id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2020-7161 | A reporttaskselect expression language injection remote code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07). | [
"cpe:2.3:a:hp:intelligent_management_center:*:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:-:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0501:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0503:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0503p02:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0504:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0504p02:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0504p04:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0504p2:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0504p4:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0506:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0506p02:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0506p03:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0506p07:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0506p09:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0605:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0605h02:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0605h05:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0605p04:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0605p06:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0705:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0705p02:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0705p04:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0705p06:*:*:*:*:*:*"
] | null | 9.8 | null | 10 |
|
GHSA-8vf7-3qv8-h36g | Os Commerce is currently susceptible to a Cross-Site Scripting (XSS) vulnerability.
This vulnerability allows attackers to inject JS through the "email_templates_key" parameter,
potentially leading to unauthorized execution of scripts within a user's web browser. | [] | null | 8.8 | null | null |
|
CVE-2023-28118 | kaml has potential denial of service while parsing input with anchors and aliases | kaml provides YAML support for kotlinx.serialization. Prior to version 0.53.0, applications that use kaml to parse untrusted input containing anchors and aliases may consume excessive memory and crash. Version 0.53.0 and later default to refusing to parse YAML documents containing anchors and aliases. There are no known workarounds. | [
"cpe:2.3:a:kaml_project:kaml:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
CVE-2024-27951 | WordPress Multiple Page Generator Plugin <= 3.4.0 - Auth. Remote Code Execution (RCE) vulnerability | Unrestricted Upload of File with Dangerous Type vulnerability in Themeisle Multiple Page Generator Plugin – MPG allows Upload a Web Shell to a Web Server.This issue affects Multiple Page Generator Plugin – MPG: from n/a through 3.4.0.
| [
"cpe:2.3:a:themeisle:multiple_page_generator:*:*:*:*:*:*:*:*"
] | null | 9.1 | null | null |
CVE-2023-50101 | JFinalcms 5.0.0 is vulnerable to Cross Site Scripting (XSS) via Label management editing. | [
"cpe:2.3:a:jfinalcms_project:jfinalcms:5.0.0:*:*:*:*:*:*:*"
] | null | 5.4 | null | null |
|
GHSA-22mj-r7hq-f9h2 | Improper Verification of Cryptographic Signature vulnerability in LibreOffice allows PDF Signature Spoofing by Improper Validation.In the affected versions of LibreOffice a flaw in the verification code for adbe.pkcs7.sha1 signatures could cause invalid signatures to be accepted as validThis issue affects LibreOffice: from 24.8 before < 24.8.6, from 25.2 before < 25.2.2. | [] | 2.4 | null | null | null |
|
CVE-2010-5239 | Untrusted search path vulnerability in DAEMON Tools Lite 4.35.6.0091 and Pro Standard 4.36.0309.0160 allows local users to gain privileges via a Trojan horse mfc80loc.dll file in the current working directory, as demonstrated by a directory that contains a .mds file. NOTE: some of these details are obtained from third party information. | [
"cpe:2.3:a:daemon-tools:daemon_tools:4.35.6.0091:*:lite:*:*:*:*:*",
"cpe:2.3:a:daemon-tools:daemon_tools:4.36.0309.0160:*:pro_standard:*:*:*:*:*"
] | null | null | null | 6.9 |
|
CVE-2017-5845 | The gst_avi_demux_parse_ncdt function in gst/avi/gstavidemux.c in gst-plugins-good in GStreamer before 1.10.3 allows remote attackers to cause a denial of service (invalid memory read and crash) via a ncdt sub-tag that "goes behind" the surrounding tag. | [
"cpe:2.3:a:gstreamer_project:gstreamer:*:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
GHSA-9pgh-4g73-wwx9 | In Splunk App for Stream versions below 8.1.1, a low-privileged user could use a vulnerability in the streamfwd process within the Splunk App for Stream to escalate their privileges on the machine that runs the Splunk Enterprise instance, up to and including the root user. | [] | null | 7.8 | null | null |
|
RHSA-2024:5258 | Red Hat Security Advisory: container-tools:rhel8 security update | golang: net/http: golang: mime/multipart: golang: net/textproto: memory exhaustion in Request.ParseMultipartForm golang-fips/openssl: Memory leaks in code encrypting and decrypting RSA payloads containers/image: digest type does not guarantee valid type go-retryablehttp: url might write sensitive information to log file golang: crypto/x509: Verify panics on certificates with an unknown public key algorithm golang: net/mail: comments in display names are incorrectly handled golang: archive/zip: Incorrect handling of certain ZIP files gorilla/schema: Potential memory exhaustion attack due to sparse slice deserialization | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
GHSA-j5jw-xrqm-q6mg | Microsoft Project Server 2013 SP1 and Microsoft SharePoint Enterprise Server 2016 allow an elevation of privilege vulnerability to due how specially crafted web requests are sanitized, aka "Microsoft SharePoint Elevation of Privilege Vulnerability". This CVE is unique from CVE-2018-0909, CVE-2018-0911, CVE-2018-0912, CVE-2018-0913, CVE-2018-0914, CVE-2018-0915, CVE-2018-0916, CVE-2018-0917, CVE-2018-0921, CVE-2018-0923, CVE-2018-0944 and CVE-2018-0947. | [] | null | null | 8.8 | null |
|
GHSA-9h42-jv2f-gc8x | A vulnerability classified as critical has been found in TOTOLINK A720R 4.1.5. Affected is the function exportOvpn. The manipulation leads to os command injection. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The vendor was contacted early about this disclosure but did not respond in any way. | [] | 2.3 | 5 | null | null |
|
GHSA-4fgx-xv5w-xfcp | Inappropriate implementation in Autofill in Google Chrome prior to 97.0.4692.99 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. | [] | null | null | null | null |
|
CVE-2024-38469 | zhimengzhe iBarn v1.5 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the $search parameter at /pay.php. | [
"cpe:2.3:a:ibarn_project:ibarn:1.5:*:*:*:*:*:*:*"
] | null | 6.3 | null | null |
|
CVE-2021-28681 | Pion WebRTC before 3.0.15 didn't properly tear down the DTLS Connection when certificate verification failed. The PeerConnectionState was set to failed, but a user could ignore that and continue to use the PeerConnection. )A WebRTC implementation shouldn't allow the user to continue if verification has failed.) | [
"cpe:2.3:a:webrtc_project:webrtc:*:*:*:*:*:*:*:*"
] | null | 5.3 | null | 5 |
|
CVE-2024-13901 | Counter Box: Add Engaging Countdowns, Timers & Counters to Your WordPress Site <= 2.0.6 - Authenticated (Administrator+) DOM-Based Stored Cross-Site Scripting | The Counter Box: Add Engaging Countdowns, Timers & Counters to Your WordPress Site plugin for WordPress is vulnerable to DOM-Based Stored Cross-Site Scripting via the ‘content’ parameter in all versions up to, and including, 2.0.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. | [] | null | 4.4 | null | null |
CVE-2023-26942 | Weak encryption mechanisms in RFID Tags in Yale IA-210 Alarm v1.0 allows attackers to create a cloned tag via physical proximity to the original. | [
