id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-9f4f-vcpj-64xm | Multiple buffer overflows in BarCodeWiz BarCode before 6.7 ActiveX control (BarcodeWiz.DLL) allow remote attackers to execute arbitrary code via a long argument to the (1) BottomText or (2) TopText property. | [] | null | null | 8.8 | null |
|
CVE-2016-2460 | mediaserver in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-05-01 does not initialize certain data structures, which allows attackers to obtain sensitive information via a crafted application, related to IGraphicBufferConsumer.cpp and IGraphicBufferProducer.cpp, aka internal bug 27555981. | [
"cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*"
] | null | null | 5.5 | 4.3 |
|
GHSA-9rg8-mfh8-fg8v | Photoshop Desktop versions 24.7.4, 25.11 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [] | null | 7.8 | null | null |
|
GHSA-fc33-wf68-wr6h | In modify_for_next_stage of fdt.rs, there is a possible way to render KASLR ineffective due to improperly used crypto. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | [] | null | 9.8 | null | null |
|
GHSA-5fjm-57qj-h2pj | The DGifDecompressLine function in dgif_lib.c in GIFLIB (possibly version 3.0.x), as later shipped in cgif.c in sam2p 0.49.4, has a heap-based buffer overflow because a certain "Private->RunningCode - 2" array index is not checked. This will lead to a denial of service or possibly unspecified other impact. | [] | null | null | 8.8 | null |
|
CVE-2019-7742 | An issue was discovered in Joomla! before 3.9.3. A combination of specific web server configurations, in connection with specific file types and browser-side MIME-type sniffing, causes an XSS attack vector. | [
"cpe:2.3:a:joomla:joomla\\!:*:*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 |
|
CVE-2011-4597 | The SIP over UDP implementation in Asterisk Open Source 1.4.x before 1.4.43, 1.6.x before 1.6.2.21, and 1.8.x before 1.8.7.2 uses different port numbers for responses to invalid requests depending on whether a SIP username exists, which allows remote attackers to enumerate usernames via a series of requests. | [
"cpe:2.3:a:digium:asterisk:1.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.0:beta5:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.0:rc4:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.0:rc5:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.1:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.3:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.3:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.3:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.3:rc3:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.4:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.4:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.4:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.4:rc3:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.5:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.5:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.6.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.6.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.6.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.7.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.7.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.6.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.6.2.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.6.2.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.6.2.0:rc4:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.6.2.0:rc5:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.6.2.0:rc6:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.6.2.0:rc7:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.6.2.0:rc8:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.6.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.6.2.1:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.6.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.6.2.3:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.6.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.6.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.6.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.6.2.6:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.6.2.6:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.6.2.15:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.6.2.16:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.6.2.16:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.6.2.16.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.6.2.16.2:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.6.2.17:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.6.2.17:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.6.2.17:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.6.2.17:rc3:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.6.2.17.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.6.2.17.2:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.6.2.17.3:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.6.2.18:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.6.2.18:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.6.2.19:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.6.2.19:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.6.2.20:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.6.2.21:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.9:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.10:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.11:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.12:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.12.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.13:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.14:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.15:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.16:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.16.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.16.2:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.17:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.18:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.19:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.19:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.19:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.19:rc3:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.19:rc4:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.19.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.19.2:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.20:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.20:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.20:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.20:rc3:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.20.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.21:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.21:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.21:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.21.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.21.2:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.22:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.22:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.22:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.22:rc3:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.22:rc4:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.22:rc5:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.22.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.22.2:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.23:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.23:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.23:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.23:rc3:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.23:rc4:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.23.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.23.2:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.24:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.24:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.24.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.25:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.25:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.25.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.26:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.26:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.26:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.26:rc3:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.26:rc4:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.26:rc5:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.26:rc6:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.26.