndigital:sandisk_x400_sd8sn8u-1t00_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:westerndigital:sandisk_x400_sd8sn8u-1t00:-:*:*:*:*:*:*:*",
"cpe:2.3:o:westerndigital:sandisk_x400_sd8sn8u-1t00-1122_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:westerndigital:sandisk_x400_sd8sn8u-1t00-1122:-:*:*:*:*:*:*:*",
"cpe:2.3:o:westerndigital:sandisk_x400_sd8sn8u-256g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:westerndigital:sandisk_x400_sd8sn8u-256g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:westerndigital:sandisk_x400_sd8sn8u-256g-1122_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:westerndigital:sandisk_x400_sd8sn8u-256g-1122:-:*:*:*:*:*:*:*",
"cpe:2.3:o:westerndigital:sandisk_x400_sd8sn8u-512g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:westerndigital:sandisk_x400_sd8sn8u-512g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:westerndigital:sandisk_x400_sd8sn8u-512g-1122_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:westerndigital:sandisk_x400_sd8sn8u-512g-1122:-:*:*:*:*:*:*:*",
"cpe:2.3:o:westerndigital:sandisk_x400_sd8tb8u-128g-1122_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:westerndigital:sandisk_x400_sd8tb8u-128g-1122:-:*:*:*:*:*:*:*",
"cpe:2.3:o:westerndigital:sandisk_x400_sd8tb8u-1t00-1122_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:westerndigital:sandisk_x400_sd8tb8u-1t00-1122:-:*:*:*:*:*:*:*",
"cpe:2.3:o:westerndigital:sandisk_x400_sd8tb8u-256g-1122_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:westerndigital:sandisk_x400_sd8tb8u-256g-1122:-:*:*:*:*:*:*:*",
"cpe:2.3:o:westerndigital:sandisk_x400_sd8tb8u-512g-1122_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:westerndigital:sandisk_x400_sd8tb8u-512g-1122:-:*:*:*:*:*:*:*",
"cpe:2.3:o:westerndigital:sandisk_x300_sd7sb6s-128g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:westerndigital:sandisk_x300_sd7sb6s-128g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:westerndigital:sandisk_x300_sd7sb6s-256g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:westerndigital:sandisk_x300_sd7sb6s-256g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:westerndigital:sandisk_x300_sd7sb7s-010t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:westerndigital:sandisk_x300_sd7sb7s-010t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:westerndigital:sandisk_x300_sd7sb7s-512g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:westerndigital:sandisk_x300_sd7sb7s-512g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:westerndigital:sandisk_x300_sd7sf6s-128g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:westerndigital:sandisk_x300_sd7sf6s-128g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:westerndigital:sandisk_x300_sd7sf6s-256g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:westerndigital:sandisk_x300_sd7sf6s-256g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:westerndigital:sandisk_x300_sd7sf6s-512g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:westerndigital:sandisk_x300_sd7sf6s-512g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:westerndigital:sandisk_x300_sd7sn6s-128g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:westerndigital:sandisk_x300_sd7sn6s-128g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:westerndigital:sandisk_x300_sd7sn6s-256g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:westerndigital:sandisk_x300_sd7sn6s-256g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:westerndigital:sandisk_x300_sd7sn6s-512g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:westerndigital:sandisk_x300_sd7sn6s-512g:-:*:*:*:*:*:*:*"
] | null | 5.5 | null | 2.1 | null |
|
GHSA-hj6w-6w27-6783
|
IBM Concert Software 1.0.0, 1.0.1, 1.0.2, 1.0.2.1, and 1.0.3 could disclose sensitive system information to an unauthorized actor that could be used in further attacks against the system.
|
[] | null | 5.3 | null | null | null |
|
CVE-2022-27544
|
HCL BigFix Web Reports authorized users may see sensitive information in clear text
|
BigFix Web Reports authorized users may see SMTP credentials in clear text.
|
[
"cpe:2.3:a:hcltech:bigfix_platform:*:*:*:*:*:*:*:*"
] | null | 5 | null | null | null |
GHSA-ghfx-q992-xmjq
|
SQL injection vulnerability in the Live Chat (com_livechat) component 1.0 for Joomla! allows remote attackers to execute arbitrary SQL commands via the last parameter to getChatRoom.php. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
|
[] | null | null | null | null | null |
|
GHSA-78x5-r7gq-35h4
|
TEKNOTEL CBW700N 81.447.392110.729.024 devices allow remote attackers to discover credentials via iso.3.6.1.4.1.4491.2.4.1.1.6.1.1.0 and iso.3.6.1.4.1.4491.2.4.1.1.6.1.2.0 SNMP requests.
