id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-5r2p-47vm-6fh9 | IBM Engineering Lifecycle Optimization 7.0.2 and 7.0.3 is vulnerable to HTTP header injection, caused by improper validation of input by the HOST headers. This could allow an attacker to conduct various attacks against the vulnerable system, including cross-site scripting, cache poisoning or session hijacking. IBM X-Force ID: 268754. | [] | null | 5.1 | null | null |
|
CVE-2023-27237 | LavaLite CMS v 9.0.0 was discovered to be vulnerable to a host header injection attack. | [
"cpe:2.3:a:lavalite:lavalite:9.0.0:*:*:*:*:*:*:*"
] | null | 6.1 | null | null |
|
GHSA-6q82-84qc-99r9 | In sensor driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service in kernel. | [] | null | 5.5 | null | null |
|
RHSA-2016:1087 | Red Hat Security Advisory: Red Hat JBoss Web Server 3.0.3 update | tomcat: directory disclosure tomcat: Session fixation tomcat: CSRF token leak tomcat: security manager bypass via StatusManagerServlet tomcat: Security Manager bypass via persistence mechanisms tomcat: security manager bypass via setGlobalContext() | [
"cpe:/a:redhat:jboss_enterprise_web_server:3.0::el6"
] | null | null | 6.3 | null |
CVE-2009-2947 | Cross-site scripting (XSS) vulnerability in Xapian Omega before 1.0.16 allows remote attackers to inject arbitrary web script or HTML via unspecified CGI parameter values, which are sometimes included in exception messages. | [
"cpe:2.3:a:xapian:omega:*:*:*:*:*:*:*:*",
"cpe:2.3:a:xapian:omega:0.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:xapian:omega:0.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:xapian:omega:0.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:xapian:omega:0.8.3:*:*:*:*:*:*:*",
"cpe:2.3:a:xapian:omega:0.8.4:*:*:*:*:*:*:*",
"cpe:2.3:a:xapian:omega:0.8.5:*:*:*:*:*:*:*",
"cpe:2.3:a:xapian:omega:0.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:xapian:omega:0.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:xapian:omega:0.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:xapian:omega:0.9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:xapian:omega:0.9.4:*:*:*:*:*:*:*",
"cpe:2.3:a:xapian:omega:0.9.5:*:*:*:*:*:*:*",
"cpe:2.3:a:xapian:omega:0.9.6:*:*:*:*:*:*:*",
"cpe:2.3:a:xapian:omega:0.9.7:*:*:*:*:*:*:*",
"cpe:2.3:a:xapian:omega:0.9.8:*:*:*:*:*:*:*",
"cpe:2.3:a:xapian:omega:0.9.9:*:*:*:*:*:*:*",
"cpe:2.3:a:xapian:omega:0.9.10:*:*:*:*:*:*:*",
"cpe:2.3:a:xapian:omega:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:xapian:omega:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:xapian:omega:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:xapian:omega:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:xapian:omega:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:xapian:omega:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:xapian:omega:1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:xapian:omega:1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:xapian:omega:1.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:xapian:omega:1.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:xapian:omega:1.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:xapian:omega:1.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:xapian:omega:1.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:xapian:omega:1.0.14:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-gq9w-xhj4-qh3r | Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.7.18 and earlier. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | [] | null | null | 4.9 | null |
|
GHSA-899x-jhm8-pc3m | Off-by-one buffer overflow in _xlate_ascii_write() in ProFTPD 1.2.7 through 1.2.9rc2p allows local users to gain privileges via a 1024 byte RETR command. | [] | null | 7.8 | null | null |
|
GHSA-w2ph-8pcw-pr59 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in kagla GNUPress allows Reflected XSS. This issue affects GNUPress: from n/a through 0.2.9. | [] | null | 7.1 | null | null |
|
RHSA-2024:0386 | Red Hat Security Advisory: kpatch-patch security update | kernel: net/sched: sch_hfsc UAF kernel: use after free in nvmet_tcp_free_crypto in NVMe kernel: IGB driver inadequate buffer size for frames larger than MTU | [
"cpe:/o:redhat:rhel_eus:9.0::baseos"
] | null | 7.5 | null | null |
CVE-2017-14384 | In Dell Storage Manager versions earlier than 16.3.20, the EMConfigMigration service is affected by a directory traversal vulnerability. A remote malicious user could potentially exploit this vulnerability to read unauthorized files by supplying specially crafted strings in input parameters of the application. A malicious user cannot delete or modify any files via this vulnerability. | [
"cpe:2.3:a:dell:storage_manager:*:*:*:*:*:*:*:*"
] | null | null | 6.5 | 4 |
|
CVE-2022-0107 | Use after free in File Manager API in Google Chrome on Chrome OS prior to 97.0.4692.71 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.8 |
|
cisco-sa-20181107-ems-csrf | Cisco Energy Management Suite Cross-Site Request Forgery Vulnerability | A vulnerability in the web-based management interface of Cisco Energy Management Suite Software could allow an authenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack and perform arbitrary actions on an affected device.
The vulnerability is due to insufficient CSRF protections for the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading an authenticated user of the interface to follow a crafted link. A successful exploit could allow the attacker to perform arbitrary actions on a targeted device via a web browser and with the privileges of the user.
