id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2013-2558 | Unspecified vulnerability in Microsoft Windows 8 allows remote attackers to cause a denial of service (reboot) or possibly have unknown other impact via a crafted TrueType Font (TTF) file, as demonstrated by the 120612-69701-01.dmp error report. | [
"cpe:2.3:o:microsoft:windows_8:-:-:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8:-:-:x86:*:*:*:*:*"
] | null | null | null | 10 |
|
RHSA-2023:4022 | Red Hat Security Advisory: kernel security and bug fix update | kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation | [
"cpe:/o:redhat:rhel_aus:7.7::server",
"cpe:/o:redhat:rhel_e4s:7.7::server",
"cpe:/o:redhat:rhel_tus:7.7::server"
] | null | 7.8 | null | null |
GHSA-fj5m-5qc8-rw48 | IBM Lotus Notes Traveler before 8.5.1.2 does not reject an attachment download request for an e-mail message with a Prevent Copy attribute, which allows remote authenticated users to bypass intended access restrictions via this request. | [] | null | null | null | null |
|
GHSA-wqmf-63gp-6rjg | The Relish (Verve Connect) VH510 device with firmware before 1.0.1.6L0516 contains undocumented default admin credentials for the web management interface. A remote attacker could exploit this vulnerability to login and execute commands on the device, as well as upgrade the firmware image to a malicious version. | [] | null | null | null | null |
|
GHSA-x7rm-228h-8xh9 | A flaw was found in the containerized-data-importer in virt-cdi-cloner, version 1.4, where the host-assisted cloning feature does not determine whether the requesting user has permission to access the Persistent Volume Claim (PVC) in the source namespace. This could allow users to clone any PVC in the cluster into their own namespace, effectively allowing access to other user's data. | [] | null | 6.5 | null | null |
|
CVE-2017-1715 | IBM Rational Quality Manager and IBM Rational Collaborative Lifecycle Management 5.0 through 5.0.2 and 6.0 through 6.0.5 are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 134637. | [
"cpe:2.3:a:ibm:rational_quality_manager:5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_quality_manager:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_quality_manager:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_quality_manager:6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_quality_manager:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_quality_manager:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_quality_manager:6.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_quality_manager:6.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_quality_manager:6.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:6.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:6.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:6.0.5:*:*:*:*:*:*:*"
] | null | null | 5.4 | null |
|
CVE-2020-10413 | The way URIs are handled in admin/header.php in Chadha PHPKB Standard Multi-Language 9 allows Reflected XSS (injecting arbitrary web script or HTML) in admin/import-html.php by adding a question mark (?) followed by the payload. | [
"cpe:2.3:a:chadhaajay:phpkb:9.0:*:*:*:*:*:*:*"
] | null | 4.8 | null | 3.5 |
|
GHSA-24x4-44mg-fffp | Unrestricted file upload vulnerability in "Add Pen/Author Name" feature in addpen.php in AvailScript Article Script allows remote authenticated users to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in photos/. | [] | null | null | null | null |
|
CVE-2023-48508 | Adobe Experience Manager | Cross-site Scripting (Stored XSS) (CWE-79) | Adobe Experience Manager versions 6.5.18 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | [
"cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:experience_manager_cloud_service:*:*:*:*:*:*:*:*"
] | null | 5.4 | null | null |
GHSA-48g2-452q-4xqc | Windows Hyper-V Remote Code Execution Vulnerability | [] | null | 8.8 | null | null |
|
CVE-2015-0607 | The Authentication Proxy feature in Cisco IOS does not properly handle invalid AAA return codes from RADIUS and TACACS+ servers, which allows remote attackers to bypass authentication in opportunistic circumstances via a connection attempt that triggers an invalid code, as demonstrated by a connection attempt with a blank password, aka Bug IDs CSCuo09400 and CSCun16016. | [
"cpe:2.3:o:cisco:ios:15.4\\(1\\)t:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(1\\)t1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(1\\)t2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(1\\)t3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(1\\)t4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(2\\)t:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(2\\)t1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(2\\)t2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(2\\)t3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(100\\)t:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4t:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
RHSA-2022:6314 | Red Hat Security Advisory: pcs security update | pcs: obtaining an authentication token for hacluster user could lead to privilege escalation | [
"cpe:/a:redhat:enterprise_linux:8::highavailability",
"cpe:/a:redhat:enterprise_linux:8::resilientstorage"
] | null | 8.4 | null | null |
GHSA-9q3q-62hm-f2qh | The Saan World Clock WordPress plugin through 1.8 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks. | [] | null | 5.4 | null | null |
|
CVE-2021-42748 | In Beaver Builder through 2.5.0.3, attackers can bypass the visibility controls protection mechanism via the REST API. | [
"cpe:2.3:a:fastlinemedia:beaver_builder:*:*:*:*:lite:wordpress:*:*",
"cpe:2.3:a:fastlinemedia:beaver_builder:*:*:*:*:professional:wordpress:*:*"
] | null | 5.3 | null | 5 |
|
GHSA-cg87-2898-49f2 | An issue was discovered in Mattermost Desktop App before 3.4.0. Strings could be executed as code via injection. | [] | null | null | null | null |
|
CVE-2022-49006 | tracing: Free buffers when a used dynamic event is removed | In the Linux kernel, the following vulnerability has been resolved:
tracing: Free buffers when a used dynamic event is removed
After 65536 dynamic events have been added and removed, the "type" field
of the event then uses the first type number that is available (not
currently used by other events). A type number is the identifier of the
binary blobs in the tracing ring buffer (known as events) to map them to
logic that can parse the binary blob.
The issue is that if a dynamic event (like a kprobe event) is traced and
is in the ring buffer, and then that event is removed (because it is
dynamic, which means it can be created and destroyed), if another dynamic
event is created that has the same number that new event's logic on
parsing the binary blob will be used.
To show how this can be an issue, the following can crash the kernel:
# cd /sys/kernel/tracing
# for i in `seq 65536`; do
echo 'p:kprobes/foo do_sys_openat2 $arg1:u32' > kprobe_events
# done
For every iteration of the above, the writing to the kprobe_events will
remove the old event and create a new one (with the same format) and
increase the type number to the next available on until the type number
reaches over 65535 which is the max number for the 16 bit type. After it
reaches that number, the logic to allocate a new number simply looks for
the next available number. When an dynamic event is removed, that number
is then available to be reused by the next dynamic event created. That is,
once the above reaches the max number, the number assigned to the event in
that loop will remain the same.
Now that means deleting one dynamic event and created another will reuse
the previous events type number. This is where bad things can happen.