|
[] | null | null | 9.8 | null | null |
|
GHSA-2hj9-rhvv-rxfx
|
modules/gallery/helpers/data_rest.php in Gallery 3 before 3.0.9 allows remote attackers to bypass intended access restrictions and obtain sensitive information (image files) via the "full" string in the size parameter.
|
[] | null | null | null | null | null |
|
CVE-2021-36665
|
An issue was discovered in Druva 6.9.0 for macOS, allows attackers to gain escalated local privileges via the inSyncUpgradeDaemon.
|
[
"cpe:2.3:a:druva:insync_client:*:*:*:*:*:macos:*:*",
"cpe:2.3:a:druva:insync_client:*:*:*:*:*:windows:*:*"
] | null | 7.8 | null | 7.2 | null |
|
CVE-2014-9412
|
Multiple cross-site scripting (XSS) vulnerabilities in NetIQ Access Manager (NAM) 4.x before 4.1 allow remote attackers to inject arbitrary web script or HTML via (1) an arbitrary parameter to roma/jsp/debug/debug.jsp or (2) an arbitrary parameter in a debug.DumpAll action to nps/servlet/webacc, a different issue than CVE-2014-5216.
|
[
"cpe:2.3:a:microfocus:access_manager:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:microfocus:access_manager:4.0.1:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-3x83-p476-vv95
|
Downloads Resources over HTTP in selenium-standalone-painful
|
Affected versions of `selenium-standalone-painful` insecurely download an executable over an unencrypted HTTP connection.In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `selenium-standalone-painful`.RecommendationNo patch is currently available for this vulnerability.The best mitigation is currently to avoid using this package, using a different package if available.Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
[] | null | null | null | null | null |
ICSA-24-228-09
|
Siemens NX
|
The affected applications contains an out of bounds read vulnerability while parsing specially crafted PRT files. This could allow an attacker to crash the application or execute code in the context of the current process.
|
[] | null | 7.8 | null | null | null |
CVE-2021-22962
|
An attacker can send a specially crafted request which could lead to leakage of sensitive data or potentially a resource-based DoS attack.
|
[
"cpe:2.3:a:ivanti:avalanche:*:*:*:*:premise:*:*:*"
] | null | null | 7.3 | null | null |
|
GHSA-p72p-3m8j-v5mg
|
PreferencesPithosDialog.py in Pithos 0.3.7 does not properly restrict permissions for the .config/pithos.ini file in a user's home directory, which allows local users to obtain Pandora credentials by reading this file.
|
[] | null | null | null | null | null |
|
CVE-2017-8582
|
HTTP.sys in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an information disclosure vulnerability when the component improperly handles objects in memory, aka "Https.sys Information Disclosure Vulnerability".
|
[
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*"
] | null | null | 5.9 | 4.3 | null |
|
CVE-2020-27384
|
The Gw2-64.exe in Guild Wars 2 launcher version 106916 suffers from an elevation of privileges vulnerability which can be used by an "Authenticated User" to modify the existing executable file with a binary of his choice. The vulnerability exist due to the improper permissions, with the 'F' flag (Full Control) for 'Everyone' group, making the entire directory 'Guild Wars 2' and its files and sub-dirs world-writable.
|
[
"cpe:2.3:a:arena:guild_wars_2:106916:*:*:*:*:*:*:*"
] | null | 7.8 | null | 4.6 | null |
|
CVE-2023-33160
|
Microsoft SharePoint Server Remote Code Execution Vulnerability
|
Microsoft SharePoint Server Remote Code Execution Vulnerability
|
[
"cpe:2.3:a:microsoft:sharepoint_server:-:*:*:*:subscription:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_server:2016:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_server:2019:*:*:*:*:*:*:*"
] | null | 8.8 | null | null | null |
CVE-2022-23457
|
Path Traversal in ESAPI
|
ESAPI (The OWASP Enterprise Security API) is a free, open source, web application security control library. Prior to version 2.3.0.0, the default implementation of `Validator.getValidDirectoryPath(String, String, File, boolean)` may incorrectly treat the tested input string as a child of the specified parent directory. This potentially could allow control-flow bypass checks to be defeated if an attack can specify the entire string representing the 'input' path. This vulnerability is patched in release 2.3.0.0 of ESAPI. As a workaround, it is possible to write one's own implementation of the Validator interface. However, maintainers do not recommend this.
