id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
57.2k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2007-3410 | Stack-based buffer overflow in the SmilTimeValue::parseWallClockValue function in smlprstime.cpp in RealNetworks RealPlayer 10, 10.1, and possibly 10.5, RealOne Player, RealPlayer Enterprise, and Helix Player 10.5-GOLD and 10.0.5 through 10.0.8, allows remote attackers to execute arbitrary code via an SMIL (SMIL2) file with a long wallclock value. | [
"cpe:2.3:a:realnetworks:helix_player:10.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:helix_player:10.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:helix_player:10.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:helix_player:10.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:helix_player:10.5-gold:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realone_player:*:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:10.5:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer_enterprise:*:*:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
GHSA-x6p2-rpj7-w423 | A vulnerability classified as critical was found in QDocs Smart School Management System 7.0.0. Affected by this vulnerability is an unknown functionality of the file /user/chat/mynewuser of the component Chat. The manipulation of the argument users[] with the input 1'+AND+(SELECT+3220+FROM+(SELECT(SLEEP(5)))ZNun)+AND+'WwBM'%3d'WwBM as part of POST Request Parameter leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 7.0.1 is able to address this issue. It is recommended to upgrade the affected component. | [] | 5.3 | 6.3 | null | null |
|
CVE-2020-21547 | Libsixel 1.8.2 contains a heap-based buffer overflow in the dither_func_fs function in tosixel.c. | [
"cpe:2.3:a:libsixel_project:libsixel:1.8.2:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.8 |
|
CVE-2024-0533 | Tenda A15 Web-based Management Interface SetOnlineDevName stack-based overflow | A vulnerability was found in Tenda A15 15.13.07.13. It has been rated as critical. This issue affects some unknown processing of the file /goform/SetOnlineDevName of the component Web-based Management Interface. The manipulation of the argument devName leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-250703. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | [
"cpe:2.3:o:tenda:a15_firmware:15.13.07.13:*:*:*:*:*:*:*",
"cpe:2.3:h:tenda:a15:-:*:*:*:*:*:*:*"
] | null | 7.2 | 7.2 | 8.3 |
GHSA-mg3f-7p64-q5jf | The Name Directory WordPress plugin before 1.25.3 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting. Furthermore, as the payload is also saved into the database after the request, it leads to a Stored XSS as well | [] | null | 6.1 | null | null |
|
GHSA-m649-qfq3-hfqm | OTFCC commit 617837b was discovered to contain a segmentation violation via /release-x64/otfccdump+0x65f724. | [] | null | 6.5 | null | null |
|
CVE-2005-1016 | Cross-site scripting (XSS) vulnerability in links_add_form.asp for MaxWebPortal 1.33 and earlier allows remote attackers to inject arbitrary web script or HTML via a Javascript URL in a banner URL. | [
"cpe:2.3:a:maxwebportal:maxwebportal:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2018-8214 | An elevation of privilege vulnerability exists in Windows when Desktop Bridge does not properly manage the virtual registry, aka "Windows Desktop Bridge Elevation of Privilege Vulnerability." This affects Windows Server 2016, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-8208. | [
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*"
] | null | null | 7 | 6.9 |
|
GHSA-4x37-wc67-gqjf | MyWebSQL 3.7 has a Cross-site request forgery (CSRF) vulnerability for deleting a database via the /?q=wrkfrm&type=databases URI. | [] | null | null | 5.7 | null |
|
CVE-2017-1175 | IBM Maximo Asset Management 7.1, 7.5, and 7.6 is vulnerable to SQL injection. A remote attacker could send specially-crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-Force ID: 123297. | [
"cpe:2.3:a:ibm:maximo_asset_management:7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:7.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:7.6:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 |
|
GHSA-rq56-q73v-5g57 | Privilege Escalation to root administrator (nsroot) | [] | null | 8 | null | null |
|
GHSA-ggfm-5h26-pppx | Use after free in V8 in Google Chrome prior to 107.0.5304.106 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chrome security severity: High) | [] | null | 8.8 | null | null |
|
GHSA-wc27-6x2h-q38w | A vulnerability in the software upgrade process of Cisco Nexus 3000 Series Switches and Cisco Nexus 9000 Series Switches in standalone NX-OS mode could allow an authenticated, local attacker with valid Administrator credentials to execute a command injection attack on the underlying operating system of an affected device.This vulnerability is due to insufficient validation of specific elements within a software image. An attacker could exploit this vulnerability by installing a crafted image. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with root privileges.
