id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
57.2k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-7w85-qxmf-mpxc | The MonsterInsights WordPress plugin before 8.12.1 does not validate and escape some of its block options before outputting them back in a page/post where the block is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks. | [] | null | 5.4 | null | null |
|
GHSA-5m63-cm92-r4mq | Insufficient policy enforcement in downloads in Google Chrome on Windows prior to 86.0.4240.75 allowed a remote attacker who convinced the user to open files to execute arbitrary code via a crafted HTML page. | [] | null | null | null | null |
|
CVE-2017-0308 | All versions of NVIDIA Windows GPU Display Driver contain a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape where untrusted input is used for buffer size calculation leading to denial of service or escalation of privileges. | [
"cpe:2.3:a:nvidia:gpu_driver:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | null | 8.8 | 7.2 |
|
CVE-2007-0297 | Unspecified vulnerability in Oracle PeopleSoft Enterprise and JD Edwards EnterpriseOne 8.47.11 and 8.48.06 has unknown impact and attack vectors in PeopleTools, aka PSE03. | [
"cpe:2.3:a:oracle:enterpriseone:8.47.11:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:enterpriseone:8.48.06:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:peoplesoft_enterprise:8.47.11:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:peoplesoft_enterprise:8.48.06:*:*:*:*:*:*:*"
] | null | null | null | 4 |
|
GHSA-5jf4-jh9g-7766 | The admin sys mode is now conditional and dedicated for the special case. By default, since [email protected] no instance (container) is launched with advanced capabilities (not launched as root) | [] | null | null | null | null |
|
ICSA-22-223-07 | Siemens SCALANCE (Update A) | Affected devices do not properly sanitize an input field. This could allow an authenticated remote attacker with administrative privileges to inject code or spawn a system root shell. CVE-2022-36323 has been assigned to this vulnerability. A CVSS v3 base score of 9.1 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H). Affected devices do not properly handle the renegotiation of SSL/TLS parameters. This could allow an unauthenticated remote attacker to bypass the TCP brute force prevention and lead to a denial of service condition for the duration of the attack. CVE-2022-36324 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). Affected devices do not properly sanitize data introduced by an user when rendering the web interface. This could allow an authenticated remote attacker with administrative privileges to inject code and lead to a DOM-based XSS. CVE-2022-36325 has been assigned to this vulnerability. A CVSS v3 base score of 6.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H). | [] | null | 6.8 | null | null |
CVE-2010-1380 | Integer overflow in the cgtexttops CUPS filter in Printing in Apple Mac OS X 10.6 before 10.6.4 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via vectors related to page sizes. | [
"cpe:2.3:o:apple:mac_os_x:10.6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.6.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.6.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.6.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.6.3:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-3p92-886g-qxpq | Remote Memory Exposure in floody | Versions of `floody` before 0.1.1 are vulnerable to remote memory exposure..write(number)` in the affected `floody` versions passes a number to Buffer constructor, appending a chunk of uninitialized memory.Proof of Concept: | [] | null | 5.1 | null | null |
GHSA-q2cw-g3jx-6p84 | Cleartext Transmission in set-cookie:ecos_pw: Tenda N301 v6.0, Firmware v12.02.01.61_multi allows an authenticated attacker on the LAN or WLAN to intercept communications with the router and obtain the password. | [] | null | 5.7 | null | null |
|
GHSA-gfmf-6ghh-gjwr | An Improper Check for Unusual or Exceptional Conditions vulnerability in the the Public Key Infrastructure daemon (pkid) of Juniper Networks Junos OS allows an unauthenticated networked attacker to cause Denial of Service (DoS).The pkid is responsible for the certificate verification. Upon a failed verification, the pkid uses all CPU resources and becomes unresponsive to future verification attempts. This means that all subsequent VPN negotiations depending on certificate verification will fail.This CPU utilization of pkid can be checked using this command:
root@srx> show system processes extensive | match pkid
xxxxx root 103 0 846M 136M CPU1 1 569:00 100.00% pkidThis issue affects:
Juniper Networks Junos OS
All versions prior to 20.4R3-S10;
21.2 versions prior to 21.2R3-S7;
21.4 versions prior to 21.4R3-S5;
22.1 versions prior to 22.1R3-S4;
22.2 versions prior to 22.2R3-S3;
22.3 versions prior to 22.3R3-S1;
22.4 versions prior to 22.4R3;
23.2 versions prior to 23.2R1-S2, 23.2R2. | [] | 8.7 | 7.5 | null | null |
|
GHSA-cjqm-pc48-gq5m | Microchip Atmel ATSAMA5 products in Secure Mode allow an attacker to bypass existing security mechanisms related to applet handling. | [] | null | null | null | null |
|
CVE-2017-14804 | package builds could use directory traversal to write outside of target area | The build package before 20171128 did not check directory names during extraction of build results that allowed untrusted builds to write outside of the target system,allowing escape out of buildroots. | [
"cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp2:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp3:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*"
] | null | null | 9.9 | null |
RHSA-2017:0252 | Red Hat Security Advisory: ntp security update | ntp: Client rate limiting and server responses ntp: Attack on interface selection ntp: Broken initial sync calculations regression ntp: Mode 6 unauthenticated trap information disclosure and DDoS vector ntp: Null pointer dereference when trap service is enabled | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 5.9 | null |
GHSA-6c3j-c64m-qhgq | XSS in jQuery as used in Drupal, Backdrop CMS, and other products | jQuery from 1.1.4 until 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles `jQuery.extend(true, {}, ...)` because of `Object.prototype` pollution. If an unsanitized source object contained an enumerable `__proto__` property, it could extend the native `Object.prototype`. | [] | null | 6.1 | null | null |
RHSA-2024:2565 | Red Hat Security Advisory: libreswan security update | libreswan: Missing PreSharedKey for connection can cause crash | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 5 | null | null |
CVE-2024-40807 | A logic issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14.6, macOS Monterey 12.7.6, macOS Ventura 13.6.8. A shortcut may be able to use sensitive data with certain actions without prompting the user. | [
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
|
GHSA-2835-wpx9-j9cq | An issue was discovered in Eventum 3.5.0. htdocs/ajax/update.php has XSS via the field_name parameter. | [] | null | null | null | null |
|
GHSA-6jq7-rv4f-7448 | A vulnerability was found in Campcodes Coffee Shop POS System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /admin/products/manage_product.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-226978 is the identifier assigned to this vulnerability. | [] | null | null | 6.3 | null |
|
GHSA-jr42-fxwr-2j4m | content/content.blueprintspages.php in Symphony 2.7.6 has XSS via the pages content page. | [] | null | null | 6.1 | null |
|