|
[
"cpe:2.3:a:owasp:enterprise_security_api:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:weblogic_server:12.2.1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:weblogic_server:14.1.1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:linux:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*",
"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
GHSA-7547-299x-4pmv
|
Improper session management vulnerability in Samsung Health prior to 6.20.1.005 prevents logging out from Samsung Health App.
|
[] | null | null | null | null | null |
|
GHSA-xq72-5mqw-j6rc
|
An issue was discovered in the Archibus app 4.0.3 for iOS. There is an XSS vulnerability in the create work request feature of the maintenance module, via the description field. This allows an attacker to perform an action on behalf of the user, exfiltrate data, and so on.
|
[] | null | 6.1 | null | null | null |
|
CVE-2008-6477
|
SQL injection vulnerability in Mumbo Jumbo Media OP4 allows remote attackers to execute arbitrary SQL commands via the id parameter to index.php.
|
[
"cpe:2.3:a:mumbojumbo:op4:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2022-41634
|
WordPress Media Library Folders plugin <= 7.1.1 - Cross-Site Request Forgery (CSRF) vulnerability
|
Cross-Site Request Forgery (CSRF) vulnerability in Media Library Folders plugin <= 7.1.1 on WordPress.
|
[
"cpe:2.3:a:maxfoundry:media_library_folders:*:*:*:*:*:wordpress:*:*"
] | null | 5.4 | null | null | null |
CVE-2023-49857
|
WordPress Awesome Support plugin <= 6.1.7 - Broken Access Control vulnerability
|
Missing Authorization vulnerability in Awesome Support Team Awesome Support allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Awesome Support: from n/a through 6.1.7.
|
[
"cpe:2.3:a:awesomesupport:awesome_support_wordpress_helpdesk_\\&_support:-:*:*:*:*:wordpress:*:*"
] | null | 6.5 | null | null | null |
CVE-2006-1731
|
Mozilla Firefox and Thunderbird 1.x before 1.5 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0 returns the Object class prototype instead of the global window object when (1) .valueOf.call or (2) .valueOf.apply are called without any arguments, which allows remote attackers to conduct cross-site scripting (XSS) attacks.
|
[
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla_suite:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla_suite:1.7.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla_suite:1.7.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla_suite:1.7.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla_suite:1.7.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla_suite:1.7.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:*:beta:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0:*:alpha:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.5:beta:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5:beta2:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-6gv9-w2gh-cw82
|
Microsoft Office Excel 2002 SP3 does not properly parse the Excel file format, which allows remote attackers to execute arbitrary code via a crafted spreadsheet, aka "Microsoft Office Excel Record Memory Corruption Vulnerability."
|
[] | null | null | null | null | null |
|
GHSA-wc3j-p7cf-6prx
|
Possible denial of service scenario due to improper handling of group management action frame in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking
|
[] | null | null | null | null | null |
|
GHSA-w545-4968-c9wr
|
Google Chrome before 27.0.1453.110 on Windows provides an incorrect handle to a renderer process in unspecified circumstances, which allows remote attackers to cause a denial of service or possibly have other impact via unknown vectors.
|
[] | null | null | null | null | null |
|
RHSA-2024:2890
|
Red Hat Security Advisory: bind and dhcp security update
|
bind9: Parsing large DNS messages may cause excessive CPU load bind9: KeyTrap - Extreme CPU consumption in DNSSEC validator bind9: Preparing an NSEC3 closest encloser proof can exhaust CPU resources
|
[
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/o:redhat:rhel_aus:8.2::baseos"
] | null | 7.5 | null | null | null |
CVE-2001-0387
|
Format string vulnerability in hfaxd in HylaFAX before 4.1.b2_2 allows local users to gain privileges via the -q command line argument.
|
[
"cpe:2.3:a:hylafax:hylafax:4.0_pl0:*:*:*:*:*:*:*",
"cpe:2.3:a:hylafax:hylafax:4.0_pl1:*:*:*:*:*:*:*",
"cpe:2.3:a:hylafax:hylafax:4.0_pl2:*:*:*:*:*:*:*",
"cpe:2.3:a:hylafax:hylafax:4.1_beta1:*:*:*:*:*:*:*",
"cpe:2.3:a:hylafax:hylafax:4.1_beta2:*:*:*:*:*:*:*",
"cpe:2.3:a:hylafax:hylafax:4.1_beta3:*:*:*:*:*:*:*"
] | null | null | null | 7.2 | null |
|
GHSA-g89c-gj6q-v3fw
|
mediaserver in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-07-01 does not limit process-memory usage, which allows remote attackers to cause a denial of service (device hang or reboot) via a crafted media file, aka internal bug 28615448.