Note: Administrators should validate the hash of any software image before installation. | [] | null | 5.1 | null | null |
|
CVE-2024-1215 | SourceCodester CRUD without Page Reload fetch_data.php cross site scripting | A vulnerability was found in SourceCodester CRUD without Page Reload 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file fetch_data.php. The manipulation of the argument username/city leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-252782 is the identifier assigned to this vulnerability. | [
"cpe:2.3:a:crud_without_page_reload_project:crud_without_page_reload:1.0:*:*:*:*:*:*:*"
] | null | 3.5 | 3.5 | 4 |
CVE-2018-14513 | An XSS vulnerability was discovered in WUZHI CMS 4.1.0. There is persistent XSS that allows remote attackers to inject arbitrary web script or HTML via the form[content] parameter to the index.php?m=feedback&f=index&v=contact URI. | [
"cpe:2.3:a:wuzhi_cms_project:wuzhi_cms:4.1.0:*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 |
|
GHSA-wfrh-gq5h-5225 | Argument injection in Ivanti Connect Secure before version 22.7R2 and 9.1R18.7 and Ivanti Policy Secure before version 22.7R1.1 allows a remote authenticated attacker with admin privileges to achieve remote code execution. | [] | null | null | 9.1 | null |
|
CVE-2013-4524 | Directory traversal vulnerability in repository/filesystem/lib.php in Moodle through 2.2.11, 2.3.x before 2.3.10, 2.4.x before 2.4.7, and 2.5.x before 2.5.3 allows remote authenticated users to read arbitrary files via a .. (dot dot) in a path. | [
"cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.5.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.6.7:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.6.8:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.7.5:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.7.6:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.8.3:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.8.4:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.8.5:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.8.6:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.8.7:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.8.8:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.8.9:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.8.10:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.8.11:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.8.12:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.8.13:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.8.14:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.9.4:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.9.5:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.9.6:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.9.7:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.9.8:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.9.9:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.9.10:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.9.11:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.9.12:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.9.13:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.9.14:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.9.15:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.9.16:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.9.17:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.9.18:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.3.8:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.3.9:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.5.2:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
CVE-2004-1199 | Safari 1.2.4 on Mac OS X 10.3.6 allows remote attackers to cause a denial of service (application crash from memory exhaustion), as demonstrated using Javascript code that continuously creates nested arrays and then sorts the newly created arrays. | [
"cpe:2.3:a:apple:safari:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:beta2:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
ICSA-20-119-01 | LCDS LAquis SCADA | The affected product is vulnerable to sensitive information exposure by unauthorized users.CVE-2020-10618 has been assigned to this vulnerability. A CVSS v3 base score of 5.5 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N). The affected product is vulnerable to arbitrary file creation by unauthorized users.CVE-2020-10622 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H). | [] | null | null | 6.5 | null |
GHSA-hhpj-6pj7-wpx5 | OpenStack Neutron Race condition vulnerability | Race condition in OpenStack Neutron before 2014.2.4 and 2015.1 before 2015.1.2, when using the ML2 plugin or the security groups AMQP API, allows remote authenticated users to bypass IP anti-spoofing controls by changing the device owner of a port to start with network: before the security group rules are applied. | [] | null | null | null | null |
GHSA-pm3j-mqcc-rjqr | The Net::EasyTCP package before 0.15 for Perl always uses Perl's builtin rand(), which is not a strong random number generator, for cryptographic keys. | [] | null | 5.4 | null | null |
|
CVE-2012-5761 | Cross-site scripting (XSS) vulnerability in the WebAdmin application 6.0.5, 6.0.8, and 7.0 before P2 in IBM Netezza allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors. | [
"cpe:2.3:h:ibm:netezza:6.0.5:*:*:*:*:*:*:*",
"cpe:2.3:h:ibm:netezza:6.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:ibm:netezza:7.0:*:*:*:*:*:*:*"
] | null | null | null | 3.5 |
|
GHSA-f3hr-4gx3-x2mg | Improper input validation in the DAL subsystem for Intel(R) CSME versions before 11.8.77, 11.12.77, 11.22.77, 12.0.64, 13.0.32,14.0.33 and Intel(R) TXE versions before 3.1.75 and 4.0.25 may allow an unauthenticated user to potentially enable information disclosure via network access. | [] | null | null | null | null |
|
GHSA-v2c6-mhjv-vm9x | An issue in the API endpoint /AccountMaster/GetCurrentUserInfo of INROAD before v202402060 allows attackers to access sensitive information via a crafted payload to the UserNameOrPhoneNumber parameter. | [] | null | 5.9 | null | null |
|
CVE-2022-40752 |
IBM InfoSphere DataStage 11.7 is vulnerable to a command injection vulnerability due to improper neutralization of special elements. IBM X-Force ID: 236687. | [
"cpe:2.3:a:ibm:infosphere_information_server:11.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:infosphere_information_server_on_cloud:11.7:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:-:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
CVE-2022-3928 | Hardcoded credential is found in the message queue |
Hardcoded credential is found in affected products' message queue. An attacker that manages to exploit this vulnerability will be able to access data to the internal message queue.
This issue affects
* FOXMAN-UN product: FOXMAN-UN R15B, FOXMAN-UN R15A, FOXMAN-UN R14B, FOXMAN-UN R14A, FOXMAN-UN R11B, FOXMAN-UN R11A, FOXMAN-UN R10C, FOXMAN-UN R9C;
* UNEM product: UNEM R15B, UNEM R15A, UNEM R14B, UNEM R14A, UNEM R11B, UNEM R11A, UNEM R10C, UNEM R9C.