"cpe:2.3:o:assaabloy:yale_ia-210_firmware:1.0:*:*:*:*:*:*:*",
"cpe:2.3:h:assaabloy:yale_ia-210:-:*:*:*:*:*:*:*"
] | null | 6.5 | null | null |
|
CVE-2023-4498 | Authentication Bypass in Tenda N300 Wireless N VDSL2 Modem Router | Tenda N300 Wireless N VDSL2 Modem Router allows unauthenticated access to pages that in turn should be accessible to authenticated users only | [
"cpe:2.3:h:tenda:n300_wireless_n_vdsl2_modem_router:*:*:*:*:*:*:*:*",
"cpe:2.3:o:tenda:n300_firmware:53.0.1.6:*:*:*:*:*:*:*",
"cpe:2.3:h:tenda:n300:-:*:*:*:*:*:*:*"
] | null | 5.3 | null | null |
GHSA-698p-cwrw-qvv2 | Memory corruption in Automotive GPU while querying a gsl memory node. | [] | null | 8.4 | null | null |
|
CVE-2023-30798 | MultipartParser DOS with too many fields or files in Starlette Framework | There MultipartParser usage in Encode's Starlette python framework before versions 0.25.0 allows an unauthenticated and remote attacker to specify any number of form fields or files which can cause excessive memory usage resulting in denial of service of the HTTP service. | [
"cpe:2.3:a:encode:starlette:*:*:*:*:*:python:*:*"
] | null | 7.5 | null | null |
RHSA-2025:1053 | Red Hat Security Advisory: Red Hat OpenShift Service Mesh Containers for 2.6.5 | golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html envoy: HTTP/1: sending overload crashes when the request is reset beforehand in envoy | [
"cpe:/a:redhat:service_mesh:2.6::el8",
"cpe:/a:redhat:service_mesh:2.6::el9"
] | null | 7.5 | null | null |
GHSA-p3vf-x6xc-g2vh | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in GoldAddons Gold Addons for Elementor allows Stored XSS.This issue affects Gold Addons for Elementor: from n/a through 1.2.9. | [] | null | 6.5 | null | null |
|
GHSA-42mj-wjw2-4gxp | iRedMail version prior to commit f04b8ef contains a Insecure Permissions vulnerability in Roundcube Webmail that can result in Exfiltrate a user's password protected secret GPG key file and other important configuration files.. This attack appear to be exploitable via network connectivity. This vulnerability appears to have been fixed in Beta: 0.9.8-BETA1, Stable: 0.9.7. | [] | null | null | 7.5 | null |
|
CVE-2019-2426 | Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 7u201, 8u192 and 11.0.1; Java SE Embedded: 8u191. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N). | [
"cpe:2.3:a:oracle:jdk:1.7.0:update201:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.8.0:update191:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.8.0:update192:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:11.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update201:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.8.0:update191:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.8.0:update192:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:11.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*",
"cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
"cpe:2.3:a:netapp:oncommand_workflow_automation:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*",
"cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*",
"cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*"
] | null | 3.7 | null | 4.3 |
|
CVE-2024-22567 | File Upload vulnerability in MCMS 5.3.5 allows attackers to upload arbitrary files via crafted POST request to /ms/file/upload.do. | [
"cpe:2.3:a:mingsoft:mcms:5.3.5:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
|
CVE-2021-27851 | Local privilege escalation in GNU Guix via guix-daemon and '--keep-failed' | A security vulnerability that can lead to local privilege escalation has been found in ’guix-daemon’. It affects multi-user setups in which ’guix-daemon’ runs locally. The attack consists in having an unprivileged user spawn a build process, for instance with `guix build`, that makes its build directory world-writable. The user then creates a hardlink to a root-owned file such as /etc/shadow in that build directory. If the user passed the --keep-failed option and the build eventually fails, the daemon changes ownership of the whole build tree, including the hardlink, to the user. At that point, the user has write access to the target file. Versions after and including v0.11.0-3298-g2608e40988, and versions prior to v1.2.0-75109-g94f0312546 are vulnerable. | [
"cpe:2.3:a:gnu:guix:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | 2.1 |
RHSA-2005:582 | Red Hat Security Advisory: httpd security update | security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
CVE-2022-29220 | No verification of commits origin in github-action-merge-dependabot | github-action-merge-dependabot is an action that automatically approves and merges dependabot pull requests (PRs). Prior to version 3.2.0, github-action-merge-dependabot does not check if a commit created by dependabot is verified with the proper GPG key. There is just a check if the actor is set to `dependabot[bot]` to determine if the PR is a legit PR. Theoretically, an owner of a seemingly valid and legit action in the pipeline can check if the PR is created by dependabot and if their own action has enough permissions to modify the PR in the pipeline. If so, they can modify the PR by adding a second seemingly valid and legit commit to the PR, as they can set arbitrarily the username and email in for commits in git. Because the bot only checks if the actor is valid, it would pass the malicious changes through and merge the PR automatically, without getting noticed by project maintainers. It would probably not be possible to determine where the malicious commit came from, as it would only say `dependabot[bot]` and the corresponding email-address. Version 3.2.0 contains a patch for this issue. | [
"cpe:2.3:a:fastify:github_action_merge_dependabot:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | null |
GHSA-gq9w-wr34-cg54 | IBM Security Identity Governance and Intelligence 5.2.6 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the insecure link and the attacker can then obtain the cookie value by snooping the traffic. IBM X-Force ID: 192423. | [] | null | null | null | null |
|
GHSA-w2rf-v2fh-5mjh | An issue has been discovered in GitLab EE affecting all versions starting from 15.7 before 15.10.8, all versions starting from 15.11 before 15.11.7, all versions starting from 16.0 before 16.0.2. It was possible to disclose issue notes to an unauthorized user at project export. | [] | null | 3.1 | null | null |
|
GHSA-rx8q-gf7p-3fvp | CAYIN xPost suffers from an unauthenticated SQL Injection vulnerability. Input passed via the GET parameter 'wayfinder_seqid' in wayfinder_meeting_input.jsp is not properly sanitized before being returned to the user or used in SQL queries. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code and execute SYSTEM commands. | [] | null | null | null | null |
|
GHSA-886v-mm6p-4m66 | High severity vulnerability that affects gun | Urgent UpgradeThe static file server module included with GUN had a **serious vulnerability**:Using `curl --path-as-is` allowed reads on any parent directory or files.This did not work via the browser or via curl without as-is option.FixedThis has been fixed since version `0.2019.416` and higher.Who Was Effected?Most NodeJS users who use the default setup, such as:`npm start``node examples/http.js``Heroku` 1-click-deploy`Docker``Now`If you have a custom NodeJS code then you are probably safe *unless* you have something like `require('http').createServer(Gun.serve(__dirname))` in it.If you have not upgraded, it is **mandatory** or else it is highly likely your environment variables and AWS (or other) keys could be leaked.CreditIt was reported and fixed by [JK0N](https://github.com/amark/gun/pull/527), but I did not understand the `--path-as-is` condition.Joonas Loppi from [function61](http://function61.com) rediscovered it and explained the urgency to me to fix it. | [] | null | null | null | null |
