id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2022-26327 | Stored cross-site scripting (XSS) has been discovered in OpenText™ Performance Center | Exposure of Sensitive Information to an Unauthorized Actor vulnerability in OpenText Performance Center on Windows allows Retrieve Embedded Sensitive Data.This issue affects Performance Center: 12.63. | [] | 5.1 | null | null | null |
PYSEC-2021-352 | null | furlongm openvpn-monitor through 1.1.3 allows CSRF to disconnect an arbitrary client. | [] | null | null | null | null |
PYSEC-2024-21 | null | A vulnerability classified as critical was found in van_der_Schaar LAB TemporAI 0.0.3. Affected by this vulnerability is the function load_from_file of the component PKL File Handler. The manipulation leads to deserialization. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-252181 was assigned to this vulnerability. NOTE: The vendor was contacted early and confirmed immediately the existence of the issue. A patch is planned to be released in February 2024. | [] | null | 8.8 | null | null |
GHSA-xw32-6422-frqm | Pagekit Cross-site Scripting vulnerability | Pagekit 1.0.18 is vulnerable to Cross Site Scripting (XSS) in index.php/admin/site/widget. | [] | 5.3 | 6.1 | null | null |
CVE-2018-0287 | A vulnerability in the Cisco WebEx Network Recording Player for Advanced Recording Format (ARF) files could allow an unauthenticated, remote attacker to execute arbitrary code on an affected system. The vulnerability is due to a design flaw in the affected software. An attacker could exploit this vulnerability by sending a user an email attachment or link to a malicious ARF file and persuading the user to open the file or follow the link. A successful exploit could allow the attacker to execute arbitrary code on the user's system. This vulnerability affects Cisco WebEx Business Suite meeting sites, Cisco WebEx Meetings sites, Cisco WebEx Meetings Server, and Cisco WebEx ARF players. Cisco Bug IDs: CSCvh70213, CSCvh70222, CSCvh70228. | [
"cpe:2.3:a:cisco:webex_meetings_online:t30:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_meetings_online:t32.7:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.8 |
|
CVE-2022-27452 | MariaDB Server v10.9 and below was discovered to contain a segmentation fault via the component sql/item_cmpfunc.cc. | [
"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
GHSA-v52w-8549-jpj5 | Vulnerability in wordpress plugin eventr v1.02.2, The edit.php form and event_form.php code do not sanitize input, this allows for blind SQL injection via the event parameter. | [] | null | null | 9.8 | null |
|
GHSA-2j74-fvxg-qf8v | Cross-site scripting (XSS) vulnerability in members/profileCommentsResponse.php in Rayzz Photoz allows remote attackers to inject arbitrary web script or HTML via the profileCommentTextArea parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | [] | null | null | null | null |
|
CVE-2011-4675 | The pathname canonicalization functionality in io/filesystem/filesystem.cc in Widelands before 15.1 expands leading ~ (tilde) characters to home-directory pathnames but does not restrict use of these characters in strings received from the network, which might allow remote attackers to conduct absolute path traversal attacks and overwrite arbitrary files via a ~ in a pathname that is used for a file transfer in an Internet game, a different vulnerability than CVE-2011-1932. | [
"cpe:2.3:a:widelands:widelands:-:build1:*:*:*:*:*:*",
"cpe:2.3:a:widelands:widelands:-:build10:*:*:*:*:*:*",
"cpe:2.3:a:widelands:widelands:-:build10_release_candidate:*:*:*:*:*:*",
"cpe:2.3:a:widelands:widelands:-:build11:*:*:*:*:*:*",
"cpe:2.3:a:widelands:widelands:-:build11_release_candidate:*:*:*:*:*:*",
"cpe:2.3:a:widelands:widelands:-:build12:*:*:*:*:*:*",
"cpe:2.3:a:widelands:widelands:-:build12_release_candidate:*:*:*:*:*:*",
"cpe:2.3:a:widelands:widelands:-:build13:*:*:*:*:*:*",
"cpe:2.3:a:widelands:widelands:-:build13_release_candidate:*:*:*:*:*:*",
"cpe:2.3:a:widelands:widelands:-:build13_release_candidate2:*:*:*:*:*:*",
"cpe:2.3:a:widelands:widelands:-:build14:*:*:*:*:*:*",
"cpe:2.3:a:widelands:widelands:-:build14_release_candidate:*:*:*:*:*:*",
"cpe:2.3:a:widelands:widelands:-:build2:*:*:*:*:*:*",
"cpe:2.3:a:widelands:widelands:-:build3:*:*:*:*:*:*",
"cpe:2.3:a:widelands:widelands:-:build4:*:*:*:*:*:*",
"cpe:2.3:a:widelands:widelands:-:build5:*:*:*:*:*:*",
"cpe:2.3:a:widelands:widelands:-:build6:*:*:*:*:*:*",
"cpe:2.3:a:widelands:widelands:-:build7:*:*:*:*:*:*",
"cpe:2.3:a:widelands:widelands:-:build8:*:*:*:*:*:*",
"cpe:2.3:a:widelands:widelands:-:build9:*:*:*:*:*:*"
] | null | null | null | 6.4 |
|
GHSA-38mm-h2h2-77mm | An exploitable SQL injection vulnerability exists in ‘getAssets.jsp’ page of OpenClinic GA 5.173.3. The serialnumber parameter in the getAssets.jsp page is vulnerable to unauthenticated SQL injection. An attacker can make an authenticated HTTP request to trigger this vulnerability. | [] | null | 9.8 | null | null |
|
CVE-2022-26877 | Asana Desktop before 1.6.0 allows remote attackers to exfiltrate local files if they can trick the Asana desktop app into loading a malicious web page. | [