|
[] | null | null | 7.5 | null | null |
|
GHSA-c3xx-grhv-v8fg
|
Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK & Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, and CVE-2015-8454.
|
[] | null | null | null | null | null |
|
CVE-2022-1957
|
Comment License < 1.4.0 - Arbitrary Settings Update via CSRF
|
The Comment License WordPress plugin before 1.4.0 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack
|
[
"cpe:2.3:a:comment_license_project:comment_license:*:*:*:*:*:wordpress:*:*"
] | null | 4.3 | null | 4.3 | null |
cisco-sa-fmc-cmd-inj-Z3B5MY35
|
Cisco Firepower Management Center Software Command Injection Vulnerabilities
|
Multiple vulnerabilities in the web management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to execute arbitrary commands on the underlying operating system.
These vulnerabilities are due to insufficient validation of user-supplied parameters for certain API endpoints. An attacker could exploit these vulnerabilities by sending crafted input to an affected API endpoint. A successful exploit could allow an attacker to execute arbitrary commands on the device with low system privileges. To successfully exploit these vulnerabilities, an attacker would need valid credentials for a user who has Devices permissions. By default, only Administrator, Security Approver and Network Admin roles have these permissions.
Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.
This advisory is part of the November 2022 release of the Cisco ASA, FTD, and FMC Security Advisory Bundled publication. For a complete list of the advisories and links to them, see Cisco Event Response: November 2022 Semiannual Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication ["https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-74838"].
|
[] | null | 6.3 | null | null | null |
GHSA-6r9v-xg29-4gfg
|
The Art Theme for WordPress is vulnerable to unauthorized access due to a missing capability check on the 'arttheme_theme_option_restore' AJAX function in all versions up to, and including, 3.12.2.3. This makes it possible for authenticated attackers, with subscriber-level access and above, to delete the theme option.
|
[] | null | 4.3 | null | null | null |
|
RHSA-2024:0234
|
Red Hat Security Advisory: java-11-openjdk security update
|
OpenJDK: array out-of-bounds access due to missing range check in C1 compiler (8314468) OpenJDK: JVM class file verifier flaw allows unverified bytecode execution (8314295) OpenJDK: range check loop optimization issue (8314307) OpenJDK: arbitrary Java code execution in Nashorn (8314284) OpenJDK: logging of digital signature private keys (8316976) OpenJDK: RSA padding issue and timing side-channel attack against TLS (8317547)
|
[
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 7.4 | null | null | null |
CVE-2005-4511
|
Format string vulnerability in TN3270 Resource Gateway 1.1.0 allows local users to cause a denial of service and possibly execute arbitrary code via format string specifiers in syslog function calls.
|
[
"cpe:2.3:a:curtis_hawthorne:tn3270_resource_gateway:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:curtis_hawthorne:tn3270_resource_gateway:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:curtis_hawthorne:tn3270_resource_gateway:1.1.0:*:*:*:*:*:*:*"
] | null | null | null | 4.6 | null |
|
CVE-2006-2212
|
Buffer overflow in KarjaSoft Sami FTP Server 2.0.2 and earlier allows remote attackers to execute arbitrary code via a long (1) USER or (2) PASS command.
|
[
"cpe:2.3:a:karjasoft:sami_ftp_server:2.0.2:*:*:*:*:*:*:*"
] | null | null | null | 6.4 | null |
|
CVE-2025-43864
|
React Router allows a DoS via cache poisoning by forcing SPA mode
|
React Router is a router for React. Starting in version 7.2.0 and prior to version 7.5.2, it is possible to force an application to switch to SPA mode by adding a header to the request. If the application uses SSR and is forced to switch to SPA, this causes an error that completely corrupts the page. If a cache system is in place, this allows the response containing the error to be cached, resulting in a cache poisoning that strongly impacts the availability of the application. This issue has been patched in version 7.5.2.
|
[] | null | 7.5 | null | null | null |
GHSA-vvr6-2w5f-52qh
|
A vulnerability has been identified in Tecnomatix Plant Simulation (All versions < V2201.0006). The affected application contains an out of bounds write past the end of an allocated buffer while parsing a specially crafted SPP file. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-19807)
|
[] | null | 7.8 | null | null | null |
|
GHSA-xw43-24rr-hxcr
|
Cross-site scripting (XSS) vulnerability in Google Chrome before 22.0.1229.79 allows remote attackers to inject arbitrary web script or HTML via vectors involving frames, aka "Universal XSS (UXSS)."
