id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-vr57-f797-cqc5 | The avatar upload feature in affected versions of Atlassian Jira Server and Data Center allows remote attackers to achieve Denial of Service via a crafted PNG file. The affected versions are before version 8.5.4, from version 8.6.0 before 8.6.2, and from version 8.7.0 before 8.7.1. | [] | null | 6.5 | null | null |
|
CVE-2024-30050 | Windows Mark of the Web Security Feature Bypass Vulnerability | Windows Mark of the Web Security Feature Bypass Vulnerability | [
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*"
] | null | 5.4 | null | null |
CVE-2013-1822 | Multiple cross-site scripting (XSS) vulnerabilities in ownCloud 4.5.x before 4.5.8 allow remote authenticated users with administrator privileges to inject arbitrary web script or HTML via the (1) quota parameter to /core/settings/ajax/setquota.php, or remote authenticated users with group admin privileges to inject arbitrary web script or HTML via the (2) group field to settings.php or (3) "share with" field. | [
"cpe:2.3:a:owncloud:owncloud:4.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:4.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:4.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:4.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:4.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:4.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:4.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:4.5.7:*:*:*:*:*:*:*"
] | null | null | null | 2.1 |
|
GHSA-rrvv-g9v3-737h | A stack-based buffer overflow in Fortinet FortiWeb version 6.3.14 and below, 6.2.4 and below allows attacker to execute unauthorized code or commands via crafted parameters in CLI command execution | [] | null | null | null | null |
|
GHSA-gppm-h73v-3rx6 | Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 12.1, tvOS 12.1, watchOS 5.1, Safari 12.0.1, iTunes 12.9.1, iCloud for Windows 7.8. | [] | null | null | 8.8 | null |
|
GHSA-vjc4-8cmg-4xxh | A configuration issue in Indexhibit 2.1.5 allows authenticated attackers to modify .php files, leading to getshell. | [] | null | null | null | null |
|
GHSA-vm9x-63j8-h9j9 | SQL injection vulnerability in mod_auth_mysql.c in the mod-auth-mysql (aka libapache2-mod-auth-mysql) module for the Apache HTTP Server 2.x, when configured to use a multibyte character set that allows a \ (backslash) as part of the character encoding, allows remote attackers to execute arbitrary SQL commands via unspecified inputs in a login request. | [] | null | null | null | null |
|
CVE-2022-48363 | In MPD before 0.23.8, as used on Automotive Grade Linux and other platforms, the PipeWire output plugin mishandles a Drain call in certain situations involving truncated files. Eventually there is an assertion failure in libmpdclient because libqtappfw passes in a NULL pointer. | [
"cpe:2.3:a:linuxfoundation:automotive_grade_linux:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
|
CVE-2007-3286 | Multiple buffer overflows in unspecified ActiveX controls in COM objects in Avaya IP Softphone R5.2 before SP3, and R6.0, allow remote attackers to execute arbitrary code via unspecified vectors. | [
"cpe:2.3:a:avaya:ip_soft_phone:*:sp2:*:*:*:*:*:*",
"cpe:2.3:a:avaya:ip_soft_phone:6.0:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
CVE-2022-43393 | An improper check for unusual or exceptional conditions in the HTTP request processing function of Zyxel GS1920-24v2 firmware prior to V4.70(ABMH.8)C0, which could allow an unauthenticated attacker to corrupt the contents of the memory and result in a denial-of-service (DoS) condition on a vulnerable device. | [
"cpe:2.3:o:zyxel:gs1350-6hp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:gs1350-6hp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:gs1350-12hp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:gs1350-12hp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:gs1350-18hp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:gs1350-18hp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:gs1350-26hp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:gs1350-26hp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:gs1915-8_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:gs1915-8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:gs1915-8ep_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:gs1915-8ep:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:gs1915-24e_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:gs1915-24e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:gs1915-24ep_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:gs1915-24ep:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:gs1920-24v2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:gs1920-24v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:gs1920-48v2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:gs1920-48v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:gs1920-24hpv2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:gs1920-24hpv2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:gs1920-48hpv2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:gs1920-48hpv2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:gs2220-10_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:gs2220-10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:gs2220-28_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:gs2220-28:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:gs2220-50_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:gs2220-50:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:gs2220-10hp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:gs2220-10hp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:gs2220-28hp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:gs2220-28hp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:gs2220-50hp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:gs2220-50hp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:xgs1930-28_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:xgs1930-28:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:xgs1930-28hp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:xgs1930-28hp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:xgs1930-52_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:xgs1930-52:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:xgs1930-52hp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:xgs1930-52hp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:xs1930-10_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