After the above loop finishes, the kprobes/foo event which reads the
do_sys_openat2 function call's first parameter as an integer.
# echo 1 > kprobes/foo/enable
# cat /etc/passwd > /dev/null
# cat trace
cat-2211 [005] .... 2007.849603: foo: (do_sys_openat2+0x0/0x130) arg1=4294967196
cat-2211 [005] .... 2007.849620: foo: (do_sys_openat2+0x0/0x130) arg1=4294967196
cat-2211 [005] .... 2007.849838: foo: (do_sys_openat2+0x0/0x130) arg1=4294967196
cat-2211 [005] .... 2007.849880: foo: (do_sys_openat2+0x0/0x130) arg1=4294967196
# echo 0 > kprobes/foo/enable
Now if we delete the kprobe and create a new one that reads a string:
# echo 'p:kprobes/foo do_sys_openat2 +0($arg2):string' > kprobe_events
And now we can the trace:
# cat trace
sendmail-1942 [002] ..... 530.136320: foo: (do_sys_openat2+0x0/0x240) arg1= cat-2046 [004] ..... 530.930817: foo: (do_sys_openat2+0x0/0x240) arg1="������������������������������������������������������������������������������������������������"
cat-2046 [004] ..... 530.930961: foo: (do_sys_openat2+0x0/0x240) arg1="������������������������������������������������������������������������������������������������"
cat-2046 [004] ..... 530.934278: foo: (do_sys_openat2+0x0/0x240) arg1="������������������������������������������������������������������������������������������������"
cat-2046 [004] ..... 530.934563: foo: (do_sys_openat2+0x0/0x240) arg1="���������������������������������������
---truncated--- | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.1:rc5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.1:rc6:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.1:rc7:*:*:*:*:*:*"
] | null | 7.8 | null | null |
GHSA-76m6-h6vf-x33v | libvirt 1.1.1 through 1.2.0 allows context-dependent attackers to bypass the domain:getattr and connect:search_domains restrictions in ACLs and obtain sensitive domain object information via a request to the (1) virConnectDomainEventRegister and (2) virConnectDomainEventRegisterAny functions in the event registration API. | [] | null | null | null | null |
|
GHSA-j9x6-5wqj-262h | The call-handling implementation in Cisco Unity Connection 8.5 before 8.5(1)SU7, 8.6 before 8.6(2a)SU4, 9.x before 9.1(2)SU2, and 10.0 before 10.0(1)SU1, when SIP trunk integration is enabled, allows remote attackers to cause a denial of service (port consumption) by improperly terminating SIP sessions, aka Bug ID CSCul28089. | [] | null | null | null | null |
|
GHSA-fv6q-cpfx-7rj8 | IBM Cloud Orchestrator and IBM Cloud Orchestrator Enterprise 2.5 through 2.5.0.9 and 2.4 through 2.4.0.5 stores sensitive information in URL parameters. This may lead to information disclosure if unauthorized parties have access to the URLs via server logs, referrer header or browser history. IBM X-Force ID: 162239 | [] | null | 6.5 | null | null |
|
RHSA-2023:3264 | Red Hat Security Advisory: sudo security update | sudo: arbitrary file write with privileges of the RunAs user | [
"cpe:/o:redhat:rhel_aus:7.4::server"
] | null | 7.8 | null | null |
CVE-2019-15793 | Mishandling of file-system uid/gid with namespaces in shiftfs | In shiftfs, a non-upstream patch to the Linux kernel included in the Ubuntu 5.0 and 5.3 kernel series, several locations which shift ids translate user/group ids before performing operations in the lower filesystem were translating them into init_user_ns, whereas they should have been translated into the s_user_ns for the lower filesystem. This resulted in using ids other than the intended ones in the lower fs, which likely did not map into the shifts s_user_ns. A local attacker could use this to possibly bypass discretionary access control permissions. | [
"cpe:2.3:o:linux:linux_kernel:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.3:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*"
] | null | 6.5 | null | null |
GHSA-ww87-xv54-4xg7 | Apple QuickTime before 7.6.9 on Windows sets weak permissions for the Apple Computer directory in the profile of a user account, which allows local users to obtain sensitive information by reading files in this directory. | [] | null | null | null | null |
|
GHSA-hqmg-m6cw-2jmh | The launchURL function in PDF-XChange Viewer 2.5 (Build 314.0) might allow remote attackers to execute arbitrary code via a crafted PDF file. | [] | null | null | 7.8 | null |
|
GHSA-vx6j-pjrh-vgjh | PHP file inclusion in the Sulu admin panel | Impact_What kind of vulnerability is it? Who is impacted?_An attacker can read arbitrary local files via a PHP file include. In a default configuration this also leads to remote code execution.Compromised components: Arbitrary file read on the server, (Potential) Remote code executionExploitation pre-requisite: User account on the backendPatches_Has the problem been patched? What versions should users upgrade to?_The problem is patched with the Versions 1.6.44, 2.2.18, 2.3.8, 2.4.0Workarounds_Is there a way for users to fix or remediate the vulnerability without upgrading?_Overwrite the service `sulu_route.generator.expression_token_provider` and wrap the translator before passing it to the expression language.References_Are there any links users can visit to find out more?_Currently not.For more informationIf you have any questions or comments about this advisory:Open an issue in [example link to repo](http://example.com)Email us at [example email address](mailto:[email protected]) | [] | null | 8.5 | null | null |
GHSA-7hrg-3c44-45cg | An issue in Cesanta mjs 2.20.0 allows a remote attacker to cause a denial of service via the mjs_op_json_parse function in the msj.c file. | [] | null | 7.5 | null | null |
|
ICSA-24-074-09 | Siemens Sinteso EN Cerberus PRO EN Fire Protection Systems | The network communication library in affected systems does not validate the length of certain X.509 certificate attributes which might result in a stack-based buffer overflow.
This could allow an unauthenticated remote attacker to execute code on the underlying operating system with root privileges. Successful exploitation requires an on-path attacker that intercepts the communication of the engineering tool in the fire system network; code execution might be possible on the underlying operating system with the privileges of the engineering tool user account. Successful exploitation requires an on-path attacker that intercepts the communication of the engineering tool in the fire system network; code execution might be possible on the underlying operating system with the privileges of the engineering tool user account. Successful exploitation requires an on-path attacker that intercepts the communication of the app in the fire system network; possible impact is limited to the app, not the underlying operating system. The network communication library in affected systems insufficiently validates HMAC values which might result in a buffer overread.