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.26.2:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.26.3:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.27:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.27:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.27:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.27:rc3:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.27:rc4:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.27:rc5:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.27.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.28:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.28:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.29:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.29:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.29.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.30:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.30:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.30:rc3:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.31:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.31:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.31:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.32:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.32:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.33:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.33:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.33:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.33.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.34:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.34:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.34:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.35:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.35:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.36:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.36:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.37:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.37:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.38:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.38:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.39:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.39:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.39.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.39.2:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.40:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.40:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.40:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.40:rc3:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.40.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.40.2:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.41:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.41:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.41.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.41.2:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.42:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.42:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.42:rc2:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2024-47830 | Plane allows server side request forgery via /_next/image endpoint | Plane is an open-source project management tool. Plane uses the ** wildcard support to retrieve the image from any hostname as in /web/next.config.js. This may permit an attacker to induce the server side into performing requests to unintended locations. This vulnerability is fixed in 0.23.0. | [
"cpe:2.3:a:plane:plane:*:*:*:*:*:*:*:*"
] | null | 9.3 | null | null |
GHSA-wq7q-x8vc-j7p4 | SQL Injection vulnerability in SEMCMS v.4.8 allows a remote attacker to obtain sensitive information via the ID parameter in the SEMCMS_User.php component. | [] | null | 9.8 | null | null |
|
GHSA-7w46-7mwp-f24r | Directory traversal vulnerability in archeryscores.php in the Archery Scores (com_archeryscores) component 1.0.6 for Joomla! allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the controller parameter to index.php. | [] | null | null | null | null |
|
CVE-2013-4861 | Directory traversal vulnerability in cgi-bin/cmh/get_file.sh in MiCasaVerde VeraLite with firmware 1.5.408 allows remote authenticated users to read arbirary files via a .. (dot dot) in the filename parameter. | [
"cpe:2.3:o:micasaverde:veralite_firmware:1.5.408:*:*:*:*:*:*:*",
"cpe:2.3:h:micasaverde:veralite:-:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4 |
|
GHSA-g6cp-4pc8-6jfr | Race condition in the kernel in Sun Solaris 8 through 10 allows local users to cause a denial of service (panic) via unspecified vectors related to "the handling of thread contexts." | [] | null | null | null | null |
|
GHSA-8p3v-4rh7-r554 | Zoom Call Recording 6.3.1 from ZOOM International is vulnerable to Java Deserialization attacks targeting the inbuilt RMI service. A remote unauthenticated attacker can exploit this vulnerability by sending crafted RMI requests to execute arbitrary code on the target host. | [] | null | null | null | null |
|
GHSA-h976-8v6c-8j56 | In the Linux kernel, the following vulnerability has been resolved:net: dsa: bcm_sf2: don't use devres for mdiobusAs explained in commits:
74b6d7d13307 ("net: dsa: realtek: register the MDIO bus under devres")
5135e96a3dd2 ("net: dsa: don't allocate the slave_mii_bus using devres")mdiobus_free() will panic when called from devm_mdiobus_free() <-
devres_release_all() <- __device_release_driver(), and that mdiobus was
not previously unregistered.The Starfighter 2 is a platform device, so the initial set of
constraints that I thought would cause this (I2C or SPI buses which call
->remove on ->shutdown) do not apply. But there is one more which
applies here.If the DSA master itself is on a bus that calls ->remove from ->shutdown
(like dpaa2-eth, which is on the fsl-mc bus), there is a device link
between the switch and the DSA master, and device_links_unbind_consumers()
will unbind the bcm_sf2 switch driver on shutdown.So the same treatment must be applied to all DSA switch drivers, which
is: either use devres for both the mdiobus allocation and registration,
or don't use devres at all.The bcm_sf2 driver has the code structure in place for orderly mdiobus
removal, so just replace devm_mdiobus_alloc() with the non-devres
variant, and add manual free where necessary, to ensure that we don't
let devres free a still-registered bus. | [] | null | null | null | null |
|
CVE-2022-34386 |
Dell SupportAssist for Home PCs (version 3.11.4 and prior) and SupportAssist for Business PCs (version 3.2.0 and prior) contain cryptographic weakness vulnerability. An authenticated non-admin user could potentially exploit the issue and obtain sensitive information.
| [
"cpe:2.3:a:dell:supportassist_for_business_pcs:*:*:*:*:*:*:*:*",
"cpe:2.3:a:dell:supportassist_for_home_pcs:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
|
CVE-2021-24982 | Child Theme Generator <= 2.2.7 - Reflected Cross-Site Scripting | The Child Theme Generator WordPress plugin through 2.2.7 does not sanitise escape the parade parameter before outputting it back, leading to a Reflected Cross-Site Scripting in the admin dashboard | [
"cpe:2.3:a:childtheme-generator:child_theme_generator:*:*:*:*:*:wordpress:*:*"
] | null | 6.4 | null | 3.5 |
CVE-2020-1364 | A denial of service vulnerability exists in the way that the WalletService handles files, aka 'Windows WalletService Denial of Service Vulnerability'. | [
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
] | null | 7.1 | null | 3.6 |
|
CVE-2023-1528 | Use after free in Passwords in Google Chrome prior to 111.0.5563.110 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
|
GHSA-g9g4-w2mf-449q | In the Linux kernel, the following vulnerability has been resolved:wireguard: socket: free skb in send6 when ipv6 is disabledI got a memory leak report:unreferenced object 0xffff8881191fc040 (size 232):
comm "kworker/u17:0", pid 23193, jiffies 4295238848 (age 3464.870s)
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff814c3ef4>] slab_post_alloc_hook+0x84/0x3b0
[<ffffffff814c8977>] kmem_cache_alloc_node+0x167/0x340
[<ffffffff832974fb>] __alloc_skb+0x1db/0x200
[<ffffffff82612b5d>] wg_socket_send_buffer_to_peer+0x3d/0xc0
[<ffffffff8260e94a>] wg_packet_send_handshake_initiation+0xfa/0x110
[<ffffffff8260ec81>] wg_packet_handshake_send_worker+0x21/0x30
[<ffffffff8119c558>] process_one_work+0x2e8/0x770
[<ffffffff8119ca2a>] worker_thread+0x4a/0x4b0
[<ffffffff811a88e0>] kthread+0x120/0x160
[<ffffffff8100242f>] ret_from_fork+0x1f/0x30In function wg_socket_send_buffer_as_reply_to_skb() or wg_socket_send_