List of CPEs:
* cpe:2.3:a:hitachienergy:foxman-un:R15B:*:*:*:*:*:*:*
* cpe:2.3:a:hitachienergy:foxman-un:R15A:*:*:*:*:*:*:*
* cpe:2.3:a:hitachienergy:foxman-un:R14B:*:*:*:*:*:*:*
* cpe:2.3:a:hitachienergy:foxman-un:R14A:*:*:*:*:*:*:*
* cpe:2.3:a:hitachienergy:foxman-un:R11B:*:*:*:*:*:*:*
* cpe:2.3:a:hitachienergy:foxman-un:R11A:*:*:*:*:*:*:*
* cpe:2.3:a:hitachienergy:foxman-un:R10C:*:*:*:*:*:*:*
* cpe:2.3:a:hitachienergy:foxman-un:R9C:*:*:*:*:*:*:*
* cpe:2.3:a:hitachienergy:unem:R15B:*:*:*:*:*:*:*
* cpe:2.3:a:hitachienergy:unem:R15A:*:*:*:*:*:*:*
* cpe:2.3:a:hitachienergy:unem:R14B:*:*:*:*:*:*:*
* cpe:2.3:a:hitachienergy:unem:R14A:*:*:*:*:*:*:*
* cpe:2.3:a:hitachienergy:unem:R11B:*:*:*:*:*:*:*
* cpe:2.3:a:hitachienergy:unem:R11A:*:*:*:*:*:*:*
* cpe:2.3:a:hitachienergy:unem:R10C:*:*:*:*:*:*:*
* cpe:2.3:a:hitachienergy:unem:R9C:*:*:*:*:*:*:*
| [
"cpe:2.3:a:hitachienergy:foxman-un:*:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachienergy:unem:*:*:*:*:*:*:*:*"
] | null | 7.1 | null | null |
CVE-2020-6403 | Incorrect implementation in Omnibox in Google Chrome on iOS prior to 80.0.3987.87 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:-:*:*:*:*:*:*:*",
"cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:suse:package_hub:-:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"
] | null | 4.3 | null | 4.3 |
|
GHSA-qr5q-qw5g-hr2g | file_manage_control.php in DedeCMS 5.7 has CSRF in an fmdo=rename action, as demonstrated by renaming an arbitrary file under uploads/userup to a .php file under the web root to achieve PHP code execution. This uses the oldfilename and newfilename parameters. | [] | null | null | 8.8 | null |
|
CVE-2009-0156 | Launch Services in Apple Mac OS X 10.4.11 and 10.5 before 10.5.7 allows remote attackers to cause a denial of service (persistent Finder crash) via a crafted Mach-O executable that triggers an out-of-bounds memory read. | [
"cpe:2.3:o:apple:mac_os_x:10.4.11:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.5.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.5.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.5.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.5.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.5.6:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.11:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.6:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-8g6g-hrhw-vq74 | Directory traversal vulnerability in RaidenFTPD before 2.4.2241 allows remote attackers to read arbitrary files via a "..\\" (dot dot backslash) in the urlget site command. | [] | null | null | null | null |
|
GHSA-5pq8-pf8w-mg62 | Multiple PHP remote file inclusion vulnerabilities in MangoBery CMS 0.5.5 allow remote attackers to execute arbitrary PHP code via a URL in the Site_Path parameter to (1) boxes/quotes.php or (2) templates/mangobery/footer.sample.php. | [] | null | null | null | null |
|
RHSA-2015:1081 | Red Hat Security Advisory: kernel security, bug fix, and enhancement update | kernel: partial ASLR bypass through TLS base addresses leak Kernel: fs: isofs: infinite loop in CE record entries kernel: ASLR bruteforce possible for vdso library kernel: pipe: iovec overrun leading to memory corruption Kernel: crypto: buffer overruns in RFC4106 implementation using AESNI | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
CVE-2007-5312 | Cross-site scripting (XSS) vulnerability in TorrentTrader Classic 1.07 allows remote attackers to inject arbitrary web script or HTML via the (1) color parameter to pjirc/css.php and the (2) cat parameter to browse.php. | [
"cpe:2.3:a:torrenttrader:torrenttrader:1.07:*:classic_edition:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-grhv-62hf-9jg3 | In the Linux kernel, the following vulnerability has been resolved:btrfs: fix use-after-free after failure to create a snapshotAt ioctl.c:create_snapshot(), we allocate a pending snapshot structure and
then attach it to the transaction's list of pending snapshots. After that
we call btrfs_commit_transaction(), and if that returns an error we jump
to 'fail' label, where we kfree() the pending snapshot structure. This can
result in a later use-after-free of the pending snapshot:We allocated the pending snapshot and added it to the transaction's
list of pending snapshots;We call btrfs_commit_transaction(), and it fails either at the first
call to btrfs_run_delayed_refs() or btrfs_start_dirty_block_groups().