GHSA-r57p-9vwh-hqg7 | IrfanView DXF File Parsing Memory Corruption Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of DXF files. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24629. | [] | null | null | 7.8 | null |
|
CVE-2022-46663 | In GNU Less before 609, crafted data can result in "less -R" not filtering ANSI escape sequences sent to the terminal. | [
"cpe:2.3:a:gnu:less:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
|
GHSA-q6p4-2q7c-4vw7 | Improper authorization in handler for custom URL scheme vulnerability in GU App for Android versions from 4.8.0 to 5.0.2 allows a remote attacker to lead a user to access an arbitrary website via the vulnerable App. | [] | null | 4.3 | null | null |
|
CVE-2017-9687 | In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, two concurrent threads/processes can write the value of "0" to the debugfs file that controls ipa ipc log which will lead to the double-free in ipc_log_context_destroy(). Another issue is the Use-After-Free which can happen due to the race condition when the ipc log is deallocated via the debugfs call during a log print. | [
"cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*"
] | null | null | 7.8 | 4.6 |
|
GHSA-qg48-gh7r-v9jq | Multiple Reflected Cross-site Scripting (XSS) vulnerabilities exist in Zucchetti InfoBusiness before and including 4.4.1. The browsing component did not properly sanitize user input (encoded in base64). This also applies to the search functionality for the searchKey parameter. | [] | null | 6.1 | null | null |
|
CVE-2023-44254 | An authorization bypass through user-controlled key [CWE-639] vulnerability in FortiAnalyzer version 7.4.1 and before 7.2.5 and FortiManager version 7.4.1 and before 7.2.5 may allow a remote attacker with low privileges to read sensitive data via a crafted HTTP request. | [
"cpe:2.3:o:fortinet:fortianalyzer:7.4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortianalyzer:7.2.4:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortianalyzer:7.2.3:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortianalyzer:7.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortianalyzer:7.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortianalyzer:7.2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortianalyzer:7.0.12:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortianalyzer:7.0.11:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortianalyzer:7.0.10:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortianalyzer:7.0.9:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortianalyzer:7.0.8:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortianalyzer:7.0.7:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortianalyzer:7.0.6:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortianalyzer:7.0.5:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortianalyzer:7.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortianalyzer:7.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortianalyzer:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortianalyzer:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortianalyzer:7.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortianalyzer:6.4.14:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortianalyzer:6.4.13:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortianalyzer:6.4.12:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortianalyzer:6.4.11:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortianalyzer:6.4.10:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortianalyzer:6.4.9:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortianalyzer:6.4.8:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortianalyzer:6.4.7:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortianalyzer:6.4.6:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortianalyzer:6.4.5:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortianalyzer:6.4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortianalyzer:6.4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortianalyzer:6.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortianalyzer:6.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortianalyzer:6.4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortianalyzer:6.2.12:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortianalyzer:6.2.11:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortianalyzer:6.2.10:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortianalyzer:6.2.9:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortianalyzer:6.2.8:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortianalyzer:6.2.7:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortianalyzer:6.2.6:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortianalyzer:6.2.5:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortianalyzer:6.2.4:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortianalyzer:6.2.3:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortianalyzer:6.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortianalyzer:6.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortianalyzer:6.2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:7.4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:7.2.4:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:7.2.3:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:7.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:7.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:7.2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:7.0.12:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:7.0.11:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:7.0.10:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:7.0.9:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:7.0.8:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:7.0.7:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:7.0.6:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:7.0.5:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:7.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:7.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:7.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:6.4.14:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:6.4.13:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:6.4.12:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:6.4.11:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:6.4.10:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:6.4.9:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:6.4.8:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:6.4.7:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:6.4.6:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:6.4.5:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:6.4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:6.4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:6.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:6.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:6.4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:6.2.12:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:6.2.11:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:6.2.10:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:6.2.9:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:6.2.8:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:6.2.7:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:6.2.6:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:6.2.5:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:6.2.4:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:6.2.3:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:6.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:6.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:6.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortianalyzer:*:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortianalyzer:7.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimanager:7.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortianalyzer_big_data:*:*:*:*:*:*:*:*"