"cpe:2.3:a:asana:desktop:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4.3 |
|
CVE-2018-18338 | Incorrect, thread-unsafe use of SkImage in Canvas in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:linux_workstation:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.8 |
|
CVE-2021-32706 | (Authenticated) Remote Code Execution Possible in Web Interface 5.5 | Pi-hole's Web interface provides a central location to manage a Pi-hole instance and review performance statistics. Prior to Pi-hole Web interface version 5.5.1, the `validDomainWildcard` preg_match filter allows a malicious character through that can be used to execute code, list directories, and overwrite sensitive files. The issue lies in the fact that one of the periods is not escaped, allowing any character to be used in its place. A patch for this vulnerability was released in version 5.5.1. | [
"cpe:2.3:a:pi-hole:pi-hole:*:*:*:*:*:*:*:*"
] | null | 7.6 | null | null |
GHSA-fxpg-gg9g-76gj | Cross-site scripting in django | Cross-site scripting (XSS) vulnerability in Django 1.2.x before 1.2.2 allows remote attackers to inject arbitrary web script or HTML via a csrfmiddlewaretoken (aka csrf_token) cookie. | [] | 5.3 | 6.1 | null | null |
GHSA-3rcf-g93x-vh3q | Missing Authorization vulnerability in Jose Specific Content For Mobile allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Specific Content For Mobile: from n/a through 0.5.3. | [] | null | 4.3 | null | null |
|
GHSA-xx6c-8hhq-9qc2 | Stack overflow vulnerability in parse_mul_div_rem Cesanta MJS 1.20.1, allows remote attackers to cause a Denial of Service (DoS) via a crafted file. | [] | null | 5.5 | null | null |
|
CVE-2015-10060 | MNBikeways database views.py sql injection | A vulnerability was found in MNBikeways database and classified as critical. This issue affects some unknown processing of the file Data/views.py. The manipulation of the argument id1/id2 leads to sql injection. The identifier of the patch is 829a027aca7c17f5a7ec1addca8dd5d5542f86ac. It is recommended to apply a patch to fix this issue. The identifier VDB-218417 was assigned to this vulnerability. | [
"cpe:2.3:a:mnbikeways_database_project:mnbikeways_database:*:*:*:*:*:*:*:*"
] | null | 5.5 | 5.5 | 5.2 |
GHSA-r3xc-47qg-h929 | Cross-Site Scripting in @ionic/core | Versions of `@ionic/core` prior to 4.0.3, 4.1.3, 4.2.1 or 4.3.1 are vulnerable to Cross-Site Scripting (XSS). The package uses the unsafe `innerHTML` function without sanitizing input, which may allow attackers to execute arbitrary JavaScript on the victim's browser. This issue affects the components:`<ion-alert>.message``<ion-searchbar>.placeholder``<ion-infinite-scroll-content>.loadingText``<ion-refresher-content>.pullingText``<ion-refresher-content>.refershingText`RecommendationIf you are using @ionic/core 4.0.x, upgrade to 4.0.3 or later.If you are using @ionic/core 4.1.x, upgrade to 4.1.3 or later.If you are using @ionic/core 4.2.x, upgrade to 4.2.1 or later.If you are using @ionic/core 4.3.x, upgrade to 4.3.1 or later. | [] | null | null | null | null |
CVE-2023-23328 | A File Upload vulnerability exists in AvantFAX 3.3.7. An authenticated user can bypass PHP file type validation in FileUpload.php by uploading a specially crafted PHP file. | [
"cpe:2.3:a:avantfax:avantfax:3.3.7:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
|
GHSA-7257-q8p3-hc2f | Improper Restriction of Excessive Authentication Attempts vulnerability in CodePeople Appointment Hour Booking allows Removing Important Client Functionality.This issue affects Appointment Hour Booking: from n/a through 1.4.56. | [] | null | 5.3 | null | null |
|
GHSA-4rj9-473r-rjfw | Improper error handling in firmware of some SSD DC Products may allow an attacker to enable denial of service. | [] | null | 6.5 | null | null |
|
RHSA-2017:1422 | Red Hat Security Advisory: Red Hat Directory Server 9 - Final Day Of Retirement Notice | This is the final day of notification for the retirement of Red Hat Directory Server 9. | [
"cpe:/a:redhat:directory_server:9"
] | null | null | null | null |
GHSA-qvmh-jjj7-qmh6 | PHP remote file inclusion vulnerability in connexion.php in PHPGKit 0.9 allows remote attackers to execute arbitrary PHP code via a URL in the DOCUMENT_ROOT parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | [] | null | null | null | null |
|
CVE-2019-7965 | Adobe Acrobat and Reader versions 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution . | [
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
|
GHSA-mfh5-wqqv-jp8q | IBM Rhapsody DM 5.0 through 5.0.2 and 6.0 through 6.0.5 is vulnerable to a XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 140091. | [] | null | null | 7.1 | null |
|
CVE-2004-0205 | Buffer overflow in Microsoft Internet Information Server (IIS) 4.0 allows local users to execute arbitrary code via the redirect function. | [
"cpe:2.3:a:avaya:ip600_media_servers:*:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_information_server:4.0:*:*:*:*:*:*:*",
"cpe:2.3:h:avaya:definity_one_media_server:*:*:*:*:*:*:*:*",
"cpe:2.3:h:avaya:s8100:*:*:*:*:*:*:*:*",
"cpe:2.3:o:avaya:modular_messaging_message_storage_server:s3400:*:*:*:*:*:*:*"