There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-ems-csrf ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-ems-csrf"] | [] | null | null | 6.3 | null |
CVE-2023-5627 | Incorrect Implementation of Authentication Algorithm Vulnerability | A vulnerability has been identified in NPort 6000 Series, making the authentication mechanism vulnerable. This vulnerability arises from the incorrect implementation of sensitive information protection, potentially allowing malicious users to gain unauthorized access to the web service.
| [
"cpe:2.3:a:moxa:nport_6000:*:*:*:*:*:*:*:*",
"cpe:2.3:o:moxa:nport_6150-t_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:nport_6150-t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:moxa:nport_6150_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:nport_6150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:moxa:nport_6250-m-sc-t_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:nport_6250-m-sc-t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:moxa:nport_6250-m-sc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:nport_6250-m-sc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:moxa:nport_6250-s-sc-t_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:nport_6250-s-sc-t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:moxa:nport_6250-s-sc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:nport_6250-s-sc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:moxa:nport_6250-t_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:nport_6250-t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:moxa:nport_6250_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:nport_6250:-:*:*:*:*:*:*:*",
"cpe:2.3:o:moxa:nport_6450-t_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:nport_6450-t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:moxa:nport_6450_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:nport_6450:-:*:*:*:*:*:*:*",
"cpe:2.3:o:moxa:nport_6610-16-48v_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:nport_6610-16-48v:-:*:*:*:*:*:*:*",
"cpe:2.3:o:moxa:nport_6610-16_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:nport_6610-16:-:*:*:*:*:*:*:*",
"cpe:2.3:o:moxa:nport_6610-32-48v_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:nport_6610-32-48v:-:*:*:*:*:*:*:*",
"cpe:2.3:o:moxa:nport_6610-32_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:nport_6610-32:-:*:*:*:*:*:*:*",
"cpe:2.3:o:moxa:nport_6610-8-48v_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:nport_6610-8-48v:-:*:*:*:*:*:*:*",
"cpe:2.3:o:moxa:nport_6610-8_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:nport_6610-8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:moxa:nport_6650-16-48v_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:nport_6650-16-48v:-:*:*:*:*:*:*:*",
"cpe:2.3:o:moxa:nport_6650-16-hv-t_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:nport_6650-16-hv-t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:moxa:nport_6650-16-t_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:nport_6650-16-t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:moxa:nport_6650-16_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:nport_6650-16:-:*:*:*:*:*:*:*",
"cpe:2.3:o:moxa:nport_6650-32-48v_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:nport_6650-32-48v:-:*:*:*:*:*:*:*",
"cpe:2.3:o:moxa:nport_6650-32-hv-t_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:nport_6650-32-hv-t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:moxa:nport_6650-32_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:nport_6650-32:-:*:*:*:*:*:*:*",
"cpe:2.3:o:moxa:nport_6650-8-48v_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:nport_6650-8-48v:-:*:*:*:*:*:*:*",
"cpe:2.3:o:moxa:nport_6650-8-hv-t_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:nport_6650-8-hv-t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:moxa:nport_6650-8-t_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:nport_6650-8-t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:moxa:nport_6650-8_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:nport_6650-8:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
RHSA-2020:3389 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: buffer overflow in mwifiex_cmd_append_vsie_tlv function in drivers/net/wireless/marvell/mwifiex/scan.c kernel: heap-based buffer overflow in mwifiex_ret_wmm_get_status function in drivers/net/wireless/marvell/mwifiex/wmm.c | [
"cpe:/a:redhat:enterprise_mrg:2:server:el6"
] | null | 7.1 | null | null |
GHSA-4mg4-2vjx-5ch2 | An information leak in hirochanKAKIwaiting v13.6.1 allows attackers to obtain the channel access token and send crafted messages. | [] | null | 7.5 | null | null |
|
CVE-2010-1094 | SQL injection vulnerability in news.php in DZ EROTIK Auktionshaus V4rgo allows remote attackers to execute arbitrary SQL commands via the id parameter. | [
"cpe:2.3:a:miethner-scripting:dz_erotik_auktionshaus_v4rgo:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-hjqr-c6q5-j324 | A vulnerability has been discovered in BigProf Online Clinic Management System 2.2, which does not sufficiently encode user-controlled input, resulting in persistent XSS through /clinic/events_view.php, in the FirstRecord parameter. Exploitation of this vulnerability could allow an attacking user to store dangerous JavaScript payloads on the system that will be triggered when the page loads. | [] | null | 6.3 | null | null |
|
CVE-2019-6973 | Sricam IP CCTV cameras are vulnerable to denial of service via multiple incomplete HTTP requests because the web server (based on gSOAP 2.8.x) is configured for an iterative queueing approach (aka non-threaded operation) with a timeout of several seconds. | [
"cpe:2.3:a:genivia:gsoap:2.8.0:*:*:*:*:*:*:*",
"cpe:2.3:h:sricam:nvs001:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sricam:sh016:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sricam:sh024:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sricam:sh026:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sricam:sh027:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sricam:sp007:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sricam:sp008:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sricam:sp009:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sricam:sp012:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sricam:sp015:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sricam:sp017:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sricam:sp018:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sricam:sp019:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sricam:sp020:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sricam:sp023:-:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