buffer_to_peer(), the semantics of send6() is required to free skb. But
when CONFIG_IPV6 is disable, kfree_skb() is missing. This patch adds it
to fix this bug. | [] | null | 5.5 | null | null |
|
CVE-2023-25961 | WordPress Darcie Theme <= 1.1.5 is vulnerable to Cross Site Scripting (XSS) | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Catch Themes Darcie theme <= 1.1.5 versions. | [
"cpe:2.3:a:catchthemes:darcie:*:*:*:*:*:wordpress:*:*"
] | null | 7.1 | null | null |
GHSA-mmmh-j7wc-66pp | Vulnerability in the Oracle Trade Management product of Oracle E-Business Suite (component: Claim Line LOV). Supported versions that are affected are 12.2.3-12.2.13. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Trade Management. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Trade Management accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N). | [] | null | 7.5 | null | null |
|
GHSA-7qgr-qq23-9qqw | HMS v1.0 was discovered to contain a SQL injection vulnerability via the component admin.php. | [] | null | null | null | null |
|
CVE-2017-11125 | libxar.so in xar 1.6.1 has a NULL pointer dereference in the xar_get_path function in util.c. | [
"cpe:2.3:a:xar_project:xar:1.6.1:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 |
|
GHSA-2w9q-2gq5-vqqj | The RgSecurity form in the HTTP server for the Thomson TCW690 cable modem running firmware 2.1 and software ST42.03.0a does not properly validate the password before performing changes, which allows remote attackers on the LAN to gain access via a direct POST request. | [] | null | null | null | null |
|
GHSA-493f-vcwv-8c8r | In SUPERAntiSpyware Professional Trial 6.0.1254, the driver file (SASKUTIL.SYS) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x9C402080. | [] | null | null | 7.8 | null |
|
CVE-2010-4379 | Heap-based buffer overflow in RealNetworks RealPlayer 11.0 through 11.1, RealPlayer SP 1.0 through 1.1.4, RealPlayer Enterprise 2.1.2, Mac RealPlayer 11.0 through 11.1, Linux RealPlayer 11.0.2.1744, and possibly HelixPlayer 1.0.6 and other versions, allows remote attackers to have an unspecified impact via a crafted SIPR file. | [
"cpe:2.3:a:realnetworks:realplayer:11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:11.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:11.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:11.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:11.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:11.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:11.1:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer_sp:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer_sp:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer_sp:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer_sp:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer_sp:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer_sp:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer_sp:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer_sp:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer_sp:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:11.0.2.1744:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:2.1.2:*:enterprise:*:*:*:*:*"
] | null | null | null | 9.3 |
|
CVE-2021-21258 | XSS injection in ajax/kanban | GLPI is an open-source asset and IT management software package that provides ITIL Service Desk features, licenses tracking and software auditing. In GLPI from version 9.5.0 and before version 9.5.4, there is a cross-site scripting injection vulnerability when using ajax/kanban.php. This is fixed in version 9.5.4. | [
"cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*"
] | null | 6.8 | null | null |
CVE-2025-0786 | ESAFENET CDG appDetail.jsp sql injection | A vulnerability was found in ESAFENET CDG V5. It has been classified as critical. Affected is an unknown function of the file /appDetail.jsp. The manipulation of the argument flowId leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | [] | 5.3 | 6.3 | 6.3 | 6.5 |
GHSA-ghc8-5cgm-5rpf | Inventory fails to prohibit standard library access prior to initialization of Rust standard library runtime | Affected versions allow arbitrary caller-provided code to execute before the lifetime of `main`.If the caller-provided code accesses particular pieces of the standard library that require an initialized Rust runtime, such as `std::io` or `std::thread`, these may not behave as documented. Panics are likely; UB is possible.The flaw was corrected by enforcing that only code written within the `inventory` crate, which is guaranteed not to access runtime-dependent parts of the standard library, runs before `main`. Caller-provided code is restricted to running at compile time. | [] | null | null | null | null |
GHSA-rq78-g3q7-3xqv | Unspecified vulnerability on the ASUS WL-330gE has unknown impact and remote attack vectors, as demonstrated by a certain module in VulnDisco Pack Professional 8.11. NOTE: as of 20090903, this disclosure has no actionable information. However, because the VulnDisco Pack author is a reliable researcher, the issue is being assigned a CVE identifier for tracking purposes. | [] | null | null | null | null |
|
GHSA-qwp7-fcxc-qfx5 | PRTG Network Monitor before 18.3.44.2054 allows a remote authenticated attacker (with read-write privileges) to execute arbitrary code and OS commands with system privileges. When creating an HTTP Advanced Sensor, the user's input in the POST parameter 'proxyport_' is mishandled. The attacker can craft an HTTP request and override the 'writeresult' command-line parameter for HttpAdvancedSensor.exe to store arbitrary data in an arbitrary place on the file system. For example, the attacker can create an executable file in the \Custom Sensors\EXE directory and execute it by creating EXE/Script Sensor. | [] | null | null | 8.8 | null |
|
CVE-2024-53617 | A Cross Site Scripting vulnerability in LibrePhotos before commit 32237 allows attackers to takeover any account via uploading an HTML file on behalf of the admin user using IDOR in file upload. | [] | null | 4.8 | null | null |
|
CVE-2005-1653 | Cross-site scripting (XSS) vulnerability in message.htm for Woppoware PostMaster 4.2.2 (build 3.2.5) allows remote attackers to inject arbitrary web script or HTML via the email parameter. | [
"cpe:2.3:a:woppoware:postmaster:4.2.2_build3.2.5:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
GHSA-f5x8-55gx-hm4v | Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have a Heap Overflow vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user. | [] | null | null | 9.8 | null |
|
RHSA-2023:7024 | Red Hat Security Advisory: python3.11 security update | python: tarfile module directory traversal python: file path truncation at \0 characters | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 7.5 | null | null |
CVE-2020-8797 | Juplink RX4-1500 v1.0.3 allows remote attackers to gain root access to the Linux subsystem via an unsanitized exec call (aka Command Line Injection), if the undocumented telnetd service is enabled and the attacker can authenticate as admin from the local network. | [
"cpe:2.3:o:juplink:rx4-1500_firmware:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:h:juplink:rx4-1500:-:*:*:*:*:*:*:*"
] | null | 6.7 | null | 6.9 |
|
CVE-2020-25022 | An issue was discovered in Noise-Java through 2020-08-27. AESGCMFallbackCipherState.encryptWithAd() allows out-of-bounds access. | [
"cpe:2.3:a:noise-java_project:noise-java:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
|
CVE-2008-4020 | Cross-site scripting (XSS) vulnerability in Microsoft Office XP SP3 allows remote attackers to inject arbitrary web script or HTML via a document that contains a "Content-Disposition: attachment" header and is accessed through a cdo: URL, which renders the content instead of raising a File Download dialog box, aka "Vulnerability in Content-Disposition Header Vulnerability." | [
"cpe:2.3:a:microsoft:office:xp:sp3:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-7j6w-p859-464f | Froxlor allows Multiple Accounts to Share the Same Email Address Leading to Potential Privilege Escalation or Account Takeover | Summarythe vulnerability is that users (such as resellers or customers) are able to create accounts with the same email address as an existing account (e.g., if the admin has [[email protected]](mailto:[email protected]), others can also create an account using the same email). This creates potential issues with account identification and security.ImpactLocal/Authenticated: This vulnerability can be exploited by authenticated users (e.g., reseller, customer) who can create accounts with the same email address that has already been used by another account, such as the admin.