] | null | 4.7 | null | null |
|
GHSA-rhcf-rv63-774j | In connectivity system driver, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07929848; Issue ID: ALPS07929848. | [] | null | 6.7 | null | null |
|
GHSA-c8q7-g9jx-992m | A potential vulnerability was discovered in LCFC BIOS for some Lenovo consumer notebook models that could allow a local attacker with elevated privileges to view incoming and returned data from SMI. | [] | null | 4.4 | null | null |
|
GHSA-jpxf-7694-4wcf | ELECOM LAN routers (WRC-2533GST2 firmware versions prior to v1.14, WRC-1900GST2 firmware versions prior to v1.14, WRC-1750GST2 firmware versions prior to v1.14, and WRC-1167GST2 firmware versions prior to v1.10) allow an attacker on the same network segment to execute arbitrary OS commands with a root privilege via unspecified vectors. | [] | null | null | null | null |
|
GHSA-h42p-vfrq-455p | The /.inlook/.crypt file for inlook 0.7.3 and earlier is installed with world readable permissions, which allows local users to obtain user POP3 credentials. | [] | null | null | null | null |
|
CVE-2015-7181 | The sec_asn1d_parse_leaf function in Mozilla Network Security Services (NSS) before 3.19.2.1 and 3.20.x before 3.20.1, as used in Firefox before 42.0 and Firefox ESR 38.x before 38.4 and other products, improperly restricts access to an unspecified data structure, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted OCTET STRING data, related to a "use-after-poison" issue. | [
"cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:network_security_services:3.20.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2019-11101 | Insufficient input validation in the subsystem for Intel(R) CSME before versions 11.8.70, 11.11.70, 11.22.70, 12.0.45, 13.0.10 and 14.0.10; Intel(R) TXE before versions 3.1.70 and 4.0.20 may allow a privileged user to potentially enable information disclosure via local access. | [
"cpe:2.3:o:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:trusted_execution_engine_firmware:*:*:*:*:*:*:*:*"
] | null | 4.4 | null | 2.1 |
|
GHSA-qgm6-q97v-329x | Buffer overflow in RaidenHTTPD 1.1.32, and possibly other versions before 1.1.34, allows remote attackers to execute arbitrary code via a long URL. | [] | null | null | null | null |
|
CVE-2022-1074 | TEM FLEX-1085 injection | A vulnerability has been found in TEM FLEX-1085 1.6.0 and classified as problematic. Using the input <h1>HTML Injection</h1> in the WiFi settings of the dashboard leads to html injection. | [
"cpe:2.3:o:tem:flex-1085_firmware:1.6.0:*:*:*:*:*:*:*",
"cpe:2.3:h:tem:flex-1085:-:*:*:*:*:*:*:*"
] | null | 4.3 | null | null |
CVE-2007-1500 | The Linux Security Auditing Tool (LSAT) allows local users to overwrite arbitrary files via a symlink attack on temporary files, as demonstrated using /tmp/lsat1.lsat. | [
"cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2022-43848 | IBM AIX denial of service | IBM AIX 7.1, 7.2, 7.3, and VIOS 3.1 could allow a non-privileged local user to exploit a vulnerability in the AIX perfstat kernel extension to cause a denial of service. IBM X-Force ID: 239169. | [
"cpe:2.3:a:ibm:vios:3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:7.1:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:7.2:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:7.3:*:*:*:*:*:*:*"
] | null | 6.2 | null | null |
CVE-2014-8690 | Multiple cross-site scripting (XSS) vulnerabilities in Exponent CMS before 2.1.4 patch 6, 2.2.x before 2.2.3 patch 9, and 2.3.x before 2.3.1 patch 4 allow remote attackers to inject arbitrary web script or HTML via the (1) PATH_INFO, the (2) src parameter in a none action to index.php, or the (3) "First Name" or (4) "Last Name" field to users/edituser. | [
"cpe:2.3:a:exponentcms:exponent_cms:*:*:*:*:*:*:*:*",
"cpe:2.3:a:exponentcms:exponent_cms:2.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:exponentcms:exponent_cms:2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:exponentcms:exponent_cms:2.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:exponentcms:exponent_cms:2.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:exponentcms:exponent_cms:2.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:exponentcms:exponent_cms:2.3.1:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
RHSA-2012:0469 | Red Hat Security Advisory: acroread security update | acroread: multiple unspecified flaws (APSB12-08, APSB12-01) acroread: multiple unspecified flaws (APSB12-08, APSB12-01) acroread: multiple unspecified flaws (APSB12-08, APSB12-01) acroread: multiple unspecified flaws (APSB12-08, APSB12-01) acroread: multiple unspecified flaws (APSB12-08, APSB12-01) acroread: multiple unspecified flaws (APSB12-08, APSB12-01) acroread: multiple unspecified flaws (APSB12-08, APSB12-01) | [
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
CVE-2014-2865 | PaperThin CommonSpot before 7.0.2 and 8.x before 8.0.3 allows remote attackers to bypass intended access restrictions via a '\0' character, as demonstrated by using this character within a pathname on the drive containing the web root directory of a ColdFusion installation. | [
"cpe:2.3:a:paperthin:commonspot_content_server:*:*:*:*:*:*:*:*",
"cpe:2.3:a:paperthin:commonspot_content_server:8.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:paperthin:commonspot_content_server:8.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:paperthin:commonspot_content_server:8.0.2:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-243v-5pff-qqfj | Moodle Open redirect risk in mobile auto-login feature | An open redirect issue was found in Moodle due to improper sanitization of user-supplied data in mobile auto-login feature. A remote attacker can create a link that leads to a trusted website, however, when clicked, it redirects the victims to arbitrary URL/domain. Successful exploitation of this vulnerability may allow a remote attacker to perform a phishing attack and steal potentially sensitive information. | [] | null | 6.1 | null | null |
RHSA-2022:6835 | Red Hat Security Advisory: Service Registry (container images) release and security update [2.3.0.GA] | protobuf-java: potential DoS in the parsing procedure for binary data netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way cron-utils: template Injection leading to unauthenticated Remote Code Execution node-fetch: exposure of sensitive information to an unauthorized actor follow-redirects: Exposure of Sensitive Information via Authorization Header leak quarkus: privilege escalation vulnerability with RestEasy Reactive scope leakage in Quarkus jdbc-postgresql: Unchecked Class Instantiation when providing Plugin Classes prismjs: improperly escaped output allows a XSS node-forge: Signature verification leniency in checking `digestAlgorithm` structure can lead to signature forgery node-forge: Signature verification failing to check tailing garbage bytes can lead to signature forgery node-forge: Signature verification leniency in checking `DigestInfo` structure com.google.code.gson-gson: Deserialization of Untrusted Data in com.google.code.gson-gson snakeyaml: Denial of Service due to missing nested depth limitation for collections terser: insecure use of regular expressions leads to ReDoS postgresql-jdbc: Arbitrary File Write Vulnerability moment: inefficient parsing algorithm resulting in DoS graphql-java: DoS by malicious query | [
"cpe:/a:redhat:service_registry:2.3"
] | null | 7.5 | null | null |