GHSA-q87g-x228-95pp | Unknown vulnerability in the (1) AgentX dissector, (2) PER dissector, (3) DOCSIS dissector, (4) SCTP graphs, (5) HTTP dissector, (6) DCERPC, (7) DHCP, (8) RADIUS dissector, (9) Telnet dissector, (10) IS-IS LSP dissector, or (11) NCP dissector in Ethereal 0.8.19 through 0.10.11 allows remote attackers to cause a denial of service (application crash or abort) via unknown attack vectors. | [] | null | null | null | null |
|
CVE-2008-1157 | Cisco CiscoWorks Internetwork Performance Monitor (IPM) 2.6 creates a process that executes a command shell and listens on a randomly chosen TCP port, which allows remote attackers to execute arbitrary commands. | [
"cpe:2.3:a:cisco:ciscoworks_internetwork_performance_monitor:2.6:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
CVE-2014-0733 | The Enterprise License Manager (ELM) component in Cisco Unified Communications Manager (Unified CM) 10.0(1) and earlier does not properly enforce authentication requirements, which allows remote attackers to read ELM files via a direct request to a URL, aka Bug ID CSCum46494. | [
"cpe:2.3:a:cisco:unified_communications_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:3.3\\(5\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:3.3\\(5\\)sr1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:3.3\\(5\\)sr2a:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:4.1\\(3\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:4.1\\(3\\)sr1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:4.1\\(3\\)sr2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:4.1\\(3\\)sr3:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:4.1\\(3\\)sr4:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:4.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:4.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:4.2.3sr1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:4.2.3sr2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:4.2.3sr2b:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:10.0:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-9ccq-7hvh-cv7p | If an application encounters a fatal protocol error and then calls SSL_shutdown() twice (once to send a close_notify, and once to receive one) then OpenSSL can respond differently to the calling application if a 0 byte record is received with invalid padding compared to if a 0 byte record is received with an invalid MAC. If the application then behaves differently based on that in a way that is detectable to the remote peer, then this amounts to a padding oracle that could be used to decrypt data. In order for this to be exploitable "non-stitched" ciphersuites must be in use. Stitched ciphersuites are optimised implementations of certain commonly used ciphersuites. Also the application must call SSL_shutdown() twice even if a protocol error has occurred (applications should not do this but some do anyway). Fixed in OpenSSL 1.0.2r (Affected 1.0.2-1.0.2q). | [] | null | 5.9 | null | null |
|
GHSA-5ph4-hc7j-m32j | RSA Authentication Manager versions prior to 8.4 P10 contain a stored cross-site scripting vulnerability in the Security Console. A malicious RSA Authentication Manager Security Console administrator with advanced privileges could exploit this vulnerability to store arbitrary HTML or JavaScript code through the Security Console web interface. When other Security Console administrators open the affected report page, the injected scripts could potentially be executed in their browser. | [] | null | 4.8 | null | null |
|
GHSA-rhqw-486f-x8rq | Improper Control of Generation of Code ('Code Injection') vulnerability in BinaryStash WP Booklet.This issue affects WP Booklet: from n/a through 2.1.8. | [] | null | 8.5 | null | null |
|
CVE-2014-3628 | Cross-site scripting (XSS) vulnerability in the Admin UI Plugin / Stats page in Apache Solr 4.x before 4.10.3 allows remote attackers to inject arbitrary web script or HTML via the fieldvaluecache object. | [
"cpe:2.3:a:apache:solr:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:solr:4.0.0:alpha:*:*:*:*:*:*",
"cpe:2.3:a:apache:solr:4.0.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:apache:solr:4.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:solr:4.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:solr:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:solr:4.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:solr:4.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:solr:4.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:solr:4.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:solr:4.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:solr:4.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:solr:4.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:solr:4.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:solr:4.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:solr:4.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:solr:4.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:solr:4.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:solr:4.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:solr:4.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:solr:4.10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:solr:4.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:solr:4.10.2:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2023-0973 | Step Tools Third-Party |
STEPTools v18SP1 ifcmesh library (v18.1) is affected due to a null pointer dereference, which could allow an attacker to deny application usage when reading a specially constructed file, resulting in an application crash.
| [
"cpe:2.3:a:steptools:ifcmesh_library:*:*:*:*:*:*:*:*"
] | null | 2.2 | null | null |
GHSA-4c78-fxq8-6rxg | The IsDriveLetterAvailable method in Driver/Ntdriver.c in TrueCrypt 7.0, VeraCrypt before 1.15, and CipherShed, when running on Windows, does not properly validate drive letter symbolic links, which allows local users to mount an encrypted volume over an existing drive letter and gain privileges via an entry in the /GLOBAL?? directory. | [] | null | null | 7.8 | null |
|
GHSA-v3cp-jj5w-cffv | An issue was discovered on Samsung mobile devices with O(8.x), P(9.0), and Q(10.0) software. The system area allows arbitrary file overwrites via a symlink attack. The Samsung ID is SVE-2020-17183 (June 2020). | [] | null | null | null | null |
|
RHSA-2007:1165 | Red Hat Security Advisory: libexif security update | libexif infinite recursion flaw (DoS) libexif integer overflow | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
CVE-2014-7655 | The Dresden Transport Museum (aka de.appack.project.vmd) application 2.2 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [
"cpe:2.3:a:verkehrsmuseum-dresden:dresden_transport_museum:2.2:*:*:*:*:android:*:*"
] | null | null | null | 5.4 |
|
GHSA-mjcr-h6w7-xcx6 | A vulnerability in GitLab CE/EE affecting all versions from 11.3.4 prior to 15.1.5, 15.2 to 15.2.3, 15.3 to 15.3 to 15.3.1 allows an an authenticated user to achieve remote code execution via the Import from GitHub API endpoint | [] | null | 9.9 | null | null |
|
CVE-2014-6152 | Multiple cross-site scripting (XSS) vulnerabilities in IBM Tivoli Integrated Portal (TIP) 2.2.x allow remote authenticated users to inject arbitrary web script or HTML via unspecified vectors. | [
"cpe:2.3:a:ibm:tivoli_integrated_portal:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_integrated_portal:2.2:*:*:*:*:*:*:*"
] | null | null | null | 3.5 |
|
CVE-2016-3318 | Microsoft Office 2007 SP3, 2010 SP2, 2013 SP1, and 2013 RT SP1 allow remote attackers to execute arbitrary code via a crafted file, aka "Graphics Component Memory Corruption Vulnerability." | [
"cpe:2.3:a:microsoft:office:2007:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2010:sp2:x64:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2010:sp2:x86:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2013:sp1:*:*:*:*:*:*"
] | null | null | 7.8 | 9.3 |
|
CVE-2004-1163 | Cisco CNS Network Registrar Central Configuration Management (CCM) server 6.0 through 6.1.1.3 allows remote attackers to cause a denial of service (CPU consumption) by ending a connection after sending a certain sequence of packets. | [
"cpe:2.3:a:cisco:cns_network_registrar:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:cns_network_registrar:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:cns_network_registrar:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:cns_network_registrar:6.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:cns_network_registrar:6.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:cns_network_registrar:6.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:cns_network_registrar:6.0.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:cns_network_registrar:6.0.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:cns_network_registrar:6.0.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:cns_network_registrar:6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:cns_network_registrar:6.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:cns_network_registrar:6.1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:cns_network_registrar:6.1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:cns_network_registrar:6.1.1.3:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2008-1262 | The administration panel on the Airspan WiMax ProST 4.1 antenna with 6.5.38.0 software does not verify authentication credentials, which allows remote attackers to (1) upload malformed firmware or (2) bind the antenna to a different WiMAX base station via unspecified requests to forms under process_adv/. | [
"cpe:2.3:h:airspan:wimax_prost:4.1:*:6.5.38.0:*:*:*:*:*"
] | null | null | null | 10 |
|
CVE-2024-21204 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: PS). Supported versions that are affected are 8.4.0 and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | [
"cpe:2.3:a:oracle:mysql_server:8.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql_server:9.0.1_and_prior:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:8.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:9.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:9.0.1:*:*:*:*:*:*:*"
] | null | 4.9 | null | null |
|
GHSA-hw3g-x69p-f6rq | The Easy Social Feed – Social Photos Gallery – Post Feed – Like Box plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'efb_likebox' shortcode in all versions up to, and including, 6.5.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] | null | 6.4 | null | null |
|
CVE-2021-34925 | This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View 10.15.0.75. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of JT files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14903. | [
"cpe:2.3:a:bentley:bentley_view:*:*:*:*:*:*:*:*",
"cpe:2.3:a:bentley:microstation:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | null |
|
CVE-2017-13800 | An issue was discovered in certain Apple products. macOS before 10.13.1 is affected. The issue involves the "APFS" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app. | [
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | 9.3 |
|
GHSA-52cw-mfvg-73mg | Furbo dog camera has insufficient filtering for special parameter of device log management function. An unauthenticated remote attacker in the Bluetooth network with normal user privileges can exploit this vulnerability to perform command injection attack to execute arbitrary system commands or disrupt service. | [] | null | 8.8 | null | null |
|
CVE-2006-6504 | Mozilla Firefox 2.x before 2.0.0.1, 1.5.x before 1.5.0.9, and SeaMonkey before 1.0.7 allows remote attackers to execute arbitrary code by appending an SVG comment DOM node to another type of document, which triggers memory corruption. | [
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:5.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
GHSA-r3x5-r85c-grp5 | In dotCMS 5.x-22.06, it is possible to call the TempResource multiple times, each time requesting the dotCMS server to download a large file. If done repeatedly, this will result in Tomcat request-thread exhaustion and ultimately a denial of any other requests. | [] | null | 5.3 | null | null |
|
GHSA-cq4c-8hpc-gx3j | Missing Authorization vulnerability in Avirtum Vision Interactive.This issue affects Vision Interactive: from n/a through 1.7.1. | [] | null | 5.3 | null | null |
|
CVE-2021-31936 | Microsoft Accessibility Insights for Web Information Disclosure Vulnerability | Microsoft Accessibility Insights for Web Information Disclosure Vulnerability | [
"cpe:2.3:a:microsoft:accessibility_insights_for_web:*:*:*:*:*:*:*:*"
] | null | 7.4 | null | null |
CVE-2006-3424 | Multiple buffer overflows in WebEx Downloader ActiveX Control, possibly in versions before November 2005, allow remote attackers to execute arbitrary code via unspecified vectors. | [
"cpe:2.3:a:webex_communications:webex_downloader_activex_control:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2020-25199 | A heap-based buffer overflow vulnerability exists within the WECON LeviStudioU Release Build 2019-09-21 and prior when processing project files. Opening a specially crafted project file could allow an attacker to exploit and execute code under the privileges of the application. | [
"cpe:2.3:a:we-con:levistudiou:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | 6.8 |