|
[] | null | null | null | null | null |
|
CVE-2020-1073
|
A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka 'Scripting Engine Memory Corruption Vulnerability'.
|
[
"cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:chakracore:*:*:*:*:*:*:*:*"
] | null | 8.1 | null | 9.3 | null |
|
GHSA-8rpg-rw6g-v4jc
|
Adobe Flash Player versions 25.0.0.127 and earlier have an exploitable memory corruption vulnerability in the ActionScript2 code parser. Successful exploitation could lead to arbitrary code execution.
|
[] | null | null | 9.8 | null | null |
|
CVE-2008-6624
|
SQL injection vulnerability in getin.php in WEBBDOMAIN Petition 1.02, 2.0, and 3.0 allows remote attackers to execute arbitrary SQL commands via the username parameter.
|
[
"cpe:2.3:a:webbdomain:petition:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:webbdomain:petition:1.02:*:*:*:*:*:*:*",
"cpe:2.3:a:webbdomain:petition:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:webbdomain:petition:3.0:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2018-20456
|
In radare2 prior to 3.1.1, the parseOperand function inside libr/asm/p/asm_x86_nz.c may allow attackers to cause a denial of service (application crash in libr/util/strbuf.c via a stack-based buffer over-read) by crafting an input file, a related issue to CVE-2018-20455.
|
[
"cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*"
] | null | null | 5.5 | 4.3 | null |
|
CVE-2017-2226
|
Untrusted search path vulnerability in Setup file of advance preparation for e-Tax software (WEB version) (1.17.1) and earlier allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.
|
[
"cpe:2.3:a:nta:e-tax:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | 6.8 | null |
|
CVE-2016-1379
|
Cisco Adaptive Security Appliance (ASA) Software 9.0 through 9.5.1 mishandles IPsec error processing, which allows remote authenticated users to cause a denial of service (memory consumption) via crafted (1) LAN-to-LAN or (2) Remote Access VPN tunnel packets, aka Bug ID CSCuv70576.
|
[
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.2.10:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.3.6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.3.8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.7:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.17:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.20:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.24:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.26:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.29:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.33:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.35:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.37:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.2.8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.4.5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.5.10:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.5.12:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.5.15:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.5.21:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.6.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.6.6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.6.8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2\\(0.0\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2\\(0.104\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2\\(3.1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.2.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.2.7:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.2.8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.3.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.3.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3\\(1.50\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3\\(1.105\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3\\(2.100\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3\\(2.243\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.3.5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.3.6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.0.115:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.1.5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.5.1:*:*:*:*:*:*:*"
] | null | null | 6.5 | 6.8 | null |
|
CVE-2017-11079
|
In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, while processing sparse image, uninitialized heap memory can potentially be flashed due to the lack of validation of sparse image block header size.
|
[
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 | null |
|
GHSA-3724-4mmc-j59x
|
NoMachine Enterprise Desktop is affected by Buffer Overflow. IOCTL Handler 0x22001B in the NoMachine Enterprise Desktop above 4.0.346 and below 7.7.4 allow local attackers to execute arbitrary code in kernel mode or cause a denial of service (memory corruption and OS crash) via specially crafted I/O Request Packet.
|
[] | null | null | null | null | null |
|
CVE-2019-4695
|
IBM Security Guardium Data Encryption (GDE) 3.0.0.2 allows web pages to be stored locally which can be read by another user on the system. IBM X-Force ID: 171926.
|
[
"cpe:2.3:a:ibm:guardium_data_encryption:3.0.0.2:*:*:*:*:*:*:*"
] | null | null | 4 | null | null |
|
CVE-2024-26927
|
ASoC: SOF: Add some bounds checking to firmware data
|
In the Linux kernel, the following vulnerability has been resolved:
ASoC: SOF: Add some bounds checking to firmware data
Smatch complains about "head->full_size - head->header_size" can
underflow. To some extent, we're always going to have to trust the
firmware a bit. However, it's easy enough to add a check for negatives,
and let's add a upper bounds check as well.
|
[
"cpe:2.3:a:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"
] | null | 8.4 | null | null | null |
GHSA-j2wm-vcg8-rf5v
|
An issue was discovered in phpMyAdmin. Username matching for the allow/deny rules may result in wrong matches and detection of the username in the rule due to non-constant execution time. All 4.6.x versions (prior to 4.6.5), 4.4.x versions (prior to 4.4.15.9), and 4.0.x versions (prior to 4.0.10.18) are affected.