Email-based: The attack vector is email-based, as the system does not prevent multiple accounts from registering the same email address, leading to possible conflicts and security issues. | [] | null | 5.8 | null | null |
CVE-2013-1167 | Cisco IOS XE 3.2 through 3.4 before 3.4.2S, and 3.5, on 1000 series Aggregation Services Routers (ASR), when bridge domain interface (BDI) is enabled, allows remote attackers to cause a denial of service (card reload) via packets that are not properly handled during the processing of encapsulation, aka Bug ID CSCtt11558. | [
"cpe:2.3:o:cisco:ios_xe:3.2.00.xo.15.0\\(2\\)xo:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.2.0s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.2.0sg:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.2.0xo:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.2.1s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.2.1sg:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.2.2s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.2.2sg:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.2.3sg:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.2.4sg:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.3.0s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.3.0sg:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.3.1s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.3.1sg:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.3.2s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.3.3s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.4.0as:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.4.0s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.4.1s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.5.0s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.5.1s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.5.2s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.5.xs:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_1001:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_1002:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_1002-x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_1002_fixed_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_1004:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_1006:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_1013:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_1023_router:-:*:*:*:*:*:*:*"
] | null | null | null | 7.1 |
|
CVE-2016-2067 | drivers/gpu/msm/kgsl.c in the MSM graphics driver (aka GPU driver) for the Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, mishandles the KGSL_MEMFLAGS_GPUREADONLY flag, which allows attackers to gain privileges by leveraging accidental read-write mappings, aka Qualcomm internal bug CR988993. | [
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | 9.3 |
|
CVE-2003-0373 | Multiple buffer overflows in libnasl in Nessus before 2.0.6 allow local users with plugin upload privileges to cause a denial of service (core dump) and possibly execute arbitrary code via (1) a long proto argument to the scanner_add_port function, (2) a long user argument to the ftp_log_in function, (3) a long pass argument to the ftp_log_in function. | [
"cpe:2.3:a:nessus:nessus:*:*:*:*:*:*:*:*"
] | null | null | null | 4.4 |
|
GHSA-mpw4-6r28-83wc | epan/dissectors/packet-wsp.c in the WSP dissector in Wireshark 1.12.x before 1.12.13 and 2.x before 2.0.5 allows remote attackers to cause a denial of service (infinite loop) via a crafted packet. | [] | null | null | 5.9 | null |
|
CVE-2022-37966 | Windows Kerberos RC4-HMAC Elevation of Privilege Vulnerability | Windows Kerberos RC4-HMAC Elevation of Privilege Vulnerability | [
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:management_services_for_element_software:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:management_services_for_netapp_hci:-:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*"
] | null | 8.1 | null | null |
GHSA-p8c8-w89w-gvv5 | IBM Spectrum Virtualize 8.2, 8.3, and 8.4 could allow an attacker to allow unauthorized access due to the reuse of support generated credentials. IBM X-Force ID: 212609. | [] | null | 9.8 | null | null |
|
GHSA-68r5-44xv-q47r | Multiple cross-site scripting (XSS) vulnerabilities in e-Courier CMS allow remote attackers to inject arbitrary web script or HTML via the UserGUID parameter to home/index.asp and other unspecified vectors. | [] | null | null | null | null |
|
GHSA-87jj-5mq8-98pw | Certain NETGEAR devices are affected by disclosure of sensitive information. This affects D1500 before 1.0.0.27, D500 before 1.0.0.27, D6100 before 1.0.0.58, D6200 before 1.1.00.30, D6220 before 1.0.0.46, D6400 before 1.0.0.82, D7000 before 1.0.1.68, D7000v2 before 1.0.0.51, D7800 before 1.0.1.42, D8500 before 1.0.3.42, DC112A before 1.0.0.40, DGN2200Bv4 before 1.0.0.102, DGN2200v4 before 1.0.0.102, JNR1010v2 before 1.1.0.54, JR6150 before 1.0.1.18, JWNR2010v5 before 1.1.0.54, PR2000 before 1.0.0.24, R6020 before 1.0.0.34, R6050 before 1.0.1.18, R6080 before 1.0.0.34, R6100 before 1.0.1.22, R6120 before 1.0.0.42, R6220 before 1.1.0.68, R6250 before 1.0.4.30, R6300v2 before 1.0.4.32, R6400 before 1.0.1.44, R6400v2 before 1.0.2.60, R6700 before 1.0.1.48, R6700v2 before 1.2.0.24, R6800 before 1.2.0.24, R6900 before 1.0.1.48, R6900P before 1.3.1.44, R6900v2 before 1.2.0.24, R7000 before 1.0.9.34, R7000P before 1.3.1.44, R7100LG before 1.0.0.48, R7300 before 1.0.0.68, R7500 before 1.0.0.124, R7500v2 before 1.0.3.38, R7900 before 1.0.2.16, R7900P before 1.4.1.24, R8000 before 1.0.4.18, R8000P before 1.4.1.24, R8300 before 1.0.2.122, R8500 before 1.0.2.122, WN3000RP before 1.0.0.68, WN3000RPv2 before 1.0.0.68, WNDR3400v3 before 1.0.1.18, WNDR3700v4 before 1.0.2.102, WNDR3700v5 before 1.1.0.54, WNDR4300v1 before 1.0.2.104, WNDR4300v2 before 1.0.0.56, WNDR4500v3 before 1.0.0.56, WNR1000v4 before 1.1.0.54, WNR2020 before 1.1.0.54, WNR2050 before 1.1.0.54, and WNR3500Lv2 before 1.2.0.54. | [] | null | null | null | null |