In both cases, we don't abort the transaction and we release our
transaction handle. We jump to the 'fail' label and free the pending
snapshot structure. We return with the pending snapshot still in the
transaction's list;Another task commits the transaction. This time there's no error at
all, and then during the transaction commit it accesses a pointer
to the pending snapshot structure that the snapshot creation task
has already freed, resulting in a user-after-free.This issue could actually be detected by smatch, which produced the
following warning:fs/btrfs/ioctl.c:843 create_snapshot() warn: '&pending_snapshot->list' not removed from listSo fix this by not having the snapshot creation ioctl directly add the
pending snapshot to the transaction's list. Instead add the pending
snapshot to the transaction handle, and then at btrfs_commit_transaction()
we add the snapshot to the list only when we can guarantee that any error
returned after that point will result in a transaction abort, in which
case the ioctl code can safely free the pending snapshot and no one can
access it anymore. | [] | null | 7.8 | null | null |
|
GHSA-9v29-vghv-pj7f | Vulnerability in the MySQL Enterprise Monitor component of Oracle MySQL (subcomponent: Monitoring: Agent). Supported versions that are affected are 3.1.3.7856 and earlier. Easily exploitable vulnerability allows high privileged attacker with network access via TLS to compromise MySQL Enterprise Monitor. Successful attacks of this vulnerability can result in takeover of MySQL Enterprise Monitor. CVSS v3.0 Base Score 7.2 (Confidentiality, Integrity and Availability impacts). | [] | null | null | 7.2 | null |
|
GHSA-gwr7-g7gq-m3v3 | Incorrect Privilege Assignment vulnerability in Tomdever wpForo Forum allows Privilege Escalation.This issue affects wpForo Forum: from n/a through 2.4.2. | [] | null | 7.6 | null | null |
|
GHSA-rf88-vj2v-vj92 | Lobby Track Desktop could allow a local attacker to gain elevated privileges on the system, caused by an error in the printer dialog. By visiting the kiosk and signing in as a visitor, an attacker could exploit this vulnerability using the command line to break out of kiosk mode. | [] | null | null | 7.8 | null |
|
CVE-2024-55594 | An improper handling of syntactically invalid structure in Fortinet FortiWeb at least vesrions 7.4.0 through 7.4.6 and 7.2.0 through 7.2.10 and 7.0.0 through 7.0.10 allows attacker to execute unauthorized code or commands via HTTP/S crafted requests. | [] | null | 5.5 | null | null |
|
RHSA-2021:1072 | Red Hat Security Advisory: libldb security update | samba: Out of bounds read in AD DC LDAP server | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7.1 | null | null |
CVE-2021-30188 | CODESYS V2 runtime system SP before 2.4.7.55 has a Stack-based Buffer Overflow. | [
"cpe:2.3:a:codesys:v2_runtime_system_sp:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
|
CVE-2018-12880 | Adobe Acrobat and Reader versions 2018.011.20063 and earlier, 2017.011.30102 and earlier, and 2015.006.30452 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. | [
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | null | 5.5 | 4.3 |
|
CVE-2023-3266 | A non-feature complete authentication mechanism exists in the production application allowing an attacker to bypass all authentication checks if LDAP authentication is selected.An unauthenticated attacker can leverage this vulnerability to log in to the CypberPower PowerPanel Enterprise as an administrator by selecting LDAP authentication from a hidden HTML combo box. Successful exploitation of this vulnerability also requires the attacker to know at least one username on the device, but any password will authenticate successfully. | [
"cpe:2.3:a:cyberpower:powerpanel_server:*:*:*:*:enterprise:*:*:*"
] | null | 9.8 | null | null |
|
GHSA-f5f8-hv26-rgx9 | Stack-based buffer overflow in Microsoft Office Excel 2002 SP3, Office 2004 for Mac, Office 2008 for Mac, and Open XML File Format Converter for Mac allows remote attackers to execute arbitrary code via an Excel file with a crafted OBJ (0x5D) record, aka "Excel Object Stack Overflow Vulnerability." | [] | null | null | null | null |
|
GHSA-jpj2-w3cv-mppv | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Echenley Counterpoint allows Reflected XSS.This issue affects Counterpoint: from n/a through 1.8.1. | [] | null | 7.1 | null | null |
|
CVE-2017-4923 | VMware vCenter Server (6.5 prior to 6.5 U1) contains an information disclosure vulnerability. This issue may allow plaintext credentials to be obtained when using the vCenter Server Appliance file-based backup feature. | [
"cpe:2.3:a:vmware:vcenter_server:6.5:*:*:*:*:*:*:*"
] | null | null | 9.8 | 5 |
|
CVE-2019-8018 | Adobe Acrobat and Reader versions 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure . | [
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
RHSA-2020:2789 | Red Hat Security Advisory: OpenShift Container Platform 4.4.11 ose-baremetal-operator-container security update | golang.org/x/crypto: Processing of crafted ssh-ed25519 public keys allows for panic | [
"cpe:/a:redhat:openshift:4.4::el7"
] | null | 5.3 | null | null |
CVE-2021-22896 | Nextcloud Mail before 1.9.5 suffers from improper access control due to a missing permission check allowing other authenticated users to create mail aliases for other users. | [
"cpe:2.3:a:nextcloud:nextcloud:*:*:*:*:*:*:*:*"
] | null | 4.3 | null | 4 |
|
GHSA-x2cf-jr43-g76c | Siemens WinCC (TIA Portal) 11 uses a reversible algorithm for storing HMI web-application passwords in world-readable and world-writable files, which allows local users to obtain sensitive information by leveraging (1) physical access or (2) Sm@rt Server access. | [] | null | null | null | null |
|
cisco-sa-ise-sec-atk-dos-zw5RCUYp | Cisco Identity Services Engine Software Resource Exhaustion Vulnerability | A vulnerability in a feature that monitors RADIUS requests on Cisco Identity Services Engine (ISE) Software could allow an unauthenticated, remote attacker to negatively affect the performance of an affected device.