] | null | null | null | 7.2 |
|
GHSA-84qg-hv4f-j8w8 | Mozilla Firefox before 41.0, when reader mode is enabled, allows remote attackers to spoof the relationship between address-bar URLs and web content via a crafted web site. | [] | null | null | null | null |
|
GHSA-4x34-w43g-2cfc | ** DISPUTED ** Mobile Devices (aka MDI) C4 OBD-II dongles with firmware 2.x and 3.4.x, as used in Metromile Pulse and other products, do not validate firmware updates, which allows remote attackers to execute arbitrary code by specifying an update server. NOTE: the vendor states "This was a flaw for the developer/debugging devices, and was fixed in production version about 3 years ago." | [] | null | null | null | null |
|
CVE-2018-0480 | Cisco IOS XE Software Errdisable Denial of Service Vulnerability | A vulnerability in the errdisable per VLAN feature of Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to cause the device to crash, leading to a denial of service (DoS) condition. The vulnerability is due to a race condition that occurs when the VLAN and port enter an errdisabled state, resulting in an incorrect state in the software. An attacker could exploit this vulnerability by sending frames that trigger the errdisable condition. A successful exploit could allow the attacker to cause the affected device to crash, leading to a DoS condition. | [
"cpe:2.3:o:cisco:ios_xe:3.6\\(5\\):*:*:*:*:*:*:*"
] | null | null | 6.1 | 5.7 |
GHSA-7q87-cj95-29mc | Buffer Overflow vulnerability in tvnviewer.exe of TightVNC Viewer allows a remote attacker to execute arbitrary instructions via a crafted FramebufferUpdate packet from a VNC server. | [] | null | null | null | null |
|
GHSA-j37h-9m2q-gr9m | A vulnerability, which was classified as problematic, has been found in SourceCodester Contact Manager with Export to VCF 1.0. Affected by this issue is some unknown functionality of the file index.html. The manipulation of the argument contact_name leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. | [] | 5.3 | 3.5 | null | null |
|
GHSA-v9q3-wwmw-45rq | The Recruitment module in Humanica Humatrix 7 1.0.0.203 and 1.0.0.681 allows an unauthenticated attacker to upload any file type to a candidate's profile picture folder via a crafted recruitment_online/personalData/act_personaltab.cfm multiple-part POST request with a predictable WRC01_USERID parameter. Moreover, the attacker can upload executable content (e.g., asp or aspx) for executing OS commands on the server. | [] | null | null | null | null |
|
CVE-2009-4588 | Heap-based buffer overflow in the WindsPlayerIE.View.1 ActiveX control in WindsPly.ocx 3.5.0.0 Beta, 3.0.0.5, and earlier in AwingSoft Awakening Web3D Player and Winds3D Viewer allows remote attackers to cause a denial of service (application crash) or execute arbitrary code via a long SceneUrl property value, a different vulnerability than CVE-2009-2386. NOTE: some of these details are obtained from third party information. | [
"cpe:2.3:a:awingsoft:awakening_winds3d_player:3.0.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:awingsoft:awakening_winds3d_player:3.5.0.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:awingsoft:awakening_winds3d_viewer:3.0.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:awingsoft:awakening_winds3d_viewer:3.5.0.0:beta:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
GHSA-fm7f-2pvq-7cvg | Mediahouse Statistics Server 5.02x allows remote attackers to execute arbitrary commands via a long HTTP GET request. | [] | null | null | null | null |
|
CVE-2018-16157 | waimai Super Cms 20150505 has a logic flaw allowing attackers to modify a price, before form submission, by observing data in a packet capture. By setting the index.php?m=cart&a=save item_totals parameter to zero, the entire cart is sold for free. | [
"cpe:2.3:a:bijiadao:waimai_super_cms:20150505:*:*:*:*:*:*:*"
] | null | null | 5.3 | 5 |
|
RHSA-2024:3314 | Red Hat Security Advisory: OpenShift Virtualization 4.15.2 Images security update | follow-redirects: Improper Input Validation due to the improper handling of URLs by the url.parse() golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS axios: exposure of confidential data stored in cookies | [
"cpe:/a:redhat:container_native_virtualization:4.15::el9"
] | null | 6.5 | null | null |
RHSA-2013:0581 | Red Hat Security Advisory: libxml2 security update | libxml2: CPU consumption DoS when performing string substitutions during entities expansion | [
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
GHSA-f4f5-m8x5-6hhq | Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK & Compiler before 20.0.0.260 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0964, CVE-2016-0965, CVE-2016-0966, CVE-2016-0967, CVE-2016-0969, CVE-2016-0970, CVE-2016-0972, CVE-2016-0976, CVE-2016-0977, CVE-2016-0978, CVE-2016-0979, CVE-2016-0980, and CVE-2016-0981. | [] | null | null | 9.8 | null |
|
CVE-2006-5502 | Heap-based buffer overflow in the AOL.PicDownloadCtrl.1 ActiveX control (YGPPicDownload.dll) 9.2.3.0 in America Online (AOL) 9.0 Security Edition allows remote attackers to execute arbitrary code via the AddPictureNoAlbum method, a different vulnerability than CVE-2006-5501. | [