|
CVE-2003-1355 | Buffer overflow in the remote console (rcon) in Battlefield 1942 1.2 and 1.3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long user name and password. | [
"cpe:2.3:a:electronic_arts:battlefield_1942:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:electronic_arts:battlefield_1942:1.3:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2009-10004 | Turante Sandbox Theme functions.php sandbox_body_class cross site scripting | A vulnerability was found in Turante Sandbox Theme up to 1.5.2. It has been classified as problematic. This affects the function sandbox_body_class of the file functions.php. The manipulation of the argument page leads to cross site scripting. It is possible to initiate the attack remotely. Upgrading to version 1.6.1 is able to address this issue. The identifier of the patch is 8045b1e10970342f558b2c5f360e0bd135af2b10. It is recommended to upgrade the affected component. The identifier VDB-225357 was assigned to this vulnerability. | [
"cpe:2.3:a:sandbox_theme_project:sandbox_theme:*:*:*:*:*:*:*:*"
] | null | 3.5 | 3.5 | 4 |
GHSA-c45x-r3w2-p779 | Vulnerability in the Oracle E-Business Suite Secure Enterprise Search product of Oracle E-Business Suite (component: Search Integration Engine). Supported versions that are affected are 12.1.3 and 12.2.3 - 12.2.10. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle E-Business Suite Secure Enterprise Search. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle E-Business Suite Secure Enterprise Search accessible data as well as unauthorized access to critical data or complete access to all Oracle E-Business Suite Secure Enterprise Search accessible data. CVSS 3.1 Base Score 9.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N). | [] | null | null | null | null |
|
GHSA-7cr9-4h7r-hh9g | The default configuration of consolehelper in system-config-network before 1.5.10-1 on Fedora 8 lacks the USER=root directive, which allows local users of the workstation console to gain privileges and change the network configuration. | [] | null | null | null | null |
|
CVE-2022-32593 | In vowe, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07138493; Issue ID: ALPS07138493. | [
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*"
] | null | 6.7 | null | null |
|
GHSA-p4q7-3j6p-6gv6 | On-Premises Data Gateway Information Disclosure Vulnerability | [] | null | 6.4 | null | null |
|
CVE-2018-1723 | IBM Spectrum Scale 4.1.1.0, 4.1.1.20, 4.2.0.0, 4.2.3.10, 5.0.0 and 5.0.1.2 could allow an unprivileged, authenticated user with access to a GPFS node to read arbitrary files available on this node. IBM X-Force ID: 147373. | [
"cpe:2.3:a:ibm:spectrum_scale:*:*:*:*:*:*:*:*"
] | null | null | 6.2 | null |
|
PYSEC-2017-60 | null | Multiple open redirect vulnerabilities in Plone CMS 5.x through 5.0.6, 4.x through 4.3.11, and 3.3.x through 3.3.6 allow remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the referer parameter to (1) %2b%2bgroupdashboard%2b%2bplone.dashboard1%2bgroup/%2b/portlets.Actions or (2) folder/%2b%2bcontextportlets%2b%2bplone.footerportlets/%2b /portlets.Actions or the (3) came_from parameter to /login_form. | [] | null | null | null | null |
GHSA-7722-mg32-4c33 | The graphite2::TtfUtil::CmapSubtable12Lookup function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted Graphite smart font, a different vulnerability than CVE-2016-2801. | [] | null | null | 8.8 | null |
|
GHSA-m42f-g5c9-vqgx | Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an attacker to do any of the following: Execute arbitrary code Elevate privileges Execute arbitrary commands Bypass authentication and authorization protections Fetch and run unsigned software Cause denial of service (DoS) For more information about these vulnerabilities, see the Details section of this advisory. | [] | null | null | null | null |
|
CVE-2022-30062 | ftcms <=2.1 was discovered to be vulnerable to Arbitrary File Read via tp.php | [
"cpe:2.3:a:ftcms:ftcms:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4 |
|
CVE-2022-27946 | NETGEAR R8500 1.0.2.158 devices allow remote authenticated users to execute arbitrary commands (such as telnetd) via shell metacharacters in the sysNewPasswd and sysConfirmPasswd parameters to admin_account.cgi. | [
"cpe:2.3:o:netgear:r8500_firmware:1.0.2.158:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r8500:-:*:*:*:*:*:*:*"
] | null | 8.8 | null | 9 |
|
CVE-2019-6114 | An issue was discovered in Corel PaintShop Pro 2019 21.0.0.119. An integer overflow in the jp2 parsing library allows an attacker to overwrite memory and to execute arbitrary code. | [
"cpe:2.3:a:corel:paintshop_pro_2019:21.0.0.119:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.8 |
|
CVE-2023-40328 | WordPress Carrot Plugin <= 1.1.0 is vulnerable to Cross Site Scripting (XSS) | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Carrrot plugin <= 1.1.0 versions. | [
"cpe:2.3:a:carrrot:carrrot:*:*:*:*:*:wordpress:*:*"
] | null | 5.9 | null | null |
CVE-2021-47380 | HID: amd_sfh: Fix potential NULL pointer dereference | In the Linux kernel, the following vulnerability has been resolved:
HID: amd_sfh: Fix potential NULL pointer dereference
devm_add_action_or_reset() can suddenly invoke amd_mp2_pci_remove() at
registration that will cause NULL pointer dereference since
corresponding data is not initialized yet. The patch moves
initialization of data before devm_add_action_or_reset().