This could allow an unauthenticated remote attacker to crash the network service. Successful exploitation requires an on-path attacker that intercepts the communication of the engineering tool in the fire system network; possible impact is limited to the tool, not the underlying operating system. Successful exploitation requires an on-path attacker that intercepts the communication of the engineering tool in the fire system network; possible impact is limited to the tool, not the underlying operating system. Successful exploitation requires an on-path attacker that intercepts the communication of the app in the fire system network; possible impact is limited to the app, not the underlying operating system. The network communication library in affected systems improperly handles memory buffers when parsing X.509 certificates.
This could allow an unauthenticated remote attacker to crash the network service. Successful exploitation requires an on-path attacker that intercepts the communication of the engineering tool in the fire system network; possible impact is limited to the tool, not the underlying operating system. Successful exploitation requires an on-path attacker that intercepts the communication of the engineering tool in the fire system network; possible impact is limited to the tool, not the underlying operating system. Successful exploitation requires an on-path attacker that intercepts the communication of the app in the fire system network; possible impact is limited to the app, not the underlying operating system. | [] | null | 5.9 | null | null |
CVE-2022-0247 | Write access to VMO data through copy-on-write in Fuchsia | An issue exists in Fuchsia where VMO data can be modified through access to copy-on-write snapshots. A local attacker could modify objects in the VMO that they do not have permission to. We recommend upgrading past commit d97c05d2301799ed585620a9c5c739d36e7b5d3d or any of the listed versions. | [
"cpe:2.3:o:google:fuchsia:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
GHSA-5gr9-2c49-vhjx | In the Linux kernel 6.0.8, there is an out-of-bounds read in ntfs_attr_find in fs/ntfs/attrib.c. | [] | null | 7.1 | null | null |
|
GHSA-v7cj-g3gx-p5gf | Remote Directory Traversal and Remote Disclosure of Privileged Information in UCMDB Configuration Management Service, version 10.22, 10.22 CUP1, 10.22 CUP2, 10.22 CUP3, 10.22 CUP4, 10.22 CUP5, 10.22 CUP6, 10.22 CUP7, 10.33, 10.33 CUP1, 10.33 CUP2, 10.33 CUP3, 2018.02, 2018.05, 2018.08, 2018.11. The vulnerabilities could allow Remote Directory Traversal and Remote Disclosure of Privileged Information | [] | null | null | 7.5 | null |
|
RHSA-2011:1329 | Red Hat Security Advisory: httpd and httpd22 security update | httpd: multiple ranges DoS | [
"cpe:/a:redhat:jboss_enterprise_web_server:1::el4",
"cpe:/a:redhat:jboss_enterprise_web_server:1::el5",
"cpe:/a:redhat:jboss_enterprise_web_server:1::el6"
] | null | null | null | null |
CVE-2020-11129 | u'During the error occurrence in capture request, the buffer is freed and later accessed causing the camera APP to fail due to memory use-after-free' in Snapdragon Consumer IOT, Snapdragon Mobile in Bitra, Kamorta, QCS605, Saipan, SDM710, SM8250, SXR2130 | [
"cpe:2.3:o:qualcomm:bitra_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:bitra:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:kamorta_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:kamorta:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs605_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs605:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:saipan_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:saipan:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm710_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm710:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm8250_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm8250:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sxr2130_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sxr2130:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | 7.2 |
|
CVE-2020-15694 | In Nim 1.2.4, the standard library httpClient fails to properly validate the server response. For example, httpClient.get().contentLength() does not raise any error if a malicious server provides a negative Content-Length. | [
"cpe:2.3:a:nim-lang:nim:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
GHSA-3r8c-rqqr-c7h4 | An Insecure Direct Object Reference (IDOR) vulnerability in Annex Cloud Loyalty Experience Platform <2021.1.0.1 allows any authenticated attacker to modify any existing user, including users assigned to different environments and clients. It was fixed in v2021.1.0.2. | [] | null | 4.3 | null | null |
|
GHSA-vrff-9qrr-6vqr | Applications based on SAP GUI for HTML in SAP NetWeaver Application Server ABAP store user input in the local browser storage to improve usability. An attacker with administrative privileges or access to the victim�s user directory on the Operating System level would be able to read this data. Depending on the user input provided in transactions, the disclosed data could range from non-critical data to highly sensitive data, causing high impact on confidentiality of the application. | [] | null | 6 | null | null |
|
CVE-2017-14120 | unrar 0.0.1 (aka unrar-free or unrar-gpl) suffers from a directory traversal vulnerability for RAR v2 archives: pathnames of the form ../[filename] are unpacked into the upper directory. | [
"cpe:2.3:a:rarlab:unrar:0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
GHSA-57hw-9ccm-w3ch | Multiple SQL injection vulnerabilities in PD9 Software MegaBBS 2.2 allow remote attackers to execute arbitrary SQL commands via the (1) invisible and (2) timeoffset parameters to profile/controlpanel.asp and the (3) attachmentid parameter to forums/attach-file.asp. | [] | null | null | null | null |
|
GHSA-53wq-3m85-4fx6 | The aarch64_ext_ldst_reglist function in opcodes/aarch64-dis.c in GNU Binutils 2.28 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during "objdump -D" execution. | [] | null | null | 7.8 | null |
|
CVE-2020-22016 | A heap-based Buffer Overflow vulnerability in FFmpeg 4.2 at libavcodec/get_bits.h when writing .mov files, which might lead to memory corruption and other potential consequences. | [
"cpe:2.3:a:ffmpeg:ffmpeg:4.2:-:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.8 |
|
GHSA-wx8w-3v99-w2v8 | epan/dissectors/packet-zbee-zcl.c in the ZigBee ZCL dissector in Wireshark 1.4.0 through 1.4.1 allows remote attackers to cause a denial of service (infinite loop) via a crafted ZCL packet, related to Discover Attributes. | [] | null | null | null | null |
|
GHSA-r9jr-628j-pc37 | Sophos Anti-Virus engine (SAVi) before 3.50.1, as used in VDL 4.97G 9.7.x before 9.7.9, 10.0.x before 10.0.11, and 10.3.x before 10.3.1 does not set an ACL for certain global and session objects, which allows local users to bypass anti-virus protection, cause a denial of service (resource consumption, CPU consumption, and eventual crash) or spoof "ready for update" messages by performing certain operations on mutexes or events including (1) DataUpdateRequest, (2) MmfMutexSAV-****, (3) MmfMutexSAV-Info, (4) ReadyForUpdateSAV-****, (5) ReadyForUpdateSAV-Info, (6) SAV-****, (7) SAV-Info, (8) StateChange, (9) SuspendedSAV-****, (10) SuspendedSAV-Info, (11) UpdateComplete, (12) UpdateMutex, (13) UpdateRequest, or (14) SophosALMonSessionInstance, as demonstrated by triggering a ReadyForUpdateSAV event and modifying the UpdateComplete, UpdateMutex, and UpdateRequest objects. | [] | null | null | null | null |
|
CVE-2025-32406 | An XXE issue in the Director NBR component in NAKIVO Backup & Replication 10.3.x through 11.0.1 before 11.0.2 allows remote attackers fetch and parse the XML response. | [] | null | 8.6 | null | null |
|
GHSA-mch7-w8fj-4pc4 | Multiple integer overflows in the (1) strtod, (2) strtof, (3) strtold, (4) strtod_l, and other unspecified "related functions" in stdlib in GNU C Library (aka glibc or libc6) 2.16 allow local users to cause a denial of service (application crash) and possibly execute arbitrary code via a long string, which triggers a stack-based buffer overflow. | [] | null | null | null | null |
|
CVE-2021-24593 | Business Hours Indicator < 2.3.5 - Authenticated Stored XSS | The Business Hours Indicator WordPress plugin before 2.3.5 does not sanitise or escape its 'Now closed message" setting when outputting it in the backend and frontend, leading to an Authenticated Stored Cross-Site Scripting issue | [