GHSA-8j8m-vwmq-rf2f | Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allow remote attackers to cause a denial of service (daemon hang) via a web-service request containing a crafted X.509 certificate that is not properly handled during validation, aka "Digital Signatures Vulnerability." | [] | null | null | null | null |
|
GHSA-45cr-xqhm-p6r9 | Cross Site Scripting vulnerability found in Webkil QloApps v.1.5.2 allows a remote attacker to obtain sensitive information via the back and email_create parameters in the AuthController.php file. | [] | null | 6.1 | null | null |
|
CVE-2015-6018 | The diagnostic-ping implementation on ZyXEL PMG5318-B20A devices with firmware before 1.00(AANC.2)C0 allows remote attackers to execute arbitrary commands via the PingIPAddr parameter. | [
"cpe:2.3:o:zyxel:pmg5318-b20a_firmware:*:*:*:*:*:*:*:*"
] | null | null | 9.8 | 10 |
|
CVE-2015-3203 | Unrestricted file upload vulnerability in h5ai before 0.25.0 allows remote attackers to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in the directory specified by the href parameter. | [
"cpe:2.3:a:h5ai_project:h5ai:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2007-3202 | Cross-site scripting (XSS) vulnerability in the rich text editor in Webwiz allows remote attackers to inject arbitrary web script or HTML via URL-encoded HTML composed of a frameset in which a frame has a SRC attribute pointing to a JavaScript document. | [
"cpe:2.3:a:bruce_corkhill:web_wiz_rich_text_editor:3.1:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-58xm-mxjf-254g | Multiple vulnerabilities allow bypassing path filtering of agent-to-controller access control in Jenkins | The agent-to-controller security subsystem limits which files on the Jenkins controller can be accessed by agent processes.Multiple vulnerabilities in the file path filtering implementation of Jenkins 2.318 and earlier, LTS 2.303.2 and earlier allow agent processes to read and write arbitrary files on the Jenkins controller file system, and obtain some information about Jenkins controller file systems.SECURITY-2427 / CVE-2021-21685: `FilePath#mkdirs` does not check permission to create parent directories.We expect that most of these vulnerabilities have been present since [SECURITY-144 was addressed in the 2014-10-30 security advisory](https://www.jenkins.io/security/advisory/2014-10-30/).Jenkins 2.319, LTS 2.303.3 addresses these security vulnerabilities.SECURITY-2427 / CVE-2021-21685: `FilePath#mkdirs` checks permission to create parent directories.As some common operations are now newly subject to access control, it is expected that plugins sending commands from agents to the controller may start failing. Additionally, the newly introduced path canonicalization means that instances using a custom builds directory ([Java system property jenkins.model.Jenkins.buildsDir](https://www.jenkins.io/doc/book/managing/system-properties/#jenkins-model-jenkins-buildsdir)) or partitioning `JENKINS_HOME` using symbolic links may fail access control checks. See [the documentation](https://www.jenkins.io/doc/book/security/controller-isolation/agent-to-controller/#file-access-rules) for how to customize the configuration in case of problems.If you are unable to immediately upgrade to Jenkins 2.319, LTS 2.303.3, you can install the [Remoting Security Workaround Plugin](https://www.jenkins.io/redirect/remoting-security-workaround/). It will prevent all agent-to-controller file access using `FilePath` APIs. Because it is more restrictive than Jenkins 2.319, LTS 2.303.3, more plugins are incompatible with it. Make sure to read the plugin documentation before installing it. | [] | null | 9 | null | null |
GHSA-rw75-r93v-g3c9 | IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.0.3.5, 6.1.0.0 through 6.1.0.4, and 6.1.1.0 through 6.1.1.1 is vulnerable to SQL injection. A remote attacker could send specially crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-Force ID: 215888. | [] | null | 9.8 | null | null |
|
GHSA-jjmh-958w-rr2j | Transient DOS due to buffer over-read in WLAN while parsing WLAN CSA action frames. | [] | null | 6.5 | null | null |
|
CVE-2001-1159 | load_prefs.php and supporting include files in SquirrelMail 1.0.4 and earlier do not properly initialize certain PHP variables, which allows remote attackers to (1) view sensitive files via the config_php and data_dir options, and (2) execute arbitrary code by using options_order.php to upload a message that could be interpreted as PHP. | [
"cpe:2.3:a:squirrelmail:squirrelmail:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:squirrelmail:squirrelmail:1.0.5:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2006-4885 | PHP remote file inclusion vulnerability in Shadowed Portal 5.599 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the root parameter in (1) footer.php and (2) header.php. NOTE: the provenance of this information is unknown; the details are obtained from third party information. The bottom.php parameter is already covered by CVE-2006-4826. | [
"cpe:2.3:a:shadowed_portal:shadowed_portal:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-5mf6-7wvp-g69h | A local attacker can gain administrative privileges by inserting an executable file in the path of the affected product. | [] | null | 7.8 | null | null |
|
GHSA-r6mg-254h-628j | A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka "Scripting Engine Memory Corruption Vulnerability." This affects Internet Explorer 9, Internet Explorer 11, Internet Explorer 10. | [] | null | null | 7.5 | null |
|
GHSA-wqp3-26m2-8cfv | A vulnerability, which was classified as problematic, has been found in PHPEMS 7.0. This issue affects some unknown processing of the file app\content\cls\api.cls.php of the component Content Section Handler. The manipulation leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-246629 was assigned to this vulnerability. | [] | null | 2.4 | null | null |
|
GHSA-44h6-cj92-vmj7 | Improper Authorization in RestAPI in Checkmk GmbH's Checkmk versions <2.1.0p28 and <2.2.0b8 allows remote authenticated users to read arbitrary host_configs. | [] | null | 4.3 | null | null |
|
GHSA-w396-ghph-9x2g | Actian Matrix 5.1.x through 5.1.2.4 and 5.2.x through 5.2.0.1 allows remote authenticated users to bypass intended write-access restrictions and execute an UPDATE statement by referencing a table. | [] | null | null | null | null |
|
RHSA-2021:0568 | Red Hat Security Advisory: OpenShift Container Platform 4.6 file-integrity-operator image security update | golang: math/big: panic during recursive division of very large numbers | [
"cpe:/a:redhat:openshift:4.6::el8"
] | null | 7.5 | null | null |
CVE-2023-5644 | WP Mail Log < 1.1.3 – Incorrect Authorization in REST API Endpoints | The WP Mail Log WordPress plugin before 1.1.3 does not correctly authorize its REST API endpoints, allowing users with the Contributor role to view and delete data that should only be accessible to Admin users. | [
"cpe:2.3:a:wpvibes:wp_mail_log:*:*:*:*:*:wordpress:*:*"
] | null | 7.6 | null | null |
GHSA-c5pv-rm96-f3q6 | Automox Agent 33 on Windows incorrectly sets permissions on a temporary directory. NOTE: this issue exists because of a CVE-2021-43326 regression. | [] | null | null | null | null |
|
CVE-2014-0584 | Adobe Flash Player before 13.0.0.252 and 14.x and 15.x before 15.0.0.223 on Windows and OS X and before 11.2.202.418 on Linux, Adobe AIR before 15.0.0.356, Adobe AIR SDK before 15.0.0.356, and Adobe AIR SDK & Compiler before 15.0.0.356 allow attackers to execute arbitrary code by leveraging an unspecified "type confusion," a different vulnerability than CVE-2014-0577, CVE-2014-0585, CVE-2014-0586, and CVE-2014-0590. | [
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
