id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2023-24997 | Apache InLong: Jdbc Connection Security Bypass | Deserialization of Untrusted Data vulnerability in Apache Software Foundation Apache InLong.This issue affects Apache InLong: from 1.1.0 through 1.5.0. Users are advised to upgrade to Apache InLong's latest version or cherry-pick https://github.com/apache/inlong/pull/7223 https://github.com/apache/inlong/pull/7223 to solve it.
| [
"cpe:2.3:a:apache:inlong:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
GHSA-wx6p-pjx3-8pqx | Directory traversal vulnerability in index.php in MobeScripts Mobile Space Community 2.0 allows remote attackers to read arbitrary files via a .. (dot dot) in the uid parameter in the rss page. | [] | null | null | null | null |
|
CVE-2010-0978 | KMSoft Guestbook (aka GBook) 1.0 stores sensitive information under the web root with insufficient access control, which allows remote attackers to download a database via a direct request for db/db.mdb. | [
"cpe:2.3:a:kmsoft:guestbook:1.0:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-fxg7-4q6m-p84h | A Floating point exception (division-by-zero) flaw was found in Mupdf for zero width pages in muraster.c. It is fixed in Mupdf-1.20.0-rc1 upstream. | [] | null | 5.5 | null | null |
|
CVE-2022-0124 | An issue has been discovered affecting GitLab versions prior to 14.4.5, between 14.5.0 and 14.5.3, and between 14.6.0 and 14.6.1. Gitlab's Slack integration is incorrectly validating user input and allows to craft malicious URLs that are sent to slack. | [
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*"
] | null | 4.3 | null | null |
|
CVE-2021-4258 | whohas Package Information cleartext transmission | A vulnerability was found in whohas. It has been rated as problematic. This issue affects some unknown processing of the component Package Information Handler. The manipulation leads to cleartext transmission of sensitive information. The attack may be initiated remotely. The real existence of this vulnerability is still doubted at the moment. The name of the patch is 667c3e2e9178f15c23d7918b5db25cd0792c8472. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-216251. NOTE: Most sources redirect to the encrypted site which limits the possibilities of an attack. | [
"cpe:2.3:a:whohas_project:whohas:*:*:*:*:*:*:*:*"
] | null | 3.7 | null | null |
CVE-2024-8746 | File Manager Pro <= 8.3.9 - Unauthenticated Backup File Download and Upload | The File Manager Pro plugin for WordPress is vulnerable to arbitrary backup file downloads and uploads due to missing file type validation via the 'mk_file_folder_manager_shortcode' ajax action in all versions up to, and including, 8.3.9. This makes it possible for unauthenticated attackers, if granted access to the File Manager by an administrator, to download and upload arbitrary backup files on the affected site's server which may make remote code execution possible. | [
"cpe:2.3:a:filemanagerpro:file_manager_pro:*:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:filemanagerpro:file_manager:*:*:*:*:pro:wordpress:*:*"
] | null | 7.5 | null | null |
RHSA-2020:3669 | Red Hat Security Advisory: postgresql:10 security and bug fix update | postgresql: Selectivity estimators bypass row security policies postgresql: Stack-based buffer overflow via setting a password postgresql: TYPE in pg_temp executes arbitrary SQL during SECURITY DEFINER execution postgresql: ALTER ... DEPENDS ON EXTENSION is missing authorization checks postgresql: Uncontrolled search path element in logical replication postgresql: Uncontrolled search path element in CREATE EXTENSION | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.1 | 7.5 | null |
GHSA-8vqq-vp59-hxpx | IrfanView DXF File Parsing Memory Corruption Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of DXF files. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24897. | [] | null | null | 7.8 | null |
|
CVE-2023-27499 | Cross-Site Scripting (XSS) vulnerability in SAP GUI for HTML | SAP GUI for HTML - versions KERNEL 7.22, 7.53, 7.54, 7.77, 7.81, 7.85, 7.89, 7.91, KRNL64UC, 7.22, 7.22EXT, KRNL64UC 7.22, 7.22EXT does not sufficiently encode user-controlled inputs, resulting in a reflected Cross-Site Scripting (XSS) vulnerability. An attacker could craft a malicious URL and lure the victim to click, the script supplied by the attacker will execute in the victim user's browser. The information from the victim's web browser can either be modified or read and sent to the attacker.