"cpe:2.3:a:business_hours_indicator_project:business_hours_indicator:*:*:*:*:*:wordpress:*:*"
] | null | 5.4 | null | 3.5 |
GHSA-8h4q-hf82-q8rj | The 3Com TippingPoint IPS do not properly handle certain full-width and half-width Unicode character encodings in an HTTP POST request, which might allow remote attackers to evade detection of HTTP traffic. | [] | null | null | null | null |
|
CVE-2021-0167 | Improper access control in software for Intel(R) PROSet/Wireless Wi-Fi and Killer(TM) Wi-Fi in Windows 10 and 11 may allow a privileged user to potentially enable escalation of privilege via local access. | [
"cpe:2.3:o:intel:amt_ac_8260_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:amt_ac_8260:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:amt_ac_8265_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:amt_ac_8265:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:amt_ac_9260_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:amt_ac_9260:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:amt_ac_9560_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:amt_ac_9560:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:amt_wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:amt_wi-fi_6_ax200:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:amt_wi-fi_6_ax201_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:amt_wi-fi_6_ax201:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:amt_wi-fi_6_ax210_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:amt_wi-fi_6_ax210:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:proset_ac_3165_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:proset_ac_3165:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:proset_ac_3168_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:proset_ac_3168:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:proset_ac_8260_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:proset_ac_8260:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:proset_ac_8265_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:proset_ac_8265:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:proset_ac_9260_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:proset_ac_9260:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:proset_ac_9461_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:proset_ac_9461:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:proset_ac_9462_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:proset_ac_9462:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:proset_ac_9560_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:proset_ac_9560:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:proset_wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:proset_wi-fi_6_ax200:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:proset_wi-fi_6_ax201_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:proset_wi-fi_6_ax201:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:proset_wi-fi_6e_ax210_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:proset_wi-fi_6e_ax210:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:proset_wireless_7265_\\(rev_d\\)_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:proset_wireless_7265_\\(rev_d\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:killer_ac_1550_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:killer_ac_1550:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:killer_wi-fi_6_ax1650_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:killer_wi-fi_6_ax1650:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:killer_wi-fi_6e_ax1675_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:killer_wi-fi_6e_ax1675:-:*:*:*:*:*:*:*"
] | null | 6.7 | null | 4.6 |
|
GHSA-jgvj-jh34-hqv3 | SpiderControl SCADA Webserver versions 2.08 and prior are vulnerable to path traversal. An attacker with administrative privileges could overwrite files on the webserver using the HMI's upload file feature. This could create size zero files anywhere on the webserver, potentially overwriting system files and creating a denial-of-service condition. | [] | null | 6.5 | null | null |
|
GHSA-2wgw-3mv7-47xf | MIT Kerberos 5 (aka krb5) before 1.17.2 and 1.18.x before 1.18.3 allows unbounded recursion via an ASN.1-encoded Kerberos message because the lib/krb5/asn.1/asn1_encode.c support for BER indefinite lengths lacks a recursion limit. | [] | null | 7.5 | null | null |
|
GHSA-rpq8-q44m-2rpg | Microsoft Identity Web Exposes Client Secrets and Certificate Information in Service Logs | Impact_What kind of vulnerability is it? Who is impacted?_**Description:** This vulnerability affects confidential client applications, including daemons, web apps, and web APIs. Under specific circumstances, sensitive information such as client secrets or certificate details may be exposed in the service logs of these applications. Service logs are intended to be handled securely.**Impact:** The vulnerability impacts service logs that meet the following criteria:**Logging Level:** Logs are generated at the information level.**Credential Descriptions:** containing:Local file paths with passwords.Base64 encoded values.Client secret.Additionally, logs of services using Base64 encoded certificates or certificate paths with password credential descriptions are also affected if the certificates are invalid or expired, regardless of the log level. Note that these credentials are not usable due to their invalid or expired status.If your service logs are handled securely, you are not impacted.Otherwise, the following table shows when you can be impacted
| Log Level Information for Microsoft.Identity.Web | Invalid Certificate
-- | -- | --
One of the ClientCredentials credential description has a CredentialSource = Base64Encoded or (CredentialSource = Path) | Impacted | Impacted
One of the ClientCredentials credential description is a Client secret (CredentialSource = ClientSecret) | Impacted | Not impacted
Other credential descriptions | Not Impacted | Not ImpactedPatches_Has the problem been patched? What versions should users upgrade to?_
To mitigate this vulnerability, update to Microsoft.Identity.Web 3.8.2 or Microsoft.Identity.Abstractions 9.0.0.Workarounds_Is there a way for users to fix or remediate the vulnerability without upgrading?_
You can work around the issue in the following ways:Ensure that service logs are handled securely and access to logs is restrictedDon’t use `LogLevel = Information` for the Microsoft.Identity.Web namespaceRecommendation for production environmentAvoid using `ClientCredentials` with [`CredentialDescriptions`](https://learn.microsoft.com/en-us/dotnet/api/microsoft.identity.abstractions.credentialdescription.base64encodedvalue?view=msal-model-dotnet-latest) which `CredentialSource` is `ClientSecret`, or `Base64Encoded`, or `Path`. Rather use certificate from KeyVault or a certificate store, or Federation identity credential with Managed identity.References_Are there any links users can visit to find out more?_ | [] | null | 4.7 | null | null |
GHSA-rwp6-cpw3-hxxx | A vulnerability has been identified in POWER METER SICAM Q100 (All versions < V2.41), POWER METER SICAM Q100 (All versions < V2.41), POWER METER SICAM Q100 (All versions < V2.41), POWER METER SICAM Q100 (All versions < V2.41). The affected firmware contains a buffer overflow vulnerability in the web application that could allow a remote attacker with engineer or admin priviliges to potentially perform remote code execution. | [] | null | null | null | null |
|
GHSA-mm82-783m-xjph | Multiple cross-site scripting (XSS) vulnerabilities in PhpForums.net mcGallery 1.1 allow remote attackers to inject arbitrary web script or HTML via the lang parameter to (1) admin.php, (2) index.php, (3) sess.php, (4) stats.php, (5) detail.php, (6) resize.php, and (7) show.php. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | [] | null | null | null | null |
|
GHSA-fv3m-jf9j-44vh | Cross-Site Scripting vulnerability in Devklan's Alma Blog that affects versions 2.1.10 and earlier. This vulnerability could allow an attacker to store a malicious JavaScript payload within the application by adding the payload to 'Community Description' or 'Community Rules'. | [] | null | 5.8 | null | null |
|
CVE-2023-1248 | Possible XSS in Ticket Actions | Improper Input Validation vulnerability in OTRS AG OTRS (Ticket Actions modules), OTRS AG ((OTRS)) Community Edition (Ticket Actions modules) allows Cross-Site Scripting (XSS).This issue affects OTRS: from 7.0.X before 7.0.42; ((OTRS)) Community Edition: from 6.0.1 through 6.0.34.