"cpe:2.3:a:aol:aol:9.0:*:security:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-437p-76r5-9789 | An Insufficient Entropy vulnerability in the Schweitzer Engineering Laboratories SEL-451 could allow an unauthenticated remote attacker to brute-force session tokens and bypass authentication.See product Instruction Manual Appendix A dated 20230830 for more details. | [] | null | 7.5 | null | null |
|
CVE-2023-33890 | In telephony service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. | [
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc7731e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc9832e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t310:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
|
CVE-2005-2412 | PHP remote file inclusion vulnerability in block.php in PHP FirstPost allows remote attackers to execute arbitrary PHP code via the Include parameter. | [
"cpe:2.3:a:php_firstpost:php_firstpost:*:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2008-4779 | Stack-based buffer overflow in TUGzip 3.5.0.0 allows remote attackers to denial of service (crash) or execute arbitrary code via a long filename in a .zip file. | [
"cpe:2.3:a:tguzip:tguzip:3.5.5.0.0:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
GHSA-f6qg-q7hh-hg9w | A vulnerability was found in SourceCodester Online Motorcycle Rental System 1.0. It has been declared as problematic. This vulnerability affects unknown code of the file /admin/?page=bike of the component Bike List. The manipulation of the argument Model with the input "><script>confirm (document.cookie)</script> leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-242170 is the identifier assigned to this vulnerability. | [] | null | null | 2.4 | null |
|
GHSA-6524-8pr6-358q | Integer overflow in the fbShmPutImage function in the MIT-SHM extension in the X server 1.4 in X.Org X11R7.3 allows context-dependent attackers to read arbitrary process memory via crafted values for a Pixmap width and height. | [] | null | null | null | null |
|
CVE-2023-23019 | Cross site scripting (XSS) vulnerability in file main.php in sourcecodester oretnom23 Blog Site 1.0 via the name and email parameters to function user_add.\ | [
"cpe:2.3:a:sourcecodester:blog_site:1.0:*:*:*:*:*:*:*"
] | null | 5.4 | null | null |
|
CVE-2012-5547 | Multiple cross-site request forgery (CSRF) vulnerabilities in the Search API module 7.x-1.x before 7.x-1.3 for Drupal allow remote attackers to hijack the authentication of administrators for requests that (1) enable a server via a server action or (2) enable a search index via an enable index action. | [
"cpe:2.3:a:thomas_seidl:search_api:7.x-1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:thomas_seidl:search_api:7.x-1.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:thomas_seidl:search_api:7.x-1.0:beta10:*:*:*:*:*:*",
"cpe:2.3:a:thomas_seidl:search_api:7.x-1.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:thomas_seidl:search_api:7.x-1.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:thomas_seidl:search_api:7.x-1.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:thomas_seidl:search_api:7.x-1.0:beta5:*:*:*:*:*:*",
"cpe:2.3:a:thomas_seidl:search_api:7.x-1.0:beta6:*:*:*:*:*:*",
"cpe:2.3:a:thomas_seidl:search_api:7.x-1.0:beta7:*:*:*:*:*:*",
"cpe:2.3:a:thomas_seidl:search_api:7.x-1.0:beta8:*:*:*:*:*:*",
"cpe:2.3:a:thomas_seidl:search_api:7.x-1.0:beta9:*:*:*:*:*:*",
"cpe:2.3:a:thomas_seidl:search_api:7.x-1.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:thomas_seidl:search_api:7.x-1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:thomas_seidl:search_api:7.x-1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:thomas_seidl:search_api:7.x-1.x:dev:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:-:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
GHSA-4x7j-vfwq-rj38 | projeqtor up to 11.2.0 was discovered to contain a remote code execution (RCE) vulnerability via the component /view/print.php. | [] | null | 8.8 | null | null |
|
CVE-2008-2561 | Multiple cross-site scripting (XSS) vulnerabilities in 427BB 2.3.1 allow remote attackers to inject arbitrary web script or HTML via the (1) PATH_INFO to (a) register.php, (b) reminder.php, and (c) search.php; the (2) uname, (3) email, and (4) email2 parameters to register.php; the (5) email parameter to reminder.php; and the (6) keywords parameter to search.php. | [
"cpe:2.3:a:fourtwosevenbb:427bb:2.3.1:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2008-3580 | Multiple SQL injection vulnerabilities in Qsoft K-Links allow remote attackers to execute arbitrary SQL commands via (1) the id parameter to visit.php, or the PATH_INFO to the default URI under (2) report/, (3) addreview/, or (4) refer/. | [
"cpe:2.3:a:qsoft:k-links:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
cisco-sa-anyconnect-dos-hMhyDfb8 | Cisco AnyConnect Secure Mobility Client for Windows Denial of Service Vulnerability | A vulnerability in Cisco AnyConnect Secure Mobility Client for Windows could allow an authenticated, local attacker to cause a denial of service (DoS) condition on an affected system.