| [
"cpe:2.3:a:sap:netweaver:7.22ext:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_application_server_abap:7.22:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_application_server_abap:7.53:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_application_server_abap:7.54:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_application_server_abap:7.77:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_application_server_abap:7.81:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_application_server_abap:7.85:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_application_server_abap:7.89:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_application_server_abap:7.91:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_application_server_abap:krnl64uc:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_application_server_abap:krnl64uc_7.22:*:*:*:*:*:*:*"
] | null | 6.1 | null | null |
CVE-2009-4077 | Cross-site request forgery (CSRF) vulnerability in Roundcube Webmail 0.2.2 and earlier allows remote attackers to hijack the authentication of unspecified users for requests that send arbitrary emails via unspecified vectors, a different vulnerability than CVE-2009-4076. | [
"cpe:2.3:a:roundcube:webmail:*:*:*:*:*:*:*:*",
"cpe:2.3:a:roundcube:webmail:0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:roundcube:webmail:0.1:20050811:*:*:*:*:*:*",
"cpe:2.3:a:roundcube:webmail:0.1:20050820:*:*:*:*:*:*",
"cpe:2.3:a:roundcube:webmail:0.1:20051007:*:*:*:*:*:*",
"cpe:2.3:a:roundcube:webmail:0.1:20051021:*:*:*:*:*:*",
"cpe:2.3:a:roundcube:webmail:0.1:alpha:*:*:*:*:*:*",
"cpe:2.3:a:roundcube:webmail:0.1:beta:*:*:*:*:*:*",
"cpe:2.3:a:roundcube:webmail:0.1:beta2:*:*:*:*:*:*",
"cpe:2.3:a:roundcube:webmail:0.1:rc1:*:*:*:*:*:*",
"cpe:2.3:a:roundcube:webmail:0.1:rc2:*:*:*:*:*:*",
"cpe:2.3:a:roundcube:webmail:0.1:stable:*:*:*:*:*:*",
"cpe:2.3:a:roundcube:webmail:0.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:roundcube:webmail:0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:roundcube:webmail:0.2:alpha:*:*:*:*:*:*",
"cpe:2.3:a:roundcube:webmail:0.2:beta:*:*:*:*:*:*",
"cpe:2.3:a:roundcube:webmail:0.2:stable:*:*:*:*:*:*",
"cpe:2.3:a:roundcube:webmail:0.2.1:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
GHSA-f7rm-p9fc-773f | Centreon 19.10-3.el7 is affected by a SQL injection vulnerability, where an authorized user is able to inject additional SQL queries to perform remote command execution. | [] | null | null | null | null |
|
CVE-2025-21260 | Windows Digital Media Elevation of Privilege Vulnerability | Windows Digital Media Elevation of Privilege Vulnerability | [] | null | 6.6 | null | null |
CVE-2009-0583 | Multiple integer overflows in icc.c in the International Color Consortium (ICC) Format library (aka icclib), as used in Ghostscript 8.64 and earlier and Argyll Color Management System (CMS) 1.0.3 and earlier, allow context-dependent attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly execute arbitrary code by using a device file for a translation request that operates on a crafted image file and targets a certain "native color space," related to an ICC profile in a (1) PostScript or (2) PDF file with embedded images. | [
"cpe:2.3:a:ghostscript:ghostscript:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ghostscript:ghostscript:5.50:*:*:*:*:*:*:*",
"cpe:2.3:a:ghostscript:ghostscript:7.05:*:*:*:*:*:*:*",
"cpe:2.3:a:ghostscript:ghostscript:7.07:*:*:*:*:*:*:*",
"cpe:2.3:a:ghostscript:ghostscript:8.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ghostscript:ghostscript:8.15:*:*:*:*:*:*:*",
"cpe:2.3:a:ghostscript:ghostscript:8.15.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ghostscript:ghostscript:8.54:*:*:*:*:*:*:*",
"cpe:2.3:a:ghostscript:ghostscript:8.56:*:*:*:*:*:*:*",
"cpe:2.3:a:ghostscript:ghostscript:8.57:*:*:*:*:*:*:*",
"cpe:2.3:a:ghostscript:ghostscript:8.61:*:*:*:*:*:*:*",
"cpe:2.3:a:ghostscript:ghostscript:8.62:*:*:*:*:*:*:*",
"cpe:2.3:a:ghostscript:ghostscript:8.63:*:*:*:*:*:*:*",
"cpe:2.3:a:argyllcms:argyllcms:*:*:*:*:*:*:*:*",
"cpe:2.3:a:argyllcms:argyllcms:0.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:argyllcms:argyllcms:0.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:argyllcms:argyllcms:0.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:argyllcms:argyllcms:0.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:argyllcms:argyllcms:0.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:argyllcms:argyllcms:0.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:argyllcms:argyllcms:0.7.0:beta_8:*:*:*:*:*:*",
"cpe:2.3:a:argyllcms:argyllcms:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:argyllcms:argyllcms:1.0.2:*:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
GHSA-rpp3-6c33-vw2f | Unspecified vulnerability in Microsoft Internet Explorer 5.01 SP4, 6, 6 SP1, and 7 allows remote attackers to execute arbitrary code via a crafted data stream header that triggers memory corruption, aka "Data Stream Header Corruption Vulnerability." | [] | null | 8.8 | null | null |
|
GHSA-q2jm-q4w4-22xh | PHP remote file inclusion vulnerability in adminfoot.php in Comdev Web Blogger 4.1, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the path[docroot] parameter. NOTE: the provenance of this information is unknown; the details are obtained from third party information. | [] | null | null | null | null |
|