GHSA-hc79-964w-vvqg | A vulnerability in the HPE Aruba Networking Virtual Intranet Access (VIA) client could allow malicious users to overwrite arbitrary files as NT AUTHORITY\SYSTEM (root). A successful exploit could allow the creation of a Denial-of-Service (DoS) condition affecting the Microsoft Windows Operating System. This vulnerability does not affect Linux and Android based clients. | [] | null | 5.5 | null | null |
|
GHSA-69c8-w2qp-966r | In Redmine before 3.2.6 and 3.3.x before 3.3.3, remote attackers can obtain sensitive information (password reset tokens) by reading a Referer log, because account/lost_password does not use a redirect. | [] | null | null | 7.5 | null |
|
GHSA-mf4c-7jx4-wgmm | Insufficiently protected credentials vulnerability on Micro Focus enterprise developer and enterprise server, affecting all version prior to 4.0 Patch Update 16, and version 5.0 Patch Update 6. The vulnerability could allow an attacker to transmit hashed credentials for the user account running the Micro Focus Directory Server (MFDS) to an arbitrary site, compromising that account's security. | [] | null | null | null | null |
|
CVE-2025-30601 | WordPress Flipdish Ordering System plugin <= 1.4.16 - Cross Site Request Forgery (CSRF) to Settings Change vulnerability | Cross-Site Request Forgery (CSRF) vulnerability in flipdish Flipdish Ordering System allows Cross Site Request Forgery. This issue affects Flipdish Ordering System: from n/a through 1.4.16. | [] | null | 4.3 | null | null |
GHSA-j68j-xhqx-x92f | Implicit Intent hijacking vulnerability in Finder prior to SMR Jul-2022 Release 1 allow allows attackers to launch certain activities with privilege of Finder. | [] | null | 7.8 | null | null |
|
CVE-2021-45877 | Multiple versions of GARO Wallbox GLB/GTB/GTC are affected by hard coded credentials. A hardcoded credential exist in /etc/tomcat8/tomcat-user.xml, which allows attackers to gain authorized access and control the tomcat completely on port 8000 in the tomcat manger page. | [
"cpe:2.3:o:garo:wallbox_gtb_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:garo:wallbox_gtb:-:*:*:*:*:*:*:*",
"cpe:2.3:o:garo:wallbox_gtc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:garo:wallbox_gtc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:garo:wallbox_glb_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:garo:wallbox_glb:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
|
CVE-2020-9888 | An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in iOS 13.6 and iPadOS 13.6, macOS Catalina 10.15.6, tvOS 13.4.8, watchOS 6.2.8. Processing a maliciously crafted audio file may lead to arbitrary code execution. | [
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | 6.8 |
|
GHSA-g9hc-c85f-2p82 | The Authen::ExternalAuth extension before 0.11 for Best Practical Solutions RT allows remote attackers to obtain a logged-in session via unspecified vectors related to the "URL of a RSS feed of the user." | [] | null | null | null | null |
|
GHSA-68vw-2c55-r944 | netentsec NS-ASG 6.3 is vulnerable to SQL Injection via /admin/config_ISCGroupSSLCert.php. | [] | null | 8.8 | null | null |
|
CVE-2020-36617 | ewxrjk sftpserver parse.c sftp_parse_path uninitialized pointer | A vulnerability was found in ewxrjk sftpserver. It has been declared as problematic. Affected by this vulnerability is the function sftp_parse_path of the file parse.c. The manipulation leads to uninitialized pointer. The real existence of this vulnerability is still doubted at the moment. The name of the patch is bf4032f34832ee11d79aa60a226cc018e7ec5eed. It is recommended to apply a patch to fix this issue. The identifier VDB-216205 was assigned to this vulnerability. NOTE: In some deployment models this would be a vulnerability. README specifically warns about avoiding such deployment models. | [
"cpe:2.3:a:greenend:sftpserver:*:*:*:*:*:*:*:*"
] | null | 4.6 | null | null |
CVE-2013-5218 | Cross-site scripting (XSS) vulnerability on the HOT HOTBOX router with software 2.1.11 allows remote attackers to inject arbitrary web script or HTML via a crafted DHCP Host Name option, which is not properly handled during rendering of the DHCP table in wlanAccess.asp. | [
"cpe:2.3:o:hot:hotbox_router_firmware:2.1.11:*:*:*:*:*:*:*",
"cpe:2.3:h:hot:hotbox_router:-:*:*:*:*:*:*:*"
] | null | null | null | 2.9 |
|
CVE-2017-10403 | Vulnerability in the Oracle Hospitality Reporting and Analytics component of Oracle Hospitality Applications (subcomponent: iQuery). Supported versions that are affected are 8.5.1 and 9.0.0. Difficult to exploit vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Hospitality Reporting and Analytics. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Hospitality Reporting and Analytics, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle Hospitality Reporting and Analytics. CVSS 3.0 Base Score 8.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H). | [
"cpe:2.3:a:oracle:hospitality_reporting_and_analytics:8.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:hospitality_reporting_and_analytics:9.0.0:*:*:*:*:*:*:*"
] | null | null | 8 | 4.6 |
|
CVE-2016-8382 | An exploitable heap corruption vulnerability exists in the Doc_SetSummary functionality of AntennaHouse DMC HTMLFilter. A specially crafted doc file can cause a heap corruption resulting in arbitrary code execution. An attacker can send a malicious doc file to trigger this vulnerability. | [
"cpe:2.3:a:marklogic:marklogic:8.0-5.5:*:*:*:*:*:*:*"
] | null | null | 8.3 | null |
|
CVE-2024-29066 | Windows Distributed File System (DFS) Remote Code Execution Vulnerability | Windows Distributed File System (DFS) Remote Code Execution Vulnerability | [] | null | 7.2 | null | null |
CVE-2024-28972 | Dell InsightIQ, Verion 5.0.0, contains a use of a broken or risky cryptographic algorithm vulnerability. An unauthenticated remote attacker could potentially exploit this vulnerability, leading to information disclosure. | [
"cpe:2.3:a:dell:insightiq:5.0.0:*:*:*:*:*:*:*"
] | null | 5.9 | null | null |
|
CVE-2010-0088 | Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE and Java for Business 6 Update 18, 5.0 Update 23, 1.4.2_25, and 1.3.1_27 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors, a different vulnerability than CVE-2010-0085. | [
"cpe:2.3:a:sun:jre:*:update_18:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_17:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:*:update_18:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_17:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update1:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update1_b06:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:*:update23:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update1:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update10:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update11:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update12:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update13:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update14:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update15:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update16:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update17:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update18:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update19:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update2:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update20:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update21:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update3:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update4:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update5:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update6:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update7:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update8:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update9:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