This vulnerability is due to uncontrolled memory allocation. An attacker could exploit this vulnerability by copying a crafted file to a specific folder on the system. A successful exploit could allow the attacker to crash the VPN Agent service when the affected application is launched, causing it to be unavailable to all users of the system. To exploit this vulnerability, the attacker must have valid credentials on a multiuser Windows system.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
| [] | null | 5.5 | null | null |
CVE-2016-8486 | An information disclosure vulnerability in Qualcomm closed source components. Product: Android. Versions: Android kernel. Android ID: A-28823691. | [
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
CVE-2023-46001 | Buffer Overflow vulnerability in gpac MP4Box v.2.3-DEV-rev573-g201320819-master allows a local attacker to cause a denial of service via the gpac/src/isomedia/isom_read.c:2807:51 function in gf_isom_get_user_data. | [
"cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*",
"cpe:2.3:a:gpac:gpac:2.3-dev-rev573-g201320819-master:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
|
RHSA-2024:5929 | Red Hat Security Advisory: postgresql:16 security update | postgresql: PostgreSQL pg_stats_ext and pg_stats_ext_exprs lack authorization checks postgresql: PostgreSQL relation replacement during pg_dump executes arbitrary SQL | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
CVE-2021-45606 | Certain NETGEAR devices are affected by a stack-based buffer overflow by an authenticated user. This affects R6400 before 1.0.1.70, R7000 before 1.0.11.126, R7900 before 1.0.4.46, R7900P before 1.4.2.84, R7960P before 1.4.2.84, R8000 before 1.0.4.74, R8000P before 1.4.2.84, RAX200 before 1.0.4.120, RS400 before 1.5.1.80, R6400v2 before 1.0.4.118, R7000P before 1.3.3.140, RAX80 before 1.0.4.120, R6700v3 before 1.0.4.118, R6900P before 1.3.3.140, and RAX75 before 1.0.4.120. | [
"cpe:2.3:o:netgear:r6400_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6400:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r7000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r7900_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7900:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r7900p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7900p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r7960p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7960p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r8000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r8000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r8000p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r8000p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r7000p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7000p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6900p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6900p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6700v3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6700v3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6400v2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6400v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rax200_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rax200:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rax80_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rax80:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rax75_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rax75:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rs400_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rs400:-:*:*:*:*:*:*:*"
] | null | 4.5 | null | null |
|
GHSA-j5c2-6xq9-fj5m | Crafted web server requests can be utilised to read partial stack or heap memory or may trigger a denial-of- service condition due to a crash in the CODESYS V2 web server prior to V1.1.9.22. | [] | null | 9.1 | null | null |
|
RHSA-2021:1924 | Red Hat Security Advisory: spice security update | spice: Client initiated renegotiation denial of service | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 5.3 | null | null |
GHSA-wwg3-85gh-r583 | A vulnerability was found in ESAFENET CDG 5. It has been classified as critical. This affects the function actionDelNetSecConfig of the file /com/esafenet/servlet/netSec/NetSecConfigService.java. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | [] | 5.3 | 6.3 | null | null |
|
GHSA-9crf-rxmh-772m | `AppendEncodedAttributeValue(), ExtraSpaceNeededForAttrEncoding()` and `AppendEncodedCharacters()` could have experienced integer overflows, causing underallocation of an output buffer leading to an out of bounds write. This vulnerability affects Firefox < 124, Firefox ESR < 115.9, and Thunderbird < 115.9. | [] | null | 8.4 | null | null |
|
CVE-2010-2978 | Cisco Unified Wireless Network (UWN) Solution 7.x before 7.0.98.0 does not use an adequate message-digest algorithm for a self-signed certificate, which allows remote attackers to bypass intended access restrictions via vectors involving collisions, aka Bug ID CSCtd67660. | [
"cpe:2.3:o:cisco:unified_wireless_network_solution_software:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:unified_wireless_network_solution_software:7.0.98.0:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
RHSA-2005:410 | Red Hat Security Advisory: gftp security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
CVE-2019-8832 | A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 13.3 and iPadOS 13.3, watchOS 6.1.1, macOS Catalina 10.15.2, Security Update 2019-002 Mojave, and Security Update 2019-007 High Sierra, tvOS 13.3. An application may be able to execute arbitrary code with system privileges. | [
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | 9.3 |
|
CVE-2004-0318 | Load Sharing Facility (LSF) 4.x, 5.x, and 6.x uses the LSF_EAUTH_UID environment variable, if it exists, instead of the real UID of the user, which could allow remote attackers within the local cluster to gain privileges. | [
"cpe:2.3:a:platform:lsf:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:platform:lsf:4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:platform:lsf:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:platform:lsf:5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:platform:lsf:6.0:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
GHSA-cwww-r96m-r246 | IBM Lotus Domino 7.0.x before 7.0.3 does not revalidate the signature on a signed scheduled agent after the agent is modified, which allows remote authenticated users to gain privileges via a modified agent in a server database. | [] | null | null | null | null |
|