ICSMA-22-088-01 | Philips e-Alert | The software does not perform any authentication for critical system functionality.CVE-2022-0922 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). | [] | null | null | 6.5 | null |
RHSA-2015:2579 | Red Hat Security Advisory: Red Hat JBoss BPM Suite 6.1.0 commons-collections security update | apache-commons-collections: InvokerTransformer code execution during deserialisation | [
"cpe:/a:redhat:jboss_bpms:6.0"
] | null | null | null | null |
GHSA-x867-987h-hqwj | The Autofill feature in Google Chrome before 19.0.1084.46 does not properly restrict field values, which allows remote attackers to cause a denial of service (UI corruption) and possibly conduct spoofing attacks via vectors involving long values. | [] | null | null | null | null |
|
GHSA-wr7f-jq3g-39hr | Cross Site Scripting (XSS) exists in NCH Axon PBX v2.22 and earlier via the blacklist IP address (stored). | [] | null | null | null | null |
|
CVE-2024-2036 | ApplyOnline – Application Form Builder and Manager <= 2.6 - Missing Authorization to Sensitive Information Exposure | The ApplyOnline – Application Form Builder and Manager plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the aol_modal_box AJAX action in all versions up to, and including, 2.6. This makes it possible for authenticated attackers, with subscriber access or higher, to view Application submissions. | [] | null | 4.3 | null | null |
CVE-2022-24147 | Tenda AX3 v16.03.12.10_CN was discovered to contain a stack overflow in the function fromAdvSetMacMtuWan. This vulnerability allows attackers to cause a Denial of Service (DoS) via the wanMTU, wanSpeed, cloneType, mac, and serviceName parameters. | [
"cpe:2.3:o:tenda:ax3_firmware:16.03.12.10_cn:*:*:*:*:*:*:*",
"cpe:2.3:h:tenda:ax3:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | 7.8 |
|
CVE-2024-38517 | Tencent RapidJSON include/rapidjson/reader.h GenericReader::ParseNumber() Function Template Exponent Parsing Integer Underflow | Tencent RapidJSON is vulnerable to privilege escalation due to an integer underflow in the `GenericReader::ParseNumber()` function of `include/rapidjson/reader.h` when parsing JSON text from a stream. An attacker needs to send the victim a crafted file which needs to be opened; this triggers the integer underflow vulnerability (when the file is parsed), leading to elevation of privilege. | [] | null | 6.8 | null | null |
CVE-2021-22150 | Kibana code execution issue | It was discovered that a user with Fleet admin permissions could upload a malicious package. Due to using an older version of the js-yaml library, this package would be loaded in an insecure manner, allowing an attacker to execute commands on the Kibana server.
| [
"cpe:2.3:a:elastic:kibana:*:*:*:*:*:*:*:*"
] | null | 6.6 | null | null |
CVE-2011-0921 | crs.exe in the Cell Manager Service in the client in HP Data Protector does not properly validate credentials associated with the hostname, domain, and username, which allows remote attackers to execute arbitrary code by sending unspecified data over TCP, related to the webreporting client, the applet domain, and the java username. | [
"cpe:2.3:a:hp:data_protector:*:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
CVE-2018-18209 | XSS exists in DiliCMS 2.4.0 via the admin/index.php/setting/site?tab=site_attachment attachment_type parameter. | [
"cpe:2.3:a:dilicms:dilicms:2.4.0:*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 |
|
PYSEC-2020-104 | null | An issue was discovered in SaltStack Salt through 3002. Sending crafted web requests to the Salt API, with the SSH client enabled, can result in shell injection. | [] | null | null | null | null |
CVE-2023-35765 | PiiGAB M-Bus Plaintext Storage of a Password |
PiiGAB M-Bus stores credentials in a plaintext file, which could allow a low-level user to gain admin credentials.
| [
"cpe:2.3:o:piigab:m-bus_900s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:piigab:m-bus_900s:-:*:*:*:*:*:*:*"
] | null | 6.5 | null | null |
CVE-2021-46382 | Unauthenticated cross-site scripting (XSS) in Netgear WAC120 AC Access Point may lead to mulitple attacks like session hijacking even clipboard hijacking. | [
"cpe:2.3:o:netgear:wac120_ac_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wac120_ac:-:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 |
|
CVE-2019-0351 | A remote code execution vulnerability exists in the SAP NetWeaver UDDI Server (Services Registry), versions 7.10, 7.20, 7.30, 7.31, 7.40, 7.50. Because of this, an attacker can exploit Services Registry potentially enabling them to take complete control of the product, including viewing, changing, or deleting data by injecting code into the working memory which is subsequently executed by the application. It can also be used to cause a general fault in the product, causing the product to terminate. | [
"cpe:2.3:a:sap:netweaver:7.10:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver:7.20:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver:7.30:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver:7.31:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver:7.40:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver:7.50:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.5 |
|
GHSA-pfp6-3p25-49rj | A vulnerability, which was classified as problematic, has been found in SourceCodester Road Accident Map Marker 1.0. Affected by this issue is some unknown functionality of the file /endpoint/add-mark.php. The manipulation of the argument mark_name leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well. | [] | 5.3 | 3.5 | null | null |
