id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2017-2539 | An issue was discovered in certain Apple products. iOS before 10.3.2 is affected. Safari before 10.1.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site. | [
"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.8 |
|
GHSA-5vfp-rhj3-ffh6 | Vulnerability in the Oracle FLEXCUBE Private Banking component of Oracle Financial Services Applications (subcomponent: Miscellaneous). Supported versions that are affected are 12.0.0 and 12.1.0. Easily "exploitable" vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle FLEXCUBE Private Banking. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle FLEXCUBE Private Banking, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle FLEXCUBE Private Banking accessible data. CVSS 3.0 Base Score 4.7 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N). | [] | null | null | 4.7 | null |
|
GHSA-xrvj-fcp5-3rm2 | A NULL pointer dereference was discovered in ifilter_bank of libfaad/filtbank.c in Freeware Advanced Audio Decoder 2 (FAAD2) 2.8.8. The vulnerability causes a segmentation fault and application crash, which leads to denial of service because adding to windowed output is mishandled in the LONG_START_SEQUENCE case. | [] | null | null | 5.5 | null |
|
CVE-2003-1442 | The web administration page for the Ericsson HM220dp ADSL modem does not require authentication, which could allow remote attackers to gain access from the LAN side. | [
"cpe:2.3:h:ericsson:hm220dp_adsl_modem:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-925f-gg6v-cr2f | In onCreatePreferences of EditInfoFragment.java, there is a possible way to read contacts belonging to other users due to improper input validation. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-248251018 | [] | null | 3.3 | null | null |
|
CVE-2017-2238 | Cross-site request forgery (CSRF) vulnerability in Toshiba Home gateway HEM-GW16A firmware HEM-GW16A-FW-V1.2.0 and earlier and Toshiba Home gateway HEM-GW26A firmware HEM-GW26A-FW-V1.2.0 and earlier allows remote attackers to hijack the authentication of administrators via unspecified vectors. | [
"cpe:2.3:o:toshiba:hem-gw16a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:toshiba:hem-gw16a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:toshiba:hem-gw26a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:toshiba:hem-gw26a:-:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.8 |
|
GHSA-gj2h-456r-m96q | The OpenStack Nova (python-nova) package 1:2013.2.3-0 before 1:2013.2.3-0ubuntu1.2 and 1:2014.1-0 before 1:2014.1-0ubuntu1.2 and Openstack Cinder (python-cinder) package 1:2013.2.3-0 before 1:2013.2.3-0ubuntu1.1 and 1:2014.1-0 before 1:2014.1-0ubuntu1.1 for Ubuntu 13.10 and 14.04 LTS does not properly set the sudo configuration, which makes it easier for attackers to gain privileges by leveraging another vulnerability. | [] | null | null | null | null |
|
GHSA-36hm-mqp3-4q69 | A vulnerability has been identified in Tecnomatix Plant Simulation (All versions < V2201.0006). The affected application contains an out of bounds write past the end of an allocated buffer while parsing a specially crafted SPP file. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-20300) | [] | null | 7.8 | null | null |
|
CVE-2016-1851 | The Screen Lock feature in Apple OS X before 10.11.5 mishandles password profiles, which allows physically proximate attackers to reset expired passwords in the lock-screen state via unspecified vectors. | [
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
] | null | null | 4.6 | 2.1 |
|
GHSA-888r-932r-wcrp | The WPCafe – Online Food Ordering, Restaurant Menu, Delivery, and Reservations for WooCommerce plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 2.2.25 via the reservation_extra_field shortcode parameter. This makes it possible for authenticated attackers, with Contributor-level access and above, to include remote files on the server, potentially resulting in code execution | [] | null | 8.8 | null | null |
|
RHSA-2024:3634 | Red Hat Security Advisory: Red Hat Product OCP Tools 4.14 OpenShift Jenkins security update | ssh: Prefix truncation attack on Binary Packet Protocol (BPP) jetty: stop accepting new connections from valid clients jenkins-2-plugins: git-server plugin arbitrary file read vulnerability jenkins-2-plugins: matrix-project plugin path traversal vulnerability golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON jenkins-2-plugins: Improper input sanitization in HTML Publisher Plugin jenkins-plugin/script-security: sandbox bypass via crafted constructor bodies jenkins-plugin/script-security: sandbox bypass via sandbox-defined classes | [
"cpe:/a:redhat:ocp_tools:4.14::el8"
] | null | 8.8 | null | null |
GHSA-h2j4-cg8h-chp5 | Cantemo Portal before 3.2.13, 3.3.x before 3.3.8, and 3.4.x before 3.4.9 has XSS. Leveraging this vulnerability would enable performing actions as users, including administrative users. This could enable account creation and deletion as well as deletion of information contained within the app. | [] | null | 9 | null | null |
|
CVE-2018-10635 | In Universal Robots Robot Controllers Version CB 3.1, SW Version 3.4.5-100, ports 30001/TCP to 30003/TCP listen for arbitrary URScript code and execute the code. This enables a remote attacker who has access to the ports to remotely execute code that may allow root access to be obtained. | [
"cpe:2.3:o:universal-robots:cb3.1_firmware:3.4.5-100:*:*:*:*:*:*:*",
"cpe:2.3:h:universal-robots:cb3.1:-:*:*:*:*:*:*:*"
] | null | null | 9.8 | 10 |
|
GHSA-pwqc-fww3-rgcj | WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1. | [] | null | null | null | null |
|
GHSA-q672-82r7-3973 | In Bluetooth, there is a possible out of bounds read due to a use after free. This could lead to remote information disclosure with heap information written to the log with System execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-109755179 | [] | null | null | null | null |
|
CVE-2025-23539 | WordPress Awesome Hooks plugin <= 1.0.1 - Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Awesome Hooks allows Reflected XSS. This issue affects Awesome Hooks: from n/a through 1.0.1. | [] | null | 7.1 | null | null |
CVE-2018-19452 | A use after free in the TextBox field Mouse Enter action in IReader_ContentProvider can occur for specially crafted PDF files in Foxit Reader SDK (ActiveX) Professional 5.4.0.1031. An attacker can leverage this to gain remote code execution. Relative to CVE-2018-19444, this has a different free location and requires different JavaScript code for exploitation. | [