:xs1930-10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:xs1930-12hp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:xs1930-12hp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:xs1930-12f_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:xs1930-12f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:xgs2210-28_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:xgs2210-28:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:xgs2210-52_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:xgs2210-52:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:xgs2210-28hp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:xgs2210-28hp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:xgs2210-52hp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:xgs2210-52hp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:xgs2220-30_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:xgs2220-30:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:xgs2220-30hp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:xgs2220-30hp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:xgs2220-30f_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:xgs2220-30f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:xgs2220-54_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:xgs2220-54:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:xgs2220-54hp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:xgs2220-54hp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:xgs2220-54fp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:xgs2220-54fp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:xgs4600-32_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:xgs4600-32:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:xgs4600-32f_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:xgs4600-32f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:xgs4600-52f_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:xgs4600-52f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:xmg1930-30_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:xmg1930-30:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:xmg1930-30hp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:xmg1930-30hp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:xs3800-28_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:xs3800-28:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:mgs3500-24s_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:mgs3500-24s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:mgs3520-28_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:mgs3520-28_firmware:4.10\\(abqm.1\\)c0:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:mgs3520-28:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:mgs3520-28f_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:mgs3520-28f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:mgs3530-28_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:mgs3530-28_firmware:4.10\\(acfj.0\\)c0:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:mgs3530-28:-:*:*:*:*:*:*:*"
] | null | 8.2 | null | null |
|
CVE-2022-20190 | Product: AndroidVersions: Android kernelAndroid ID: A-208744915References: N/A | [
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | 7.8 |
|
GHSA-3qw6-xf3r-vm35 | Cross-site request forgery (CSRF) vulnerability in RunCMS 1.6.1 allows remote attackers to hijack the authentication of administrators for requests that (1) add new administrators or (2) modify user profiles via a crafted request to system/admin.php. | [] | null | null | null | null |
|
CVE-2016-4008 | The _asn1_extract_der_octet function in lib/decoding.c in GNU Libtasn1 before 4.8, when used without the ASN1_DECODE_FLAG_STRICT_DER flag, allows remote attackers to cause a denial of service (infinite recursion) via a crafted certificate. | [
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:libtasn1:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*"
] | null | null | 5.9 | 4.3 |
|
GHSA-9gfq-v95v-9hrx | The vds_installer in Red Hat Enterprise Virtualization Manager (RHEV-M) before 3.1, when adding a host, uses the -k curl parameter when downloading deployUtil.py and vds_bootstrap.py, which prevents SSL certificates from being validated and allows remote attackers to execute arbitrary Python code via a man-in-the-middle attack. | [] | null | null | null | null |
|
CVE-2004-0717 | Opera 7.51 for Windows and 7.50 for Linux does not properly prevent a frame in one domain from injecting content into a frame that belongs to another domain, which facilitates web site spoofing and other attacks, aka the frame injection vulnerability. | [
"cpe:2.3:a:opera:opera_browser:7.50:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.51:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2022-45083 | WordPress ProfilePress Plugin <= 4.3.2 is vulnerable to PHP Object Injection | Deserialization of Untrusted Data vulnerability in ProfilePress Membership Team Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content – ProfilePress.This issue affects Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content – ProfilePress: from n/a through 4.3.2.
| [
"cpe:2.3:a:properfraction:profilepress:*:*:*:*:*:wordpress:*:*"
] | null | 6.6 | null | null |
GHSA-2c5h-8vr9-5p47 | A vulnerability was found in FeiFeiCMS 2.7.130201. It has been classified as problematic. This affects an unknown part of the file \Public\system\slide_add.html of the component Extension Tool. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-223557 was assigned to this vulnerability. | [] | null | 5.4 | null | null |
|
CVE-2009-3059 | Multiple SQL injection vulnerabilities in Joker Board (aka JBoard) 2.0 and earlier allow remote attackers to execute arbitrary SQL commands via (1) core/select.php or (2) the city parameter to top_add.inc.php, reachable through sboard.php. | [