GHSA-f6m2-5v5j-rhf2 | GDAL through 3.0.1 has a poolDestroy double free in OGRExpatRealloc in ogr/ogr_expat.cpp when the 10MB threshold is exceeded. | [] | null | 9.8 | null | null |
|
GHSA-w3h5-p6v5-5vjm | Security check loophole in HAProxy release (in combination with routing release) in Cloud Foundry prior to v40.17.0 potentially allows bypass of mTLS authentication to applications hosted on Cloud Foundry. | [] | null | 9 | null | null |
|
GHSA-v5c2-fhw3-mxqf | In cPanel before 66.0.2, EasyApache 4 conversion sets weak domlog ownership and permissions (SEC-272). | [] | null | null | 3.3 | null |
|
CVE-2021-46158 | A vulnerability has been identified in Simcenter Femap V2020.2 (All versions), Simcenter Femap V2021.1 (All versions). Affected application contains a stack based buffer overflow vulnerability while parsing NEU files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-15085, ZDI-CAN-15289, ZDI-CAN-15602) | [
"cpe:2.3:a:siemens:simcenter_femap:2020.2:-:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simcenter_femap:2020.2:maintenance_pack1:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simcenter_femap:2020.2:maintenance_pack2:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simcenter_femap:2020.2:maintenance_pack3:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simcenter_femap:2021.1:-:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simcenter_femap:2021.1:maintenance_pack1:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simcenter_femap:2021.1:maintenance_pack2:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simcenter_femap:2021.1:maintenance_pack3:*:*:*:*:*:*"
] | null | 7.8 | null | 6.8 |
|
CVE-2008-7099 | Unspecified vulnerability in the Manage Templates feature in Qsoft K-Rate Premium allows remote attackers to execute arbitrary PHP code via unknown vectors. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | [
"cpe:2.3:a:qsoft-inc:k-rate:-:-:premium:*:*:*:*:*"
] | null | null | null | 6.8 |
|
GHSA-94x4-fq94-5wwx | SAP CRM WebClient UI - version S4FND 102, S4FND 103, S4FND 104, S4FND 105, S4FND 106, WEBCUIF 701, WEBCUIF 731, WEBCUIF 746, WEBCUIF 747, WEBCUIF 748, WEBCUIF 800, WEBCUIF 801, does not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability. An attacker with low privileges can cause limited impact to integrity of the application data after successful exploitation. There is no impact on confidentiality and availability. | [] | null | 4.1 | null | null |
|
CVE-2024-26882 | net: ip_tunnel: make sure to pull inner header in ip_tunnel_rcv() | In the Linux kernel, the following vulnerability has been resolved:
net: ip_tunnel: make sure to pull inner header in ip_tunnel_rcv()
Apply the same fix than ones found in :
8d975c15c0cd ("ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv()")
1ca1ba465e55 ("geneve: make sure to pull inner header in geneve_rx()")
We have to save skb->network_header in a temporary variable
in order to be able to recompute the network_header pointer
after a pskb_inet_may_pull() call.
pskb_inet_may_pull() makes sure the needed headers are in skb->head.
syzbot reported:
BUG: KMSAN: uninit-value in __INET_ECN_decapsulate include/net/inet_ecn.h:253 [inline]
BUG: KMSAN: uninit-value in INET_ECN_decapsulate include/net/inet_ecn.h:275 [inline]
BUG: KMSAN: uninit-value in IP_ECN_decapsulate include/net/inet_ecn.h:302 [inline]
BUG: KMSAN: uninit-value in ip_tunnel_rcv+0xed9/0x2ed0 net/ipv4/ip_tunnel.c:409
__INET_ECN_decapsulate include/net/inet_ecn.h:253 [inline]
INET_ECN_decapsulate include/net/inet_ecn.h:275 [inline]
IP_ECN_decapsulate include/net/inet_ecn.h:302 [inline]
ip_tunnel_rcv+0xed9/0x2ed0 net/ipv4/ip_tunnel.c:409
__ipgre_rcv+0x9bc/0xbc0 net/ipv4/ip_gre.c:389
ipgre_rcv net/ipv4/ip_gre.c:411 [inline]
gre_rcv+0x423/0x19f0 net/ipv4/ip_gre.c:447
gre_rcv+0x2a4/0x390 net/ipv4/gre_demux.c:163
ip_protocol_deliver_rcu+0x264/0x1300 net/ipv4/ip_input.c:205
ip_local_deliver_finish+0x2b8/0x440 net/ipv4/ip_input.c:233
NF_HOOK include/linux/netfilter.h:314 [inline]
ip_local_deliver+0x21f/0x490 net/ipv4/ip_input.c:254
dst_input include/net/dst.h:461 [inline]
ip_rcv_finish net/ipv4/ip_input.c:449 [inline]
NF_HOOK include/linux/netfilter.h:314 [inline]
ip_rcv+0x46f/0x760 net/ipv4/ip_input.c:569
__netif_receive_skb_one_core net/core/dev.c:5534 [inline]
__netif_receive_skb+0x1a6/0x5a0 net/core/dev.c:5648
netif_receive_skb_internal net/core/dev.c:5734 [inline]
netif_receive_skb+0x58/0x660 net/core/dev.c:5793
tun_rx_batched+0x3ee/0x980 drivers/net/tun.c:1556
tun_get_user+0x53b9/0x66e0 drivers/net/tun.c:2009
tun_chr_write_iter+0x3af/0x5d0 drivers/net/tun.c:2055
call_write_iter include/linux/fs.h:2087 [inline]
new_sync_write fs/read_write.c:497 [inline]
vfs_write+0xb6b/0x1520 fs/read_write.c:590
ksys_write+0x20f/0x4c0 fs/read_write.c:643
__do_sys_write fs/read_write.c:655 [inline]
__se_sys_write fs/read_write.c:652 [inline]
__x64_sys_write+0x93/0xd0 fs/read_write.c:652
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcf/0x1e0 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x63/0x6b
Uninit was created at:
__alloc_pages+0x9a6/0xe00 mm/page_alloc.c:4590
alloc_pages_mpol+0x62b/0x9d0 mm/mempolicy.c:2133
alloc_pages+0x1be/0x1e0 mm/mempolicy.c:2204
skb_page_frag_refill+0x2bf/0x7c0 net/core/sock.c:2909
tun_build_skb drivers/net/tun.c:1686 [inline]
tun_get_user+0xe0a/0x66e0 drivers/net/tun.c:1826
tun_chr_write_iter+0x3af/0x5d0 drivers/net/tun.c:2055
call_write_iter include/linux/fs.h:2087 [inline]
new_sync_write fs/read_write.c:497 [inline]
vfs_write+0xb6b/0x1520 fs/read_write.c:590
ksys_write+0x20f/0x4c0 fs/read_write.c:643
__do_sys_write fs/read_write.c:655 [inline]
__se_sys_write fs/read_write.c:652 [inline]
__x64_sys_write+0x93/0xd0 fs/read_write.c:652
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcf/0x1e0 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x63/0x6b | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | 5.3 | null | null |
CVE-2019-14009 | Out of bound memory access while processing TZ command handler due to improper input validation on response length received from user in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking in APQ8009, APQ8098, MDM9150, MDM9607, MDM9650, MSM8905, MSM8909, MSM8998, SDA660, SDA845, SDM630, SDM636, SDM660, SDM845, SDM850, SXR2130 | [
"cpe:2.3:o:qualcomm:apq8009_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:apq8009:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:apq8098_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:apq8098:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9150_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9607_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9607:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9650:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8905_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8905:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8909_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8909:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8998_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8998:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sda660_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sda660:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sda845_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sda845:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm630_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm630:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm636_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm636:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm660_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm660:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm845_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm845:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm850_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm850:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sxr2130_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sxr2130:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | 7.2 |