|
GHSA-8mg3-xpwr-h867 | An issue was discovered in Kaseya Unitrends Backup Appliance before 10.5.5. The Unitrends Windows agent was vulnerable to DLL injection and binary planting due to insecure default permissions. This allowed privilege escalation from an unprivileged user to SYSTEM. | [] | null | 7.8 | null | null |
|
GHSA-vwc5-x3cm-cc9v | An issue was discovered on Teltonika RTU950 R_31.04.89 devices. The application allows a user to login without limitation. For every successful login request, the application saves a session. A user can re-login without logging out, causing the application to store the session in memory. Exploitation of this vulnerability will increase memory use and consume free space. | [] | null | null | 6.5 | null |
|
GHSA-5vw7-hf8v-5qgw | In writeUserLP of UserManagerService.java, device policies are serialized with an incorrect tag due to a logic error in the code. This could lead to local denial of service when policies are deserialized on reboot with no additional execution privileges needed. User interaction is not needed for exploitation. | [] | null | 5.5 | null | null |
|
GHSA-xh93-p895-vcfc | Microsoft Office Word 2000 SP3 and 2002 SP3 and Office 2004 for Mac allow remote attackers to execute arbitrary code via a Word document with a crafted lcbPlcfBkfSdt field in the File Information Block (FIB), which bypasses an initialization step and triggers an "arbitrary free," aka "Word Memory Corruption Vulnerability." | [] | null | null | null | null |
|
CVE-2021-2016 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.19 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | [
"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*"
] | null | 4.9 | null | null |
|
GHSA-58rx-v5qf-fh3p | NVIDIA GPU and Tegra hardware contain a vulnerability in the internal microcontroller which may allow a user with elevated privileges to access debug registers during runtime, which may lead to information disclosure. | [] | null | 4.4 | null | null |
|
CVE-2020-6343 | SAP 3D Visual Enterprise Viewer, version - 9, allows a user to open manipulated EPS file received from untrusted sources which results in crashing of the application and becoming temporarily unavailable until the user restarts the application, this is caused due to Improper Input Validation. | [
"cpe:2.3:a:sap:3d_visual_enterprise_viewer:9:*:*:*:*:*:*:*"
] | null | null | 4.3 | null |
|
CVE-2024-23532 | An out-of-bounds Read vulnerability in WLAvalancheService component of Ivanti Avalanche before 6.4.3 allows an authenticated remote attacker to perform denial of service attacks. In certain conditions this could also lead to remote code execution. | [
"cpe:2.3:a:ivanti:avalanche:6.4.3:*:*:*:*:*:*:*"
] | null | null | 7.5 | null |
|
CVE-2021-0109 | Insecure inherited permissions for the Intel(R) SOC driver package for STK1A32SC before version 604 may allow an authenticated user to potentially enable escalation of privilege via local access. | [
"cpe:2.3:o:intel:compute_stick_stk1a32sc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:compute_stick_stk1a32sc:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | 4.6 |
|
CVE-2022-20606 | In SAEMM_MiningCodecTableWithMsgIE of SAEMM_RadioMessageCodec.c, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-233230674References: N/A | [
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] | null | 4.9 | null | null |
|
RHSA-2024:3327 | Red Hat Security Advisory: OpenShift Container Platform 4.15.15 security update | golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS python-gunicorn: HTTP Request Smuggling due to improper validation of Transfer-Encoding headers jose-go: improper handling of highly compressed data | [
"cpe:/a:redhat:openshift:4.15::el8",
"cpe:/a:redhat:openshift:4.15::el9"
] | null | 4.3 | 7.5 | null |
GHSA-x59x-6rx5-vrr6 | Vulnerability in the Oracle FLEXCUBE Investor Servicing product of Oracle Financial Services Applications (component: Infrastructure). Supported versions that are affected are 12.1.0-12.4.0 and 14.0.0-14.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle FLEXCUBE Investor Servicing. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle FLEXCUBE Investor Servicing accessible data as well as unauthorized read access to a subset of Oracle FLEXCUBE Investor Servicing accessible data. CVSS 3.0 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N). | [] | null | 5.4 | null | null |
|
GHSA-mq4g-hhgp-p8r7 | A remote execution of arbitrary commands vulnerability was discovered in some Aruba Instant Access Point (IAP) products in version(s): Aruba Instant 6.5.x: 6.5.4.17 and below; Aruba Instant 8.3.x: 8.3.0.13 and below; Aruba Instant 8.5.x: 8.5.0.10 and below; Aruba Instant 8.6.x: 8.6.0.5 and below; Aruba Instant 8.7.x: 8.7.0.0 and below. Aruba has released patches for Aruba Instant that address this security vulnerability. | [] | null | 9.8 | null | null |
|
CVE-2015-5933 | Audio in Apple OS X before 10.11.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted audio file, a different vulnerability than CVE-2015-5934. | [
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
cisco-sa-iosxe-priv-esc-sABD8hcU | Cisco IOS XE Software Privilege Escalation Vulnerability | A vulnerability in the Cloud Management for Catalyst migration feature of Cisco IOS XE Software could allow an authenticated, local attacker to gain root-level privileges on an affected device.