"cpe:2.3:a:allpublication:jboard:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2022-31163 | TZInfo relative path traversal vulnerability allows loading of arbitrary files | TZInfo is a Ruby library that provides access to time zone data and allows times to be converted using time zone rules. Versions prior to 0.36.1, as well as those prior to 1.2.10 when used with the Ruby data source tzinfo-data, are vulnerable to relative path traversal. With the Ruby data source, time zones are defined in Ruby files. There is one file per time zone. Time zone files are loaded with `require` on demand. In the affected versions, `TZInfo::Timezone.get` fails to validate time zone identifiers correctly, allowing a new line character within the identifier. With Ruby version 1.9.3 and later, `TZInfo::Timezone.get` can be made to load unintended files with `require`, executing them within the Ruby process. Versions 0.3.61 and 1.2.10 include fixes to correctly validate time zone identifiers. Versions 2.0.0 and later are not vulnerable. Version 0.3.61 can still load arbitrary files from the Ruby load path if their name follows the rules for a valid time zone identifier and the file has a prefix of `tzinfo/definition` within a directory in the load path. Applications should ensure that untrusted files are not placed in a directory on the load path. As a workaround, the time zone identifier can be validated before passing to `TZInfo::Timezone.get` by ensuring it matches the regular expression `\A[A-Za-z0-9+\-_]+(?:\/[A-Za-z0-9+\-_]+)*\z`. | [
"cpe:2.3:a:tzinfo_project:tzinfo:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
GHSA-gwp7-6x23-ww9g | Multiple "javascript vulerabilities in BB code" in BirdBlog before 1.3.1 allow remote attackers to inject arbitrary Javascript. | [] | null | null | null | null |
|
CVE-2013-4883 | Multiple cross-site scripting (XSS) vulnerabilities in McAfee ePolicy Orchestrator 4.6.6 and earlier, and the ePO Extension for the McAfee Agent (MA) 4.5 through 4.6, allow remote attackers to inject arbitrary web script or HTML via the (1) instanceId parameter core/loadDisplayType.do; (2) instanceId or (3) monitorUrl parameter to console/createDashboardContainer.do; uid parameter to (4) ComputerMgmt/sysDetPanelBoolPie.do or (5) ComputerMgmt/sysDetPanelSummary.do; (6) uid, (7) orion.user.security.token, or (8) ajaxMode parameter to ComputerMgmt/sysDetPanelQry.do; or (9) uid, (10) orion.user.security.token, or (11) ajaxMode parameter to ComputerMgmt/sysDetPanelSummary.do. | [
"cpe:2.3:a:mcafee:epolicy_orchestrator:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:epolicy_orchestrator:4.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:epolicy_orchestrator:4.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:epolicy_orchestrator:4.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:epolicy_orchestrator:4.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:epolicy_orchestrator:4.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:epolicy_orchestrator:4.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:epolicy_orchestrator_agent:4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:epolicy_orchestrator_agent:4.6:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2009-3133 | Microsoft Office Excel 2002 SP3, Office 2004 and 2008 for Mac, and Open XML File Format Converter for Mac allow remote attackers to execute arbitrary code via a spreadsheet containing a malformed object that triggers memory corruption, related to "loading Excel records," aka "Excel Document Parsing Memory Corruption Vulnerability." | [
"cpe:2.3:a:microsoft:compatibility_pack_word_excel_powerpoint:2007:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:compatibility_pack_word_excel_powerpoint:2007:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:excel:2002:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:excel:2003:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:excel:2007:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:excel:2007:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:excel_viewer:*:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:excel_viewer:*:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:excel_viewer:2003:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2004:*:mac:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2008:*:mac:*:*:*:*:*",
"cpe:2.3:a:microsoft:open_xml_file_format_converter:*:*:mac:*:*:*:*:*"
] | null | null | null | 9.3 |
|
GHSA-652h-xwhf-q4h6 | OS Command Injection in ssh2 | ssh2 is client and server modules written in pure JavaScript for node.js. In ssh2 before version 1.4.0 there is a command injection vulnerability. The issue only exists on Windows. This issue may lead to remote code execution if a client of the library calls the vulnerable method with untrusted input. This is fixed in version 1.4.0. | [] | null | 7.5 | null | null |
RHSA-2016:2082 | Red Hat Security Advisory: Red Hat Storage Console 2 security and bug fix update | rhscon-ceph: password leak by command line parameter | [
"cpe:/a:redhat:rhscon:2::el7"
] | null | null | 4.8 | null |
GHSA-rvh8-75gg-f2cc | Zohocorp ManageEngine ADAudit Plus versions below 8110 are vulnerable to authenticated SQL Injection in attack surface analyzer's dashboard. | [] | null | 8.3 | null | null |
|
CVE-2018-15710 | Nagios XI 5.5.6 allows local authenticated attackers to escalate privileges to root via Autodiscover_new.php. | [
"cpe:2.3:a:nagios:nagios_xi:5.5.6:*:*:*:*:*:*:*"
] | null | null | 7.8 | 7.2 |
|
GHSA-fx4x-h2gf-2w4f | Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK & Compiler before 20.0.0.204 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-8045, CVE-2015-8047, CVE-2015-8408, CVE-2015-8416, CVE-2015-8417, CVE-2015-8418, CVE-2015-8419, CVE-2015-8443, CVE-2015-8444, CVE-2015-8451, and CVE-2015-8455. | [] | null | null | null | null |
|
CVE-2022-2365 | Cross-site Scripting (XSS) - Stored in zadam/trilium | Cross-site Scripting (XSS) - Stored in GitHub repository zadam/trilium prior to 0.53.3. | [
"cpe:2.3:a:trilium_project:trilium:*:*:*:*:*:*:*:*"
] | null | null | 4 | null |
GHSA-4836-xwrp-jpv6 | Cross-site scripting (XSS) vulnerability in Open Ticket Request System (OTRS) Help Desk 2.4.x before 2.4.15, 3.0.x before 3.0.17, and 3.1.x before 3.1.11 allows remote attackers to inject arbitrary web script or HTML via an e-mail message body with whitespace before a javascript: URL in the SRC attribute of an element, as demonstrated by an IFRAME element. | [] | null | null | null | null |
|
cisco-sa-20180905-webex-pe | Cisco Webex Meetings Client for Windows Privilege Escalation Vulnerability | A vulnerability in the folder permissions of Cisco Webex Meetings client for Windows could allow an authenticated, local attacker to modify locally stored files and execute code on a targeted device with the privilege level of the user.
The vulnerability is due to folder permissions that grant a user the permission to read, write, and execute files in the Webex folders. An attacker could exploit this vulnerability to write malicious files to the Webex client directory, affecting all other users of the targeted device. A successful exploit could allow a user to execute commands with elevated privileges.