|
CVE-2014-2491 | Unspecified vulnerability in the Siebel UI Framework component in Oracle Siebel CRM 8.1.1 and 8.2.2 allows remote attackers to affect integrity via unknown vectors related to Portal Framework, a different vulnerability than CVE-2014-4205. | [
"cpe:2.3:a:oracle:siebel_crm:8.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:siebel_crm:8.2.2:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2015-2132 | Unspecified vulnerability in the execve system-call implementation in HP HP-UX B.11.11, B.11.23, and B.11.31 allows local users to gain privileges via unknown vectors. | [
"cpe:2.3:a:hp:operations_manager_i:9.23:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:operations_manager_i:9.24:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:operations_manager_i:9.25:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:operations_manager_i:10.00:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:operations_manager_i:10.01:*:*:*:*:*:*:*"
] | null | null | null | 4.4 |
|
CVE-1999-0956 | The NeXT NetInfo _writers property allows local users to gain root privileges or conduct a denial of service. | [
"cpe:2.3:o:next:nextstep:1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:next:nextstep:1.0a:*:*:*:*:*:*:*",
"cpe:2.3:o:next:nextstep:2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:next:nextstep:2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:next:nextstep:3.0:*:*:*:*:*:*:*"
] | null | null | null | 7.2 |
|
GHSA-jqx9-x6x8-85cw | Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and 9.1.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | [] | null | 4.9 | null | null |
|
CVE-2015-0073 | The Windows Registry Virtualization feature in the kernel in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 does not properly restrict changes to virtual stores, which allows local users to gain privileges via a crafted application, aka "Registry Virtualization Elevation of Privilege Vulnerability." | [
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*"
] | null | null | null | 7.2 |
|
GHSA-g9q5-3vv9-mx45 | XPath injection vulnerability in Epic MyChart allows remote attackers to access contents of an XML document containing static display strings, such as field labels, via the topic parameter to help.asp. NOTE: this was originally reported as a SQL injection vulnerability, but this may be inaccurate. | [] | null | null | 7.5 | null |
|
GHSA-jx46-9ppx-mm7j | The WordPress Simple Shopping Cart WordPress plugin before 4.6.2 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins. | [] | null | 5.4 | null | null |
|
RHSA-2015:0983 | Red Hat Security Advisory: tomcat security update | Tomcat/JBossWeb: request smuggling and limited DoS in ChunkedInputFilter | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
CVE-2019-8207 | Adobe Acrobat and Reader versions , 2019.012.20040 and earlier, 2017.011.30148 and earlier, 2017.011.30148 and earlier, 2015.006.30503 and earlier, and 2015.006.30503 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure . | [
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
CVE-2012-5221 | Directory traversal vulnerability in the PostScript Interpreter, as used on the HP LaserJet 4xxx, 5200, 90xx, M30xx, M4345, M50xx, M90xx, P3005, and P4xxx; LaserJet Enterprise P3015; Color LaserJet 3xxx, 47xx, 5550, 9500, CM60xx, CP35xx, CP4005, and CP6015; Color LaserJet Enterprise CP4xxx; and 9250c Digital Sender with model-dependent firmware through 52.x allows remote attackers to read arbitrary files via unknown vectors. | [
"cpe:2.3:h:hp:color_laserjet_3000:q7534a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_3800:q5981a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_4700:q7492a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_4730_mfp:cb480a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_5550:q3714a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_9500_mfp:c8549a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_cm6030_mfp:ce664a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_cm6040_mfp:q3939a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_cp3505:cb442a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_cp3525:cc469a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_cp4005:cb503a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_cp6015:q3932a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_enterprise_cp4025:cc490a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_enterprise_cp4525:cc493a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:digital_sender_9250c:cb472a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_4240:q7785a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_4250:q5400a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_4345_mfp:q3942a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_4350:q5407a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_5200l:q7543a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_5200n:q7543a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_9040:q7697a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_9040_mfp:q3721a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_9050:q7697a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_9050_mfp:q3721a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_enterprise_p3015:ce526a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_m3027_mfp:cb416a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_m3035_mfp:cb414a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_m3035_mfp:cc519a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_m4345_mfp:cb425a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_m5025_mfp:q7840a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_m5035_mfp:q7829a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_m9040_mpf:cc394a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_m9050_mpf:cc395a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_p3005:q7812a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_p4014:cb507a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_p4015:cb509a:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_p4515:cb514a:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2006-1862 | The virtual memory implementation in Linux kernel 2.6.x allows local users to cause a denial of service (panic) by running lsof a large number of times in a way that produces a heavy system load. | [
"cpe:2.3:o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:*"
] | null | null | null | 4.9 |
|
GHSA-p4x7-45fh-r725 | Improper data access control in Odoo Community 10.0 and 11.0 and Odoo Enterprise 10.0 and 11.0 allows authenticated users to perform a CSV export of the secure hashed passwords of other users. | [] | null | null | null | null |
|
CVE-2024-43573 | Windows MSHTML Platform Spoofing Vulnerability | Windows MSHTML Platform Spoofing Vulnerability | [
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | null |
GHSA-9vh5-r4qw-v3vv | Improper Resource Shutdown or Release in HashiCorp Vault | HashiCorp Vault Enterprise 0.11.0 through 1.3.1 fails, in certain circumstances, to revoke dynamic secrets for a mount in a deleted namespace. Fixed in 1.3.2. | [] | null | 7.5 | null | null |