"cpe:2.3:a:foxitsoftware:foxit_pdf_sdk_activex:*:*:*:*:professional:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | null | 7.8 | 6.8 |
|
GHSA-274g-94c9-xmph | In the Linux kernel, the following vulnerability has been resolved:vmxnet3: Fix packet corruption in vmxnet3_xdp_xmit_frameAndrew and Nikolay reported connectivity issues with Cilium's service
load-balancing in case of vmxnet3.If a BPF program for native XDP adds an encapsulation header such as
IPIP and transmits the packet out the same interface, then in case
of vmxnet3 a corrupted packet is being sent and subsequently dropped
on the path.vmxnet3_xdp_xmit_frame() which is called e.g. via vmxnet3_run_xdp()
through vmxnet3_xdp_xmit_back() calculates an incorrect DMA address:page = virt_to_page(xdpf->data);
tbi->dma_addr = page_pool_get_dma_addr(page) +
VMXNET3_XDP_HEADROOM;
dma_sync_single_for_device(&adapter->pdev->dev,
tbi->dma_addr, buf_size,
DMA_TO_DEVICE);The above assumes a fixed offset (VMXNET3_XDP_HEADROOM), but the XDP
BPF program could have moved xdp->data. While the passed buf_size is
correct (xdpf->len), the dma_addr needs to have a dynamic offset which
can be calculated as xdpf->data - (void *)xdpf, that is, xdp->data -
xdp->data_hard_start. | [] | null | null | null | null |
|
CVE-2016-4049 | The bgp_dump_routes_func function in bgpd/bgp_dump.c in Quagga does not perform size checks when dumping data, which might allow remote attackers to cause a denial of service (assertion failure and daemon crash) via a large BGP packet. | [
"cpe:2.3:a:quagga:quagga:-:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
GHSA-rm3j-5r56-jwf6 | Adobe Framemaker versions 2020.5, 2022.3 and earlier Answer: are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [] | null | 5.5 | null | null |
|
CVE-2021-36723 | Emuse - eServices / eNvoice Exposure Of Private Personal Information | Emuse - eServices / eNvoice Exposure Of Private Personal Information due to lack of identification mechanisms and predictable IDs an attacker can scrape all the files on the service. | [
"cpe:2.3:a:emuse_-_eservices_\\/_envoice_project:emuse_-_eservices_\\/_envoice:-:*:*:*:*:*:*:*"
] | null | 6.1 | null | null |
GHSA-9qg9-x23p-hpwx | Cross-site scripting (XSS) vulnerability in MercuryBoard 1.0.x and 1.1.x allows remote attackers to inject arbitrary HTML and web script via the f parameter. | [] | null | null | null | null |
|
CVE-2020-3135 | Cisco Unified Communications Manager Cross-Site Request Forgery Vulnerability | A vulnerability in the web-based management interface of Cisco Unified Communications Manager (UCM) could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack on an affected device. The vulnerability is due to insufficient CSRF protections for the web-based management interface on an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to follow a malicious link. A successful exploit could allow the attacker to perform arbitrary actions with the privilege level of the targeted user. | [
"cpe:2.3:a:cisco:unified_communications_manager:*:*:*:*:*:*:*:*"
] | null | null | 6.5 | null |
GHSA-pmv2-xr2g-m6j5 | eGain Chat 15.0.3 allows HTML Injection. | [] | null | null | 6.1 | null |
|
CVE-2020-14222 | HCL Digital Experience 8.5, 9.0, 9.5 is susceptible to cross site scripting (XSS). One subcomponent is vulnerable to reflected XSS. In reflected XSS, an attacker must induce a victim to click on a crafted URL from some delivery mechanism (email, other web site). | [
"cpe:2.3:a:hcltech:hcl_digital_experience:8.5:*:*:*:*:*:*:*",
"cpe:2.3:a:hcltech:hcl_digital_experience:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:hcltech:hcl_digital_experience:9.5:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 |
|
CVE-2021-32071 | The MiCollab Client service in Mitel MiCollab before 9.3 could allow an unauthenticated user to gain system access due to improper access control. A successful exploit could allow an attacker to view and modify application data, and cause a denial of service for users. | [
"cpe:2.3:a:mitel:micollab:*:*:*:*:*:-:*:*"
] | null | 9.8 | null | 7.5 |
|
GHSA-7h25-phc4-5m3h | Memory leak in Cisco Adaptive Security Appliances (ASA) 5500 Series and PIX Security Appliances 8.0 before 8.0(4) and 8.1 before 8.1(2) allows remote attackers to cause a denial of service (memory consumption) via an unspecified sequence of packets, related to the "initialization code for the hardware crypto accelerator." | [] | null | null | null | null |
|
GHSA-pvgw-6cpf-8fqg | Online Job Portal v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'txt_uname' parameter of the sign-up.php resource does not validate the characters received and they are sent unfiltered to the database. | [] | null | 9.8 | null | null |
|
CVE-2007-0132 | SQL injection vulnerability in compare_product.php in iGeneric iG Shop 1.4 allows remote attackers to execute arbitrary SQL commands via the id parameter. | [
"cpe:2.3:a:igeneric:ig_shop:1.4:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2024-35653 | WordPress Visual Composer Website Builder, Landing Page Builder, Custom Theme Builder, Maintenance Mode & Coming Soon Pages plugin <= 45.8.0 - Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in visualcomposer.Com Visual Composer Website Builder allows Stored XSS.This issue affects Visual Composer Website Builder: from n/a through 45.8.0. | [
"cpe:2.3:a:visualcomposer:visual_composer_website_builder:*:*:*:*:*:wordpress:*:*"
] | null | 6.5 | null | null |
GHSA-7332-4fjh-96p7 | An XSS issue was discovered in index.php/admin/system/basic in YUNUCMS 1.1.5. | [] | null | null | 4.8 | null |
|
CVE-2024-57252 | OtCMS <=V7.46 is vulnerable to Server-Side Request Forgery (SSRF) in /admin/read.php, which can Read system files arbitrarily. | [] | null | 4.3 | null | null |
|
GHSA-cr7q-878x-246x | Maxima Max Pro Power 1.0 486A devices allow BLE traffic replay. An attacker can use GATT characteristic handle 0x0012 to perform potentially disruptive actions such as starting a Heart Rate monitor. | [] | null | 4.3 | null | null |
|
GHSA-hmj6-rqw8-j8pf | Null Pointer Dereference vulnerability exists in TRENDnet TEW-755AP 1.11B03, TEW-755AP2KAC 1.11B03, TEW-821DAP2KAC 1.11B03, and TEW-825DAP 1.11B03, which could let a remote malicious user cause a denial of service by sending the POST request to apply_cgi via the lang action without a language key. | [] | null | null | null | null |