Attacks on single-user systems are less likely to occur, as the attack must be carried out by the user on the user's own system. Multiuser systems have a higher risk of exploitation because folder permissions have an impact on all users of the device. For an attacker to exploit this vulnerability successfully, a second user must execute the locally installed malicious file to allow remote code execution to occur.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180905-webex-pe ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180905-webex-pe"] | [] | null | null | 7.3 | null |
CVE-2017-15089 | It was found that the Hotrod client in Infinispan before 9.2.0.CR1 would unsafely read deserialized data on information from the cache. An authenticated attacker could inject a malicious object into the data cache and attain deserialization on the client, and possibly conduct further attacks. | [
"cpe:2.3:a:infinispan:infinispan:*:*:*:*:*:*:*:*",
"cpe:2.3:a:infinispan:infinispan:9.2.0:alpha1:*:*:*:*:*:*",
"cpe:2.3:a:infinispan:infinispan:9.2.0:alpha2:*:*:*:*:*:*",
"cpe:2.3:a:infinispan:infinispan:9.2.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:infinispan:infinispan:9.2.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:infinispan:infinispan:9.2.0:cr1:*:*:*:*:*:*"
] | null | null | 8.8 | 6.5 |
|
CVE-2021-23928 | OX App Suite through 7.10.3 allows XSS via the ajax/apps/manifests query string. | [
"cpe:2.3:a:open-xchange:open-xchange_appsuite:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 |
|
GHSA-26jj-qj2r-hxmv | Logical vulnerability in the mobile application (com.transsion.carlcare) may lead to user information leakage risks. | [] | null | 7.5 | null | null |
|
CVE-2011-1849 | tftpserver.exe in HP Intelligent Management Center (IMC) 5.0 before E0101L02 allows remote attackers to create or overwrite files, and subsequently execute arbitrary code, via a crafted WRQ request. | [
"cpe:2.3:a:hp:intelligent_management_center:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:5.0:e0101:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:5.0:e0101l01:*:*:*:*:*:*"
] | null | null | null | 10 |
|
CVE-2022-21460 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Logging). Supported versions that are affected are 5.7.37 and prior and 8.0.28 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data. CVSS 3.1 Base Score 4.4 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N). | [
"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*",
"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*"
] | null | 4.4 | null | null |
|
CVE-2018-5203 | DEXTUploadX5 version Between 1.0.0.0 and 2.2.0.0 contains a vulnerability that could allow remote attacker to download and execute remote arbitrary file by setting the arguments to the activex method. this can be leveraged for code execution. | [
"cpe:2.3:a:dextsolution:dextuploadx5:*:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 |
|
GHSA-xcc9-7f55-xfmj | In updateUidProcState of AppOpsService.java, there is a possible permission bypass due to a logic error. This could lead to local information disclosure of location data with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-148180766 | [] | null | null | null | null |
|
CVE-2024-3704 | SQL Injection vulnerability in OpenGnsys | SQL Injection Vulnerability has been found on OpenGnsys product affecting version 1.1.1d (Espeto). This vulnerability allows an attacker to inject malicious SQL code into login page to bypass it or even retrieve all the information stored in the database. | [
"cpe:2.3:a:opengnsys:opengnsys:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
CVE-2023-51390 | Information Disclosure Vulnerability in Journalpump | journalpump is a daemon that takes log messages from journald and pumps them to a given output. A logging vulnerability was found in journalpump which logs out the configuration of a service integration in plaintext to the supplied logging pipeline, including credential information contained in the configuration if any. The problem has been patched in journalpump 2.5.0. | [
"cpe:2.3:a:aiven:journalpump:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | null |
GHSA-4q2j-4mf3-x29x | Symantec Endpoint Protection, prior to 14.2 RU2, may be susceptible to an unsigned code execution vulnerability, which may allow an individual to execute code without a resident proper digital signature. | [] | null | null | null | null |
|
GHSA-v9qw-g4pq-87mj | Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an authenticated, remote attacker to execute arbitrary code on an affected device or cause the device to restart unexpectedly, resulting in a denial of service (DoS) condition. These vulnerabilities are due to insufficient validation of user fields within incoming HTTP packets. An attacker could exploit these vulnerabilities by sending a crafted request to the web-based management interface. A successful exploit could allow the attacker to execute arbitrary commands on an affected device with root-level privileges or to cause the device to restart unexpectedly, resulting in a DoS condition. To exploit these vulnerabilities, an attacker would need to have valid Administrator credentials on the affected device. Cisco has not released software updates that address these vulnerabilities. | [] | null | 7.2 | null | null |
|
GHSA-5rwf-hpx5-32g3 | SQL injection vulnerability in the JE Ajax Event Calendar (com_jeajaxeventcalendar) component 1.0.5 for Joomla! allows remote attackers to execute arbitrary SQL commands via the view parameter to index.php. | [] | null | null | null | null |
|
CVE-2016-6663 | Race condition in Oracle MySQL before 5.5.52, 5.6.x before 5.6.33, 5.7.x before 5.7.15, and 8.x before 8.0.1; MariaDB before 5.5.52, 10.0.x before 10.0.28, and 10.1.x before 10.1.18; Percona Server before 5.5.51-38.2, 5.6.x before 5.6.32-78-1, and 5.7.x before 5.7.14-8; and Percona XtraDB Cluster before 5.5.41-37.0, 5.6.x before 5.6.32-25.17, and 5.7.x before 5.7.14-26.17 allows local users with certain permissions to gain privileges by leveraging use of my_copystat by REPAIR TABLE to repair a MyISAM table. | [