CVE-2014-2744 | plugins/mod_compression.lua in (1) Prosody before 0.9.4 and (2) Lightwitch Metronome through 3.4 negotiates stream compression while a session is unauthenticated, which allows remote attackers to cause a denial of service (resource consumption) via compressed XML elements in an XMPP stream, aka an "xmppbomb" attack. | [
"cpe:2.3:a:lightwitch:metronome:*:*:*:*:*:*:*:*",
"cpe:2.3:a:prosody:prosody:*:*:*:*:*:*:*:*",
"cpe:2.3:a:prosody:prosody:0.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:prosody:prosody:0.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:prosody:prosody:0.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:prosody:prosody:0.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:prosody:prosody:0.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:prosody:prosody:0.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:prosody:prosody:0.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:prosody:prosody:0.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:prosody:prosody:0.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:prosody:prosody:0.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:prosody:prosody:0.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:prosody:prosody:0.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:prosody:prosody:0.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:prosody:prosody:0.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:prosody:prosody:0.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:prosody:prosody:0.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:prosody:prosody:0.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:prosody:prosody:0.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:prosody:prosody:0.9.2:*:*:*:*:*:*:*"
] | null | null | null | 7.8 |
|
CVE-2023-6596 | Openshift: incomplete fix for rapid reset (cve-2023-44487/cve-2023-39325) | An incomplete fix was shipped for the Rapid Reset (CVE-2023-44487/CVE-2023-39325) vulnerability for an OpenShift Containers. | [
"cpe:/a:redhat:openshift:4.11::el8",
"cpe:/a:redhat:openshift:4.12::el8",
"cpe:/a:redhat:openshift:4"
] | null | 7.5 | null | null |
CVE-2022-20231 | In smc_intc_request_fiq of arm_gic.c, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-211485702References: N/A | [
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] | null | 6.7 | null | null |
|
GHSA-9vgq-7248-h4mj | A vulnerability in the web interface for Cisco Prime Collaboration Provisioning could allow an unauthenticated, remote attacker to bypass authentication and perform command injection with root privileges. The vulnerability is due to missing security constraints in certain HTTP request methods, which could allow access to files via the web interface. An attacker could exploit this vulnerability by sending a crafted HTTP request to the targeted application. This vulnerability affects Cisco Prime Collaboration Provisioning Software Releases prior to 12.1. Cisco Bug IDs: CSCvc98724. | [] | null | null | 9.8 | null |
|
CVE-2018-7588 | An issue was discovered in CImg v.220. A heap-based buffer over-read in load_bmp in CImg.h occurs when loading a crafted bmp image. | [
"cpe:2.3:a:cimg:cimg:.220:*:*:*:*:*:*:*"
] | null | null | 7.8 | 6.8 |
|
CVE-2019-15611 | Violation of Secure Design Principles in the iOS App 2.23.0 causes the app to leak its login and token to other Nextcloud services when search e.g. for federated users or registering for push notifications. | [
"cpe:2.3:a:nextcloud:nextcloud:*:*:*:*:*:iphone_os:*:*"
] | null | 4.9 | null | 4 |
|
CVE-2017-14975 | The FoFiType1C::convertToType0 function in FoFiType1C.cc in Poppler 0.59.0 has a NULL pointer dereference vulnerability because a data structure is not initialized, which allows an attacker to launch a denial of service attack. | [
"cpe:2.3:a:freedesktop:poppler:0.59.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
CVE-2018-8327 | A remote code execution vulnerability exists in PowerShell Editor Services, aka "PowerShell Editor Services Remote Code Execution Vulnerability." This affects PowerShell Editor, PowerShell Extension. | [
"cpe:2.3:a:microsoft:powershell_editor_services:*:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:powershell_extension:*:*:*:*:*:visual_studio_code:*:*"
] | null | 9.8 | null | 10 |
|
CVE-2021-4110 | NULL Pointer Dereference in mruby/mruby | mruby is vulnerable to NULL Pointer Dereference | [
"cpe:2.3:a:mruby:mruby:*:*:*:*:*:*:*:*"
] | null | null | 9.1 | null |
CVE-2020-8268 | Prototype pollution vulnerability in json8-merge-patch npm package < 1.0.3 may allow attackers to inject or modify methods and properties of the global object constructor. | [
"cpe:2.3:a:json8-merge-patch_project:json8-merge-patch:*:*:*:*:*:node.js:*:*"
] | null | 7.5 | null | 5 |
|
GHSA-754f-wrch-pxg4 | The Menu Icons by ThemeIsle plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘add_mime_type’ function in versions up to, and including, 0.13.13 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with author-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] | null | 6.4 | null | null |
|
RHSA-2019:4159 | Red Hat Security Advisory: kernel security and bug fix update | kernel: Out-of-bounds heap access in xfrm kernel: Exploitable memory corruption due to UFO to non-UFO path switch kernel: Out-of-bounds write via userland offsets in ebt_entry struct in netfilter/ebtables.c kernel: Memory corruption due to incorrect socket cloning kernel: Missing check in fs/inode.c:inode_init_owner() does not clear SGID bit on non-directories for non-members kernel: Use-after-free due to race condition in AF_PACKET implementation Kernel: page cache side channel attacks | [
"cpe:/o:redhat:rhel_aus:7.3::server",
"cpe:/o:redhat:rhel_e4s:7.3::server",
"cpe:/o:redhat:rhel_tus:7.3::server"
] | null | null | 7.1 | null |
CVE-2022-0448 | CP Blocks < 1.0.15 - Admin+ Stored Cross-Site Scripting | The CP Blocks WordPress plugin before 1.0.15 does not sanitise and escape its "License ID" settings, which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html is disallowed. | [
"cpe:2.3:a:dwbooster:cp_blocks:*:*:*:*:*:wordpress:*:*"
] | null | 4.8 | null | 3.5 |
CVE-2019-1862 | Cisco IOS XE Software Web UI Command Injection Vulnerability | A vulnerability in the web-based user interface (Web UI) of Cisco IOS XE Software could allow an authenticated, remote attacker to execute commands on the underlying Linux shell of an affected device with root privileges. The vulnerability occurs because the affected software improperly sanitizes user-supplied input. An attacker who has valid administrator access to an affected device could exploit this vulnerability by supplying a crafted input parameter on a form in the Web UI and then submitting that form. A successful exploit could allow the attacker to run arbitrary commands on the device with root privileges, which may lead to complete system compromise. | [
"cpe:2.3:o:cisco:ios_xe:16.3.7:*:*:*:*:*:*:*"
] | null | null | 7.2 | null |
GHSA-cxwp-3qmp-2569 | The Text Formats component in Apple OS X before 10.10.5, as used in TextEdit, allows remote attackers to read arbitrary files via a text file containing an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue. | [] | null | null | null | null |
|
CVE-2025-27307 | WordPress Quotes llama plugin <= 3.0.1 - Stored Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in oooorgle Quotes llama allows Reflected XSS. This issue affects Quotes llama: from n/a through 3.0.1. | [] | null | 6.5 | null | null |
GHSA-g6xr-c3q5-2cw3 | WorkforceROI Xpede 4.1 allows remote attackers to gain privileges as an Xpede administrator via a direct HTTP request to the /admin/adminproc.asp script, which does not prompt for a password. | [] | null | null | null | null |
|