Found by Linux Driver Verification project (linuxtesting.org).
[[email protected]: rebase] | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.15:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.15:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.15:rc3:*:*:*:*:*:*"
] | null | 5.5 | null | null |
CVE-2003-0653 | The OSI networking kernel (sys/netiso) in NetBSD 1.6.1 and earlier does not use a BSD-required "PKTHDR" mbuf when sending certain error responses to the sender of an OSI packet, which allows remote attackers to cause a denial of service (kernel panic or crash) via certain OSI packets. | [
"cpe:2.3:o:netbsd:netbsd:1.5:*:*:*:*:*:*:*",
"cpe:2.3:o:netbsd:netbsd:1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:netbsd:netbsd:1.5.2:*:*:*:*:*:*:*",
"cpe:2.3:o:netbsd:netbsd:1.5.3:*:*:*:*:*:*:*",
"cpe:2.3:o:netbsd:netbsd:1.6:*:*:*:*:*:*:*",
"cpe:2.3:o:netbsd:netbsd:1.6.1:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-r7cw-73w2-3p23 | A remote denial of service vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09. | [] | null | null | 7.5 | null |
|
GHSA-5883-cq6h-c598 | Type confusion in V8 in Google Chrome prior to 85.0.4183.121 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page. | [] | null | null | null | null |
|
GHSA-jrxv-q9r4-5w75 | Cross-site request forgery (CSRF) vulnerability in the Dropdown Menu Widget plugin 1.9.1 for WordPress allows remote attackers to hijack the authentication of arbitrary users for requests that insert cross-site scripting (XSS) sequences. | [] | null | null | null | null |
|
GHSA-hprp-8mpx-26q9 | NetMotion Mobility before 11.73 and 12.x before 12.02 allows unauthenticated remote attackers to execute arbitrary code as SYSTEM because of Java deserialization in webrepdb StatusServlet. | [] | null | null | null | null |
|
CVE-2019-18340 | A vulnerability has been identified in Control Center Server (CCS) (All versions < V1.5.0), Control Center Server (CCS) (All versions >= V1.5.0), SiNVR/SiVMS Video Server (All versions < V5.0.0), SiNVR/SiVMS Video Server (All versions >= V5.0.0). Both the SiVMS/SiNVR Video Server and the Control Center Server (CCS) store
user and device passwords by applying weak cryptography.