|
GHSA-v8mc-4rh6-jf98 | The Piraeus Bank WooCommerce Payment Gateway plugin for WordPress is vulnerable to time-based blind SQL Injection via the 'MerchantReference' parameter in all versions up to, and including, 1.6.5.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. | [] | null | 9.8 | null | null |
|
CVE-2023-6431 | Cross-site Scripting vulnerability in BigProf products | A vulnerability has been discovered in BigProf Online Invoicing System 2.6, which does not sufficiently encode user-controlled input, resulting in persistent XSS through /inventory/categories_view.php, in the FirstRecord parameter. Exploitation of this vulnerability could allow an attacking user to store dangerous JavaScript payloads on the system that will be triggered when the page loads. | [
"cpe:2.3:a:bigprof:online_invoicing_system:2.6:*:*:*:*:*:*:*"
] | null | 6.3 | null | null |
GHSA-rw3m-wxjr-rg26 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Arefly WP Header Notification allows Stored XSS.This issue affects WP Header Notification: from n/a through 1.2.7. | [] | null | 5.9 | null | null |
|
CVE-2020-0872 | A remote code execution vulnerability exists in Application Inspector version v1.0.23 or earlier when the tool reflects example code snippets from third-party source files into its HTML output, aka 'Remote Code Execution Vulnerability in Application Inspector'. | [
"cpe:2.3:a:microsoft:application_inspector:*:*:*:*:*:*:*:*"
] | null | 9.6 | null | 6.8 |
|
GHSA-jxmv-8fwr-5mqh | Stack-based buffer overflow in IBM Tivoli Storage Manager FastBack 5.5 and 6.1.x through 6.1.11.1 allows remote attackers to cause a denial of service (daemon crash) via unspecified vectors, a different vulnerability than CVE-2016-0212 and CVE-2016-0213. | [] | null | null | 9.8 | null |
|
GHSA-f3v6-qmvg-fhwg | Azure CycleCloud Remote Code Execution Vulnerability | [] | null | 9.9 | null | null |
|
CVE-2016-9375 | In Wireshark 2.2.0 to 2.2.1 and 2.0.0 to 2.0.7, the DTN dissector could go into an infinite loop, triggered by network traffic or a capture file. This was addressed in epan/dissectors/packet-dtn.c by checking whether SDNV evaluation was successful. | [
"cpe:2.3:a:wireshark:wireshark:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:2.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:2.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:2.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
] | null | null | 5.9 | 4.3 |
|
CVE-2003-0445 | Buffer overflow in webfs before 1.17.1 allows remote attackers to execute arbitrary code via an HTTP request with a long Request-URI. | [
"cpe:2.3:a:webfs:webfs:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2015-4218 | The web-based user interface in Cisco Jabber through 9.6(3) and 9.7 through 9.7(5) on Windows allows remote attackers to obtain sensitive information via a crafted value in a GET request, aka Bug IDs CSCuu65622 and CSCuu70858. | [
"cpe:2.3:a:cisco:jabber:9.6\\(0\\):*:*:*:*:windows:*:*",
"cpe:2.3:a:cisco:jabber:9.6\\(1\\):*:*:*:*:windows:*:*",
"cpe:2.3:a:cisco:jabber:9.6\\(2\\):*:*:*:*:windows:*:*",
"cpe:2.3:a:cisco:jabber:9.6\\(3\\):*:*:*:*:windows:*:*",
"cpe:2.3:a:cisco:jabber:9.7\\(0\\):*:*:*:*:windows:*:*",
"cpe:2.3:a:cisco:jabber:9.7\\(1\\):*:*:*:*:windows:*:*",
"cpe:2.3:a:cisco:jabber:9.7\\(2\\):*:*:*:*:windows:*:*",
"cpe:2.3:a:cisco:jabber:9.7\\(3\\):*:*:*:*:windows:*:*",
"cpe:2.3:a:cisco:jabber:9.7\\(4\\):*:*:*:*:windows:*:*",
"cpe:2.3:a:cisco:jabber:9.7\\(5\\):*:*:*:*:windows:*:*"
] | null | null | null | 5 |
|
CVE-2019-7569 | An issue was discovered in DOYO (aka doyocms) 2.3(20140425 update). There is a CSRF vulnerability that can add a super administrator account via admin.php?c=a_adminuser&a=add&run=1. | [
"cpe:2.3:a:wdoyo:doyo:2.3:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.8 |
|
CVE-2017-3128 | A stored XSS (Cross-Site-Scripting) vulnerability in Fortinet FortiOS allows attackers to execute unauthorized code or commands via the policy global-label parameter. | [
"cpe:2.3:o:fortinet:fortios:5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:5.0.5:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:5.0.6:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:5.0.7:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:5.0.8:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:5.0.9:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:5.0.10:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:5.0.11:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:5.0.12:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:5.0.13:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:5.0.14:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:5.2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:5.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:5.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:5.2.3:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:5.2.4:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:5.2.5:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:5.2.6:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:5.2.7:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:5.2.8:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:5.2.9:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:5.2.10:*:*:*:*:*:*:*"
] | null | null | 4.8 | 3.5 |
|
GHSA-58hv-2vjm-27h5 | Opera, possibly before 9.25, uses the HTTP Host header to determine the context of a document provided in a (1) 4xx or (2) 5xx CONNECT response from a proxy server, which allows man-in-the-middle attackers to execute arbitrary web script by modifying this CONNECT response, aka an "SSL tampering" attack. | [] | null | null | null | null |
|
GHSA-7p3q-gmw8-3xm9 | struct2json before 2020-11-18 is affected by a Buffer Overflow because strcpy is used for S2J_STRUCT_GET_string_ELEMENT. | [] | null | null | null | null |
|
GHSA-9rm7-7m57-m6gm | A vulnerability in Cisco Intercloud Fabric for Business and Cisco Intercloud Fabric for Providers could allow an unauthenticated, remote attacker to connect to the database used by these products. More Information: CSCus99394. Known Affected Releases: 7.3(0)ZN(0.99). | [] | null | null | 8.8 | null |
|
CVE-2023-46216 | An attacker sending specially crafted data packets to the Mobile Device Server can cause memory corruption which could result to a Denial of Service (DoS) or code execution. | [
"cpe:2.3:a:ivanti:avalanche:*:*:*:*:premise:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | null | 9.8 | null |
|
CVE-2023-6868 | In some instances, the user-agent would allow push requests which lacked a valid VAPID even though the push manager subscription defined one. This could allow empty messages to be sent from unauthorized parties.