This vulnerability is due to insufficient memory protection in the Cisco IOS XE Meraki migration feature of an affected device. An attacker could exploit this vulnerability by modifying the Meraki registration parameters. A successful exploit could allow the attacker to elevate privileges to root.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is part of the March 2023 release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: March 2023 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication ["https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-74842"]. | [] | null | 4.4 | null | null |
CVE-2007-4711 | Multiple cross-site scripting (XSS) vulnerabilities in Toms Gaestebuch 1.00 allow remote attackers to inject arbitrary web script or HTML via the (1) homepage, (2) mail, and (3) name parameters in a show action to (a) form.php; the (4) language and (5) anzeigebreite parameters to (b) admin/header.php; and the (6) msg parameter to (c) install.php, different vectors than CVE-2006-0706. | [
"cpe:2.3:a:www.toms-seiten.at:toms_gaestebuch:1.00:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2020-28327 | A res_pjsip_session crash was discovered in Asterisk Open Source 13.x before 13.37.1, 16.x before 16.14.1, 17.x before 17.8.1, and 18.x before 18.0.1. and Certified Asterisk before 16.8-cert5. Upon receiving a new SIP Invite, Asterisk did not return the created dialog locked or referenced. This caused a gap between the creation of the dialog object, and its next use by the thread that created it. Depending on some off-nominal circumstances and timing, it was possible for another thread to free said dialog in this gap. Asterisk could then crash when the dialog object, or any of its dependent objects, were dereferenced or accessed next by the initial-creation thread. Note, however, that this crash can only occur when using a connection-oriented protocol (e.g., TCP or TLS, but not UDP) for SIP transport. Also, the remote client must be authenticated, or Asterisk must be configured for anonymous calling. | [
"cpe:2.3:a:digium:certified_asterisk:16.8:-:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:16.8:cert1-rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:16.8:cert1-rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:16.8:cert1-rc3:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:16.8:cert1-rc4:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:16.8:cert2:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:16.8:cert3:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:16.8:cert4:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:16.8:cert4-rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:16.8:cert4-rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:16.8:cert4-rc3:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:16.8:cert4-rc4:*:*:*:*:*:*",
"cpe:2.3:a:sangoma:asterisk:*:*:*:*:*:*:*:*"
] | null | 5.3 | null | 2.1 |
|
GHSA-px77-jg6r-fh7m | Cross-site scripting (XSS) vulnerability in includes/nsp_search.php in the NewStatPress plugin before 0.9.9 for WordPress allows remote authenticated users to inject arbitrary web script or HTML via the where1 parameter in the nsp_search page to wp-admin/admin.php. | [] | null | null | null | null |
|
cisco-sa-cmx-GkCvfd4 | Cisco Connected Mobile Experiences Strong Authentication Requirements Enforcement Bypass | A vulnerability in the change password API of Cisco Connected Mobile Experiences (CMX) could allow an authenticated, remote attacker to alter their own password to a value that does not comply with the strong authentication requirements that are configured on an affected device.
This vulnerability exists because a password policy check is incomplete at the time a password is changed at server side using the API. An attacker could exploit this vulnerability by sending a specially crafted API request to the affected device. A successful exploit could allow the attacker to change their own password to a value that does not comply with the configured strong authentication requirements.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
| [] | null | 4.3 | null | null |
CVE-2019-5264 | There is an information disclosure vulnerability in certain Huawei smartphones (Mate 10;Mate 10 Pro;Honor V10;Changxiang 7S;P-smart;Changxiang 8 Plus;Y9 2018;Honor 9 Lite;Honor 9i;Mate 9). The software does not properly handle certain information of applications locked by applock in a rare condition. Successful exploit could cause information disclosure. | [
"cpe:2.3:o:huawei:mate_10_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:mate_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:mate_10_pro_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:mate_10_pro:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:honor_v10_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:honor_v10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:changxiang_7s_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:changxiang_7s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:p-smart_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:p-smart:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:changxiang_8_plus_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:changxiang_8_plus:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:y9_2018_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:y9_2018:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:honor_9_lite_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:honor_9_lite:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:honor_9i_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:honor_9i:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:mate_9_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:mate_9:-:*:*:*:*:*:*:*"