RHEA-2013:1487 | Red Hat Enhancement Advisory: Red Hat CloudForms 3.0 product update | EVM: CSRF postgresql: Insecure switch parsing postgresql: Improper randomization of pgcrypto functions (requiring random seed) postgresql: Improper user privilege check for on-line backups 2: static secret_token.rb value 2: miq_policy/explorer SQL injection interface: Ruby code injection CloudForms: user password stored in recoverable format | [
"cpe:/a:redhat:cloudforms_managementengine:5::el6"
] | null | null | null | null |
GHSA-9x8g-ghgv-j8cf | Cross-site scripting vulnerability in GROWI v3.2.3 and earlier allows remote attackers to inject arbitrary web script or HTML via New Page modal. | [] | null | null | 5.4 | null |
|
GHSA-9pfr-cc3p-p98q | A denial of service vulnerability exists when ASP.NET Core improperly handles web requests, aka "ASP.NET Core Denial of Service Vulnerability." This affects ASP.NET Core 2.2, ASP.NET Core 2.1. This CVE ID is unique from CVE-2019-0564. | [] | null | null | 7.5 | null |
|
GHSA-ff3c-rr6h-7f7f | Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK & Compiler before 20.0.0.204 allow attackers to bypass intended access restrictions via unspecified vectors, a different vulnerability than CVE-2015-8440 and CVE-2015-8453. | [] | null | null | null | null |
|
GHSA-rq94-cx6g-vxm4 | Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are Prior to 5.2.28 and prior to 6.0.6. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 7.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). | [] | null | null | null | null |
|
GHSA-f2h7-gjwf-vghv | Possible memory corruption due to lack of validation of client data used for memory allocation in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Wearables | [] | null | null | null | null |
|
CVE-2024-41719 | BIG-IP Next Central Manager vulnerability | When generating QKView of BIG-IP Next instance from the BIG-IP Next Central Manager (CM), F5 iHealth credentials will be logged in the BIG-IP Central Manager logs. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. | [
"cpe:2.3:a:f5:big-ip_next_central_manager:*:*:*:*:*:*:*:*"
] | 5.1 | 4.2 | null | null |
GHSA-8m56-4ww2-95v5 | PHP remote file inclusion vulnerability in anzeiger/start.php in Swinger Club Portal allows remote attackers to execute arbitrary PHP code via a URL in the go parameter. | [] | null | null | null | null |
|
GHSA-285c-6wq3-96wh | Axublog 1.1.0 allows remote Code Execution as demonstrated by injection of PHP code (contained in the webkeywords parameter) into the cmsconfig.php file. | [] | null | null | 9.8 | null |
|
CVE-2019-15215 | An issue was discovered in the Linux kernel before 5.2.6. There is a use-after-free caused by a malicious USB device in the drivers/media/usb/cpia2/cpia2_usb.c driver. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*",
"cpe:2.3:a:netapp:data_availability_services:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:solidfire_\\&_hci_management_node:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:solidfire_baseboard_management_controller:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"
] | null | 4.6 | null | 4.9 |
|
GHSA-jrq6-66h3-57q6 | The mintToken function of a smart contract implementation for Numisma, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value. | [] | null | null | 7.5 | null |
|
CVE-2019-1155 | Jet Database Engine Remote Code Execution Vulnerability | A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system.
An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file.
The update addresses the vulnerability by correcting the way the Windows Jet Database Engine handles objects in memory.
| [
"cpe:2.3:a:microsoft:office:2010:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2013:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2013:sp1:*:*:rt:*:*:*",
"cpe:2.3:a:microsoft:office:2016:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_365_proplus:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1803:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1803:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_1803:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_1903:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:itanium:*",
"cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_server_2008_r2:*:*:*:*:*:*:itanium:*",
"cpe:2.3:o:microsoft:windows_server_2008_r2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012_r2:*:*:*:*:*:*:x64:*",
"cpe:2.3:a:microsoft:office:2016:*:*:*:*:*:x86:*",
"cpe:2.3:a:microsoft:office:2016:*:*:*:*:*:x64:*",
"cpe:2.3:a:microsoft:excel:2010:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2013:sp1:*:*:*:*:x86:*",
"cpe:2.3:a:microsoft:office:2013:sp1:*:*:*:*:x64:*"
] | null | 7.8 | null | null |
GHSA-f3cp-f6ph-xxhj | In all versions of GitLab CE/EE, an attacker with physical access to a user’s machine may brute force the user’s password via the change password function. There is a rate limit in place, but the attack may still be conducted by stealing the session id from the physical compromise of the account and splitting the attack over several IP addresses and passing in the compromised session value from these various locations. | [] | null | null | null | null |
|
CVE-2020-4020 | The file downloading functionality in the Atlassian Companion App before version 1.0.0 allows remote attackers, who control a Confluence Server instance that the Companion App is connected to, execute arbitrary .exe files via a Protection Mechanism Failure. | [
"cpe:2.3:a:atlassian:companion:*:*:*:*:*:*:*:*"
] | null | 7.2 | null | 6.5 |
|
CVE-2022-26385 | In unusual circumstances, an individual thread may outlive the thread's manager during shutdown. This could have led to a use-after-free causing a potentially exploitable crash. This vulnerability affects Firefox < 98. | [
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | null |
|
RHSA-2017:0127 | Red Hat Security Advisory: runc security and bug fix update | docker: insecure opening of file-descriptor allows privilege escalation | [
"cpe:/a:redhat:rhel_extras_other:7"
] | null | 7.5 | null | null |
GHSA-pp9w-836q-m4cj | In libavc, there is a missing variable initialization. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-112329563 | [] | null | 6.5 | null | null |
|
GHSA-cmx9-v2vm-9c6q | Improper initialization in BIOS firmware for Intel(R) Server Board Families S2600ST, S2600BP and S2600WF may allow a privileged user to potentially enable escalation of privilege via local access. | [] | null | null | null | null |
|
CVE-2011-4023 | Memory leak in libcmd in Cisco NX-OS 5.0 on Nexus switches allows remote authenticated users to cause a denial of service (memory consumption) via SNMP requests, aka Bug ID CSCtr65682. | [