*This bug only affects Firefox on Android.* This vulnerability affects Firefox < 121. | [
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] | null | 4.3 | null | null |
|
CVE-2017-3838 | A vulnerability in Cisco Secure Access Control System (ACS) could allow an unauthenticated, remote attacker to conduct a DOM-based cross-site scripting (XSS) attack against the user of the web interface of the affected system. More Information: CSCvc04838. Known Affected Releases: 5.8(2.5). | [
"cpe:2.3:a:cisco:secure_access_control_system:5.8\\(2.5\\):*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 |
|
GHSA-f935-fh29-4mfr | PacsOne Server (PACS Server In One Box) below 7.1.1 is affected by incorrect access control, which can result in remotely gaining administrator privileges. | [] | null | null | null | null |
|
GHSA-9qrm-8x3f-j2vq | netentsec NS-ASG 6.3 is vulnerable to SQL Injection via /WebPages/history.php. | [] | null | 6.3 | null | null |
|
CVE-2020-6018 | Valve's Game Networking Sockets prior to version v1.2.0 improperly handles long encrypted messages in function AES_GCM_DecryptContext::Decrypt() when compiled using libsodium, leading to a Stack-Based Buffer Overflow and resulting in a memory corruption and possibly even a remote code execution. | [
"cpe:2.3:a:valvesoftware:game_networking_sockets:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
|
GHSA-hv54-cc8f-42jq | Cross-Site Request Forgery in Jenkins Recipe Plugin | A cross-site request forgery (CSRF) vulnerability in Jenkins Recipe Plugin 1.2 and earlier allows attackers to send an HTTP request to an attacker-specified URL and parse the response as XML. | [] | null | 7.1 | null | null |
GHSA-2hhx-vp2f-m5hf | Tenda AC8V4 V16.03.34.06 was discovered to contain a stack overflow via the shareSpeed parameter in the sub_49E098 function. | [] | null | 9.8 | null | null |
|
GHSA-73w2-5f6g-jx42 | An issue has been discovered in GitLab CE/EE affecting all versions starting from 10.3 before 15.11.10, all versions starting from 16.0 before 16.0.6, all versions starting from 16.1 before 16.1.1. A Regular Expression Denial of Service was possible via sending crafted payloads to the preview_markdown endpoint. | [] | null | 7.5 | null | null |
|
GHSA-9cfh-j5rr-38cm | Argument injection vulnerability in Microsoft Internet Explorer, when running on systems with SeaMonkey installed and certain URIs registered, allows remote attackers to conduct cross-browser scripting attacks and execute arbitrary commands via shell metacharacters in a mailto URI, which are inserted into the command line that is created when invoking SeaMonkey.exe, a related issue to CVE-2007-3670. | [] | null | null | null | null |
|
CVE-2024-36199 | Adobe Experience Manager | Cross-site Scripting (Stored XSS) (CWE-79) | Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | [
"cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*"
] | null | 5.4 | null | null |
CVE-2022-31827 | MonstaFTP v2.10.3 was discovered to contain a Server-Side Request Forgery (SSRF) via the function performFetchRequest at HTTPFetcher.php. | [
"cpe:2.3:a:monstaftp:monstaftp:2.10.3:*:*:*:*:*:*:*"
] | null | 9.1 | null | 6.4 |
|
GHSA-qxq3-p28m-qc36 | A vulnerability has been identified in SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00). Affected devices do not properly validate parameters of POST requests. This could allow an authenticated attacker to set the device to a denial of service state or to control the program counter and, thus, execute arbitrary code on the device. | [] | null | 8.8 | null | null |
|
CVE-2013-3206 | Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3201, CVE-2013-3203, CVE-2013-3207, and CVE-2013-3209. | [
"cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
GHSA-xh44-7m8v-gqg4 | A use-of-uninitialized-pointer vulnerability exists in the Forward Open connection_management_entry functionality of EIP Stack Group OpENer development commit 58ee13c. A specially-crafted EtherNet/IP request can lead to use of a null pointer, causing the server to crash. An attacker can send a series of EtherNet/IP requests to trigger this vulnerability. | [] | null | 7.5 | null | null |
|
GHSA-g3g3-hhxv-74r2 | Directory traversal vulnerability in Huawei eSight before V300R003C20SPC005 allows remote authenticated users to read arbitrary files via unspecified vectors. | [] | null | null | 6.5 | null |
|
CVE-2017-16340 | An attacker could send an authenticated HTTP request to trigger this vulnerability in Insteon Hub running firmware version 1012. At 0x9d01c0e8 the value for the s_dport key is copied using strcpy to the buffer at 0xa000180c. This buffer is 6 bytes large, sending anything longer will cause a buffer overflow. | [
"cpe:2.3:o:insteon:hub_firmware:1012:*:*:*:*:*:*:*",
"cpe:2.3:h:insteon:hub:-:*:*:*:*:*:*:*"
] | null | null | 8.5 | null |
|
CVE-2016-4269 | Adobe Reader and Acrobat before 11.0.17, Acrobat and Acrobat Reader DC Classic before 15.006.30198, and Acrobat and Acrobat Reader DC Continuous before 15.017.20050 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4191, CVE-2016-4192, CVE-2016-4193, CVE-2016-4194, CVE-2016-4195, CVE-2016-4196, CVE-2016-4197, CVE-2016-4198, CVE-2016-4199, CVE-2016-4200, CVE-2016-4201, CVE-2016-4202, CVE-2016-4203, CVE-2016-4204, CVE-2016-4205, CVE-2016-4206, CVE-2016-4207, CVE-2016-4208, CVE-2016-4211, CVE-2016-4212, CVE-2016-4213, CVE-2016-4214, CVE-2016-4250, CVE-2016-4251, CVE-2016-4252, CVE-2016-4254, CVE-2016-4265, CVE-2016-4266, CVE-2016-4267, CVE-2016-4268, and CVE-2016-4270. | [
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:reader:*:*:*:*:*:*:*:*"
] | null | null | 9.8 | 10 |
|
CVE-2018-9128 | DVD X Player Standard 5.5.3.9 has a Buffer Overflow via a crafted .plf file, a related issue to CVE-2007-3068. | [
"cpe:2.3:a:dvd-x-player:dvd_x_player:5.5.3.9:*:*:*:standard:*:*:*"
] | null | null | 7.8 | 6.8 |
|
GHSA-87qj-872v-w6wg | The Administrative Web Interface in Citrix NetScaler Application Delivery Controller (ADC) and NetScaler Gateway 11.x before 11.0 Build 64.34, 10.5 before 10.5 Build 59.13, 10.5.e before Build 59.1305.e, and 10.1 allows remote attackers to conduct clickjacking attacks via unspecified vectors. | [] | null | null | 6.1 | null |
|
CVE-2017-8160 | The Madapt Driver of some Huawei smart phones with software Earlier than Vicky-AL00AC00B172 versions,Vicky-AL00CC768B122,Vicky-TL00AC01B167,Earlier than Victoria-AL00AC00B172 versions,Victoria-TL00AC00B123,Victoria-TL00AC01B167 has a use after free (UAF) vulnerability. An attacker can trick a user to install a malicious application which has a high privilege to exploit this vulnerability, Successful exploitation may cause arbitrary code execution. | [
"cpe:2.3:o:huawei:vicky-al00a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:vicky-al00a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:vicky-al00c_firmware:vicky-al00cc768b122:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:vicky-al00c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:vicky-tl00a_firmware:vicky-tl00ac01b167:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:vicky-tl00a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:victoria-al00a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:victoria-al00a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:victoria-tl00a_firmware:victoria-tl00ac00b123:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:victoria-tl00a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:victoria-tl00a_firmware:victoria-tl00ac01b167:*:*:*:*:*:*:*"