| [
"cpe:2.3:a:otrs:otrs:*:*:*:*:community:*:*:*",
"cpe:2.3:a:otrs:otrs:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | null |
RHSA-2017:3093 | Red Hat Security Advisory: python-django security update | python-django: Open redirect and possible XSS attack via user-supplied numeric redirect URLs | [
"cpe:/a:redhat:openstack:11::el7"
] | null | null | 6.1 | null |
CVE-2025-20061 | mySCADA myPRO Manager OS Command Injection | mySCADA myPRO does not properly neutralize POST requests sent to a specific port with email information. This vulnerability could be exploited by an attacker to execute arbitrary commands on the affected system. | [] | 9.3 | 9.8 | null | null |
CVE-2016-5034 | dwarf_elf_access.c in libdwarf before 20160923 allows remote attackers to cause a denial of service (out-of-bounds write) via a crafted file, related to relocation records. | [
"cpe:2.3:a:libdwarf_project:libdwarf:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4.3 |
|
GHSA-g5fc-q72r-xgfm | The ICMPv6 parser in tcpdump before 4.9.2 has a buffer over-read in print-icmp6.c:icmp6_print(). | [] | null | null | 9.8 | null |
|
CVE-2021-1419 | Cisco Access Points SSH Management Privilege Escalation Vulnerability | A vulnerability in the SSH management feature of multiple Cisco Access Points (APs) platforms could allow a local, authenticated user to modify files on the affected device and possibly gain escalated privileges. The vulnerability is due to improper checking on file operations within the SSH management interface. A network administrator user could exploit this vulnerability by accessing an affected device through SSH management to make a configuration change. A successful exploit could allow the attacker to gain privileges equivalent to the root user. | [
"cpe:2.3:o:cisco:aironet_1542d_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:aironet_1542d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:aironet_1562d_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:aironet_1562d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:aironet_1815m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:aironet_1815m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:aironet_1830e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:aironet_1830e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:aironet_1840i_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:aironet_1840i:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:aironet_1850e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:aironet_1850e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:aironet_2800i_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:aironet_2800i:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:aironet_3800p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:aironet_3800p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:aironet_4800_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:aironet_4800:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:catalyst_9105axi_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9105axi:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:catalyst_9115axe_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9115axe:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:catalyst_9117_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9117axi:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:catalyst_9120axi_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9120axi:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:catalyst_9124axd_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9124axd:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:catalyst_9130axe_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9130axe:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:catalyst_iw6300_ac_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_iw6300_ac:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:esw6300_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:esw6300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:1100-8p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1100-8p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:1120_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1120:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:1160_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1160_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:wireless_lan_controller_software:*:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:catalyst_9800_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:catalyst_9800_firmware:17.4:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9800-l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:aironet_1542i_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:aironet_1542i:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9800-cl:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9800-40:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9800-80:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:aironet_1562e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:aironet_1562e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:aironet_1562i_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:aironet_1562i:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:aironet_1815w_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:aironet_1815w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:aironet_1815t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:aironet_1815t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:aironet_1815i_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:aironet_1815i:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:aironet_1830i_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:aironet_1830i:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:aironet_1850i_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:aironet_1850i:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:aironet_2800e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:aironet_2800e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:aironet_3800i_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:aironet_3800i:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:aironet_3800e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:aironet_3800e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:catalyst_9105axw_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9105axw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:catalyst_9115axi_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9115axi:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:catalyst_9120axp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9120axp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:catalyst_9120axe_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9120axe:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:catalyst_9124axi_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9124axi:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:catalyst_9130axi_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9130axi:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:catalyst_iw6300_dc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_iw6300_dc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:catalyst_iw6300_dcw_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_iw6300_dcw:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