"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"cpe:2.3:a:percona:percona_server:*:*:*:*:*:*:*:*",
"cpe:2.3:a:percona:xtradb_cluster:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:8.0:*:*:*:*:*:*:*"
] | null | null | 7 | 4.4 |
|
GHSA-g8hh-whpr-gfp2 | Squid before 2.3STABLE5 in HTTP accelerator mode does not enable access control lists (ACLs) when the httpd_accel_host and http_accel_with_proxy off settings are used, which allows attackers to bypass the ACLs and conduct unauthorized activities such as port scanning. | [] | null | null | null | null |
|
CVE-2012-3522 | Cross-site scripting (XSS) vulnerability in contrib/langwiz.php in GeSHi before 1.0.8.11 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | [
"cpe:2.3:a:qbnz:geshi:*:*:*:*:*:*:*:*",
"cpe:2.3:a:qbnz:geshi:1.0.8.4:*:*:*:*:*:*:*",
"cpe:2.3:a:qbnz:geshi:1.0.8.5:*:*:*:*:*:*:*",
"cpe:2.3:a:qbnz:geshi:1.0.8.6:*:*:*:*:*:*:*",
"cpe:2.3:a:qbnz:geshi:1.0.8.7:*:*:*:*:*:*:*",
"cpe:2.3:a:qbnz:geshi:1.0.8.8:*:*:*:*:*:*:*",
"cpe:2.3:a:qbnz:geshi:1.0.8.9:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2009-5021 | Cobbler before 1.6.1 does not properly determine whether an installation has the default password, which makes it easier for attackers to obtain access by using this password. | [
"cpe:2.3:a:michael_dehaan:cobbler:*:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:0.1.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:0.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:0.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:0.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:0.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:0.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:0.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:0.2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:0.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:0.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:0.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:0.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:0.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:0.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:0.3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:0.3.9:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:0.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:0.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:0.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:0.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:0.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:0.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:0.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:0.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:0.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:0.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:0.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:0.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:0.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:0.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:0.8.3:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:1.0.2-1:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:1.0.3-1:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:1.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:1.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:1.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:1.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:1.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:1.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:1.2.8-1:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:1.2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:1.2.9-1:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:1.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:1.3.1-1:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:1.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:1.3.3-1:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:1.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:1.3.4-1:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:1.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:1.4.0-2:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:1.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:1.4.1-1:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:1.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:1.4.2-1:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_dehaan:cobbler:1.4.3:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
RHSA-2016:0122 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.6 update on RHEL 6 | jakarta-taglibs-standard: XXE and RCE via XSL extension in JSTL XML tags | [
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el6"
] | null | null | 7.6 | null |
CVE-2021-34125 | An issue discovered in Yuneec Mantis Q and PX4-Autopilot v 1.11.3 and below allow attacker to gain access to sensitive information via various nuttx commands. | [
"cpe:2.3:a:dronecode:px4_drone_autopilot:*:*:*:*:*:*:*:*",
"cpe:2.3:o:yuneec:mantis_q_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:yuneec:mantis_q:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
|
GHSA-2rj6-jjxr-v6wr | NVIDIA Shield TV Experience prior to v8.0.1, NVIDIA Tegra software contains a vulnerability in the bootloader, where it does not validate the fields of the boot image, which may lead to code execution, denial of service, escalation of privileges, and information disclosure. | [] | null | null | null | null |
|
CVE-2021-46542 | Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via mjs_print at src/mjs_builtin.c. This vulnerability can lead to a Denial of Service (DoS). | [
"cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*"
] | null | 5.5 | null | 4.3 |
|
CVE-2022-30727 | Improper handling of insufficient permissions vulnerability in addAppPackageNameToAllowList in PersonaManagerService prior to SMR Jun-2022 Release 1 allows local attackers to set some setting value in work space. | [
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*"
] | null | 6.2 | null | null |