|
CVE-2017-9168 | libautotrace.a in AutoTrace 0.31.1 has a heap-based buffer overflow in the ReadImage function in input-bmp.c:353:25. | [
"cpe:2.3:a:autotrace_project:autotrace:0.31.1:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 |
|
CVE-2020-0636 | An elevation of privilege vulnerability exists in the way that the Windows Subsystem for Linux handles files, aka 'Windows Subsystem for Linux Elevation of Privilege Vulnerability'. | [
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*"
] | null | 7.8 | null | 4.6 |
|
CVE-2012-4447 | Heap-based buffer overflow in tif_pixarlog.c in LibTIFF before 4.0.3 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted TIFF image using the PixarLog Compression format. | [
"cpe:2.3:a:libtiff:libtiff:*:*:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.4:beta18:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.4:beta24:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.4:beta28:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.4:beta29:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.4:beta31:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.4:beta32:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.4:beta34:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.4:beta35:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.4:beta36:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.4:beta37:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.5.6:beta:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.5.7:alpha:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.5.7:alpha2:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.5.7:alpha3:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.5.7:alpha4:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.5.7:beta:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.6.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.6.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.7.0:alpha:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.7.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.7.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.9:*:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.9.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.9.2-5.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.9.4:*:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.9.5:*:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:4.0:alpha:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:4.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:4.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:4.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:4.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:4.0:beta5:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:4.0:beta6:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:4.0.1:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
GHSA-wq7h-4ppp-95mc | The SSLSocket implementation in the (1) JSAFE and (2) JSSE APIs in EMC RSA BSAFE SSL-J 5.x before 5.1.3 and 6.x before 6.0.2 allows remote attackers to cause a denial of service (memory consumption) by triggering application-data processing during the TLS handshake, a time at which the data is internally buffered. | [] | null | null | null | null |
|
GHSA-p3mv-74p6-4mgc | In man2html 1.6g, a specific string being read in from a file will overwrite the size parameter in the top chunk of the heap. This at least causes the program to segmentation abort if the heap size parameter isn't aligned correctly. In version before GLIBC version 2.29 and aligned correctly, it allows arbitrary write anywhere in the programs memory. | [] | null | 5.5 | null | null |
|
GHSA-8fxg-pcq5-47h6 | Directory traversal vulnerability in the web application in Symmetricom s350i 2.70.15 allows remote attackers to read arbitrary files via a (1) ../ (dot dot slash) or (2) ..\ (dot dot forward slash) before a file name. | [] | null | 7.5 | null | null |
|
GHSA-vj52-32w5-3jjr | The SNMPv2 implementation in Cisco IOS XR allows remote authenticated users to cause a denial of service (snmpd daemon reload) via a malformed SNMP packet, aka Bug ID CSCur25858. | [] | null | null | null | null |
|
CVE-2025-24304 | arkcompiler_ets_runtime has an out-of-bounds write vulnerability | in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through out-of-bounds write. | [] | null | 3.3 | null | null |
RHSA-2020:4654 | Red Hat Security Advisory: python27:2.7 security update | python: infinite loop in the tarfile module via crafted TAR archive python-pip: directory traversal in _download_http_url() function in src/pip/_internal/download.py | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8 | null | null |
CVE-2024-10788 | Activity Log – Monitor & Record User Changes <= 2.11.1 - Unauthenticated Stored Cross-Site Scripting via Event Context | The Activity Log – Monitor & Record User Changes plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the event parameters in all versions up to, and including, 2.11.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever an administrative user accesses an injected page. | [] | null | 7.2 | null | null |
GHSA-8r7f-vjf7-pvp7 | The Request a Quote WordPress plugin before 2.4.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) | [] | null | 5.9 | null | null |
|
CVE-2018-3854 | An exploitable information disclosure vulnerability exists in the password protection functionality of Quicken Deluxe 2018 for Mac version 5.2.2. A specially crafted sqlite3 request can cause the removal of the password protection, allowing an attacker to access and modify the data without knowing the password. An attacker needs to have access to the password-protected files to trigger this vulnerability. | [
"cpe:2.3:a:intuit:quicken_2018:5.2.2:*:*:*:deluxe:macos:*:*"
] | null | null | 7.1 | null |
|
CVE-2019-8209 | Adobe Acrobat and Reader versions , 2019.012.20040 and earlier, 2017.011.30148 and earlier, 2017.011.30148 and earlier, 2015.006.30503 and earlier, and 2015.006.30503 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution . | [
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.8 |
|
GHSA-462j-78vj-jjpr | A vulnerability has been identified in SCALANCE W780 and W740 (IEEE 802.11n) family (All versions < V6.3). Sending specially crafted packets through the ARP protocol to an affected device could cause a partial denial-of-service, preventing the device to operate normally for a short period of time. | [] | null | null | null | null |