] | null | 4.6 | null | 2.1 |
|
CVE-2023-26520 | WordPress Advanced Text Widget plugin <= 2.1.2 - Broken Access Control vulnerability | Missing Authorization vulnerability in Max Chirkov Advanced Text Widget allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Advanced Text Widget : from n/a through 2.1.2. | [
"cpe:2.3:a:advanced_text_widget_project:advanced_text_widget:*:*:*:*:*:wordpress:*:*"
] | null | 5.3 | null | null |
RHSA-2023:6811 | Red Hat Security Advisory: insights-client security update | insights-client: unsafe handling of temporary files and directories | [
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 7.8 | null | null |
CVE-2001-0175 | The caching module in Netscape Fasttrack Server 4.1 allows remote attackers to cause a denial of service (resource exhaustion) by requesting a large number of non-existent URLs. | [
"cpe:2.3:a:netscape:fasttrack_server:4.0.1:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-xx5f-qgcw-mf6j | Deserialization of Untrusted Data vulnerability in Echo Plugins Knowledge Base for Documentation, FAQs with AI Assistance.This issue affects Knowledge Base for Documentation, FAQs with AI Assistance: from n/a through 11.30.2. | [] | null | 8.7 | null | null |
|
CVE-2025-31439 | WordPress Browser Caching with .htaccess 1.2.1 - Cross Site Request Forgery (CSRF) Vulnerability | Cross-Site Request Forgery (CSRF) vulnerability in tobias_.MerZ Browser Caching with .htaccess allows Cross Site Request Forgery. This issue affects Browser Caching with .htaccess: from 1.2.1 through n/a. | [] | null | 5.4 | null | null |
CVE-2007-1800 | Cisco Secure ACS does not require authentication when Cisco Trust Agent (CTA) transmits posture information, which might allow remote attackers to gain network access via a spoofed Network Endpoint Assessment posture, aka "NACATTACK." NOTE: this attack might be limited to authenticated users and devices. | [
"cpe:2.3:a:cisco:trust_agent:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2023-27491 | Envoy forwards invalid Http2/Http3 downstream headers | Envoy is an open source edge and service proxy designed for cloud-native applications. Compliant HTTP/1 service should reject malformed request lines. Prior to versions 1.26.0, 1.25.3, 1.24.4, 1.23.6, and 1.22.9, There is a possibility that non compliant HTTP/1 service may allow malformed requests, potentially leading to a bypass of security policies. This issue is fixed in versions 1.26.0, 1.25.3, 1.24.4, 1.23.6, and 1.22.9. | [
"cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*"
] | null | 5.4 | null | null |
CVE-2022-3351 | An issue has been discovered in GitLab EE affecting all versions starting from 13.7 before 15.2.5, all versions starting from 15.3 before 15.3.4, all versions starting from 15.4 before 15.4.1. A user's primary email may be disclosed to an attacker through group member events webhooks. | [
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*"
] | null | 4.3 | null | null |
|
GHSA-99jw-x78w-3hcm | Arbitrary file upload, deletion and read through header manipulation | [] | null | 6.3 | null | null |
|
CVE-2015-3970 | Multiple cross-site scripting (XSS) vulnerabilities in the web interface on Janitza UMG 508, 509, 511, 604, and 605 devices allow remote attackers to inject arbitrary web script or HTML via unspecified vectors. | [
"cpe:2.3:h:janitza:umg_508:-:*:*:*:*:*:*:*",
"cpe:2.3:h:janitza:umg_509:-:*:*:*:*:*:*:*",
"cpe:2.3:h:janitza:umg_511:-:*:*:*:*:*:*:*",
"cpe:2.3:h:janitza:umg_604:-:*:*:*:*:*:*:*",
"cpe:2.3:h:janitza:umg_605:-:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-284g-9pqv-rxfm | Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: PIA Core Technology). Supported versions that are affected are 8.57 and 8.58. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N). | [] | null | null | null | null |
|
GHSA-qq7r-jjr4-m4cx | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in DuoGeek Email to Download allows Reflected XSS. This issue affects Email to Download: from n/a through 3.1.0. | [] | null | 7.1 | null | null |
|
CVE-2008-2663 | Multiple integer overflows in the rb_ary_store function in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, and 1.8.7 before 1.8.7-p22 allow context-dependent attackers to execute arbitrary code or cause a denial of service via unknown vectors, a different issue than CVE-2008-2662, CVE-2008-2664, and CVE-2008-2725. NOTE: as of 20080624, there has been inconsistent usage of multiple CVE identifiers related to Ruby. The CVE description should be regarded as authoritative, although it is likely to change. | [
"cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*"
] | null | null | null | 10 |
|
CVE-2005-1244 | Directory traversal vulnerability in the third party tool from NetIQ, as used to secure the iSeries AS/400 FTP server, allows remote attackers to access arbitrary files, including those from qsys.lib, via ".." sequences in a GET request. NOTE: the vendor has disputed this issue, saying that "neither NetIQ Security Manager nor our iSeries Security Solutions are vulnerable. | [
"cpe:2.3:a:netiq:pssecure:7.5:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
cisco-sa-20171129-nxos | Cisco NX-OS System Software Patch Signature Bypass Vulnerability | A vulnerability in Cisco NX-OS System Software could allow an authenticated, local attacker to bypass signature verification when loading a software patch.
The vulnerability is due to insufficient NX-OS signature verification for software patches. An authenticated, local attacker could exploit this vulnerability to bypass signature verification and load a crafted, unsigned software patch on a targeted device. The attacker would need valid administrator credentials to perform this exploit.
There are no workarounds that address this vulnerability.