|
GHSA-vp4v-pgq4-9fhp | An issue found in Entetsu Store v.13.4.1 allows a remote attacker to gain access to sensitive information via the channel access token in the miniapp Entetsu Store function. | [] | null | 7.5 | null | null |
|
GHSA-px8f-pf56-946w | HP Security Manager is potentially vulnerable to Remote Code Execution as a result of code vulnerability within the product's solution open-source libraries. | [] | null | 9.8 | null | null |
|
GHSA-gvr6-vw53-xh39 | In Wireshark 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the Bazaar dissector could go into an infinite loop. This was addressed in epan/dissectors/packet-bzr.c by ensuring that backwards parsing cannot occur. | [] | null | null | 7.5 | null |
|
GHSA-c3jj-h8cx-frp8 | There is a buffer overflow vulnerability in CV81-WDM FW 01.70.49.29.46. Successful exploitation of this vulnerability may lead to privilege escalation. | [] | null | 9.8 | null | null |
|
GHSA-677p-wrj2-2cg2 | NVIDIA Jetson TX2 contains a vulnerability in the kernel driver where input/output control (IOCTL) handling for user mode requests could create a non-trusted pointer dereference, which may lead to information disclosure, denial of service, escalation of privileges, or code execution. The updates apply to all versions prior to R28.3. | [] | null | null | 7.8 | null |
|
CVE-2024-51758 | Exported files stored in default (`public`) filesystem if not reconfigured in filament | Filament is a collection of full-stack components for accelerated Laravel development. All Filament features that interact with storage use the `default_filesystem_disk` config option. This allows the user to easily swap their storage driver to something production-ready like `s3` when deploying their app, without having to touch multiple configuration options and potentially forgetting about some. The default disk is set to `public` when you first install Filament, since this allows users to quickly get started developing with a functional disk that allows features such as file upload previews locally without the need to set up an S3 disk with temporary URL support. However, some features of Filament such as exports also rely on storage, and the files that are stored contain data that should often not be public. This is not an issue for the many deployed applications, since many use a secure default disk such as S3 in production. However, [CWE-1188](https://cwe.mitre.org/data/definitions/1188.html) suggests that having the `public` disk as the default disk in Filament is a security vulnerability itself. As such, we have implemented a measure to protect users whereby if the `public` disk is set as the default disk, the exports feature will automatically swap it out for the `local` disk, if that exists. Users who set the default disk to `local` or `s3` already are not affected. If a user wants to continue to use the `public` disk for exports, they can by setting the export disk deliberately. This change has been included in the 3.2.123 release and all users who use the `public` disk are advised to upgrade. | [
"cpe:2.3:a:filament:excel_export:*:*:*:*:*:*:*:*"
] | 2.3 | null | null | null |
GHSA-pqp8-qh2v-v728 | The Secure Empty Trash feature in Finder in Apple OS X before 10.11 improperly deletes Trash files, which might allow local users to obtain sensitive information by reading storage media, as demonstrated by reading a flash drive. | [] | null | null | null | null |
|
CVE-2003-0025 | Multiple SQL injection vulnerabilities in IMP 2.2.8 and earlier allow remote attackers to perform unauthorized database activities and possibly gain privileges via certain database functions such as check_prefs() in db.pgsql, as demonstrated using mailbox.php3. | [
"cpe:2.3:a:horde:imp:2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:horde:imp:2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:horde:imp:2.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:horde:imp:2.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:horde:imp:2.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:horde:imp:2.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:horde:imp:2.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:horde:imp:2.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:horde:imp:2.2.8:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-6xrw-q954-8cqh | A stored cross-site scripting vulnerability exists in TCExam <= 14.8.1. Valid files uploaded via tce_filemanager.php with a filename beggining with a period will be rendered as text/html. An attacker with access to tce_filemanager.php could upload a malicious javascript payload which would be triggered when another user views the file. | [] | null | null | null | null |
|
GHSA-88x8-58wq-2gj5 | Certain NETGEAR devices are affected by command injection by an unauthenticated attacker. This affects CBR40 before 2.5.0.24, CBR750 before 4.6.3.6, RBK752 before 3.2.17.12, RBR750 before 3.2.17.12, RBS750 before 3.2.17.12, RBK852 before 3.2.17.12, RBR850 before 3.2.17.12, and RBS850 before 3.2.17.12. | [] | null | null | null | null |
|
CVE-2021-27269 | This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 10.1.0.37527. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of U3D objects in PDF files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated structure. An attacker can leverage this vulnerability to execute code in the context of the current process Was ZDI-CAN-12390. | [
"cpe:2.3:a:foxitsoftware:foxit_reader:*:*:*:*:*:*:*:*",
"cpe:2.3:a:foxitsoftware:phantompdf:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | null | 7.8 | null |
|
CVE-2020-26816 | SAP AS JAVA (Key Storage Service), versions - 7.10, 7.11, 7.20 ,7.30, 7.31, 7.40, 7.50, has the key material which is stored in the SAP NetWeaver AS Java Key Storage service stored in the database in the DER encoded format and is not encrypted. This enables an attacker who has administrator access to the SAP NetWeaver AS Java to decode the keys because of missing encryption and get some application data and client credentials of adjacent systems. This highly impacts Confidentiality as information disclosed could contain client credentials of adjacent systems. | [