CVE-2009-2764 | Microsoft Internet Explorer 8.0.7100.0 on Windows 7 RC on the x64 platform allows remote attackers to cause a denial of service (application crash) via a certain DIV element in conjunction with SCRIPT elements that have empty contents and no reference to a valid external script location. | [
"cpe:2.3:a:microsoft:internet_explorer:8.0.7100.0:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-7grv-vq6p-hf4x | gpsdrive (aka gpsdrive-scripts) 2.10~pre4 allows local users to overwrite arbitrary files via a symlink attack on the (a) /tmp/.smswatch or (b) /tmp/gpsdrivepos temporary file, related to (1) examples/gpssmswatch and (2) src/splash.c, different vectors than CVE-2008-4959 and CVE-2008-5380. | [] | null | null | null | null |
|
CVE-2010-4279 | The default configuration of Pandora FMS 3.1 and earlier specifies an empty string for the loginhash_pwd field, which allows remote attackers to bypass authentication by sending a request to index.php with "admin" in the loginhash_user parameter, in conjunction with the md5 hash of "admin" in the loginhash_data parameter. | [
"cpe:2.3:a:artica:pandora_fms:*:*:*:*:*:*:*:*",
"cpe:2.3:a:artica:pandora_fms:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:artica:pandora_fms:1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:artica:pandora_fms:1.3:beta:*:*:*:*:*:*",
"cpe:2.3:a:artica:pandora_fms:1.3:beta1:*:*:*:*:*:*",
"cpe:2.3:a:artica:pandora_fms:1.3:beta2:*:*:*:*:*:*",
"cpe:2.3:a:artica:pandora_fms:1.3:beta3:*:*:*:*:*:*",
"cpe:2.3:a:artica:pandora_fms:1.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:artica:pandora_fms:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:artica:pandora_fms:2.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:artica:pandora_fms:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:artica:pandora_fms:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:artica:pandora_fms:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:artica:pandora_fms:3.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:artica:pandora_fms:3.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:artica:pandora_fms:3.1:rc1:*:*:*:*:*:*"
] | null | null | null | 10 |
|
GHSA-hpj6-g6xh-pqc4 | An out-of-bounds write vulnerability exists in the U3D file reading procedure in Open Design Alliance PRC SDK before 2022.10. Crafted data in a U3D file can trigger a write past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. | [] | null | null | null | null |
|
GHSA-vfw5-rhwh-5h4p | Stack-based buffer overflow in the JPEG2000 plugin in IrfanView PlugIns before 4.33 allows remote attackers to execute arbitrary code via a JPEG2000 (JP2) file with a crafted Quantization Default (QCD) marker segment. | [] | null | null | null | null |
|
CVE-2005-4196 | Multiple cross-site scripting (XSS) vulnerabilities in Scout Portal Toolkit (SPT) 1.3.1 and earlier allow remote attackers to inject arbitrary web script or HTML via (1) the ss parameter in SPT--QuickSearch.php; (2) ParentId parameter in SPT--BrowseResources.php; (3) the ResourceId parameter in SPT--FullRecord.php; (4) ResourceOffset parameter in SPT--Home.php, (5) F_SearchString parameter in SPT--QuickSearch.php; (6) F_UserName and (7) F_Password parameters in SPT--UserLogin.php; (8) F_SearchCat1, (9) F_TextField1, (10) F_SearchCat2, (11) F_TextField2, (12) F_SearchCat3, (13) F_TextField3, (14) F_SearchCat4, (15) F_TextField4, (16) ResourceType, (17) Language, (18) Audience, (19) Format parameters in SPT--AdvancedSearch.php. | [
"cpe:2.3:a:internet_scout:scout_portal_toolkit:*:*:*:*:*:*:*:*",
"cpe:2.3:a:internet_scout:scout_portal_toolkit:1.3.0_beta:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-h32j-7m2c-7x9m | A vulnerability was found in SourceCodester Air Cargo Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file admin/transactions/update_status.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-223556. | [] | null | 9.8 | null | null |
|
GHSA-f2x7-pmw5-f3c9 | Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.7.22 and prior and 8.0.11 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all MySQL Server accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H). | [] | null | null | 6.5 | null |
|
CVE-2018-0007 | An unauthenticated network-based attacker able to send a maliciously crafted LLDP packet to the local segment, through a local segment broadcast, may be able to cause a Junos device to enter an improper boundary check condition allowing a memory corruption to occur, leading to a denial of service. Further crafted packets may be able to sustain the denial of service condition. Score: 6.5 MEDIUM (CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) Further, if the attacker is authenticated on the target device receiving and processing the malicious LLDP packet, while receiving the crafted packets, the attacker may be able to perform command or arbitrary code injection over the target device thereby elevating their permissions and privileges, and taking control of the device. Score: 7.8 HIGH (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) An unauthenticated network-based attacker able to send a maliciously crafted LLDP packet to one or more local segments, via LLDP proxy / tunneling agents or other LLDP through Layer 3 deployments, through one or more local segment broadcasts, may be able to cause multiple Junos devices to enter an improper boundary check condition allowing a memory corruption to occur, leading to multiple distributed Denials of Services. These Denials of Services attacks may have cascading Denials of Services to adjacent connected devices, impacts network devices, servers, workstations, etc. Further crafted packets may be able to sustain these Denials of Services conditions. Score 6.8 MEDIUM (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H) Further, if the attacker is authenticated on one or more target devices receiving and processing these malicious LLDP packets, while receiving the crafted packets, the attacker may be able to perform command or arbitrary code injection over multiple target devices thereby elevating their permissions and privileges, and taking control multiple devices. Score: 7.8 HIGH (CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H) Affected releases are Juniper Networks Junos OS: 12.1X46 versions prior to 12.1X46-D71; 12.3 versions prior to 12.3R12-S7; 12.3X48 versions prior to 12.3X48-D55; 14.1 versions prior to 14.1R8-S5, 14.1R9; 14.1X53 versions prior to 14.1X53-D46, 14.1X53-D50, 14.1X53-D107; 14.2 versions prior to 14.2R7-S9, 14.2R8; 15.1 versions prior to 15.1F2-S17, 15.1F5-S8, 15.1F6-S8, 15.1R5-S7, 15.1R7; 15.1X49 versions prior to 15.1X49-D90; 15.1X53 versions prior to 15.1X53-D65; 16.1 versions prior to 16.1R4-S6, 16.1R5; 16.1X65 versions prior to 16.1X65-D45; 16.2 versions prior to 16.2R2; 17.1 versions prior to 17.1R2. No other Juniper Networks products or platforms are affected by this issue. | [