| [] | null | null | 6.7 | null |
CVE-2024-39576 | Dell Power Manager (DPM), versions 3.15.0 and prior, contains an Incorrect Privilege Assignment vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Code execution and Elevation of privileges. | [
"cpe:2.3:a:dell:power_manager:-:*:*:*:*:*:*:*",
"cpe:2.3:a:dell:power_manager:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
|
RHSA-2021:3837 | Red Hat Security Advisory: httpd:2.4 security update | httpd: mod_proxy: SSRF via a crafted request uri-path containing "unix:" | [
"cpe:/a:redhat:rhel_eus:8.1::appstream"
] | null | 9 | null | null |
GHSA-669x-j2pw-grf8 | NoMachine for Windows prior to version 6.15.1 and 7.5.2 suffer from local privilege escalation due to the lack of safe DLL loading. This vulnerability allows local non-privileged users to perform DLL Hijacking via any writable directory listed under the system path and ultimately execute code as NT AUTHORITY\SYSTEM. | [] | null | 7.3 | null | null |
|
CVE-2001-0302 | Buffer overflow in tstisapi.dll in Pi3Web 1.0.1 web server allows remote attackers to cause a denial of service, and possibly execute arbitrary commands, via a long URL. | [
"cpe:2.3:a:pi3:pi3web:1.0.1:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-rj98-crf4-g69w | pgAdmin 4 vulnerable to Unsafe Deserialization and Remote Code Execution by an Authenticated user | pgAdmin prior to version 8.4 is affected by a path-traversal vulnerability while deserializing users’ sessions in the session handling code. If the server is running on Windows, an unauthenticated attacker can load and deserialize remote pickle objects and gain code execution. If the server is running on POSIX/Linux, an authenticated attacker can upload pickle objects, deserialize them and gain code execution. | [] | 9.4 | 9.9 | null | null |
GHSA-5378-fj29-782c | The mintToken function of a smart contract implementation for SlidebitsToken, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value. | [] | null | 7.5 | null | null |
|
GHSA-mr96-7qcv-9qcp | PDshopPro stores sensitive information under the web root with insufficient access control, which allows remote attackers to download a database via a direct request for (1) /pdshoppro.mdb, (2) /data/pdshoppro.mdb, or (3) /shoppro/data/pdshoppro.mdb. | [] | null | null | null | null |
|
CVE-2018-21253 | An issue was discovered in Mattermost Server before 5.1, 5.0.2, and 4.10.2. An attacker could use the invite_people slash command to invite a non-permitted user. | [
"cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mattermost:mattermost_server:5.1.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mattermost:mattermost_server:5.1.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mattermost:mattermost_server:5.1.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:mattermost:mattermost_server:5.1.0:rc4:*:*:*:*:*:*"
] | null | 4.3 | null | 4 |
|
CVE-2016-10214 | Memory leak in the virgl_resource_attach_backing function in virglrenderer before 0.6.0 allows local guest OS users to cause a denial of service (memory consumption) via a large number of VIRTIO_GPU_CMD_RESOURCE_ATTACH_BACKING commands. | [
"cpe:2.3:a:virglrenderer_project:virglrenderer:*:*:*:*:*:*:*:*"
] | null | null | 6.5 | 4.9 |
|
GHSA-q993-vp3w-9j4h | Adobe After Effects versions 24.0.3 (and earlier) and 23.6.0 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [] | null | 7.8 | null | null |
|
GHSA-gfr2-qpxh-qj9m | Path Traversal in Ansible | A flaw was found in the Ansible Engine when the fetch module is used. An attacker could intercept the module, inject a new path, and then choose a new destination path on the controller node. All versions in 2.7.x, 2.8.x and 2.9.x branches are believed to be vulnerable. | [] | 4.6 | 4.6 | null | null |
GHSA-3769-65j8-fv22 | SuiteCRM 7.11.13 is affected by stored Cross-Site Scripting (XSS) in the Documents preview functionality. This vulnerability could allow remote authenticated attackers to inject arbitrary web script or HTML. | [] | null | null | null | null |
|
GHSA-fvrq-c69c-wh39 | A vulnerability was found in SourceCodester Shopping Website 1.0. It has been classified as critical. Affected is an unknown function of the file check_availability.php. The manipulation of the argument email leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-233286 is the identifier assigned to this vulnerability. | [] | null | null | 6.3 | null |
|
CVE-2017-0716 | A remote code execution vulnerability in the Android media framework (libmpeg2). Product: Android. Versions: 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2. Android ID: A-37203196. | [
"cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:*"
] | null | null | 7.8 | 9.3 |
|
GHSA-fmxw-v7gw-cqpg | Cross-site scripting (XSS) vulnerability in AzDGDatingLite 2.1.1 allows remote attackers to inject arbitrary web script or HTML via the (1) l parameter (aka language variable) to index.php or (2) id parameter to view.php. | [] | null | null | null | null |
|
CVE-2022-35838 | HTTP V3 Denial of Service Vulnerability | HTTP V3 Denial of Service Vulnerability | [
"cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:azure:*:*:*"
] | null | 7.5 | null | null |
RHSA-2022:7106 | Red Hat Security Advisory: zlib security update | zlib: heap-based buffer over-read and overflow in inflate() in inflate.c via a large gzip header extra field | [
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7 | null | null |
CVE-2017-15579 | In PHPSUGAR PHP Melody before 2.7.3, SQL Injection exists via an aa_pages_per_page cookie in a playlist action to watch.php. | [
"cpe:2.3:a:phpsugar:php_melody:*:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 |
|
GHSA-cxxm-972m-66mg | win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT does not properly handle objects in memory, which allows local users to gain privileges via a crafted application, aka "Win32k Memory Allocation Vulnerability." | [] | null | null | null | null |
|
GHSA-g79q-phhr-2g7p | Multiple SQL injection vulnerabilities in PHP Lite Calendar Express 2.2 allow remote attackers to execute arbitrary SQL commands via the cid parameter to (1) login.php, (2) auth.php, and (3) subscribe.php. NOTE: the month.php, year.php, week.php, and day.php vectors are already covered by CVE-2005-4009. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | [] | null | null | null | null |
|
CVE-2009-3058 | Stack-based buffer overflow in akPlayer 1.9.0 allows remote attackers to execute arbitrary code via a long string in a .plt playlist file. | [
"cpe:2.3:a:aksoft:akplayer:1.9.0:*:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