"cpe:2.3:a:sap:netweaver_application_server_java:7.10:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_application_server_java:7.11:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_application_server_java:7.20:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_application_server_java:7.30:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_application_server_java:7.31:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_application_server_java:7.40:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_application_server_java:7.50:*:*:*:*:*:*:*"
] | null | null | 5.4 | null |
|
GHSA-xvc4-7pr5-9qg4 | Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N). | [] | null | 3.1 | null | null |
|
GHSA-629c-j867-3v45 | Malicious Package in bitcoisnj-lib | All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.RecommendationAny computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | [] | null | 9.1 | null | null |
RHSA-2020:3756 | Red Hat Security Advisory: librepo security update | librepo: missing path validation in repomd.xml may lead to directory traversal | [
"cpe:/o:redhat:rhel_e4s:8.0::baseos"
] | null | 8 | null | null |
GHSA-vcrv-vj6h-fr9c | cPanel before 82.0.15 allows self XSS in the SSL Key Delete interface (SEC-526). | [] | null | null | null | null |
|
CVE-2025-30801 | WordPress TWB Woocommerce Reviews plugin <= 1.7.7 - Cross Site Request Forgery (CSRF) vulnerability | Cross-Site Request Forgery (CSRF) vulnerability in Abu Bakar TWB Woocommerce Reviews allows Cross Site Request Forgery. This issue affects TWB Woocommerce Reviews: from n/a through 1.7.7. | [] | null | 4.3 | null | null |
GHSA-cfp2-gfv9-jqxx | The WordPress Google Map Professional (Map In Your Language) WordPress plugin through 1.0 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin. | [] | null | 6.1 | null | null |
|
CVE-2007-5331 | Queue.dll for the message queuing service (LQserver.exe) in CA BrightStor ARCServe BackUp v9.01 through R11.5, and Enterprise Backup r10.5, allows remote attackers to execute arbitrary code via a malformed ONRPC protocol request for operation 0x76, which causes ARCserve Backup to dereference arbitrary pointers. | [
"cpe:2.3:a:broadcom:brightstor_arcserve_backup:9.01:*:*:*:*:*:*:*",
"cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:*:*:*:*:*:*",
"cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.5:*:*:*:*:*:*:*",
"cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.5:*:*:*:*:*:*:*",
"cpe:2.3:a:broadcom:business_protection_suite:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:broadcom:server_protection_suite:2:*:*:*:*:*:*:*",
"cpe:2.3:a:ca:brightstor_arcserve_backup:11:*:windows:*:*:*:*:*",
"cpe:2.3:a:ca:business_protection_suite:2.0:*:microsoft_small_business_server_premium:*:*:*:*:*",
"cpe:2.3:a:ca:business_protection_suite:2.0:*:microsoft_small_business_server_standard:*:*:*:*:*"
] | null | null | null | 10 |
|
GHSA-6gfj-9c5p-w3pw | Cisco Small Business 220 devices with firmware before 1.0.1.1 have a hardcoded SNMP community, which allows remote attackers to read or modify SNMP objects by leveraging knowledge of this community, aka Bug ID CSCuz76216. | [] | null | null | 9.8 | null |
|
CVE-2024-5408 | Cross-site Scripting vulnerability in RhinOS from SaltOS | Vulnerability in RhinOS 3.0-1190 consisting of an XSS through the "search" parameter of /portal/search.htm. This vulnerability could allow a remote attacker to steal details of a victim's user session by submitting a specially crafted URL. | [] | null | 7.1 | null | null |
CVE-2010-4178 | MySQL-GUI-tools (mysql-administrator) leaks passwords into process list after with launch of mysql text console | [
"cpe:2.3:a:oracle:mysql-gui-tools:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:12:*:*:*:*:*:*:*"
] | null | 5.5 | null | 2.1 |
|
GHSA-69r6-jccq-6m9h | Absolute path traversal vulnerability in includes/functions_portal.php in IntegraMOD Portal 2.x and earlier, when magic_quotes_gpc is disabled, allows remote attackers to read arbitrary files via an absolute pathname in the phpbb_root_path parameter. | [] | null | null | null | null |
|
CVE-2015-3801 | The document.cookie API implementation in the CFNetwork Cookies subsystem in WebKit in Apple iOS before 9 allows remote attackers to bypass an intended single-cookie restriction via unspecified vectors. | [
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-6263-577f-x76p | lib/Locale/Po4a/Po.pm in po4a before 0.32 allows local users to overwrite arbitrary files via a symlink attack on the gettextization.failed.po temporary file. | [] | null | null | null | null |
|
GHSA-h877-88g5-8mh5 | Cross-site scripting (XSS) vulnerability in IBM Content Navigator 2.x before 2.0.2.2-ICN-FP002 allows remote authenticated users to inject arbitrary web script or HTML via an unspecified parameter. | [] | null | null | null | null |
|
CVE-2019-1391 | A denial of service vulnerability exists when Windows improperly handles objects in memory, aka 'Windows Denial of Service Vulnerability'. This CVE ID is unique from CVE-2018-12207. | [
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
] | null | 5.5 | null | 4.9 |
|
RHSA-2024:4173 | Red Hat Security Advisory: Red Hat build of Cryostat 3.0.0: new RHEL 8 container image security update | bc-java: BouncyCastle vulnerable to a timing variant of Bleichenbacher (Marvin Attack) | [
"cpe:/a:redhat:cryostat:3::el8"
] | null | 5.9 | null | null |
GHSA-f729-m528-5h64 | This issue was addressed with improved validation of symlinks. This issue is fixed in macOS Ventura 13.7.1, macOS Sonoma 14.7.1. A malicious app may be able to create symlinks to protected regions of the disk. | [] | null | 5.5 | null | null |
|
GHSA-gw7g-cgfh-x45p | Buffer overflow in Firewall Authentication Proxy for FTP and/or Telnet Sessions for Cisco IOS 12.2ZH and 12.2ZL, 12.3 and 12.3T, and 12.4 and 12.4T allows remote attackers to cause a denial of service and possibly execute arbitrary code via crafted user authentication credentials. | [] | null | null | null | null |
|