This vulnerability is due to insufficient management of system resources. An attacker could exploit this vulnerability by taking actions that cause Cisco ISE Software to receive specific RADIUS traffic. A successful and sustained exploit of this vulnerability could allow the attacker to cause reduced performance of the affected device, resulting in significant delays to RADIUS authentications.
Cisco has released software updates that address this vulnerability. There are workarounds that address this vulnerability.
| [] | null | 5.3 | null | null |
CVE-2024-10495 | Out of bounds read when loading the font table in fontmgr.cpp in NI LabVIEW | An out of bounds read due to improper input validation when loading the font table in fontmgr.cpp in NI LabVIEW may disclose information or result in arbitrary code execution. Successful exploitation requires an attacker to provide a user with a specially crafted VI. This vulnerability affects LabVIEW 2024 Q3 and prior versions. | [] | 8.4 | 7.8 | null | null |
GHSA-jhwj-rxcc-56mw | Unspecified vulnerability in Oracle Solaris 10 and 11 Express allows local users to affect availability, related to Kernel/NFS. | [] | null | null | null | null |
|
CVE-2024-9566 | D-Link DIR-619L B1 formDeviceReboot buffer overflow | A vulnerability classified as critical was found in D-Link DIR-619L B1 2.06. This vulnerability affects the function formDeviceReboot of the file /goform/formDeviceReboot. The manipulation of the argument next_page leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. | [
"cpe:2.3:h:d-link:dir-619l_b1:*:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dir-619l_firmware:2.06b1:*:*:*:*:*:*:*"
] | 8.7 | 8.8 | 8.8 | 9 |
GHSA-wxfq-r6w9-2mg2 | Unspecified vulnerability in Oracle Solaris 8, 9, and 10 allows remote attackers to affect confidentiality, integrity, and availability, related to CDE Calendar Manager Service Daemon and RPC. NOTE: the previous information was obtained from the January 2011 CPU. Oracle has not commented on claims from other software vendors that this affects other operating systems, such as HP-UX, or claims from a reliable third party that this is a buffer overflow in rpc.cmsd via long XDR-encoded ASCII strings in RPC call 10. | [] | null | null | null | null |
|
GHSA-8cvv-3p2p-xx9w | Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in RTI Connext Professional (Core Libraries, Queuing Service, Recording Service, Routing Service) allows Overflow Variables and Tags.This issue affects Connext Professional: from 7.4.0 before 7.5.0, from 7.0.0 before 7.3.0.5, from 6.1.0 before 6.1.2.21, from 6.0.0 before 6.0.1.40, from 5.0.0 before 5.3.1.45. | [] | 8.3 | null | null | null |
|
CVE-2014-5995 | The eWUS mobile (aka pl.dreryk.ewustest) application 1.4.5 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [
"cpe:2.3:a:ericpol:ewus_mobile:1.4.5:*:*:*:*:android:*:*"
] | null | null | null | 5.4 |
|
GHSA-49pq-458f-68rv | Unspecified vulnerability in the Oracle Transportation Management component in Oracle Supply Chain Products Suite 6.3.0, 6.3.1, 6.3.2, 6.3.3, 6.3.4, 6.3.5, 6.3.6, 6.3.7, 6.4.0, and 6.4.1 allows remote authenticated users to affect confidentiality via vectors related to Database. | [] | null | null | 3 | null |
|
RHSA-2020:0666 | Red Hat Security Advisory: qemu-kvm security and enhancement update | hw: TSX Transaction Asynchronous Abort (TAA) | [
"cpe:/o:redhat:rhel_eus:7.6::computenode",
"cpe:/o:redhat:rhel_eus:7.6::server"
] | null | null | 6.5 | null |
GHSA-w4jc-4p46-64m5 | Vulnerability in the Oracle Internet Expenses product of Oracle E-Business Suite (component: Mobile Expenses Admin Utilities). Supported versions that are affected are 12.2.4-12.2.9. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Internet Expenses. While the vulnerability is in Oracle Internet Expenses, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Internet Expenses accessible data. CVSS 3.1 Base Score 7.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N). | [] | null | null | null | null |
|
GHSA-27pq-ccjc-wxmc | Sngrep v1.6.0 was discovered to contain a stack buffer overflow via the function packet_set_payload at /src/packet.c. | [] | null | 7.8 | null | null |
|
CVE-2014-0829 | Multiple buffer overflows in IBM Rational ClearCase 7.x before 7.1.2.13, 8.0.0.x before 8.0.0.10, and 8.0.1.x before 8.0.1.3 allow remote authenticated users to obtain privileged access via unspecified vectors. | [
"cpe:2.3:a:ibm:rational_clearcase:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:8.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:8.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:8.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:8.0.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:8.0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:8.0.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:8.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:8.0.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:8.0.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:8.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.0.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.0.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.0.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.0.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.0.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.0.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.0.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.0.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.0.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.0.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.0.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.0.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.0.