"cpe:2.3:o:cisco:nx-os:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:5.0\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:5.0\\(2\\)n1\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:5.0\\(2\\)n2\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:5.0\\(2\\)n2\\(1a\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:5.0\\(2a\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:5.0\\(3\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1a\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1b\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1c\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(2a\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(2b\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:5.0\\(5\\):*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_2148t_fex_switch:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_2224tp_fex_switch:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_2232pp_fex_switch:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_2232tm_fex_switch:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_2248tp_e_fex_switch:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_2248tp_fex_switch:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5010p_switch:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5020p_switch:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5548p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5548up:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5596up:-:*:*:*:*:*:*:*"
] | null | null | null | 7.8 |
|
GHSA-4f59-hmr5-3f2r | Cisco WebEx Meetings Server allows remote authenticated users to bypass authorization checks and (1) join arbitrary meetings, or (2) terminate a meeting without having a host role, via a crafted URL, aka Bug ID CSCuj42346. | [] | null | null | null | null |
|
GHSA-5c4g-wxx8-6c9r | A memory corruption issue was addressed with improved validation. This issue is fixed in tvOS 15.4, iOS 15.4 and iPadOS 15.4, watchOS 8.5. Processing a maliciously crafted image may lead to heap corruption. | [] | null | 7.8 | null | null |
|
GHSA-6w95-mr48-gp8c | The OpenBlob function in blob.c in GraphicsMagick before 1.3.24 and ImageMagick allows remote attackers to execute arbitrary code via a | (pipe) character at the start of a filename. | [] | null | null | 9.8 | null |
|
CVE-2017-10270 | Vulnerability in the Oracle Identity Manager Connector component of Oracle Fusion Middleware (subcomponent: Microsoft Active Directory). The supported version that is affected is 9.1.1.5.0. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle Identity Manager Connector executes to compromise Oracle Identity Manager Connector. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Identity Manager Connector, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Identity Manager Connector accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Identity Manager Connector. CVSS 3.0 Base Score 8.2 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:H). | [
"cpe:2.3:a:oracle:identity_manager_connector:9.1.1.5.0:*:*:*:*:*:*:*"
] | null | null | 8.2 | 3.3 |
|
CVE-2012-2213 | Squid 3.1.9 allows remote attackers to bypass the access configuration for the CONNECT method by providing an arbitrary allowed hostname in the Host HTTP header. NOTE: this issue might not be reproducible, because the researcher is unable to provide a squid.conf file for a vulnerable system, and the observed behavior is consistent with a squid.conf file that was (perhaps inadvertently) designed to allow access based on a "req_header Host" acl regex that matches www.uol.com.br | [
"cpe:2.3:a:squid-cache:squid:3.1.9:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-5gq9-48pm-v9hx | An exploitable integer overflow exists in the way that the Blender open-source 3d creation suite v2.78c applies a particular object modifier to a Mesh. A specially crafted .blend file can cause an integer overflow resulting in a buffer overflow which can allow for code execution under the context of the application. An attacker can convince a user to open the file or use the file as a library in order to trigger this vulnerability. | [] | null | null | 7.8 | null |
|
CVE-2015-5345 | The Mapper component in Apache Tomcat 6.x before 6.0.45, 7.x before 7.0.68, 8.x before 8.0.30, and 9.x before 9.0.0.M2 processes redirects before considering security constraints and Filters, which allows remote attackers to determine the existence of a directory via a URL that lacks a trailing / (slash) character. | [
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.0:alpha:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.1:alpha:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.2:alpha:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.2:beta:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.4:alpha:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.24:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.26:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.28:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.29:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.30:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.32:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.33:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.35:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.36:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.37:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.39:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.41:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.43:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.44:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.2:beta:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.4:beta:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.5:beta:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.21:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.22:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.23:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.25:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.26:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.27:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.28:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.29:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.30:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.32:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.33:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.34:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.35:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.37:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.39:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.40:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.41:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.42:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.47:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.50:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.52:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.53:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.54:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.55:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.56:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.57:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.59:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.61:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.62:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.63:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.64:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.65:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.0.