A local attacker could exploit this vulnerability to extract
the passwords from the user database and/or the device configuration files
to conduct further attacks. | [
"cpe:2.3:a:siemens:sinvr_3_central_control_server:*:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:sinvr_3_video_server:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
|
GHSA-2454-7cjj-wj2v | Cross-site request forgery in Icegram Email Subscribers & Newsletters Plugin for WordPress v4.4.8 allows a remote attacker to send forged emails by tricking legitimate users into clicking a crafted link. | [] | null | null | null | null |
|
GHSA-hw33-x8j9-76jp | \upload\plugins\sys\admin\Setting.php in CScms 4.1 allows CSRF via admin.php/setting/ftp_save. | [] | null | null | 8.8 | null |
|
GHSA-v5qv-jjr8-5wpj | Libsixel prior to v1.8.3 contains a stack buffer overflow in the function gif_process_raster at fromgif.c. | [] | null | 6.5 | null | null |
|
CVE-2022-25598 | Apache DolphinScheduler user registration is vulnerable to ReDoS attacks | Apache DolphinScheduler user registration is vulnerable to Regular express Denial of Service (ReDoS) attacks, Apache DolphinScheduler users should upgrade to version 2.0.5 or higher. | [
"cpe:2.3:a:apache:dolphinscheduler:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
GHSA-fwg4-q55q-w62p | Book Stack version 23.10.2 allows filtering local files on the server. This is possible because the application is vulnerable to SSRF. | [] | null | 7.1 | null | null |
|
CVE-2025-22531 | WordPress Urdu Formatter – Shamil plugin <= 0.1 - Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in M Bilal M Urdu Formatter – Shamil allows Stored XSS.This issue affects Urdu Formatter – Shamil: from n/a through 0.1. | [] | null | 6.5 | null | null |
CVE-2023-47415 | Cypress Solutions CTM-200 v2.7.1.5600 and below was discovered to contain an OS command injection vulnerability via the cli_text parameter. | [
"cpe:2.3:o:cypress:ctm-200_firmware:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
|
CVE-2023-46978 | TOTOLINK X6000R V9.4.0cu.852_B20230719 is vulnerable to Incorrect Access Control.Attackers can reset login password & WIFI passwords without authentication. | [
"cpe:2.3:o:totolink:x6000r_firmware:9.4.0cu.852_b20230719:*:*:*:*:*:*:*",
"cpe:2.3:h:totolink:x6000r:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
|
GHSA-5qf5-xcc6-qrmw | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Adam DeHaven Perfect Pullquotes allows Stored XSS.This issue affects Perfect Pullquotes: from n/a through 1.7.5. | [] | null | 6.5 | null | null |
|
CVE-2022-43034 | An issue was discovered in Bento4 v1.6.0-639. There is a heap buffer overflow vulnerability in the AP4_BitReader::SkipBits(unsigned int) function in mp42ts. | [
"cpe:2.3:a:axiosys:bento4:1.6.0-639:*:*:*:*:*:*:*"
] | null | 6.5 | null | null |
|
CVE-2021-43809 | Local Code Execution through Argument Injection via dash leading git url parameter in Gemfile | `Bundler` is a package for managing application dependencies in Ruby. In `bundler` versions before 2.2.33, when working with untrusted and apparently harmless `Gemfile`'s, it is not expected that they lead to execution of external code, unless that's explicit in the ruby code inside the `Gemfile` itself. However, if the `Gemfile` includes `gem` entries that use the `git` option with invalid, but seemingly harmless, values with a leading dash, this can be false. To handle dependencies that come from a Git repository instead of a registry, Bundler uses various commands, such as `git clone`. These commands are being constructed using user input (e.g. the repository URL). When building the commands, Bundler versions before 2.2.33 correctly avoid Command Injection vulnerabilities by passing an array of arguments instead of a command string. However, there is the possibility that a user input starts with a dash (`-`) and is therefore treated as an optional argument instead of a positional one. This can lead to Code Execution because some of the commands have options that can be leveraged to run arbitrary executables. Since this value comes from the `Gemfile` file, it can contain any character, including a leading dash.
To exploit this vulnerability, an attacker has to craft a directory containing a `Gemfile` file that declares a dependency that is located in a Git repository. This dependency has to have a Git URL in the form of `-u./payload`. This URL will be used to construct a Git clone command but will be interpreted as the upload-pack argument. Then this directory needs to be shared with the victim, who then needs to run a command that evaluates the Gemfile, such as `bundle lock`, inside.
This vulnerability can lead to Arbitrary Code Execution, which could potentially lead to the takeover of the system. However, the exploitability is very low, because it requires a lot of user interaction. Bundler 2.2.33 has patched this problem by inserting `--` as an argument before any positional arguments to those Git commands that were affected by this issue. Regardless of whether users can upgrade or not, they should review any untrustred `Gemfile`'s before running any `bundler` commands that may read them, since they can contain arbitrary ruby code. | [
"cpe:2.3:a:bundler:bundler:*:*:*:*:*:ruby:*:*"
] | null | 6.7 | null | null |
CVE-2023-31857 | Sourcecodester Online Computer and Laptop Store 1.0 allows unrestricted file upload and can lead to remote code execution. The vulnerability path is /classes/Users.php?f=save. | [
"cpe:2.3:a:oretnom23:online_computer_and_laptop_store:1.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
GHSA-3cwv-x695-72xm | A vulnerability, which was classified as critical, was found in Campcodes Complete Web-Based School Management System 1.0. Affected is an unknown function of the file /view/student_payment_details4.php. The manipulation of the argument index leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-265098 is the identifier assigned to this vulnerability. | [] | 5.3 | 6.3 | null | null |
|
GHSA-8899-pjpj-8p5v | Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV160, RV160W, RV260, RV260P, and RV260W VPN Routers could allow an unauthenticated, remote attacker to execute arbitrary code as the root user on an affected device. These vulnerabilities exist because HTTP requests are not properly validated. An attacker could exploit these vulnerabilities by sending a crafted HTTP request to the web-based management interface of an affected device. A successful exploit could allow the attacker to remotely execute arbitrary code on the device. | [] | null | null | null | null |