GHSA-274w-2j5w-m2xj | Magento 2 Community Edition Information Disclosure | Names of disabled downloadable products could be disclosed due to inadequate validation of user input in Magento Open Source prior to 1.9.4.2, and Magento Commerce prior to 1.14.4.2, Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2. | [] | null | null | 5.3 | null |
RHSA-2024:4015 | Red Hat Security Advisory: thunderbird security update | Mozilla: Use-after-free in JavaScript object transplant Mozilla: External protocol handlers leaked by timing attack Mozilla: Sandboxed iframes were able to bypass sandbox restrictions to open a new window Mozilla: Cross-Origin Image leak via Offscreen Canvas Mozilla: Memory Corruption in Text Fragments Mozilla: Memory safety bugs fixed in Firefox 127, Firefox ESR 115.12, and Thunderbird 115.12 Mozilla: Use-after-free in networking | [
"cpe:/a:redhat:rhel_e4s:9.0::appstream"
] | null | 7.5 | null | null |
GHSA-pmc9-x67w-5fv5 | Heap-based buffer overflow in the KeyView PDF filter in IBM Domino 8.5.x before 8.5.3 FP6 IF13 and 9.x before 9.0.1 FP6 allows remote attackers to execute arbitrary code via a crafted PDF document, a different vulnerability than CVE-2016-0277, CVE-2016-0279, and CVE-2016-0301. | [] | null | null | 7.8 | null |
|
CVE-2019-4204 | IBM Business Automation Workflow 18.0.0.0, 18.0.0.1, 18.0.0.2, and 19.0.0.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 159125. | [
"cpe:2.3:a:ibm:business_automation_workflow:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.5.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.5.7.0:cf2016.06:*:*:*:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.5.7.0:cf2016.09:*:*:*:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.5.7.0:cf2016.12:*:*:*:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.5.7.0:cf2017.03:*:*:*:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.5.7.0:cf2017.06:*:*:*:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.6.0.0:cf201803:*:*:*:*:*:*"
] | null | null | 5.4 | null |
|
GHSA-pq94-73jh-jg9w | A stored cross-site scripting (XSS) vulnerability in the /devices.php function inrConfig 3.9.5 has been fixed for version 3.9.6. This vulnerability allowed remote attackers to perform arbitrary Javascript execution through entering a crafted payload into the 'Model' field then saving. | [] | null | null | null | null |
|
GHSA-c4hh-96wh-qcjh | Lead Management System v1.0 is vulnerable to SQL Injection via the id parameter in removeCategories.php. | [] | null | 9.8 | null | null |
|
CVE-2025-27343 | WordPress WooCommerce HTML5 Video Plugin <= 1.7.10 - Reflected Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Webilop WooCommerce HTML5 Video allows Reflected XSS. This issue affects WooCommerce HTML5 Video: from n/a through 1.7.10. | [] | null | 7.1 | null | null |
CVE-2021-33531 | WEIDMUELLER: WLAN devices affected by Hard-coded Credentials vulnerability | In Weidmueller Industrial WLAN devices in multiple versions an exploitable use of hard-coded credentials vulnerability exists in multiple iw_* utilities. The device operating system contains an undocumented encryption password, allowing for the creation of custom diagnostic scripts. An attacker can send diagnostic scripts while authenticated as a low privilege user to trigger this vulnerability. | [
"cpe:2.3:o:weidmueller:ie-wl-bl-ap-cl-eu_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:weidmueller:ie-wl-bl-ap-cl-eu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:weidmueller:ie-wlt-bl-ap-cl-eu_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:weidmueller:ie-wlt-bl-ap-cl-eu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:weidmueller:ie-wl-bl-ap-cl-us_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:weidmueller:ie-wl-bl-ap-cl-us:-:*:*:*:*:*:*:*",
"cpe:2.3:o:weidmueller:ie-wlt-bl-ap-cl-us_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:weidmueller:ie-wlt-bl-ap-cl-us:-:*:*:*:*:*:*:*",
"cpe:2.3:o:weidmueller:ie-wl-vl-ap-br-cl-eu_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:weidmueller:ie-wl-vl-ap-br-cl-eu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:weidmueller:ie-wlt-vl-ap-br-cl-eu_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:weidmueller:ie-wlt-vl-ap-br-cl-eu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:weidmueller:ie-wl-vl-ap-br-cl-us_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:weidmueller:ie-wl-vl-ap-br-cl-us:-:*:*:*:*:*:*:*",
"cpe:2.3:o:weidmueller:ie-wlt-vl-ap-br-cl-us_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:weidmueller:ie-wlt-vl-ap-br-cl-us:-:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
CVE-2009-3793 | Unspecified vulnerability in Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, allows attackers to cause a denial of service (memory consumption) or possibly execute arbitrary code via unknown vectors. | [
"cpe:2.3:a:adobe:flash_player:9.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.20.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.28:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.28.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.31:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.31.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.45.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.47.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.48.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.124.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.125.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.151.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.152.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.159.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.246.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.260.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.262.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.0.0.584:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.0.12.10:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.0.12.36:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.0.15.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.0.22.87:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.0.32.18:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.0.42.34:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:6.0.79:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.14.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.19.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.24.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.25:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.53.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.60.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.61.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.63:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.66.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.67.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.68.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.69.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.70.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.73.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:8.0.22.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:8.0.24.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:8.0.33.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:8.0.34.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:8.0.35.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:8.0.42.0:*:*:*:*:*:*:*",