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.0.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.0.1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.1.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.1.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.1.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.1.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.1.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.1.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.1.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.1.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.1.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.1.2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.1.2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.1.2.11:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.1.2.12:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:8.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:8.0.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:8.0.1.2:*:*:*:*:*:*:*"
] | null | null | null | 6.5 |
|
CVE-2011-4295 | The moodle_enrol_external:role_assign function in enrol/externallib.php in Moodle 2.0.x before 2.0.4 and 2.1.x before 2.1.1 does not have an authorization check, which allows remote authenticated users to gain privileges by making a role assignment. | [
"cpe:2.3:a:moodle:moodle:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.1.0:*:*:*:*:*:*:*"
] | null | null | null | 6.5 |
|
CVE-2024-34693 | Apache Superset: Server arbitrary file read | Improper Input Validation vulnerability in Apache Superset, allows for an authenticated attacker to create a MariaDB connection with local_infile enabled. If both the MariaDB server (off by default) and the local mysql client on the web server are set to allow for local infile, it's possible for the attacker to execute a specific MySQL/MariaDB SQL command that is able to read files from the server and insert their content on a MariaDB database table.This issue affects Apache Superset: before 3.1.3 and version 4.0.0
Users are recommended to upgrade to version 4.0.1 or 3.1.3, which fixes the issue. | [] | null | 6.8 | null | null |
GHSA-xvgj-xgx8-24qr | TP-Link WVR, WAR and ER devices allow remote authenticated administrators to execute arbitrary commands via command injection in the new-mppeencryption variable in the pptp_client.lua file. | [] | null | null | 7.2 | null |
|
GHSA-2f2w-f2fq-hhm8 | Azure Site Recovery Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-33678. | [] | null | 7.2 | null | null |
|
CVE-2020-10782 | An exposure of sensitive information flaw was found in Ansible version 3.7.0. Sensitive information, such tokens and other secrets could be readable and exposed from the rsyslog configuration file, which has set the wrong world-readable permissions. The highest threat from this vulnerability is to confidentiality. This is fixed in Ansible version 3.7.1. | [
"cpe:2.3:a:redhat:ansible_tower:3.7.0:*:*:*:*:*:*:*"
] | null | 6.5 | null | null |
|
CVE-2016-5750 | The certificate upload feature in iManager in NetIQ Access Manager 4.1 before 4.1.2 Hot Fix 1 and 4.2 before 4.2.2 could be used to upload JSP pages that would be executed as the iManager user, allowing code execution by logged-in remote users. | [
"cpe:2.3:a:netiq:access_manager:4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:netiq:access_manager:4.1:sp1:*:*:*:*:*:*",
"cpe:2.3:a:netiq:access_manager:4.1:sp2:*:*:*:*:*:*",
"cpe:2.3:a:netiq:access_manager:4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:netiq:access_manager:4.2:sp1:*:*:*:*:*:*"
] | null | null | 8.8 | 6.5 |
|
GHSA-cq6w-v7jp-qj2g | Buffer overflow in Abuse 2.00 and earlier allows local users to gain root privileges via a long -net command line argument. | [] | null | null | null | null |
|
CVE-2022-42724 | app/Controller/UsersController.php in MISP before 2.4.164 allows attackers to discover role names (this is information that only the site admin should have). | [
"cpe:2.3:a:misp-project:malware_information_sharing_platform:*:*:*:*:*:*:*:*"
] | null | 4.3 | null | null |
|
GHSA-372q-3c59-c2w9 | Cross-site scripting (XSS) vulnerability in view_create.php (aka the Create View page) in phpMyAdmin 4.x before 4.0.3 allows remote authenticated users to inject arbitrary web script or HTML via an invalid SQL CREATE VIEW statement with a crafted name that triggers an error message. | [] | null | null | null | null |
|
CVE-2024-25966 | Dell PowerScale OneFS versions 8.2.x through 9.7.0.2 contains an improper handling of unexpected data type vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to denial of service. | [
"cpe:2.3:o:dell:powerscale_onefs:*:*:*:*:*:*:*:*",
"cpe:2.3:a:dell:powerscale_onefs:*:*:*:*:*:*:*:*"
] | null | 5.3 | null | null |
|
CVE-2022-1128 | Inappropriate implementation in Web Share API in Google Chrome on Windows prior to 100.0.4896.60 allowed an attacker on the local network segment to leak cross-origin data via a crafted HTML page. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 6.5 | null | null |
|
GHSA-36vx-qm6w-f394 | An information disclosure vulnerability exists when the Windows RDP server improperly discloses the contents of its memory, aka 'Remote Desktop Protocol Server Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2019-1225. | [] | null | null | 7.5 | null |
|
GHSA-7x7g-57qw-5g6m | Flexense DiskBoss Enterprise v7.4.28 to v9.1.16 has XSS. | [] | null | null | 6.1 | null |
|
CVE-2013-1899 | Argument injection vulnerability in PostgreSQL 9.2.x before 9.2.4, 9.1.x before 9.1.9, and 9.0.x before 9.0.13 allows remote attackers to cause a denial of service (file corruption), and allows remote authenticated users to modify configuration settings and execute arbitrary code, via a connection request using a database name that begins with a "-" (hyphen). | [