"cpe:2.3:o:juniper:junos:12.1x46:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.1x46:d10:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.1x46:d15:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.1x46:d20:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.1x46:d25:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.1x46:d30:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.1x46:d35:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.1x46:d40:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.1x46:d45:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.1x46:d50:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.1x46:d55:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.1x46:d60:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.1x46:d65:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3:r10:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3:r11:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3:r12:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3:r4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3:r5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3:r6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3:r7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3:r8:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3:r9:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3x48:d10:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3x48:d15:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3x48:d20:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3x48:d25:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3x48:d30:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3x48:d35:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3x48:d40:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3x48:d45:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3x48:d50:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1:r4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1:r5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1:r6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1:r7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1:r8:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1:r9:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1x53:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1x53:d10:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1x53:d15:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1x53:d16:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1x53:d25:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1x53:d26:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1x53:d27:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1x53:d30:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1x53:d35:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1x53:d40:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1x53:d45:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.2:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.2:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.2:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.2:r4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.2:r5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.2:r6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.2:r7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x49:d10:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x49:d20:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x49:d30:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x49:d35:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x49:d40:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x49:d45:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x49:d50:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x49:d55:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x49:d60:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x49:d65:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x49:d70:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x49:d75:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x49:d80:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x53:d20:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x53:d21:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x53:d210:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x53:d25:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x53:d30:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x53:d32:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x53:d33:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x53:d34:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x53:d60:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x53:d61:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x53:d62:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x53:d63:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1x65:d30:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1x65:d35:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1x65:d40:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.2:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.1:r1:*:*:*:*:*:*"
] | null | null | 9.8 | 10 |
|
GHSA-mv2p-xxqx-rg9j | jfinal CMS 5.1.0 has an arbitrary file read vulnerability. | [] | null | 7.5 | null | null |
|
RHSA-2020:3241 | Red Hat Security Advisory: firefox security update | chromium-browser: Use after free in ANGLE chromium-browser: Inappropriate implementation in WebRTC Mozilla: Potential leak of redirect targets when loading scripts in a worker Mozilla: Memory safety bugs fixed in Firefox 79 and Firefox ESR 68.11 | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | 8.8 | null |
GHSA-vp7h-9vpx-8f6p | Class and method names in error message in Micro Focus Service Manager product versions 9.30, 9.31, 9.32, 9.33, 9.34, 9.35, 9.40, 9.41, 9.50, 9.51, 9.52, 9.60, 9.61, 9.62. This vulnerability could be exploited in some special cases to allow information exposure through an error message. | [] | null | null | null | null |
|
RHSA-2021:0989 | Red Hat Security Advisory: firefox security update | Mozilla: Angle graphics library out of date Mozilla: Texture upload into an unbound backing buffer resulted in an out-of-bound read Mozilla: Internal network hosts could have been probed by a malicious webpage Mozilla: Malicious extensions could have spoofed popup information Mozilla: Memory safety bugs fixed in Firefox 87 and Firefox ESR 78.9 | [
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 8.8 | 6.1 | null |
CVE-2019-15372 | The Hisense F17 Android device with a build fingerprint of Hisense/F17_4G/HS6739MT:8.1.0/O11019/Hisense_F17_4G_00_S01:user/release-keys contains a pre-installed app with a package name of com.mediatek.wfo.impl app (versionCode=27, versionName=8.1.0) that allows any app co-located on the device to modify a system property through an exported interface without proper authorization. | [
"cpe:2.3:o:hisense:infinity_f17_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hisense:infinity_f17:-:*:*:*:*:*:*:*"
] | null | 5.5 | null | 2.1 |
|
GHSA-g764-jhgr-8vmc | Unknown vulnerability in Webmin 1.140 allows remote attackers to bypass access control rules and gain read access to configuration information for a module. | [] | null | null | null | null |
|
CVE-2020-21406 | An issue was discovered in RK Smart TV Box MAX and V88 SmartTV box that allows attackers to cause a denial of service via the switchNextDisplayInterface service. | [
"cpe:2.3:o:v88_smart_tv_box_project:v88_smart_tv_box_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:v88_smart_tv_box_project:v88_smart_tv_box:-:*:*:*:*:*:*:*",
"cpe:2.3:o:rk_max_smart_tv_box_project:rk_max_smart_tv_box_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:rk_max_smart_tv_box_project:rk_max_smart_tv_box:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
|
CVE-2022-40005 | Intelbras WiFiber 120AC inMesh before 1-1-220826 allows command injection by authenticated users, as demonstrated by the /boaform/formPing6 and /boaform/formTracert URIs for ping and traceroute. | [
"cpe:2.3:o:intelbras:wifiber_120ac_inmesh_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intelbras:wifiber_120ac_inmesh:-:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
|
CVE-2024-48440 | Shenzhen Tuoshi Network Communications Co.,Ltd 5G CPE Router NR500-EA RG500UEAABxCOMSLICv3.2.2543.12.18 was discovered to contain a command injection vulnerability via the component at_command.asp. | [