|
GHSA-r3cp-6f7r-wgx4 | Untrusted search path vulnerability in Douro Kouji Kanseizutou Check Program Ver3.1 (cdrw_checker_3.1.0.lzh) and earlier allows remote attackers to gain privileges via a Trojan horse DLL in an unspecified directory. | [] | null | null | 7.8 | null |
|
CVE-2010-4144 | SQL injection vulnerability in radyo.asp in Kisisel Radyo Script allows remote attackers to execute arbitrary SQL commands via the Id parameter. | [
"cpe:2.3:a:aspindir:kisisel_radyo_script:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2023-46468 | An issue in juzawebCMS v.3.4 and before allows a remote attacker to execute arbitrary code via a crafted file to the custom plugin function. | [
"cpe:2.3:a:juzaweb:juzaweb_cms:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
|
CVE-2000-0693 | pgxconfig in the Raptor GFX configuration tool uses a relative path name for a system call to the "cp" program, which allows local users to execute arbitrary commands by modifying their path to point to an alternate "cp" program. | [
"cpe:2.3:a:tech-source:raptor_gfx_pgx32:2.3.1:*:*:*:*:*:*:*"
] | null | null | null | 7.2 |
|
CVE-2017-5081 | Lack of verification of an extension's locale folder in Google Chrome prior to 59.0.3071.86 for Mac, Windows, and Linux, and 59.0.3071.92 for Android, allowed an attacker with local write access to modify extensions by modifying extension files. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"
] | null | 3.3 | null | 2.1 |
|
CVE-2025-23868 | WordPress Chess Tempo Viewer plugin <= 0.9.5 - Stored Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Markus Liebelt Chess Tempo Viewer allows Stored XSS.This issue affects Chess Tempo Viewer: from n/a through 0.9.5. | [] | null | 6.5 | null | null |
GHSA-j459-hg6r-rr22 | The WebPageSerializerImpl::openTagToString function in WebKit/Source/web/WebPageSerializerImpl.cpp in the page serializer in Google Chrome before 47.0.2526.80 does not properly use HTML entities, which might allow remote attackers to inject arbitrary web script or HTML via a crafted document, as demonstrated by a double-quote character inside a single-quoted string. | [] | null | null | null | null |
|
CVE-2016-2145 | The am_read_post_data function in mod_auth_mellon before 0.11.1 does not check if the ap_get_client_block function returns an error, which allows remote attackers to cause a denial of service (segmentation fault and process crash) via a crafted POST data. | [
"cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*",
"cpe:2.3:a:uninett:mod_auth_mellon:*:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
GHSA-h3vj-c927-89ww | Arbitrary Code Execution through Sanitizer Bypass in GitHub repository jgraph/drawio prior to 18.0.0. - Arbitrary (remote) code execution in the desktop app. - Stored XSS in the web app. | [] | null | 9.6 | null | null |
|
GHSA-53c3-c4qm-j6hm | Windows DNS Server Denial of Service Vulnerability. | [] | null | 7.5 | null | null |
|
CVE-2021-30896 | A logic issue was addressed with improved restrictions. This issue is fixed in iOS 15.0.2 and iPadOS 15.0.2, tvOS 15.1, watchOS 8.1, macOS Monterey 12.0.1. A malicious application may be able to read user's gameplay data. | [
"cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | 4.3 |
|
CVE-2023-37308 | Zoho ManageEngine ADAudit Plus before 7100 allows XSS via the username field. | [
"cpe:2.3:a:zohocorp:manageengine_adaudit_plus:*:*:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.0:-:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.0:7000:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.0:7002:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.0:7003:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.0:7004:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.0:7005:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.0:7006:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.0:7007:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.0:7008:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.0:7050:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.0:7051:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.0:7052:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.0:7053:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.0:7054:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.0:7055:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.0:7060:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.0:7062:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.0:7063:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.0:7065:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.0:7080:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.0:7081:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.0:7082:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.0:7090:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.0:7091:*:*:*:*:*:*"
] | null | 5.4 | null | null |
|
CVE-2006-3931 | Buffer overflow in the daemon function in midirecord.cc in Tuomas Airaksinen Midirecord 2.0 allows local users to execute arbitrary code via a long command line argument (filename). NOTE: This may not be a vulnerability if Midirecord is not installed setuid. | [
"cpe:2.3:a:tuomas_airaksinen:midirecord:2.0:*:*:*:*:*:*:*"
] | null | null | null | 4.6 |
|
CVE-2023-47837 | WordPress ARMember plugin <= 4.0.10 - Membership Plan Bypass vulnerability | Improper Privilege Management vulnerability in Repute Infosystems ARMember allows Privilege Escalation.This issue affects ARMember: from n/a through 4.0.10. | [
"cpe:2.3:a:armemberplugin:armember:*:*:*:*:*:wordpress:*:*"
] | null | 8.3 | null | null |
GHSA-jr2m-29wj-w9qc | SQL Injection in FreeTAKServer-UI | FreeTAKServer-UI v1.9.8 was discovered to contain a SQL injection vulnerability via the API endpoint /AuthenticateUser. | [] | null | 6.5 | null | null |
CVE-2021-46053 | A Denial of Service vulnerability exists in Binaryen 103. The program terminates with signal SIGKILL. | [
"cpe:2.3:a:webassembly:binaryen:103:*:*:*:*:*:*:*"
] | null | 5.5 | null | 4.3 |
|
CVE-2012-3305 | Directory traversal vulnerability in IBM WebSphere Application Server (WAS) 6.1 before 6.1.0.47, 7.0 before 7.0.0.25, 8.0 before 8.0.0.5, and 8.5 before 8.5.0.1 allows remote attackers to overwrite arbitrary files via a crafted application file. | [