|
[] | null | null | 5.3 | null | null |
|
GHSA-pjwm-cr36-mwv3
|
ReDoS in giskard's transformation.py (GHSL-2024-324)
|
ReDoS in Giskard text perturbation detectorA Remote Code Execution (ReDoS) vulnerability was discovered in Giskard component by the [GitHub Security Lab](https://securitylab.github.com) team. When processing datasets with specific text patterns with Giskard detectors, this vulnerability could trigger exponential regex evaluation times, potentially leading to denial of service.DetailsThe vulnerability affects Giskard's punctuation removal transformation used in the text perturbation detection. A regex used to detect URLs and links was vulnerable to catastrophic backtracking that could be triggered by specific patterns in the text.Affected versionGiskard versions prior to 2.15.5 are affected. Users should upgrade to version 2.15.5 or later, which includes a fix for this vulnerability.ImpactThis vulnerability can cause extended computation times or crashes in Giskard when processing text containing certain patterns.CreditThis issue was discovered and reported by GHSL team member [@kevinbackhouse (Kevin Backhouse)](https://github.com/kevinbackhouse).
|
[] | 6.9 | null | null | null | null |
GHSA-g94p-m365-483p
|
Verizon LVSKIHP 5G outside devices through 2022-02-15 allow anyone (knowing the device's serial number) to access a CPE admin website, e.g., at the 10.0.0.1 IP address. The password (for the verizon username) is calculated by concatenating the serial number and the model (i.e., the LVSKIHP string), running the sha256sum program, and extracting the first seven characters concatenated with the last seven characters of that SHA-256 value.
|
[] | null | 8.1 | null | null | null |
|
CVE-2022-26266
|
Piwigo v12.2.0 was discovered to contain a SQL injection vulnerability via pwg.users.php.
|
[
"cpe:2.3:a:piwigo:piwigo:12.2.0:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.5 | null |
|
GHSA-6c6g-x473-fqjx
|
Insufficiently Protected Credentials vulnerability in client environment of Hitachi ABB Power Grids Retail Operations and Counterparty Settlement Billing (CSB) allows an attacker or unauthorized user to access database credentials, shut down the product and access or alter. This issue affects: Hitachi ABB Power Grids Retail Operations version 5.7.2 and prior versions. Hitachi ABB Power Grids Counterparty Settlement Billing (CSB) version 5.7.2 and prior versions.
|
[] | null | 7.2 | null | null | null |
|
GHSA-prxq-rjvh-533j
|
Cross-site scripting (XSS) vulnerability in Colony CMS 2.75 and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified search parameters.
|
[] | null | null | null | null | null |
|
PYSEC-2017-148
| null |
Cross-site scripting (XSS) vulnerability in ZMI pages that use the manage_tabs_message in Zope 2.11.4, 2.11.2, 2.10.9, 2.10.7, 2.10.6, 2.10.5, 2.10.4, 2.10.2, 2.10.1, 2.12.
|
[] | null | null | 6.1 | null | null |
GHSA-f25p-chr4-q25h
|
Huawei Mate 9 and Mate 9 pro smart phones with software the versions before MHA-AL00B 8.0.0.334(C00); the versions before LON-AL00B 8.0.0.334(C00) have a information leak vulnerability in the date service proxy implementation. An attacker may trick a user into installing a malicious application and application can exploit the vulnerability to get kernel date which may cause sensitive information leak.
|
[] | null | null | 5.5 | null | null |
|
GHSA-p5p4-pp89-v937
|
AyaCMS v3.1.2 has an Arbitrary File Upload vulnerability.
|
[] | null | 8.8 | null | null | null |
|
CVE-2025-32572
|
WordPress Kata Plus Plugin <= 1.5.2 - PHP Object Injection vulnerability
|
Deserialization of Untrusted Data vulnerability in Climax Themes Kata Plus allows Object Injection. This issue affects Kata Plus: from n/a through 1.5.2.
|
[] | null | 9.8 | null | null | null |
CVE-2012-5565
|
Cross-site scripting (XSS) vulnerability in js/compose-dimp.js in Horde Internet Mail Program (IMP) before 5.0.24, as used in Horde Groupware Webmail Edition before 4.0.9, allows remote attackers to inject arbitrary web script or HTML via a crafted name for an attached file, related to the dynamic view.