] | null | null | 7.8 | 9.3 |
|
GHSA-h862-m45v-wg8w | Format string vulnerability in PunkBuster 1.180 and earlier, as used by Soldier of Fortune II and possibly other games, allows remote attackers to cause a denial of service (server crash) and possibly execute arbitrary code via format string specifiers in invalid cvar values, which are not properly handled when the server kicks the player and records the reason. | [] | null | null | null | null |
|
GHSA-cgqx-hv7c-9fq5 | The server process in Novell Messenger 2.1 and 2.2.x before 2.2.1, and Novell GroupWise Messenger 2.04 and earlier, allows remote attackers to read from arbitrary memory locations via a crafted command. | [] | null | null | null | null |
|
CVE-2019-7041 | Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have a security bypass vulnerability. Successful exploitation could lead to privilege escalation. | [
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.8 |
|
CVE-2011-2718 | Multiple directory traversal vulnerabilities in the relational schema implementation in phpMyAdmin 3.4.x before 3.4.3.2 allow remote authenticated users to include and execute arbitrary local files via directory traversal sequences in an export type field, related to (1) libraries/schema/User_Schema.class.php and (2) schema_export.php. | [
"cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:3.4.3.1:*:*:*:*:*:*:*"
] | null | null | null | 6 |
|
GHSA-9c9q-3xvx-4wqh | The ocfs2_prepare_page_for_write function in fs/ocfs2/aops.c in the Oracle Cluster File System 2 (OCFS2) subsystem in the Linux kernel before 2.6.39-rc1 does not properly handle holes that cross page boundaries, which allows local users to obtain potentially sensitive information from uninitialized disk locations by reading a file. | [] | null | null | null | null |
|
CVE-2021-21163 | Insufficient data validation in Reader Mode in Google Chrome on iOS prior to 89.0.4389.72 allowed a remote attacker to leak cross-origin data via a crafted HTML page and a malicious server. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4.3 |
|
CVE-2024-2589 | SQL injection vulnerability in AMSS++ | Vulnerability in AMSS++ version 4.31 that allows SQL injection through /amssplus/modules/book/main/bookdetail_school_person.php, in multiple parameters. This vulnerability could allow a remote attacker to send a specially crafted SQL query to the server and retrieve all the information stored in the DB. | [
"cpe:2.3:a:amssplus:amss_plus:4.31:*:*:*:*:*:*:*"
] | null | 8.2 | null | null |
GHSA-2v7h-rhjc-hq44 | Cross-Site Request Forgery (CSRF) vulnerability in Skpstorm SK WP Settings Backup allows Object Injection.This issue affects SK WP Settings Backup: from n/a through 1.0. | [] | null | 8.8 | null | null |
|
CVE-2002-1774 | NOTE: this issue has been disputed by the vendor. Symantec Norton AntiVirus 2002 allows remote attackers to send viruses that bypass the e-mail scanning via a NULL character in the MIME header before the virus. NOTE: the vendor has disputed this issue, acknowledging that the initial scan is bypassed, but the AutoProtect feature would detect the virus before it is executed | [
"cpe:2.3:a:symantec:norton_antivirus:2002:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2019-11508 | In Pulse Secure Pulse Connect Secure (PCS) before 8.1R15.1, 8.2 before 8.2R12.1, 8.3 before 8.3R7.1, and 9.0 before 9.0R3.4, an authenticated attacker (via the admin web interface) can exploit Directory Traversal to execute arbitrary code on the appliance. | [
"cpe:2.3:a:ivanti:connect_secure:7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:7.1:r1.0:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:7.1:r1.1:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:7.1:r10.0:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:7.1:r11.0:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:7.1:r12.0:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:7.1:r13.0:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:7.1:r14.0:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:7.1:r15.0:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:7.1:r16.0:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:7.1:r17.0:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:7.1:r18.0:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:7.1:r19.0:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:7.1:r19.1:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:7.1:r2.0:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:7.1:r20.0:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:7.1:r20.1:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:7.1:r20.2:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:7.1:r21.0:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:7.1:r22.0:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:7.1:r22.1:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:7.1:r22.2:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:7.1:r22.3:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:7.1:r22.4:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:7.1:r3.0:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:7.1:r4.0:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:7.1:r4.1:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:7.1:r5.0:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:7.1:r6.0:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:7.1:r7.0:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:7.1:r8.0:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:7.1:r9.0:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:7.4:r1.0:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:7.4:r10.0:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:7.4:r11.0:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:7.4:r11.1:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:7.4:r12.0:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:7.4:r13.0:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:7.4:r13.1:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:7.4:r13.2:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:7.4:r13.3:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:7.4:r13.4:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:7.4:r13.5:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:7.4:r13.6:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:7.4:r2.0:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:7.4:r3.0:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:7.4:r4.0:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:7.4:r5.0:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:7.4:r6.0:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:7.4:r7.0:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:7.4:r8.0:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:7.4:r9.0:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:7.4:r9.1:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:7.4:r9.2:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:7.4:r9.3:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:8.1:r1.0:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:8.1:r1.1:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:8.1:r10.0:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:8.1:r11.0:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:8.1:r11.1:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:8.1:r12.0:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:8.1:r12.1:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:8.1:r13.0:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:8.1:r14.0:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:8.1:r2.0:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:8.1:r2.1:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:8.1:r3.1:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:8.1:r3.2:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:8.1:r4.0:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:8.1:r4.1:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:8.1:r5.0:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:8.1:r6.0:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:8.1:r7.0:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:8.1:r8.0:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:8.1:r9.0:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:8.1:r9.1:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:8.1:r9.2:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:8.2:r1.0:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:8.2:r1.1:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:8.2:r10.0:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:8.2:r11.0:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:8.2:r12.0:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:8.2:r2.0:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:8.2:r3.0:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:8.2:r3.1:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:8.2:r4.0:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:8.2:r4.1:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:8.2:r5.0:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:8.2:r5.1:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:8.2:r6.0:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:8.2:r7.0:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:8.2:r7.1:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:8.2:r8.0:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:8.2:r8.1:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:8.2:r8.2:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:8.2:r9.0:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:8.3:r1:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:8.3:r2:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:8.3:r2.1:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:8.3:r3:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:8.3:r4:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:8.3:r5:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:8.3:r5.1:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:8.3:r5.2:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:8.3:r6:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:8.3:r6.1:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:8.3:r7:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.0:r1:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.0:r2:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.0:r2.1:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.0:r3:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.0:r3.1:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.0:r3.2:*:*:*:*:*:*",
"cpe:2.3:a:pulsesecure:pulse_connect_secure:7.4:*:*:*:*:*:*:*"
] | null | null | 8.6 | null |
|
CVE-2022-31055 | Improper Access Control in kctf | kCTF is a Kubernetes-based infrastructure for capture the flag (CTF) competitions. Prior to version 1.6.0, the kctf cluster set-src-ip-ranges was broken and allowed traffic from any IP. The problem has been patched in v1.6.0. As a workaround, those who want to test challenges privately can mark them as `public: false` and use `kctf chal debug port-forward` to connect. | [
"cpe:2.3:a:google:kctf:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
CVE-2024-58115 | Buffer overflow vulnerability in the SVG parsing module of the ArkUI framework
Impact: Successful exploitation of this vulnerability may affect availability. | [] | null | 4 | null | null |
|
GHSA-63q7-72w2-qvvv | Authorization Bypass Through User-Controlled Key vulnerability in Software Engineering Consultancy Machine Equipment Limited Company Hearing Tracking System allows Authentication Abuse.This issue affects Hearing Tracking System: before for IOS 7.0, for Android Latest release 1.0. | [] | null | 8.8 | null | null |
|
GHSA-vqq3-6hq7-qcxr | In CyberArk Endpoint Privilege Manager (formerly Viewfinity), Privilege Escalation is possible if the attacker has one process that executes as Admin. | [] | null | null | 9.8 | null |
|
GHSA-q4hm-fwc9-hmv6 | Insecure temporary file used in com.squareup:connect | This affects all versions of package com.squareup:connect. The method prepareDownloadFilecreates creates a temporary file with the permissions bits of -rw-r--r-- on unix-like systems. On unix-like systems, the system temporary directory is shared between users. As such, the contents of the file downloaded by downloadFileFromResponse will be visible to all other users on the local system. A workaround fix for this issue is to set the system property java.io.tmpdir to a safe directory as remediation. Note: This version of the SDK is end of life and no longer maintained, please upgrade to the latest version. | [] | null | 3.3 | null | null |
CVE-2021-36319 | Dell Networking OS10 versions 10.4.3.x, 10.5.0.x and 10.5.1.x contain an information exposure vulnerability. A low privileged authenticated malicious user can gain access to SNMP authentication failure messages. | [
"cpe:2.3:o:dell:networking_os10:*:*:*:*:*:*:*:*"
] | null | 3.3 | null | null |
|
CVE-2016-4618 | Cross-site scripting (XSS) vulnerability in Safari Reader in Apple iOS before 10 and Safari before 10 allows remote attackers to inject arbitrary web script or HTML via a crafted web site, aka "Universal XSS (UXSS)." | [
"cpe:2.3:a:apple:safari:9.1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 |
|
CVE-2006-6238 | The AutoFill feature in Apple Safari 2.0.4 does not properly verify that all automatically populated form fields are visible to the user, which allows remote attackers to obtain sensitive information, such as usernames and passwords, via input fields of zero width, a variant of CVE-2006-6077. | [
"cpe:2.3:a:apple:safari:2.0.4:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-vgpm-hvwj-9wc9 | In FreeBSD before 11.0-STABLE, 11.0-RELEASE-p10, 10.3-STABLE, and 10.3-RELEASE-p19, ipfilter using "keep state" or "keep frags" options can cause a kernel panic when fed specially crafted packet fragments due to incorrect memory handling. | [] | null | null | 7.5 | null |
Subsets and Splits