"cpe:2.3:a:ibm:websphere_application_server:6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.21:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.22:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.23:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.24:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.25:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.26:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.27:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.28:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.29:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.31:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.32:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.33:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.34:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.35:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.36:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.37:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.38:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.39:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.41:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.42:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.43:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.44:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.45:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.21:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.22:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.23:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:8.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:8.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:8.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:8.0.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:8.0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:8.5.0.0:*:*:*:*:*:*:*"
] | null | null | null | 6.4 |
|
CVE-2017-3323 | Vulnerability in the MySQL Cluster component of Oracle MySQL (subcomponent: Cluster: General). Supported versions that are affected are 7.2.25 and earlier, 7.3.14 and earlier and 7.4.12 and earlier. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Cluster. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Cluster. CVSS v3.0 Base Score 3.7 (Availability impacts). | [
"cpe:2.3:a:oracle:mysql_cluster:*:*:*:*:*:*:*:*"
] | null | null | 3.7 | 4.3 |
|
CVE-2024-5624 | Reflected Cross-Site Scripting (XSS) in Shift Logbook application of B&R APROL | Reflected Cross-Site Scripting (XSS) in Shift Logbook application of B&R APROL <= R 4.4-00P3 may allow a network-based attacker to execute arbitrary JavaScript code in the context of the user's browser session | [
"cpe:2.3:a:br-automation:industrial_automation_aprol:*:*:*:*:*:*:*:*"
] | 5.1 | null | null | null |
CVE-2007-0002 | Multiple heap-based buffer overflows in WordPerfect Document importer/exporter (libwpd) before 0.8.9 allow user-assisted remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted WordPerfect file in which values to loop counters are not properly handled in the (1) WP3TablesGroup::_readContents and (2) WP5DefinitionGroup_DefineTablesSubGroup::WP5DefinitionGroup_DefineTablesSubGroup functions. NOTE: the integer overflow has been split into CVE-2007-1466. | [
"cpe:2.3:a:libwpd:libwpd_library:*:*:*:*:*:*:*:*",
"cpe:2.3:a:libwpd:libwpd_library:0.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:libwpd:libwpd_library:0.8.6:*:*:*:*:*:*:*",
"cpe:2.3:a:libwpd:libwpd_library:0.8.7:*:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
CVE-2018-20753 | Kaseya VSA RMM before R9.3 9.3.0.35, R9.4 before 9.4.0.36, and R9.5 before 9.5.0.5 allows unprivileged remote attackers to execute PowerShell payloads on all managed devices. In January 2018, attackers actively exploited this vulnerability in the wild. | [
"cpe:2.3:a:kaseya:virtual_system_administrator:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
|
RHSA-2022:6505 | Red Hat Security Advisory: openvswitch2.15 security update | dpdk: error recovery in mlx5 driver not handled properly, allowing for denial of service | [
"cpe:/o:redhat:enterprise_linux:8::fastdatapath"
] | null | 6.5 | null | null |
GHSA-9j72-vvrm-mh5p | Directory traversal vulnerability in WP Fastest Cache versions prior to 0.9.1.7 allows a remote attacker with administrator privileges to delete arbitrary files on the server via unspecified vectors. | [] | null | null | null | null |
|
GHSA-fw82-qm5f-g359 | An issue was discovered in Open Network Operating System (ONOS) 1.14. In the P4 tutorial application (org.onosproject.p4tutorial), the host event listener does not handle the following event types: HOST_MOVED, HOST_REMOVED, HOST_UPDATED. In combination with other applications, this could lead to the absence of intended code execution. | [] | null | null | null | null |
|
CVE-2013-0641 | Buffer overflow in Adobe Reader and Acrobat 9.x before 9.5.4, 10.x before 10.1.6, and 11.x before 11.0.02 allows remote attackers to execute arbitrary code via a crafted PDF document, as exploited in the wild in February 2013. | [
"cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:6.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:5.9:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:-:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:*"
] | null | 7.8 | null | 9.3 |
|
CVE-2012-6135 | RubyGems passenger 4.0.0 betas 1 and 2 allows remote attackers to delete arbitrary files during the startup process. | [
"cpe:2.3:a:phusion:passenger:4.0.0:beta1:*:*:*:ruby:*:*",
"cpe:2.3:a:phusion:passenger:4.0.0:beta2:*:*:*:ruby:*:*",
"cpe:2.3:a:redhat:openshift:1.0:*:*:*:enterprise:*:*:*"
] | null | 7.5 | null | 6.4 |
|
CVE-2000-0242 | WindMail allows remote attackers to read arbitrary files or execute commands via shell metacharacters. | [
"cpe:2.3:a:geocel:windmail:3.0:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-fg9q-5cw2-p6r9 | kubevirt-csi: PersistentVolume allows access to HCP's root node | A flaw was found in the kubevirt-csi component of OpenShift Virtualization's Hosted Control Plane (HCP). This issue could allow an authenticated attacker to gain access to the root HCP worker node's volume by creating a custom Persistent Volume that matches the name of a worker node. | [] | null | 8.1 | null | null |