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.0.0:rc10:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.0.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.0.0:rc5:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.0.21:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.0.22:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.0.23:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.0.24:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.0.26:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.0.27:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.0.28:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.0.29:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone1:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"
] | null | null | 5.3 | 5 |
|
CVE-2013-3124 | Microsoft Internet Explorer 9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3117 and CVE-2013-3122. | [
"cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
GHSA-vjvg-9vgw-x699 | On Supermicro X10 and X11 products, a client's access privileges may be transferred to a different client that later has the same socket file descriptor number. In opportunistic circumstances, an attacker can simply connect to the virtual media service, and then connect virtual USB devices to the server managed by the BMC. | [] | null | null | null | null |
|
GHSA-38rg-8rfh-j366 | eladmin v2.7 and before is vulnerable to Server-Side Request Forgery (SSRF) which allows an attacker to execute arbitrary code via the DatabaseController.java component. | [] | null | 9.8 | null | null |
|
RHSA-2024:7646 | Red Hat Security Advisory: firefox security update | firefox: Clipboard write permission bypass firefox: thunderbird: Compromised content process can bypass site isolation firefox: thunderbird: Cross-origin access to PDF contents through multipart responses firefox: thunderbird: Cross-origin access to JSON contents through multipart responses firefox: thunderbird: Potential memory corruption may occur when cloning certain objects firefox: thunderbird: Potential directory upload bypass via clickjacking firefox: thunderbird: External protocol handlers could be enumerated via popups firefox: thunderbird: Specially crafted WebTransport requests could lead to denial of service firefox: thunderbird: Potential memory corruption during JIT compilation firefox: thunderbird: Memory safety bugs fixed in Firefox 131, Firefox ESR 115.16, Firefox ESR 128.3, Thunderbird 131, and Thunderbird 128.3 firefox: thunderbird: Memory safety bugs fixed in Firefox 131, Firefox ESR 128.3, Thunderbird 131, and Thunderbird 128.3 firefox: thunderbird: Memory safety bugs fixed in Firefox 131 and Thunderbird 131 | [
"cpe:/a:redhat:rhel_aus:8.2::appstream"
] | null | 7.5 | null | null |
CVE-2008-4647 | SQL injection vulnerability in index.php in sweetCMS 1.5.2 allows remote attackers to execute arbitrary SQL commands via the page parameter. | [
"cpe:2.3:a:sweetcms:sweetcms:1.5.2:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
RHSA-2023:6840 | Red Hat Security Advisory: OpenShift Container Platform 4.14.2 packages and security update | golang: net/http: insufficient sanitization of Host header golang: crypto/tls: slow verification of certificate chains containing large RSA keys golang: html/template: improper handling of HTML-like comments within script contexts golang: html/template: improper handling of special tags within script contexts golang: crypto/tls: panic when processing post-handshake message on QUIC connections golang: crypto/tls: lack of a limit on buffered post-handshake golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) | [
"cpe:/a:redhat:openshift:4.14::el8",
"cpe:/a:redhat:openshift:4.14::el9"
] | null | 7.5 | null | null |
CVE-2007-1968 | PHP remote file inclusion vulnerability in games.php in Sam Crew MyBlog, possibly 1.0 through 1.6, allows remote attackers to execute arbitrary PHP code via a URL in the scoreid parameter. | [
"cpe:2.3:a:sam_crew:myblog:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sam_crew:myblog:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:sam_crew:myblog:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:sam_crew:myblog:1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:sam_crew:myblog:1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:sam_crew:myblog:1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:sam_crew:myblog:1.6:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
CVE-2014-4757 | The Outlook Extension in IBM Content Collector 4.0.0.x before 4.0.0.0-ICC-OE-IF004 allows local users to bypass the intended Reviewer privilege requirement and read e-mail messages from an arbitrary mailbox by invoking the Search function. | [
"cpe:2.3:a:ibm:content_collector:4.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:content_collector:4.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:content_collector:4.0.0.2:*:*:*:*:*:*:*"
] | null | null | null | 2.1 |
|
CVE-2024-49683 | WordPress Schema & Structured Data for WP & AMP plugin <= 1.3.5 - Sensitive Data Exposure vulnerability | Missing Authorization vulnerability in Schema & Structured Data for WP & AMP allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Schema & Structured Data for WP & AMP: from n/a through 1.3.5. | [] | null | 5.3 | null | null |
ICSMA-18-142-01 | BD Kiestra and InoquIA Systems (Update A) | A vulnerability in DB Manager and PerformA allows an authorized user with access to a privileged account on a BD Kiestra system to issue SQL commands, which may result in data corruption.CVE-2018-10593 has been assigned to this vulnerability. A CVSS v3 base score of 5.6 has been calculated; the CVSS vector string is (AV:A/AC:H/PR:H/UI:R/S:U/C:N/I:H/A:H). A vulnerability in ReadA allows an authorized user with access to a privileged account on a BD Kiestra system to issue SQL commands, which may result in loss or corruption of data.CVE-2018-10595 has been assigned to this vulnerability. A CVSS v3 base score of 6.3 has been calculated; the CVSS vector string is (AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H). | [] | null | null | 6.3 | null |
Subsets and Splits