GHSA-w9mh-mv37-65p8 | IBM Security Verify Governance 10.0.2 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. | [] | null | 5.4 | null | null |
|
CVE-2025-23478 | WordPress Photo Video Store plugin <= 21.07 - Reflected Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Photo Video Store allows Reflected XSS. This issue affects Photo Video Store: from n/a through 21.07. | [] | null | 7.1 | null | null |
CVE-2017-12608 | A vulnerability in Apache OpenOffice Writer DOC file parser before 4.1.4, and specifically in ImportOldFormatStyles, allows attackers to craft malicious documents that cause denial of service (memory corruption and application crash) potentially resulting in arbitrary code execution. | [
"cpe:2.3:a:apache:openoffice:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
] | null | 7.8 | null | 6.8 |
|
CVE-2018-18657 | An issue was discovered in Arcserve Unified Data Protection (UDP) through 6.5 Update 4. There is a DDI-VRT-2018-18 Unauthenticated Sensitive Information Disclosure via /gateway/services/EdgeServiceImpl issue. | [
"cpe:2.3:a:arcserve:udp:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:arcserve:udp:6.0:1:*:*:*:*:*:*",
"cpe:2.3:a:arcserve:udp:6.0:2:*:*:*:*:*:*",
"cpe:2.3:a:arcserve:udp:6.0:3:*:*:*:*:*:*",
"cpe:2.3:a:arcserve:udp:6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:arcserve:udp:6.5:1:*:*:*:*:*:*",
"cpe:2.3:a:arcserve:udp:6.5:2:*:*:*:*:*:*",
"cpe:2.3:a:arcserve:udp:6.5:3:*:*:*:*:*:*",
"cpe:2.3:a:arcserve:udp:6.5:4:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
CVE-2017-11538 | When ImageMagick 7.0.6-1 processes a crafted file in convert, it can lead to a Memory Leak in the WriteOnePNGImage() function in coders/png.c. | [
"cpe:2.3:a:imagemagick:imagemagick:7.0.6-1:*:*:*:*:*:*:*"
] | null | null | 6.5 | 4.3 |
|
CVE-2021-24125 | Contact Form Submissions < 1.7.1 - Authenticated SQL Injection | Unvalidated input in the Contact Form Submissions WordPress plugin before 1.7.1, could lead to SQL injection in the wpcf7_contact_form GET parameter when submitting a filter request as a high privilege user (admin+) | [
"cpe:2.3:a:contact_form_submissions_project:contact_form_submissions:*:*:*:*:*:wordpress:*:*"
] | null | 7.2 | null | 6.5 |
CVE-2019-8599 | A logic issue was addressed with improved restrictions. This issue is fixed in iOS 12.3. A person with physical access to an iOS device may be able to see the email address used for iTunes. | [
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"
] | null | 2.4 | null | 2.1 |
|
GHSA-x73w-g8hx-v7rp | Code injection in electerm | An issue was discovered in Electerm 1.3.22, allows attackers to execute arbitrary code via unverified request to electerms service. | [] | null | 9.8 | null | null |
GHSA-qfrv-fmc5-hmmh | Ember ZNet between v7.2.0 and v7.4.0 used software AES-CCM instead of integrated hardware cryptographic accelerators, potentially increasing risk of electromagnetic and differential power analysis sidechannel attacks. | [] | null | 6.2 | null | null |
|
GHSA-3m7x-5crf-j7qc | Multiple cross-site scripting (XSS) vulnerabilities in vtiger CRM 4.2.4, and possibly earlier, allow remote attackers to inject arbitrary web script or HTML via the (1) description parameter in unspecified modules or the (2) solution parameter in the HelpDesk module. | [] | null | null | null | null |
|
GHSA-5rw6-vf4w-p4j3 | Use after free in WebRTC in Google Chrome prior to 114.0.5735.133 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) | [] | null | 8.8 | null | null |
|
GHSA-2h6w-rcrp-4x6j | An elevation of privilege vulnerability exists when Windows Mobile Device Management (MDM) Diagnostics improperly handles junctions, aka 'Windows Mobile Device Management Diagnostics Elevation of Privilege Vulnerability'. | [] | null | null | null | null |
|
GHSA-54v6-qx46-f6g6 | Unrestricted file upload vulnerability in NetArt Media Car Portal 3.0 allows remote attackers to execute arbitrary PHP code by uploading a file a double extension, as demonstrated by .php%00.jpg. | [] | null | null | null | null |
|
GHSA-5q86-fgf8-6xg8 | SQL injection vulnerability in vb_board_functions.php in MKPortal 1.1, as used with vBulletin 3.5.4 and earlier, allows remote attackers to execute arbitrary SQL commands via the userid parameter. | [] | null | null | null | null |
|
GHSA-g93m-hx8j-2qmq | This HTTP Headers WordPress plugin before 1.18.11 allows arbitrary data to be written to arbitrary files, leading to a Remote Code Execution vulnerability. | [] | null | 7.2 | null | null |
|
CVE-2022-35916 | Cross chain utilities for Arbitrum L2 see EOA calls as cross chain calls | OpenZeppelin Contracts is a library for secure smart contract development. Contracts using the cross chain utilities for Arbitrum L2, `CrossChainEnabledArbitrumL2` or `LibArbitrumL2`, will classify direct interactions of externally owned accounts (EOAs) as cross chain calls, even though they are not started on L1. This issue has been patched in v4.7.2. Users are advised to upgrade. There are no known workarounds for this issue. | [
"cpe:2.3:a:openzeppelin:contracts:*:*:*:*:*:node.js:*:*",
"cpe:2.3:a:openzeppelin:contracts_upgradeable:*:*:*:*:*:node.js:*:*"
] | null | 5.3 | null | null |
CVE-2020-14484 | OpenClinic GA versions 5.09.02 and 5.89.05b may allow an attacker to bypass the system’s account lockout protection, which may allow brute force password attacks. | [
"cpe:2.3:a:openclinic_ga_project:openclinic_ga:5.09.02:*:*:*:*:*:*:*",
"cpe:2.3:a:openclinic_ga_project:openclinic_ga:5.89.05b:*:*:*:*:*:*:*"
] | null | 9.8 | null | 5 |
|
RHSA-2011:0144 | Red Hat Security Advisory: Red Hat Enterprise Linux Extended Update Support 5.4 6-Month EOL Notice | This is the 6-month notification of the End Of Life plans for Red Hat
Enterprise Linux Extended Update Support Add-On (EUS) 5.4. | [
"cpe:/o:redhat:rhel_eus:5.4"
] | null | null | null | null |
RHSA-2020:4951 | Red Hat Security Advisory: freetype security update | freetype: Heap-based buffer overflow due to integer truncation in Load_SBit_Png | [
"cpe:/o:redhat:rhel_eus:8.2::baseos"
] | null | 8.6 | null | null |
Subsets and Splits