GHSA-wrgm-3c24-9q9r | Trendnet AC2600 TEW-827DRU version 2.08B01 improperly discloses credentials for the smb functionality of the device. Usernames and passwords for all smb users are revealed in plaintext on the smbserver.asp page. | [] | null | null | null | null |
|
CVE-2022-36788 | A heap-based buffer overflow vulnerability exists in the TriangleMesh clone functionality of Slic3r libslic3r 1.3.0 and Master Commit b1a5500. A specially-crafted STL file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability. | [
"cpe:2.3:a:slic3r:libslic3r:1.3.0:*:*:*:*:*:*:*"
] | null | 8.1 | null | null |
|
CVE-2024-11788 | StreamWeasels YouTube Integration <= 1.3.6 - Authenticated (Contributor+) Stored Cross-Site Scripting | The StreamWeasels YouTube Integration plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'sw-youtube-embed' shortcode in all versions up to, and including, 1.3.6 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] | null | 6.4 | null | null |
GHSA-rj67-qpp5-5cr5 | Race condition in the HTTP Deep Packet Inspection (DPI) feature in Cisco Adaptive Security Appliance (ASA) Software 8.2.x before 8.2(5.46), 8.3.x before 8.3(2.39), 8.4.x before 8.4(5.5), 8.5.x before 8.5(1.18), 8.6.x before 8.6(1.12), 8.7.x before 8.7(1.4), 9.0.x before 9.0(1.4), and 9.1.x before 9.1(1.2), in certain conditions involving the spoof-server option or ActiveX or Java response inspection, allows remote attackers to cause a denial of service (device reload) via a crafted HTTP response, aka Bug ID CSCud37992. | [] | null | null | null | null |
|
CVE-2023-0321 | Disclosure of Sensitive Information on Campbell Scientific Products | Campbell Scientific dataloggers CR6, CR300, CR800, CR1000 and CR3000 may allow an attacker to download configuration files, which may contain sensitive information about the internal network. From factory defaults, the mentioned datalogges have HTTP and PakBus enabled. The devices, with the default configuration, allow this situation via the PakBus port. The exploitation of this vulnerability may allow an attacker to download, modify, and upload new configuration files. | [
"cpe:2.3:o:campbellsci:cr6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:campbellsci:cr6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:campbellsci:cr300_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:campbellsci:cr300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:campbellsci:cr800_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:campbellsci:cr800:-:*:*:*:*:*:*:*",
"cpe:2.3:o:campbellsci:cr1000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:campbellsci:cr1000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:campbellsci:cr3000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:campbellsci:cr3000:-:*:*:*:*:*:*:*"
] | null | 9.1 | null | null |
GHSA-jrc5-254w-5vfw | The kernel-mode driver in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 does not properly constrain impersonation levels, which allows local users to gain privileges via a crafted application, aka "Windows KMD Security Feature Bypass Vulnerability." | [] | null | null | null | null |
|
CVE-2019-11975 | A SQL injection code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09. | [
"cpe:2.3:a:hp:intelligent_management_center:*:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:-:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0503:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0504:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0504p02:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0504p04:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0506:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0506p03:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0506p07:*:*:*:*:*:*"
] | null | null | 8.8 | 9 |
|
CVE-2017-9698 | In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, improperly specified offset/size values for a submission command could cause a math operation to overflow and could result in an access to arbitrary memory. The combined pointer will overflow and possibly pass further checks intended to avoid accessing unintended memory. | [
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] | null | null | 7.8 | 4.6 |
|
CVE-2014-4296 | Unspecified vulnerability in the JPublisher component in Oracle Database Server 11.1.0.7, 11.2.0.3, 11.2.0.4, 12.1.0.1, and 12.1.0.2 allows remote authenticated users to affect confidentiality via unknown vectors, a different vulnerability than CVE-2014-4290, CVE-2014-4291, CVE-2014-4292, CVE-2014-4293, CVE-2014-4297, CVE-2014-4310, CVE-2014-6547, and CVE-2014-6477. | [
"cpe:2.3:a:oracle:database_server:11.1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_server:11.2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_server:11.2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_server:12.1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_server:12.1.0.2:*:*:*:*:*:*:*"
] | null | null | null | 4 |
|
GHSA-r7mf-5w8w-4x2h | This vulnerability exists in LD DP Back Office due to improper validation of certain parameters “cCdslClicentcode” and “cLdClientCode” in the API endpoint. An authenticated remote attacker could exploit this vulnerability by manipulating parameters in the API request body leading to exposure of sensitive information belonging to other users. | [] | 8.7 | 6.5 | null | null |
|
GHSA-p95x-45rv-wpxr | In ImageMagick 7.0.6-1, a use-after-free vulnerability was found in the function ReadWMFImage in coders/wmf.c, which allows attackers to cause a denial of service. | [] | null | null | 6.5 | null |
|
CVE-2017-7549 | A flaw was found in instack-undercloud 7.2.0 as packaged in Red Hat OpenStack Platform Pike, 6.1.0 as packaged in Red Hat OpenStack Platform Oacta, 5.3.0 as packaged in Red Hat OpenStack Newton, where pre-install and security policy scripts used insecure temporary files. A local user could exploit this flaw to conduct a symbolic-link attack, allowing them to overwrite the contents of arbitrary files. | [
"cpe:2.3:a:openstack:instack-undercloud:7.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:*",
"cpe:2.3:a:openstack:instack-undercloud:6.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openstack:11:*:*:*:*:*:*:*",
"cpe:2.3:a:openstack:instack-undercloud:5.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openstack:10:*:*:*:*:*:*:*"
] | null | null | 6.4 | 3.3 |
|
CVE-2023-20570 | Insufficient verification of data authenticity in
the configuration state machine may allow a local attacker to potentially load
arbitrary bitstreams.