:*:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_1:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_02:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_3:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_4:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_5:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_6:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_7:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_8:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_9:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_10:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_11:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_12:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_13:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_14:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_15:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_16:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_17:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_18:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_19:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_20:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_21:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_22:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_23:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_24:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:*:update23:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update1:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update10:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update11:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update12:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update13:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update14:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update15:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update16:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update17:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update18:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update19:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update2:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update20:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update21:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update3:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update4:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update5:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update6:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update7:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update8:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update9:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:*:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_1:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_2:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_3:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_4:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_5:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_6:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_7:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_8:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_9:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_10:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_11:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_12:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_13:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_14:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_15:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_16:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_17:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_18:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_19:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_20:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_21:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_22:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_23:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_24:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:*:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.3.0_01:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.3.0_02:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.3.0_03:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.3.0_04:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.3.0_05:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.3.1_01:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.3.1_01a:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.3.1_02:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.3.1_03:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.3.1_04:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.3.1_05:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.3.1_06:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.3.1_07:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.3.1_08:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.3.1_09:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.3.1_10:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.3.1_11:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.3.1_12:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.3.1_13:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.3.1_14:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.3.1_15:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.3.1_16:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.3.1_17:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.3.1_18:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.3.1_19:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.3.1_20:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.3.1_21:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.3.1_22:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.3.1_23:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.3.1_24:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.3.1_25:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.3.1_26:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.0:update1:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.0:update2:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.0:update3:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.0:update4:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.0:update5:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1:update1:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1:update2:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_2:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_03:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_04:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_05:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_06:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_07:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_08:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_09:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_10:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_11:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_12:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_13:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_14:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_15:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_16:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_17:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_18:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_19:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_20:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_21:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_22:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_23:