RHSA-2021:1363 | Red Hat Security Advisory: firefox security update | Mozilla: More internal network hosts could have been probed by a malicious webpage Mozilla: Out of bound write due to lazy initialization Mozilla: Use-after-free in Responsive Design Mode Mozilla: Secure Lock icon could have been spoofed Mozilla: Blob URLs may have been granted additional privileges Mozilla: Arbitrary FTP command execution on FTP servers using an encoded URL Mozilla: Incorrect size computation in WebAssembly JIT could lead to null-reads Mozilla: Port blocking could be bypassed | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.8 | 6.1 | null |
CVE-2022-3048 | Inappropriate implementation in Chrome OS lockscreen in Google Chrome on Chrome OS prior to 105.0.5195.52 allowed a local attacker to bypass lockscreen navigation restrictions via physical access to the device. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*"
] | null | 6.8 | null | null |
|
GHSA-482j-vvpx-r8pp | Multiple PHP remote file inclusion vulnerabilities in Vortex Portal 1.0.42 allow remote attackers to execute arbitrary PHP code via a URL in the cfgProgDir parameter to (1) admincp/auth/secure.php or (2) admincp/auth/checklogin.php. | [] | null | null | null | null |
|
CVE-2023-1725 | SSRF in Infoline Project Management System | Server-Side Request Forgery (SSRF) vulnerability in Infoline Project Management System allows Server Side Request Forgery.This issue affects Project Management System: before 4.09.31.125.
| [
"cpe:2.3:a:infoline-tr:project_management_system:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
CVE-2022-46545 | Tenda F1203 V2.0.1.6 was discovered to contain a buffer overflow via the page parameter at /goform/NatStaticSetting. | [
"cpe:2.3:o:tenda:f1203_firmware:2.0.1.6:*:*:*:*:*:*:*",
"cpe:2.3:h:tenda:f1203:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
|
CVE-2013-3656 | Cybozu Office 9.1.0 and earlier does not properly manage sessions, which allows remote attackers to bypass authentication by leveraging knowledge of a login URL. | [
"cpe:2.3:a:cybozu:cybozu_office:*:*:*:*:*:*:*:*"
] | null | null | null | 5.8 |
|
GHSA-xr3v-r79c-636q | In easelcomm_hw_build_scatterlist, there is a possible out of bounds write due to a race condition. This could lead to local escalation of privilege with System privileges required. User interaction is not needed for exploitation. Product: Android. Versions: Android kernel. Android ID: A-69808833. | [] | null | null | 6.4 | null |
|
GHSA-q728-cmx3-fxvv | SQL injection vulnerability in modules/sharedaddy.php in the Jetpack plugin for WordPress allows remote attackers to execute arbitrary SQL commands via the id parameter. | [] | null | null | null | null |
|
GHSA-7c69-8whh-7xg5 | Directory traversal vulnerability in the Messaging (com_messaging) component before 1.5.1 for Joomla! allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the controller parameter in a messages action to index.php. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | [] | null | null | null | null |
|
CVE-2021-38629 | Windows Ancillary Function Driver for WinSock Information Disclosure Vulnerability | Windows Ancillary Function Driver for WinSock Information Disclosure Vulnerability | [
"cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2183:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2183:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2183:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2183:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1801:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1801:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.18363.1801:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1237:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1237:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1237:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.230:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.19041.1237:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2004:10.0.19041.1237:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_20h2:10.0.19042.1237:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_20h2:10.0.19042.1237:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_20h2:10.0.19042.1237:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19060:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19060:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.4651:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.4651:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.4651:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:6.1.7601.25712:sp1:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_7:6.1.7601.25712:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20120:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20120:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:6.3.9600.20120:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21218:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21218:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_server_2008_r2:6.1.7601.25712:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23462:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012_r2:6.3.9600.20120:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:-:*:-:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:-:*:-:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:r2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*"
] | null | 6.5 | null | null |
CVE-2018-5000 | Adobe Flash Player versions 29.0.0.171 and earlier have an Integer Overflow vulnerability. Successful exploitation could lead to information disclosure. | [
"cpe:2.3:a:adobe:flash_player_desktop_runtime:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:chrome:*:*",
"cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:edge:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:internet_explorer_11:*:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"
] | null | null | 6.5 | 4.3 |
|
GHSA-vp93-gcx5-4w52 | Cross-Site Scripting in swagger-ui | Versions of `swagger-ui` prior to 2.2.1 are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize JSON schemas, allowing attackers to execute arbitrary JavaScript using `<script>` tags in the method descriptions.RecommendationUpgrade to version 2.2.1 or later. | [] | null | null | null | null |
CVE-2020-12529 | An issue was discovered in MB connect line mymbCONNECT24 and mbCONNECT24 software in all versions through V2.6.2 There is a SSRF in the LDAP access check, allowing an attacker to scan for open ports. | [
"cpe:2.3:a:mbconnectline:mbconnect24:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mbconnectline:mymbconnect24:*:*:*:*:*:*:*:*"
] | null | 5.8 | null | null |
Subsets and Splits