| [
"cpe:2.3:o:amd:alveo_u50_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:alveo_u50:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:alveo_u200_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:alveo_u200:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:alveo_u250_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:alveo_u250:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:alveo_u280_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:alveo_u280:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:kintex_ultrascale\\+_ku3p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:kintex_ultrascale\\+_ku3p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:kintex_ultrascale\\+_ku5p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:kintex_ultrascale\\+_ku5p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:kintex_ultrascale\\+_ku9p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:kintex_ultrascale\\+_ku9p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:kintex_ultrascale\\+_ku11p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:kintex_ultrascale\\+_ku11p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:kintex_ultrascale\\+_ku13p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:kintex_ultrascale\\+_ku13p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:kintex_ultrascale\\+_ku15p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:kintex_ultrascale\\+_ku15p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:kintex_ultrascale\\+_ku19p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:kintex_ultrascale\\+_ku19p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:kintex_ultrascale_ku025_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:kintex_ultrascale_ku025:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:kintex_ultrascale_ku035_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:kintex_ultrascale_ku035:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:kintex_ultrascale_ku040_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:kintex_ultrascale_ku040:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:kintex_ultrascale_ku060_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:kintex_ultrascale_ku060:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:kintex_ultrascale_ku085_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:kintex_ultrascale_ku085:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:kintex_ultrascale_ku095_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:kintex_ultrascale_ku095:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:kintex_ultrascale_ku115_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:kintex_ultrascale_ku115:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:virtex_ultrascale_xcvu065_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:virtex_ultrascale_xcvu065:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:virtex_ultrascale_xcvu080_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:virtex_ultrascale_xcvu080:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:virtex_ultrascale_xcvu095_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:virtex_ultrascale_xcvu095:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:virtex_ultrascale_xcvu125_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:virtex_ultrascale_xcvu125:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:virtex_ultrascale_xcvu160_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:virtex_ultrascale_xcvu160:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:virtex_ultrascale_xcvu190_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:virtex_ultrascale_xcvu190:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:virtex_ultrascale_xcvu440_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:virtex_ultrascale_xcvu440:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:virtex_ultrascale\\+_vu3p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:virtex_ultrascale\\+_vu3p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:virtex_ultrascale\\+_vu5p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:virtex_ultrascale\\+_vu5p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:virtex_ultrascale\\+_vu7p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:virtex_ultrascale\\+_vu7p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:virtex_ultrascale\\+_vu9p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:virtex_ultrascale\\+_vu9p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:virtex_ultrascale\\+_vu11p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:virtex_ultrascale\\+_vu11p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:virtex_ultrascale\\+_vu13p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:virtex_ultrascale\\+_vu13p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:virtex_ultrascale\\+_vu19p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:virtex_ultrascale\\+_vu19p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:virtex_ultrascale\\+_vu23p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:virtex_ultrascale\\+_vu23p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:virtex_ultrascale\\+_vu27p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:virtex_ultrascale\\+_vu27p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:virtex_ultrascale\\+_vu29p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:virtex_ultrascale\\+_vu29p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:virtex_ultrascale\\+_vu31p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:virtex_ultrascale\\+_vu31p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:virtex_ultrascale\\+_vu33p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:virtex_ultrascale\\+_vu33p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:virtex_ultrascale\\+_vu35p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:virtex_ultrascale\\+_vu35p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:virtex_ultrascale\\+_vu37p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:virtex_ultrascale\\+_vu37p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:virtex_ultrascale\\+_vu45p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:virtex_ultrascale\\+_vu45p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:virtex_ultrascale\\+_vu47p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:virtex_ultrascale\\+_vu47p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:virtex_ultrascale\\+_vu57p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:virtex_ultrascale\\+_vu57p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:artix_ultrascale\\+_au7p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:artix_ultrascale\\+_au7p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:artix_ultrascale\\+_au10p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:artix_ultrascale\\+_au10p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:artix_ultrascale\\+_au15p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:artix_ultrascale\\+_au15p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:artix_ultrascale\\+_au20p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:artix_ultrascale\\+_au20p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:artix_ultrascale\\+_au25p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:artix_ultrascale\\+_au25p:-:*:*:*:*:*:*:*"