"cpe:2.3:a:postgresql:postgresql:9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.0.12:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:8.04:-:lts:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*"
] | null | null | null | 6.5 |
|
GHSA-9452-vhg2-pfvx | contentHostProperties.php in Rasilient PixelStor 5000 K:4.0.1580-20150629 (KDI Version) allows authenticated attackers to remotely execute code via the name parameter. | [] | null | null | null | null |
|
GHSA-c9g5-h8rc-q6m5 | An issue with ARP packets in Arista’s EOS affecting the 7800R3, 7500R3, and 7280R3 series of products may result in issues that cause a kernel crash, followed by a device reload. The affected Arista EOS versions are: 4.24.2.4F and below releases in the 4.24.x train; 4.23.4M and below releases in the 4.23.x train; 4.22.6M and below releases in the 4.22.x train. | [] | null | null | null | null |
|
GHSA-p63m-vmjr-wg37 | Cross-site request forgery (CSRF) vulnerability in the content page editor in Liferay Portal 7.3.2 through 7.4.3.107, and Liferay DXP 2023.Q4.0 through 2023.Q4.2, 2023.Q3.1 through 2023.Q3.5, 7.4 GA through update 92 and 7.3 GA through update 35 allows remote attackers to (1) change user passwords, (2) shut down the server, (3) execute arbitrary code in the scripting console, (4) and perform other administrative actions via the p_l_back_url parameter. | [] | null | 8.8 | null | null |
|
CVE-2018-0146 | A vulnerability in the Cisco Data Center Analytics Framework application could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack on an affected system. The vulnerability is due to improper CSRF protection by the affected application. An attacker could exploit this vulnerability by persuading a user of the affected application to click a malicious link. A successful exploit could allow the attacker to submit arbitrary requests and take unauthorized actions on behalf of the user. Cisco Bug IDs: CSCvg45114. | [
"cpe:2.3:a:cisco:data_center_analytics_framework:3.1:*:*:*:*:*:*:*"
] | null | null | 5.4 | 5.8 |
|
CVE-2023-31945 | SQL injection vulnerability found in Online Travel Agency System v.1.0 allows a remote attacker to execute arbitrary code via the id parameter at daily_expenditure_edit.php. | [
"cpe:2.3:a:online_travel_agency_system_project:online_travel_agency_system:1.0:*:*:*:*:*:*:*"
] | null | 7.2 | null | null |
|
CVE-2024-55968 | An issue was discovered in DTEX DEC-M (DTEX Forwarder) 6.1.1. The com.dtexsystems.helper service, responsible for handling privileged operations within the macOS DTEX Event Forwarder agent, fails to implement critical client validation during XPC interprocess communication (IPC). Specifically, the service does not verify the code requirements, entitlements, security flags, or version of any client attempting to establish a connection. This lack of proper logic validation allows malicious actors to exploit the service's methods via unauthorized client connections, and escalate privileges to root by abusing the DTConnectionHelperProtocol protocol's submitQuery method over an unauthorized XPC connection. | [] | null | 8.8 | null | null |
|
GHSA-g6gj-xwhj-g7rm | There is a Cross-site scripting (XSS) vulnerability in the Wireless settings under the Easy Setup Page of TOTOLINK X2000R before v1.0.0-B20231213.1013. | [] | null | 5.4 | null | null |
|
GHSA-qfvx-qh4h-983h | B.A.S C2Box before 4.0.0 (r19171) relies on client-side validation, which allows remote attackers to "corrupt the business logic" via a negative value in an overdraft. | [] | null | null | 7.5 | null |
|
GHSA-9qgh-3x6p-9934 | A buffer overflow issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13.3. An app may be able to cause unexpected system termination or write kernel memory. | [] | null | 7.8 | null | null |
|
CVE-2009-4063 | Cross-site scripting (XSS) vulnerability in the Subgroups for Organic Groups (OG) module 5.x before 5.x-4.0 and 5.x before 5.x-3.4 for Drupal allows remote attackers to inject arbitrary web script or HTML via unspecified node titles. | [
"cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ezra_barnett_gildesgame:og_subgroups:5.x-1.x:dev:*:*:*:*:*:*",
"cpe:2.3:a:ezra_barnett_gildesgame:og_subgroups:5.x-2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ezra_barnett_gildesgame:og_subgroups:5.x-3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ezra_barnett_gildesgame:og_subgroups:5.x-3.0:dev:*:*:*:*:*:*",
"cpe:2.3:a:ezra_barnett_gildesgame:og_subgroups:5.x-3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ezra_barnett_gildesgame:og_subgroups:5.x-3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ezra_barnett_gildesgame:og_subgroups:5.x-3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ezra_barnett_gildesgame:og_subgroups:5.x-3.x:dev:*:*:*:*:*:*",
"cpe:2.3:a:ezra_barnett_gildesgame:og_subgroups:5.x-4.x:dev:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2023-21419 | An improper implementation logic in Secure Folder prior to SMR Jan-2023 Release 1 allows the Secure Folder container remain unlocked under certain condition. | [
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*"
] | null | 4.3 | null | null |
|
CVE-2024-35861 | smb: client: fix potential UAF in cifs_signal_cifsd_for_reconnect() | In the Linux kernel, the following vulnerability has been resolved:
smb: client: fix potential UAF in cifs_signal_cifsd_for_reconnect()
Skip sessions that are being teared down (status == SES_EXITING) to
avoid UAF. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:*"
] | null | 7.8 | null | null |
GHSA-4jh7-m9q3-3qw9 | CMSimple_XH 1.7.6 allows XSS by uploading a crafted SVG document. | [] | null | 6.1 | null | null |
|
CVE-2016-10394 | Improper Authentication in Core | Initial xbl_sec revision does not have all the debug policy features and critical checks. | [