"cpe:2.3:o:tuoshi:5g_cpe_router_nr500-ea_firmware:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
|
GHSA-qrm6-mr4f-gv6x | Macromedia ColdFusion MX 6.0 and 6.1 application server, when running with the CreateObject function or CFOBJECT tag enabled, allows local users to conduct unauthorized activities and obtain administrative passwords by creating CFML scripts that use CreateObject or CFOBJECT. | [] | null | null | null | null |
|
GHSA-6f2m-vhfx-gqwf | A stored cross site scripting (XSS) vulnerability in /administration/setting_security.php of PHP-Fusion 9.03.60 allows authenticated attackers to execute arbitrary web scripts or HTML via a crafted payload. | [] | null | null | null | null |
|
RHSA-2016:0778 | Red Hat Security Advisory: icedtea-web security, bug fix, and enhancement update | icedtea-web: unexpected permanent authorization of unsigned applets icedtea-web: applet origin spoofing | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
CVE-2007-3714 | Directory traversal vulnerability in Ada Image Server (ImgSvr) 0.6.5 allows remote attackers to read arbitrary files via a .. (dot dot) in the template parameter to the default URI. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. NOTE: this is probably a different issue than CVE-2004-2464. NOTE: it was later reported that 0.6.21 and earlier is also affected. | [
"cpe:2.3:a:ada:imgsvr:0.6.5:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-wjjr-h4wh-w6vv | Spring Framework Inefficient Regular Expression Complexity | Algorithmic complexity vulnerability in the java.util.regex.Pattern.compile method in Sun Java Development Kit (JDK) before 1.6, when used with spring.jar in SpringSource Spring Framework 1.1.0 through 2.5.6 and 3.0.0.M1 through 3.0.0.M2 and dm Server 1.0.0 through 1.0.2, allows remote attackers to cause a denial of service (CPU consumption) via serializable data with a long regex string containing multiple optional groups, a related issue to CVE-2004-2540. | [] | null | null | null | null |
GHSA-9jr7-gg57-r7pf | The Shariff Wrapper plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'shariff' shortcode in all versions up to, and including, 4.6.9 due to insufficient input sanitization and output escaping on user supplied attributes such as 'secondarycolor' and 'maincolor'. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] | null | 6.4 | null | null |
|
GHSA-mvcc-q3f8-gccx | The SMB client in Microsoft Windows Server 2008 R2 and Windows 7 does not properly handle (1) SMBv1 and (2) SMBv2 response packets, which allows remote SMB servers and man-in-the-middle attackers to execute arbitrary code via a crafted packet that causes the client to read the entirety of the response, and then improperly interact with the Winsock Kernel (WSK), aka "SMB Client Message Size Vulnerability." | [] | null | null | null | null |
|
CVE-2021-41276 | Indirect LDAP injection in Tuleap | Tuleap is a Libre and Open Source tool for end to end traceability of application and system developments. In affected versions Tuleap does not sanitize properly the search filter built from the ldap_id attribute of a user during the daily synchronization. A malicious user could force accounts to be suspended or take over another account by forcing the update of the ldap_uid attribute. Note that the malicious user either need to have site administrator capability on the Tuleap instance or be an LDAP operator with the capability to create/modify account. The Tuleap instance needs to have the LDAP plugin activated and enabled for this issue to be exploitable. This issue has been patched in Tuleap Community Edition 13.2.99.31, Tuleap Enterprise Edition 13.1-5, and Tuleap Enterprise Edition 13.2-3. | [
"cpe:2.3:a:enalean:tuleap:*:*:*:*:community:*:*:*",
"cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*"
] | null | 6.7 | null | null |
CVE-2007-1390 | Multiple cross-site scripting (XSS) vulnerabilities in dynaliens 2.0 and 2.1 allow remote attackers to inject arbitrary web script or HTML via unspecified parameters to (1) recherche.php3 or (2) ajouter.php3. | [
"cpe:2.3:a:dynaliens:dynaliens:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:dynaliens:dynaliens:2.1:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2013-5798 | Unspecified vulnerability in the Oracle Identity Manager component in Oracle Fusion Middleware 11.1.2.0.0 and 11.1.2.1.0 allows remote attackers to affect integrity via unknown vectors related to End User Self Service. | [
"cpe:2.3:a:oracle:fusion_middleware:11.1.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:fusion_middleware:11.1.2.1.0:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2020-13817 | ntpd in ntp before 4.2.8p14 and 4.3.x before 4.3.100 allows remote attackers to cause a denial of service (daemon exit or system time change) by predicting transmit timestamps for use in spoofed packets. The victim must be relying on unauthenticated IPv4 time sources. There must be an off-path attacker who can query time from the victim's ntpd instance. | [
"cpe:2.3:a:ntp:ntp:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.2.8:-:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.2.8:p1:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.2.8:p1-beta1:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.2.8:p1-beta2:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.2.8:p1-beta3:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.2.8:p1-beta4:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.2.8:p1-beta5:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.2.8:p1-rc1:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.2.8:p1-rc2:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.2.8:p10:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.2.8:p11:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.2.8:p12:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.2.8:p13:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.2.8:p2:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.2.8:p2-rc1:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.2.8:p2-rc2:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.2.8:p2-rc3:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.2.8:p3:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.2.8:p3-rc1:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.2.8:p3-rc2:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.2.8:p3-rc3:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.2.8:p4:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.2.8:p5:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.2.8:p6:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.2.8:p7:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.2.8:p8:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.2.8:p9:*:*:*:*:*:*",
"cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:data_ontap:-:*:*:*:*:7-mode:*:*",
"cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:ontap_tools:-:*:*:*:*:vmware_vsphere:*:*",
"cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:hci_compute_node_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h300e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h300e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h500e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h500e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h700e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h700e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*",