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_24:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_25:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_26:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.0_01:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.0_02:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.0_03:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.0_04:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.0_05:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_01:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_01a:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_02:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_03:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_04:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_05:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_06:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_07:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_08:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_09:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_10:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_11:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_12:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_13:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_14:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_15:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_16:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_17:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_18:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_19:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_20:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_21:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_22:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_23:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_24:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_25:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_26:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
RHSA-2022:7209 | Red Hat Security Advisory: libksba security update | libksba: integer overflow may lead to remote code execution | [
"cpe:/o:redhat:rhel_e4s:8.1::baseos"
] | null | 8.6 | null | null |
CVE-2020-4294 | IBM QRadar 7.3.0 to 7.3.3 Patch 2 is vulnerable to Server Side Request Forgery (SSRF). This may allow an authenticated attacker to send unauthorized requests from the system, potentially leading to network enumeration or facilitating other attacks. IBM X-ForceID: 176404. | [
"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.3:-:*:*:*:*:*:*",
"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.3:p1:*:*:*:*:*:*",
"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.3:p2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"
] | null | null | 6.3 | null |
|
RHSA-2017:0831 | Red Hat Security Advisory: JBoss Enterprise Application Platform 7.0.5 on RHEL 6 | jboss: jbossas: unsafe chown of server.log in jboss init script allows privilege escalation wildfly: ParseState headerValuesCache can be exploited to fill heap with garbage | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7::el6"
] | null | null | 7.5 | null |
CVE-2020-12474 | Telegram Desktop through 2.0.1, Telegram through 6.0.1 for Android, and Telegram through 6.0.1 for iOS allow an IDN Homograph attack via Punycode in a public URL or a group chat invitation URL. | [
"cpe:2.3:a:telegram:telegram:*:*:*:*:*:android:*:*",
"cpe:2.3:a:telegram:telegram:*:*:*:*:*:iphone_os:*:*",
"cpe:2.3:a:telegram:telegram_desktop:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4.3 |
|
GHSA-gff5-qf5f-9qw3 | An unauthenticated Denial of Service (DoS) vulnerability exists in a service accessed via the PAPI protocol provided by Aruba InstantOS and ArubaOS 10. Successful exploitation of this vulnerability results in the ability to interrupt the normal operation of the affected access point. | [] | null | 7.5 | null | null |
|
GHSA-p25m-jpj4-qcrr | Denial of Service Vulnerability in gRPC TCP Server (Posix-compatible platforms) | Lack of error handling in the TCP server in Google's gRPC starting version 1.23 on posix-compatible platforms (ex. Linux) allows an attacker to cause a denial of service by initiating a significant number of connections with the server. Note that gRPC C++ Python, and Ruby are affected, but gRPC Java, and Go are NOT affected. | [] | null | 7.5 | null | null |
CVE-2020-25275 | Dovecot before 2.3.13 has Improper Input Validation in lda, lmtp, and imap, leading to an application crash via a crafted email message with certain choices for ten thousand MIME parts. | [
"cpe:2.3:a:dovecot:dovecot:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
CVE-2021-1060 | NVIDIA vGPU software contains a vulnerability in the guest kernel mode driver and vGPU plugin, in which an input index is not validated, which may lead to tampering of data or denial of service. This affects vGPU version 8.x (prior to 8.6) and version 11.0 (prior to 11.3). | [
"cpe:2.3:a:nvidia:virtual_gpu_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:o:citrix:hypervisor:-:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:o:nutanix:ahv:-:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_kernel-based_virtual_machine:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vmware:vsphere:-:*:*:*:*:*:*:*"
] | null | 7.1 | null | 3.6 |
|
CVE-2024-47714 | wifi: mt76: mt7996: use hweight16 to get correct tx antenna | In the Linux kernel, the following vulnerability has been resolved:
wifi: mt76: mt7996: use hweight16 to get correct tx antenna
The chainmask is u16 so using hweight8 cannot get correct tx_ant.
Without this patch, the tx_ant of band 2 would be -1 and lead to the
following issue:
BUG: KASAN: stack-out-of-bounds in mt7996_mcu_add_sta+0x12e0/0x16e0 [mt7996e] | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
GHSA-483f-wxw9-3rpq | bbPress Cross-site Scripting (XSS) vulnerability | bbPress through 1.0.2 has XSS in /bb-login.php url via the re parameter. | [] | null | 6.1 | null | null |
GHSA-64wx-9889-v8xp | Multiple cross-site scripting (XSS) vulnerabilities in stconf.nsf in the server in IBM Lotus Sametime 8.0.1 allow remote attackers to inject arbitrary web script or HTML via (1) the messageString parameter in a WebMessage action or (2) the PATH_INFO. | [] | null | null | null | null |
|
GHSA-gm94-hchp-rw5x | A vulnerability in Handling of Undefined Values in the routing protocol daemon (RPD) process of Juniper Networks Junos OS and Junos OS Evolved may allow an unauthenticated network-based attacker to crash the RPD process by sending a specific BGP update while the system is under heavy load, leading to a Denial of Service (DoS). Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition. Malicious exploitation of this issue requires a very specific combination of load, timing, and configuration of the vulnerable system which is beyond the direct control of the attacker. Internal reproduction has only been possible through artificially created load and specially instrumented source code. Systems are only vulnerable to this issue if BGP multipath is enabled. Routers not configured for BGP multipath are not vulnerable to this issue. This issue affects: Juniper Networks Junos OS: 21.1 versions prior to 21.1R3-S1; 21.2 versions prior to 21.2R2-S2, 21.2R3; 21.3 versions prior to 21.3R2, 21.3R3; 21.4 versions prior to 21.4R1-S1, 21.4R2. Juniper Networks Junos OS Evolved: 21.1 versions prior to 21.1R3-S1-EVO; 21.2 version 21.2R1-EVO and later versions; 21.3 versions prior to 21.3R3-EVO; 21.4 versions prior to 21.4R1-S1-EVO, 21.4R2-EVO. This issue does not affect: Juniper Networks Junos OS versions prior to 21.1. Juniper Networks Junos OS Evolved versions prior to 21.1-EVO. | [] | null | 5.9 | null | null |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.