"cpe:2.3:a:macromedia:flash_player:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:macromedia:flash_player:5.0.30.0:*:*:*:*:*:*:*",
"cpe:2.3:a:macromedia:flash_player:5.0.41.0:*:*:*:*:*:*:*",
"cpe:2.3:a:macromedia:flash_player:5.0.42.0:*:*:*:*:*:*:*",
"cpe:2.3:a:macromedia:flash_player:5.0.58.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air:1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air:1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air:1.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air:1.5.3:*:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
GHSA-446j-7c44-9q8x | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Brevo for WooCommerce Sendinblue for WooCommerce.This issue affects Sendinblue for WooCommerce: from n/a through 4.0.17. | [] | null | 8.5 | null | null |
|
GHSA-9qpf-g9g2-qwrx | An information disclosure vulnerability exists in the Windows kernel that could allow an attacker to retrieve information that could lead to a Kernel Address Space Layout Randomization (ASLR) bypass, aka "Windows Kernel Information Disclosure Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-0887, CVE-2018-0960, CVE-2018-0968, CVE-2018-0969, CVE-2018-0970, CVE-2018-0972, CVE-2018-0973, CVE-2018-0974, CVE-2018-0975. | [] | null | null | 5.5 | null |
|
GHSA-r8ch-vw3q-8h8q | Tenda i29 v1.0 V1.0.0.5 was discovered to contain a buffer overflow via the time parameter in the sysTimeInfoSet function. | [] | null | 9.8 | null | null |
|
CVE-2020-6346 | SAP 3D Visual Enterprise Viewer, version - 9, allows a user to open manipulated BMP file received from untrusted sources which results in crashing of the application and becoming temporarily unavailable until the user restarts the application, this is caused due to Improper Input Validation. | [
"cpe:2.3:a:sap:3d_visual_enterprise_viewer:9:*:*:*:*:*:*:*"
] | null | null | 4.3 | null |
|
GHSA-f87p-9hqc-9w9r | Redmine before 3.2.6 and 3.3.x before 3.3.3 mishandles the rendering of wiki links, which allows remote attackers to obtain sensitive information. | [] | null | null | 7.5 | null |
|
CVE-2010-2489 | Buffer overflow in Ruby 1.9.x before 1.9.1-p429 on Windows might allow local users to gain privileges via a crafted ARGF.inplace_mode value that is not properly handled when constructing the filenames of the backup files. | [
"cpe:2.3:a:ruby-lang:ruby:1.9.0-0:*:*:*:*:*:*:*",
"cpe:2.3:a:ruby-lang:ruby:1.9.0-1:*:*:*:*:*:*:*",
"cpe:2.3:a:ruby-lang:ruby:1.9.0-2:*:*:*:*:*:*:*",
"cpe:2.3:a:ruby-lang:ruby:1.9.0-20060415:*:*:*:*:*:*:*",
"cpe:2.3:a:ruby-lang:ruby:1.9.0-20070709:*:*:*:*:*:*:*",
"cpe:2.3:a:ruby-lang:ruby:1.9.1:-p0:*:*:*:*:*:*",
"cpe:2.3:a:ruby-lang:ruby:1.9.1:-p129:*:*:*:*:*:*",
"cpe:2.3:a:ruby-lang:ruby:1.9.1:-p243:*:*:*:*:*:*",
"cpe:2.3:a:ruby-lang:ruby:1.9.1:-p376:*:*:*:*:*:*",
"cpe:2.3:a:ruby-lang:ruby:1.9.1:-p429:*:*:*:*:*:*",
"cpe:2.3:a:ruby-lang:ruby:1.9.1:-preview_1:*:*:*:*:*:*",
"cpe:2.3:a:ruby-lang:ruby:1.9.1:-preview_2:*:*:*:*:*:*",
"cpe:2.3:a:ruby-lang:ruby:1.9.1:-rc1:*:*:*:*:*:*",
"cpe:2.3:a:ruby-lang:ruby:1.9.1:-rc2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*"
] | null | null | null | 7.2 |
|
CVE-2010-4363 | Multiple SQL injection vulnerabilities in contact.php in MRCGIGUY (MCG) FreeTicket 1.0.0, when magic_quotes_gpc is disabled, allow remote attackers to execute arbitrary SQL commands via the (1) id and (2) email parameters in a showtickets action. | [
"cpe:2.3:a:mrcgiguy:freeticket:1.0.0:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
GHSA-7mpj-wcrp-p76g | Vulnerability in the Siebel UI Framework component of Oracle Siebel CRM (subcomponent: Open UI). The supported version that is affected is 16.1. Difficult to exploit vulnerability allows low privileged attacker with network access via HTTP to compromise Siebel UI Framework. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Siebel UI Framework accessible data. CVSS v3.0 Base Score 3.1 (Integrity impacts). | [] | null | null | 3.1 | null |
|
CVE-2016-7659 | An issue was discovered in certain Apple products. iOS before 10.2 is affected. macOS before 10.12.2 is affected. watchOS before 3.1.3 is affected. The issue involves the "Audio" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted file. | [
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.8 |
|
GHSA-pxx3-8xw2-8x5x | Insertion of Sensitive Information into Log File vulnerability in Inisev Backup Migration.This issue affects Backup Migration: from n/a through 1.4.3. | [] | null | 5.3 | null | null |
|
CVE-2022-28874 | Multiple Denial-of-Service (DoS) Vulnerabilities | Multiple Denial-of-Service vulnerabilities was discovered in the F-Secure Atlant and in certain WithSecure products while scanning fuzzed PE32-bit files cause memory corruption and heap buffer overflow which eventually can crash the scanning engine. The exploit can be triggered remotely by an attacker. | [
"cpe:2.3:a:f-secure:atlant:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f-secure:elements_endpoint_protection:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f-secure:linux_security:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:a:withsecure:cloud_protection_for_salesforce:*:*:*:*:*:*:*:*",
"cpe:2.3:a:withsecure:elements_collaboration_protection:*:*:*:*:*:*:*:*"
] | null | 4.3 | null | null |
GHSA-r8j5-h5cx-65gg | ReDOS in IS-SVG | A vulnerability was discovered in IS-SVG version 4.3.1 and below where a Regular Expression Denial of Service (ReDOS) occurs if the application is provided and checks a crafted invalid SVG string. | [] | null | 7.5 | null | null |
RHSA-2024:10265 | Red Hat Security Advisory: kernel security update | kernel: xprtrdma: fix pointer derefs in error cases of rpcrdma_ep_create kernel: mptcp: pm: Fix uaf in __timer_delete_sync | [
"cpe:/o:redhat:rhel_aus:8.4::baseos",
"cpe:/o:redhat:rhel_e4s:8.4::baseos",
"cpe:/o:redhat:rhel_tus:8.4::baseos"
] | null | 7 | null | null |
CVE-2022-38980 | The HwAirlink module has a heap overflow vulnerability in processing data packets of the proprietary protocol.Successful exploitation of this vulnerability may allow attackers to obtain process control permissions. | [
"cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:2.1:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
CVE-2000-0569 | Sybergen Sygate allows remote attackers to cause a denial of service by sending a malformed DNS UDP packet to its internal interface. | [
"cpe:2.3:a:sybergen:sygate:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sybergen:sygate:3.11:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2007-6016 | Multiple stack-based buffer overflows in the PVATLCalendar.PVCalendar.1 ActiveX control in pvcalendar.ocx in the scheduler component in the Media Server in Symantec Backup Exec for Windows Server (BEWS) 11d 11.0.6235 and 11.0.7170, and 12.0 12.0.1364, allow remote attackers to execute arbitrary code via a long (1) _DOWText0, (2) _DOWText1, (3) _DOWText2, (4) _DOWText3, (5) _DOWText4, (6) _DOWText5, (7) _DOWText6, (8) _MonthText0, (9) _MonthText1, (10) _MonthText2, (11) _MonthText3, (12) _MonthText4, (13) _MonthText5, (14) _MonthText6, (15) _MonthText7, (16) _MonthText8, (17) _MonthText9, (18) _MonthText10, or (19) _MonthText11 property value when executing the Save method. NOTE: the vendor states "Authenticated user involvement required," but authentication is not needed to attack a client machine that loads this control. | [