|
GHSA-cv2h-wxc2-2v4j | It was possible for double OGNL evaluation in certain redirect action and in WebWork URL and Anchor tags in JSP files to occur. An attacker who can access the web interface of Fisheye or Crucible or who hosts a website that a user who can access the web interface of Fisheye or Crucible visits, is able to exploit this vulnerability to execute Java code of their choice on systems that run a vulnerable version of Fisheye or Crucible. All versions of Fisheye and Crucible before 4.4.5 (the fixed version for 4.4.x) and from 4.5.0 before 4.5.2 (the fixed version for 4.5.x) are affected by this vulnerability. | [] | null | null | 9.8 | null |
|
RHSA-2020:1445 | Red Hat Security Advisory: Red Hat AMQ Broker 7.4.3 release and security update | activemq: Corrupt MQTT frame can cause broker shutdown HTTP/2: large amount of data requests leads to denial of service HTTP/2: flood using PING frames results in unbounded memory growth HTTP/2: flood using HEADERS frames results in unbounded memory growth HTTP/2: flood using SETTINGS frames results in unbounded memory growth HTTP/2: 0-length headers lead to denial of service HTTP/2: request for large response leads to denial of service HTTP/2: flood using empty frames results in excessive resource consumption jetty: using specially formatted URL against DefaultServlet or ResourceHandler leads to XSS conditions jetty: error path information disclosure netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers netty: HTTP request smuggling netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling | [
"cpe:/a:redhat:amq_broker:7"
] | null | 7.5 | 7.5 | null |
GHSA-8cpv-pp42-ppmr | An issue was discovered on Innovaphone PBX before 14r1 devices. It provides different responses to incoming requests in a way that reveals information to an attacker. | [] | null | 5.3 | null | null |
|
CVE-2020-13793 | Unsafe storage of AD credentials in Ivanti DSM netinst 5.1 due to a static, hard-coded encryption key. | [
"cpe:2.3:a:ivanti:dsm_netinst:5.1:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
|
GHSA-rv49-vc49-4rpp | nopCommerce 4.50.1 is vulnerable to Cross Site Scripting (XSS). At Apply for vendor account feature, an attacker can upload an arbitrary file to the system. | [] | null | 6.1 | null | null |
|
GHSA-qw5m-vmp3-f553 | Magento Open Source allows Incorrect Authorization | Adobe Commerce versions 2.4.6 (and earlier), 2.4.5-p2 (and earlier) and 2.4.4-p3 (and earlier) are affected by an Incorrect Authorization vulnerability that could result in a security feature bypass. An attacker could leverage this vulnerability to bypass a minor functionality. Exploitation of this issue does not require user interaction. | [] | 6.9 | 5.3 | null | null |
GHSA-9qhr-489p-hcrq | A SQL injection vulnerability in /view/emarks_range_grade_update_form.php in Campcodes Complete Web-Based School Management System 1.0 allows an attacker to execute arbitrary SQL commands via the conversation_id parameter. | [] | null | 9.8 | null | null |
|
GHSA-w62m-q72r-mx47 | In Argent RecoveryManager before 0xdc350d09f71c48c5D22fBE2741e4d6A03970E192, the executeRecovery function does not require any signatures in the zero-guardian case, which allows attackers to cause a denial of service (locking) or a takeover. | [] | null | null | null | null |
|
CVE-2019-10112 | An issue was discovered in GitLab Community and Enterprise Edition before 11.7.8, 11.8.x before 11.8.4, and 11.9.x before 11.9.2. The construction of the HMAC key was insecurely derived. | [
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*"
] | null | null | 7.5 | 5 |
|
RHSA-2018:1877 | Red Hat Security Advisory: sssd and ding-libs security and bug fix update | sssd: unsanitized input when searching in local cache database | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 4.3 | null |
GHSA-m8rx-f843-vqgg | The Advanced Google reCAPTCHA plugin for WordPress is vulnerable to generic SQL Injection via the ‘sSearch’ parameter in all versions up to, and including, 1.29 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries, particularly when the plugin’s settings page hasn’t been visited and its welcome message has not been dismissed. This issue can be used to extract sensitive information from the database. | [] | null | 5.3 | null | null |
|
GHSA-5qfh-qxwg-gpxg | Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vulnerability in UBIT Information Technologies Student Information Management System.This issue affects Student Information Management System: before 20211126. | [] | null | 6.1 | null | null |
|
RHSA-2019:2033 | Red Hat Security Advisory: patch security and bug fix update | patch: Out-of-bounds access in pch_write_line function in pch.c patch: Double free of memory in pch.c:another_hunk() causes a crash | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 3.3 | null |
GHSA-pfc3-fmmp-mxgw | OpenEXR 2.3.0 has a memory leak in ThreadPool in IlmBase/IlmThread/IlmThreadPool.cpp, as demonstrated by exrmultiview. | [] | null | null | 4.3 | null |
|
GHSA-8hhw-p6vr-v3wv | A use after free issue was addressed with improved memory management. This issue is fixed in macOS Ventura 13, iOS 16.1 and iPadOS 16, Safari 16.1. Processing maliciously crafted web content may lead to arbitrary code execution. | [] | null | 8.8 | null | null |
|
GHSA-jqxq-7f92-m7ww | Crypt::Random Perl package 1.05 through 1.55 may use rand() function, which is not cryptographically strong, for cryptographic functions.Crypt::Random::rand 1.05 through 1.55 uses the rand() function. If the Provider is not specified and /dev/urandom or an Entropy Gathering Daemon (egd) service is not available Crypt::Random will default to use the insecure Crypt::Random::rand provider.In particular, Windows versions of perl will encounter this issue by default. | [] | null | 8.8 | null | null |
|
GHSA-4c38-cvx5-fh22 | In Android before security patch level 2018-04-05 on Qualcomm Snapdragon Mobile and Snapdragon Wear MDM9206, MDM9607, MSM8909W, SD 210/SD 212/SD 205, SD 425, SD 430, SD 450, SD 625, SD 650/52, debug policy can potentially be bypassed. | [] | null | null | 9.8 | null |
|
GHSA-rrqf-vmwv-g72p | A vulnerability was found in knightliao Disconf 2.6.36. It has been classified as critical. This affects an unknown part of the file /api/config/list of the component Configuration Center. The manipulation leads to improper authentication. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. | [] | 6.9 | 5.3 | null | null |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.