|
[
"cpe:2.3:a:horde:imp:*:*:*:*:*:*:*:*",
"cpe:2.3:a:horde:imp:5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:horde:imp:5.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:horde:imp:5.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:horde:imp:5.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:horde:imp:5.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:horde:imp:5.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:horde:imp:5.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:horde:imp:5.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:horde:imp:5.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:horde:imp:5.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:horde:imp:5.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:horde:imp:5.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:horde:imp:5.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:horde:imp:5.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:horde:imp:5.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:horde:imp:5.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:horde:imp:5.0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:horde:imp:5.0.21:*:*:*:*:*:*:*",
"cpe:2.3:a:horde:imp:5.0.22:*:*:*:*:*:*:*",
"cpe:2.3:a:horde:groupware:*:*:webamail:*:*:*:*:*",
"cpe:2.3:a:horde:groupware:4.0:*:webamail:*:*:*:*:*",
"cpe:2.3:a:horde:groupware:4.0:rc1:webamail:*:*:*:*:*",
"cpe:2.3:a:horde:groupware:4.0:rc2:webamail:*:*:*:*:*",
"cpe:2.3:a:horde:groupware:4.0.1:*:webamail:*:*:*:*:*",
"cpe:2.3:a:horde:groupware:4.0.2:*:webamail:*:*:*:*:*",
"cpe:2.3:a:horde:groupware:4.0.3:*:webamail:*:*:*:*:*",
"cpe:2.3:a:horde:groupware:4.0.4:*:webamail:*:*:*:*:*",
"cpe:2.3:a:horde:groupware:4.0.5:*:webamail:*:*:*:*:*",
"cpe:2.3:a:horde:groupware:4.0.6:*:webamail:*:*:*:*:*",
"cpe:2.3:a:horde:groupware:4.0.7:*:webamail:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
CVE-2022-33742
|
Linux disk/nic frontends data leaks T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Linux Block and Network PV device frontends don't zero memory regions before sharing them with the backend (CVE-2022-26365, CVE-2022-33740). Additionally the granularity of the grant table doesn't allow sharing less than a 4K page, leading to unrelated data residing in the same 4K page as data shared with a backend being accessible by such backend (CVE-2022-33741, CVE-2022-33742).
|
[
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.12:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.12:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.12:rc5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.12:rc6:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.19:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.19:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.19:rc5:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:-:*:*:*:*:*:*:*"
] | null | 7.1 | null | 3.6 | null |
|
GHSA-9xfp-2644-5v32
|
Improper buffer restrictions in some Intel(R) Thunderbolt(TM) DCH drivers for Windows before version 88 may allow a privileged user to potentially enable escalation of privilege via local access.
|
[] | null | 6.1 | null | null | null |
|
GHSA-f8qc-p4j7-6757
|
Cross-site request forgery (CSRF) vulnerability in Exinda WAN Optimization Suite 7.0.0 (2160) allows remote attackers to hijack the authentication of administrators for requests that change the admin password via a request to admin/launch.
|
[] | null | null | null | null | null |
|
CVE-2023-26454
|
Requests to fetch image metadata could be abused to include SQL queries that would be executed unchecked. Exploiting this vulnerability requires at least access to adjacent networks of the imageconverter service, which is not exposed to public networks by default. Arbitrary SQL statements could be executed in the context of the services database user account. API requests are now properly checked for valid content and attempts to circumvent this check are being logged as error. No publicly available exploits are known.
|
[
"cpe:2.3:a:open-xchange:open-xchange_appsuite:*:*:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:-:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6069:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6073:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6080:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6085:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6093:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6102:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6112:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6121:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6133:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6138:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6141:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6146:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6147:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6148:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6150:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6156:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6161:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6166:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6173:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6176:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6178:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6189:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6194:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6199:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6204:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6205:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6209:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6210:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6214:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6215:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6216:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6218:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6219:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6220:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6227:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6230:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6233:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6235:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6236:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6239:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6241:*:*:*:*:*:*"
] | null | 7.6 | null | null | null |
|
GHSA-v5vc-xx2v-57v7
|
In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Mobile and Snapdragon Wear MDM9206, MDM9607, MDM9635M, MSM8909W, SD 210/SD 212/SD 205, SD 400, SD 410/12, SD 425, SD 430, SD 615/16/SD 415, SD 617, SD 800, SD 808, and SD 810, when making a high speed Dual Carrier Downlink Data call in a multicell environment, a buffer overflow may occur.
|
[] | null | null | 9.8 | null | null |
|
GHSA-gmpq-xrxj-xh8m
|
Arches vulnerable to execution of arbitrary SQL
|
ImpactWith a carefully crafted web request, it's possible to execute certain unwanted sql statements against the database.