"cpe:2.3:a:symantec:backup_exec_for_windows_server:11d:11.0.6235:*:*:*:*:*:*",
"cpe:2.3:a:symantec:backup_exec_for_windows_server:11d:11.0.7170:*:*:*:*:*:*",
"cpe:2.3:a:symantec:backup_exec_for_windows_server:12.0:12.0.1364:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
CVE-2010-4417 | Unspecified vulnerability in the Services for Beehive component in Oracle Fusion Middleware 2.0.1.0, 2.0.1.1, 2.0.1.2, 2.0.1.2.1, and 2.0.1.3 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the January 2011 CPU. Oracle has not commented on claims from a reliable third party coordinator that voice-servlet/prompt-qa/Index.jspf does not properly handle null (%00) bytes in the evaluation parameter that is used in a filename, which allows attackers to create a file with an executable extension and execute arbitrary JSP code. | [
"cpe:2.3:a:oracle:beehive:2.0.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:beehive:2.0.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:beehive:2.0.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:beehive:2.0.1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:beehive:2.0.1.3:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-p2jx-4425-chh9 | Multiple cross-site scripting (XSS) vulnerabilities in OrbitHYIP 2.0 and earlier allow remote attackers to inject arbitrary web script via the (1) referral parameter to signup.php or (2) id parameter to members.php. | [] | null | null | null | null |
|
CVE-2020-10225 | An unauthenticated file upload vulnerability has been identified in admin/gallery.php in PHPGurukul Job Portal 1.0. The vulnerability could be exploited by an unauthenticated remote attacker to upload content to the server, including PHP files, which could result in command execution. | [
"cpe:2.3:a:phpgurukul:job_portal:1.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
|
GHSA-v5h8-96h5-6hm4 | SettingsBase.php in Pinnacle ShowCenter 1.51 allows remote attackers to cause a denial of service (web interface errors) via an invalid Skin parameter. | [] | null | null | null | null |
|
CVE-2013-0193 | Cross-site Scripting (XSS) in Piwik before 1.10.1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. NOTE: This is a different vulnerability than CVE-2013-0194 and CVE-2013-0195. | [
"cpe:2.3:a:matomo:matomo:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 |
|
CVE-2020-1427 | An elevation of privilege vulnerability exists in the way that the Windows Network Connections Service handles objects in memory, aka 'Windows Network Connections Service Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1373, CVE-2020-1390, CVE-2020-1428, CVE-2020-1438. | [
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | 4.6 |
|
CVE-2023-6721 | Improper Restriction of XML External Entity Reference in Repox | An XEE vulnerability has been found in Repox, which allows a remote attacker to interfere with the application's XML data processing in the fileupload function, resulting in interaction between the attacker and the server's file system. | [
"cpe:2.3:a:europeana:repox:2.3.7:*:*:*:*:*:*:*"
] | null | 8.3 | null | null |
GHSA-r9mp-qr63-99pq | Northern.tech Mender Client 4.x before 4.0.5 has Insecure Permissions. | [] | null | 9.1 | null | null |
|
CVE-2019-0643 | An information disclosure vulnerability exists in the way that Microsoft Edge handles cross-origin requests, aka 'Microsoft Edge Information Disclosure Vulnerability'. | [
"cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
] | null | null | 4.3 | 4.3 |
|
GHSA-r32h-gpw9-p8r4 | NVIDIA GeForce Experience all versions prior to 3.14.1 contains a potential vulnerability when GameStream is enabled where improper access control may lead to a denial of service, escalation of privileges, or both. | [] | null | null | 7 | null |
|
GHSA-5mw9-mr3r-536c | An integer overflow in the search_in_range function in regexec.c in Oniguruma 6.x before 6.9.4_rc2 leads to an out-of-bounds read, in which the offset of this read is under the control of an attacker. (This only affects the 32-bit compiled version). Remote attackers can cause a denial-of-service or information disclosure, or possibly have unspecified other impact, via a crafted regular expression. | [] | null | null | null | null |
|
CVE-2013-0145 | Buffer overflow in the TFTPD service in Serva32 2.1.0 allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a long string in a read request. | [
"cpe:2.3:a:vercot:serva32:2.1.0:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2006-5234 | Multiple PHP remote file inclusion vulnerabilities in phpWebSite 0.10.2 allow remote attackers to execute arbitrary PHP code via a URL in the PHPWS_SOURCE_DIR parameter in (1) init.php, (2) users.php, (3) Cookie.php, (4) forms.php, (5) Groups.php, (6) ModSetting.php, (7) Calendar.php, (8) DateTime.php, (9) core.php, (10) ImgLibrary.php, (11) Manager.php, and (12) Template.php, and (13) EZform.php. NOTE: CVE disputes this report, since "PHPWS_SOURCE_DIR" is defined as a constant, not accessed as a variable | [
"cpe:2.3:a:phpwebsite:phpwebsite:0.10.2:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2022-34872 | This vulnerability allows remote attackers to disclose sensitive information on affected installations of Centreon. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of Virtual Metrics. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise. Was ZDI-CAN-16336. | [
"cpe:2.3:a:centreon:centreon:21.10.2:*:*:*:*:*:*:*"
] | null | null | 6.5 | null |
|
GHSA-83x5-3w6q-xwfg | Untrusted search path vulnerability in Invensys Wonderware InTouch 2012 and earlier, as used in Wonderware Application Server, Wonderware Information Server, Foxboro Control Software, InFusion CE/FE/SCADA, InBatch, and Wonderware Historian, allows local users to gain privileges via a Trojan horse DLL in an unspecified directory. | [] | null | null | null | null |
|
GHSA-pf6w-3pfw-fxvw | Magento SQL Injection vulnerability | Magento versions 2.4.0 and 2.3.5 (and earlier) are affected by an SQL Injection vulnerability that could lead to sensitive information disclosure. This vulnerability could be exploited by an authenticated user with permissions to the product listing page to read data from the database. | [] | null | 7.1 | null | null |
CVE-2023-2793 | Stack exhaustion in PreparePostForClientWithEmbedsAndImages | Mattermost fails to validate links on external websites when constructing a preview for a linked website, allowing an attacker to cause a denial-of-service by a linking to a specially crafted webpage in a message.
| [
"cpe:2.3:a:mattermost:mattermost:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mattermost:mattermost:7.10.0:*:*:*:*:*:*:*"
] | null | 6.5 | null | null |
CVE-2024-46754 | bpf: Remove tst_run from lwt_seg6local_prog_ops. | In the Linux kernel, the following vulnerability has been resolved:
bpf: Remove tst_run from lwt_seg6local_prog_ops.
The syzbot reported that the lwt_seg6 related BPF ops can be invoked
via bpf_test_run() without without entering input_action_end_bpf()
first.
Martin KaFai Lau said that self test for BPF_PROG_TYPE_LWT_SEG6LOCAL
probably didn't work since it was introduced in commit 04d4b274e2a
("ipv6: sr: Add seg6local action End.BPF"). The reason is that the
per-CPU variable seg6_bpf_srh_states::srh is never assigned in the self
test case but each BPF function expects it.
Remove test_run for BPF_PROG_TYPE_LWT_SEG6LOCAL. | [] | null | null | null | null |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.