"cpe:2.3:o:qualcomm:mdm9206_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9206:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9607_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9607:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_835_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_835:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_845_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_845:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_850_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_850:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
CVE-2023-39966 | 1Panel arbitrary file write vulnerability exists in the background | 1Panel is an open source Linux server operation and maintenance management panel. In version 1.4.3, an arbitrary file write vulnerability could lead to direct control of the server. In the `api/v1/file.go` file, there is a function called `SaveContentthat,It `recieves JSON data sent by users in the form of a POST request. And the lack of parameter filtering allows for arbitrary file write operations. Version 1.5.0 contains a patch for this issue. | [
"cpe:2.3:a:fit2cloud:1panel:1.4.3:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
CVE-2024-8763 | Regular Expression Denial of Service (ReDoS) in lunary-ai/lunary | A Regular Expression Denial of Service (ReDoS) vulnerability exists in the lunary-ai/lunary repository, specifically in the compileTextTemplate function. The affected version is git be54057. An attacker can exploit this vulnerability by manipulating the regular expression /{{(.*?)}}/g, causing the server to hang indefinitely and become unresponsive to any requests. This is due to the regular expression's susceptibility to second-degree polynomial time complexity, which can be triggered by a large number of braces in the input. | [] | null | null | 7.5 | null |
CVE-2020-14159 | By using an Automate API in ConnectWise Automate before 2020.5.178, a remote authenticated user could execute commands and/or modifications within an individual Automate instance by triggering an SQL injection vulnerability in /LabTech/agent.aspx. This affects versions before 2019.12.337, 2020 before 2020.1.53, 2020.2 before 2020.2.85, 2020.3 before 2020.3.114, 2020.4 before 2020.4.143, and 2020.5 before 2020.5.178. | [
"cpe:2.3:a:connectwise:automate_api:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.5 |
|
GHSA-hpcm-hcj8-c96c | In Dogtag PKI through 10.8.3, the pki.client.PKIConnection class did not enable python-requests certificate validation. Since the verify parameter was hard-coded in all request functions, it was not possible to override the setting. As a result, tools making use of this class, such as the pki-server command, may have been vulnerable to Person-in-the-Middle attacks in certain non-localhost use cases. This is fixed in 10.9.0-b1. | [] | null | null | null | null |
|
GHSA-m42j-hmvj-q2c6 | .NET Framework Denial of Service Vulnerability | [] | null | 7.5 | null | null |
|
GHSA-2gxx-2hcr-3whr | In the Linux kernel, the following vulnerability has been resolved:clk: qcom: mmcc-msm8974: fix terminating of frequency table arraysThe frequency table arrays are supposed to be terminated with an
empty element. Add such entry to the end of the arrays where it
is missing in order to avoid possible out-of-bound access when
the table is traversed by functions like qcom_find_freq() or
qcom_find_freq_floor().Only compile tested. | [] | null | null | null | null |
|
CVE-2021-39022 | IBM Guardium Data Encryption (GDE) 4.0.0.0 and 5.0.0.0 saves user-provided information into a Comma-Separated Value (CSV) file, but it does not neutralize or incorrectly neutralizes special elements that could be interpreted as a command when the file is opened by spreadsheet software. IBM X-Force ID: 213858. | [
"cpe:2.3:a:ibm:guardium_data_encryption:4.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:guardium_data_encryption:5.0.0.0:*:*:*:*:*:*:*"
] | null | null | 6.2 | null |
|
GHSA-36vp-p2m5-97vp | Memory safety bugs present in Firefox 120, Firefox ESR 115.5, and Thunderbird 115.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR < 115.6, Thunderbird < 115.6, and Firefox < 121. | [] | null | 8.8 | null | null |
|
GHSA-2c5f-68qc-5vrp | An Information Disclosure vulnerability exists in Netgear WNDR4700 running firmware 1.0.0.34 in the management web interface, which discloses the PSK of the wireless LAN. | [] | null | null | null | null |
|
CVE-2017-7479 | OpenVPN versions before 2.3.15 and before 2.4.2 are vulnerable to reachable assertion when packet-ID counter rolls over resulting into Denial of Service of server by authenticated attacker. | [
"cpe:2.3:a:openvpn:openvpn:*:*:*:*:*:*:*:*",
"cpe:2.3:a:openvpn:openvpn:2.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:openvpn:openvpn:2.4.0:alpha2:*:*:*:*:*:*",
"cpe:2.3:a:openvpn:openvpn:2.4.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:openvpn:openvpn:2.4.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:openvpn:openvpn:2.4.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:openvpn:openvpn:2.4.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:openvpn:openvpn:2.4.1:*:*:*:*:*:*:*"
] | null | null | 6.5 | 4 |
|
CVE-2017-10789 | The DBD::mysql module through 4.043 for Perl uses the mysql_ssl=1 setting to mean that SSL is optional (even though this setting's documentation has a "your communication with the server will be encrypted" statement), which allows man-in-the-middle attackers to spoof servers via a cleartext-downgrade attack, a related issue to CVE-2015-3152. | [
"cpe:2.3:a:dbd-mysql_project:dbd-mysql:*:*:*:*:*:*:*:*"
] | null | null | 5.9 | 4.3 |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.