Anyone running the impacted versions (<=6.1.1, 6.2.0, >=7.0.0, <=7.1.1) should upgrade as soon as possible.PatchesThe problem has been patched in the following versions: [6.1.2](https://pypi.org/project/arches/6.1.2/), [6.2.1](https://pypi.org/project/arches/6.2.1/), and [7.2.0](https://pypi.org/project/arches/7.2.0/)
Users are strongly urged to upgrade to the most recent relevant patch.WorkaroundsThere are no workarounds.General Referenceshttps://www.w3schools.com/sql/sql_injection.asp
https://en.wikipedia.org/wiki/SQL_injectionFor more informationPost any questions to the [Arches project forum](https://community.archesproject.org/).
|
[] | null | 8.6 | null | null | null |
GHSA-q4cp-jqj9-c4cv
|
An out-of-bounds read was addressed with improved input validation. This issue is fixed in macOS Big Sur 11.0.1. A malicious application may be able to read restricted memory.
|
[] | null | null | null | null | null |
|
GHSA-w2rh-7p2w-889c
|
The SimpleXMLRPCServer library module in Python 2.2, 2.3 before 2.3.5, and 2.4, when used by XML-RPC servers that use the register_instance method to register an object without a _dispatch method, allows remote attackers to read or modify globals of the associated module, and possibly execute arbitrary code, via dotted attributes.
|
[] | null | null | null | null | null |
|
CVE-2017-11302
|
An issue was discovered in Adobe InDesign 12.1.0 and earlier versions. An exploitable memory corruption vulnerability exists. Successful exploitation could lead to arbitrary code execution.
|
[
"cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*"
] | null | null | 9.8 | 10 | null |
|
GHSA-ggf6-638m-vqmg
|
Netmaker vulnerable to Insufficient Granularity of Access Control
|
ImpactImproper Authorization functions leads to non-privileged users running privileged API calls. If you have added users to your Netmaker platform who whould not have admin privileges, they could use their auth token to run admin-level functions via the API.In addition, differing response codes based on function calls allowed non-users to potentially brute force the determination of names of networks on the system.PatchesThis problem has been patched in v0.15.1. To apply:docker-compose downdocker pull gravitl/netmaker:v0.15.1docker-compose up -dFor more informationIf you have any questions or comments about this advisory:Email us at [[email protected]](mailto:[email protected])
This vulnerability was brought to our attention by @tweidinger
|
[] | null | 8.8 | null | null | null |
CVE-2021-25479
|
A possible heap-based buffer overflow vulnerability in Exynos CP Chipset prior to SMR Oct-2021 Release 1 allows arbitrary memory write and code execution.
|
[
"cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:h:samsung:exynos:-:*:*:*:*:*:*:*"
] | null | 7.2 | null | null | null |
|
GHSA-vpxw-jphr-pjhp
|
The ktimer feature (sys/kern/kern_time.c) in FreeBSD 7.0, 7.1, and 7.2 allows local users to overwrite arbitrary kernel memory via an out-of-bounds timer value.
|
[] | null | null | null | null | null |
|
GHSA-qhrx-hcm6-pmrw
|
Unsafe deserialization in SmtpTransport in CakePHP
|
An issue was discovered in SmtpTransport in CakePHP 3.7.6. An unserialized object with modified internal properties can trigger arbitrary file overwriting upon destruction.
|
[] | null | null | 7.5 | null | null |
CVE-2021-24182
|
Tutor LMS < 1.8.3 - SQL Injection via tutor_quiz_builder_get_answers_by_question
|
The tutor_quiz_builder_get_answers_by_question AJAX action from the Tutor LMS – eLearning and online course solution WordPress plugin before 1.8.3 was vulnerable to UNION based SQL injection that could be exploited by students.
|
[
"cpe:2.3:a:themeum:tutor_lms:*:*:*:*:*:wordpress:*:*"
] | null | 6.5 | null | 4 | null |
GHSA-43g4-6p45-h9cf
|
The FTP proxy server in Apple AirPort Express, AirPort Extreme, and Time Capsule with firmware 7.5 does not restrict the IP address and port specified in a PORT command from a client, which allows remote attackers to leverage intranet FTP servers for arbitrary TCP forwarding via a crafted PORT command.
|
[] | null | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.