"cpe:2.3:o:fujitsu:m10-1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fujitsu:m10-1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fujitsu:m10-4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fujitsu:m10-4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fujitsu:m10-4s_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fujitsu:m10-4s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fujitsu:m12-1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fujitsu:m12-1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fujitsu:m12-2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fujitsu:m12-2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fujitsu:m12-2s_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fujitsu:m12-2s:-:*:*:*:*:*:*:*"
] | null | null | 5.9 | null |
|
CVE-2019-19736 | MFScripts YetiShare 3.5.2 through 4.5.3 does not set the HttpOnly flag on session cookies, allowing the cookie to be read by script, which can potentially be used by attackers to obtain the cookie via cross-site scripting. | [
"cpe:2.3:a:mfscripts:yetishare:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 |
|
CVE-2021-25479 | A possible heap-based buffer overflow vulnerability in Exynos CP Chipset prior to SMR Oct-2021 Release 1 allows arbitrary memory write and code execution. | [
"cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:h:samsung:exynos:-:*:*:*:*:*:*:*"
] | null | 7.2 | null | null |
|
CVE-2019-18989 | A partial authentication bypass vulnerability exists on Mediatek MT7620N 1.06 devices. The vulnerability allows sending an unencrypted data frame to a WPA2-protected WLAN router where the packet is routed through the network. If successful, a response is sent back as an encrypted frame, which would allow an attacker to discern information or potentially modify data. | [
"cpe:2.3:o:mediatek:mt7620n_firmware:1.06:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt7620n:-:*:*:*:*:*:*:*"
] | null | null | 6.1 | null |
|
CVE-2010-4785 | The do_extendedOp function in ibmslapd in IBM Tivoli Directory Server (TDS) 6.0 before 6.0.0.62 (aka 6.0.0.8-TIV-ITDS-IF0004) on Linux, Solaris, and Windows allows remote authenticated users to cause a denial of service (ABEND) via a malformed LDAP extended operation that triggers certain comparisons involving the NULL operation OID. | [
"cpe:2.3:a:ibm:tivoli_directory_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.33:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.41:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.45:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.52:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.53:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.54:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.55:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.56:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.57:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.58:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.59:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.60:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_directory_server:6.0.0.61:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:*:*:*:*:*:*:*:*"
] | null | null | null | 4 |
|
CVE-2010-2119 | Microsoft Internet Explorer 6.0.2900.2180 allows remote attackers to cause a denial of service (resource consumption) via JavaScript code containing an infinite loop that creates IFRAME elements for invalid nntp:// URIs. | [
"cpe:2.3:a:microsoft:internet_explorer:6.0.2900.2180:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2023-41033 | A vulnerability has been identified in Parasolid V35.0 (All versions < V35.0.260), Parasolid V35.1 (All versions < V35.1.246), Parasolid V36.0 (All versions < V36.0.156), Simcenter Femap V2301 (All versions < V2301.0003), Simcenter Femap V2306 (All versions < V2306.0001). The affected application contains an out of bounds write past the end of an allocated structure while parsing specially crafted X_T files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-21266) | [
"cpe:2.3:a:siemens:parasolid:*:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simcenter_femap:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
|
CVE-2015-1000000 | Remote file upload vulnerability in mailcwp v1.99 wordpress plugin | [
"cpe:2.3:a:mailcwp_project:mailcwp:1.99:*:*:*:*:wordpress:*:*"
] | null | null | 9.8 | 5 |
|
GHSA-58h5-x5rq-8fvp | An elevation of privilege vulnerability exists when Windows improperly handles calls to Advanced Local Procedure Call (ALPC).An attacker who successfully exploited this vulnerability could run arbitrary code in the security context of the local system, aka 'Windows ALPC Elevation of Privilege Vulnerability'. | [] | null | null | null | null |
|
GHSA-rrjg-c2rx-4hv6 | The CSS functionality in Opera 9 on Windows XP SP2 allows remote attackers to cause a denial of service (crash) by setting the background property of a DHTML element to a long http or https URL, which triggers memory corruption. | [] | null | null | null | null |
|
CVE-2009-1935 | Integer overflow in the pipe_build_write_buffer function (sys/kern/sys_pipe.c) in the direct write optimization feature in the pipe implementation in FreeBSD 7.1 through 7.2 and 6.3 through 6.4 allows local users to bypass virtual-to-physical address lookups and read sensitive information in memory pages via unspecified vectors. | [
"cpe:2.3:o:freebsd:freebsd:6.3:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:6.3:release_p10:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:6.3_releng:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:6.4:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:6.4:release_p4:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:6.4:stable:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:7.1:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:7.1:pre-release:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:7.1:rc1:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:7.1:release-p1:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:7.1:release-p2:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:7.1:release-p5:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:7.1:stable:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:7.2:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:7.2:pre-release:*:*:*:*:*:*"
] | null | null | null | 4.9 |
|
CVE-2018-2699 | Vulnerability in the Application Express component of Oracle Database Server. The supported version that is affected is Prior to 5.1.4.00.08. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Application Express. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Application Express, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Application Express accessible data as well as unauthorized read access to a subset of Application Express accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N). | [
"cpe:2.3:a:oracle:application_express:*:*:*:*:*:*:*:*"
] | null | null | 6.1 | 5.8 |
|
CVE-2023-20843 | In imgsys_cmdq, there is a possible out of bounds read due to a missing valid range checking. This could lead to local information disclosure with System execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS07340119; Issue ID: ALPS07340119. | [
"cpe:2.3:a:linuxfoundation:yocto:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mediatek:iot_yocto:23.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.1:-:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8395:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*"
] | null | 4.2 | null | null |
|
GHSA-vwfv-c6hj-hp8f | When user with insufficient privileges tries to access any application in SAP NetWeaver Administrator (Administrator applications), version - 7.50, no security audit log is created. Therefore, security audit log Integrity is impacted. | [] | null | null | null | null |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.