] | null | 3.3 | null | null |
|
CVE-2018-21164 | Certain NETGEAR devices are affected by command injection by an authenticated user. This affects R6220 before 1.1.0.64 and WNDR3700v5 before 1.1.0.54. | [
"cpe:2.3:o:netgear:r6220_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6220:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:wndr3700_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wndr3700:v5:*:*:*:*:*:*:*"
] | null | null | 6.8 | null |
|
GHSA-jm63-cmh5-jrcj | NULL Pointer Dereference in GitHub repository gpac/gpac prior to 1.1.0. | [] | null | 5.5 | null | null |
|
CVE-2006-3341 | SQL injection vulnerability in annonces-p-f.php in MyAds module 2.04jp for Xoops allows remote attackers to execute arbitrary SQL commands via the lid parameter. | [
"cpe:2.3:a:myads:myads:2.04jp:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-m9vp-6f5p-fg4g | An issue was discovered on Samsung mobile devices with N(7.1), O(8.x), and P(9.0) software. SPENgesture allows arbitrary applications to read or modify user-input logs. The Samsung ID is SVE-2019-14170 (June 2019). | [] | null | null | null | null |
|
GHSA-fr2w-mp56-g4xp | Unrestricted Attachment Upload | ImpactInvenTree allows unrestricted upload of files as attachments to various database fields. Potentially dangerous files (such as HTML files containing malicious javascript) can be uploaded, and (when opened by the user) run the malicious code directly in the users browser.*Note that the upload of malicious files must be performed by an authenticated user account*SolutionThe solution for this vulnerability is to ensure that attachment files are downloaded to the local machine before opening, rather than opening the file in the current browser context.PatchesThe issue is addressed in the upcoming 0.8.0 releaseThis fix will also be back-ported to the 0.7.x branch, applied to the 0.7.2 releaseWorkaroundsUsers can alleviate risk of opening malicious files by right-clicking on the attachment link and selecting "Save link as"This minimizes risk (e.g. of XSS attacks) by opening the HTML file from the users computerReferenceshttps://huntr.dev/bounties/a0e5c68e-0f75-499b-bd7b-d935fb8c0cd1/For more informationIf you have any questions or comments about this advisory:Open an issue in [github](http://github.com/inventree/inventree)Email us at [[email protected]](mailto:[email protected]) | [] | null | 8.8 | null | null |
GHSA-r26h-642q-j6cg | A blind SQL injection vulnerability is present in Chop Slider 3, a WordPress plugin. The vulnerability is introduced in the id GET parameter supplied to get_script/index.php, and allows an attacker to execute arbitrary SQL queries in the context of the WP database user. | [] | null | null | null | null |
|
CVE-2022-40924 | Zoo Management System v1.0 has an arbitrary file upload vulnerability in the picture upload point of the "save_animal" file of the "Animals" module in the background management system. | [
"cpe:2.3:a:phpgurukul:zoo_management_system:1.0:*:*:*:*:*:*:*"
] | null | 7.2 | null | null |
|
CVE-2005-3025 | Multiple cross-site scripting (XSS) vulnerabilities in vBulletin 3.0.7 and earlier allow remote attackers to inject arbitrary web script or HTML via the loc parameter to (1) modcp/index.php or (2) admincp/index.php, or the ip parameter to (3) modcp/user.php or (4) admincp/usertitle.php. | [
"cpe:2.3:a:jelsoft:vbulletin:1.0.1:*:lite:*:*:*:*:*",
"cpe:2.3:a:jelsoft:vbulletin:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:jelsoft:vbulletin:2.0_rc2:*:*:*:*:*:*:*",
"cpe:2.3:a:jelsoft:vbulletin:2.0_rc3:*:*:*:*:*:*:*",
"cpe:2.3:a:jelsoft:vbulletin:2.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:jelsoft:vbulletin:2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:jelsoft:vbulletin:2.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:jelsoft:vbulletin:2.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:jelsoft:vbulletin:2.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:jelsoft:vbulletin:2.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:jelsoft:vbulletin:2.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:jelsoft:vbulletin:2.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:jelsoft:vbulletin:2.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:jelsoft:vbulletin:2.2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:jelsoft:vbulletin:2.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:jelsoft:vbulletin:2.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:jelsoft:vbulletin:2.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:jelsoft:vbulletin:2.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:jelsoft:vbulletin:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:jelsoft:vbulletin:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:jelsoft:vbulletin:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:jelsoft:vbulletin:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:jelsoft:vbulletin:3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:jelsoft:vbulletin:3.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:jelsoft:vbulletin:3.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:jelsoft:vbulletin:3.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:jelsoft:vbulletin:3.0_beta_2:*:*:*:*:*:*:*",
"cpe:2.3:a:jelsoft:vbulletin:3.0_beta_3:*:*:*:*:*:*:*",
"cpe:2.3:a:jelsoft:vbulletin:3.0_beta_4:*:*:*:*:*:*:*",
"cpe:2.3:a:jelsoft:vbulletin:3.0_beta_5:*:*:*:*:*:*:*",
"cpe:2.3:a:jelsoft:vbulletin:3.0_beta_6:*:*:*:*:*:*:*",
"cpe:2.3:a:jelsoft:vbulletin:3.0_beta_7:*:*:*:*:*:*:*",
"cpe:2.3:a:jelsoft:vbulletin:3.0_gamma:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-wp2p-q35g-3rjj | Malicious Package in soket.io | All versions of `soket.io` are considered malicious. The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. When executed, the package calls home to a Command and Control server to execute arbitrary commands.RecommendationThis package was published to the npm Registry for a very short period of time. If you happen to find it in your environment you should revoke and rotate all credentials found on the compromised machine, as well as completely erase the affected machine and reinstall your Operating System. | [] | null | 9.8 | null | null |
CVE-2024-38139 | Microsoft Dataverse Elevation of Privilege Vulnerability | Improper authentication in Microsoft Dataverse allows an authorized attacker to elevate privileges over a network. | [
"cpe:2.3:a:microsoft:dataverse:-:*:*:*:*:*:*:*"
] | null | 8.7 | null | null |
GHSA-2hcr-94vw-mxjh | The Newsletter, SMTP, Email marketing and Subscribe forms by Sendinblue WordPress plugin before 3.1.31 does not escape the lang and pid parameter before outputting them back in attributes, leading to Reflected Cross-Site Scripting issues | [] | null | 6.1 | null | null |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.