id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
57.2k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-7qrj-vh9v-fwc5 | mySCADA myPRO: Versions 8.20.0 and prior has a feature where the password can be specified, which may allow an attacker to inject arbitrary operating system commands through a specific parameter. | [] | null | null | null | null |
|
CVE-2008-5417 | HP DECnet-Plus 8.3 before ECO03 for OpenVMS on the Alpha platform uses world-writable permissions for the OSIT$NAMES logical name table, which allows local users to bypass intended access restrictions and modify this table via the (1) SYS$CRELNM and (2) SYS$DELLNM system services. | [
"cpe:2.3:a:hp:decnet_plus_for_openvms:8.3:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:openvms:8.3:*:*:*:*:*:*:*"
] | null | null | null | 2.1 |
|
GHSA-rw97-r8p5-64w5 | Unspecified vulnerability in the Oracle Agile Engineering Data Management component in Oracle Supply Chain Products Suite 6.1.3.0 and 6.2.0.0 allows remote attackers to affect availability via vectors related to Engineering Communication Interface. | [] | null | null | 3.1 | null |
|
CVE-2020-16103 | Type confusion in Gallagher Command Centre Server allows a remote attacker to crash the server or possibly cause remote code execution. This issue affects: Gallagher Command Centre 8.30 versions prior to 8.30.1236(MR1); 8.20 versions prior to 8.20.1166(MR3); 8.10 versions prior to 8.10.1211(MR5); version 8.00 and prior versions. | [
"cpe:2.3:a:gallagher:command_centre:*:*:*:*:*:*:*:*",
"cpe:2.3:a:gallagher:command_centre:8.10.1211:-:*:*:*:*:*:*",
"cpe:2.3:a:gallagher:command_centre:8.10.1211:maintenance_release5:*:*:*:*:*:*",
"cpe:2.3:a:gallagher:command_centre:8.20.1166:-:*:*:*:*:*:*",
"cpe:2.3:a:gallagher:command_centre:8.20.1166:maintenance_release3:*:*:*:*:*:*",
"cpe:2.3:a:gallagher:command_centre:8.30.1236:-:*:*:*:*:*:*",
"cpe:2.3:a:gallagher:command_centre:8.30.1236:maintenance_release1:*:*:*:*:*:*"
] | null | 8.8 | null | null |
|
GHSA-899p-4hpj-22f4 | IBM Planning Analytics 2.0 is vulnerable to server-side request forgery (SSRF). This may allow an authenticated attacker to send unauthorized requests from the system, potentially leading to network enumeration or facilitating other attacks. IBM X-Force ID: 219736. | [] | null | 7.3 | null | null |
|
CVE-2017-9445 | In systemd through 233, certain sizes passed to dns_packet_new in systemd-resolved can cause it to allocate a buffer that's too small. A malicious DNS server can exploit this via a response with a specially crafted TCP payload to trick systemd-resolved into allocating a buffer that's too small, and subsequently write arbitrary data beyond the end of it. | [
"cpe:2.3:a:systemd_project:systemd:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
CVE-2018-20677 | In Bootstrap before 3.4.0, XSS is possible in the affix configuration target property. | [
"cpe:2.3:a:getbootstrap:bootstrap:*:*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 |
|
CVE-2012-1484 | Unspecified vulnerability in the WaliSMS CN (cn.com.wali.walisms) application 2.9.2 and 3.7.0 for Android has unknown impact and attack vectors. | [
"cpe:2.3:a:wali:walisms_cn:2.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wali:walisms_cn:3.7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
CVE-2009-2817 | Buffer overflow in Apple iTunes before 9.0.1 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted .pls file. | [
"cpe:2.3:a:apple:itunes:*:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:*:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:1.0:*:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:1.0:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:1.0:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:1.1.1:*:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:1.1.1:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:1.1.1:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:1.1.2:*:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:1.1.2:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:1.1.2:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:2.0:*:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:2.0:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:2.0:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:2.0.1:*:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:2.0.1:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:2.0.1:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:2.0.2:*:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:2.0.2:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:2.0.2:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:2.0.3:*:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:2.0.3:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:2.0.3:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:2.0.4:*:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:2.0.4:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:2.0.4:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:3.0:*:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:3.0.1:*:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.0:*:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.0.0:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.0.0:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.0.1:*:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.0.1:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.0.1:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.1:*:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.1.0:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.1.0:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.2:*:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.2.0:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.2.0:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.2.72:*:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.5:*:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.5.0:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.5.0:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.6:*:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.6.0:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.6.0:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.7:*:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.7.0:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.7.0:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.7.1:*:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.7.1:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.7.1:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.7.1.30:*:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.8:*:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.8.0:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.8.0:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.9:*:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.9.0:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.9.0:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:5.0:*:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:5.0.0:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:5.0.0:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:5.0.1:*:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:5.0.1:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:5.0.1:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:6.0:*:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:6.0.0:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:6.0.0:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:6.0.1:*:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:6.0.1:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:6.0.1:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:6.0.2:*:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:6.0.2:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:6.0.2:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:6.0.3:*:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:6.0.3:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:6.0.3:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:6.0.4:*:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:6.0.4:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:6.0.4:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:6.0.4.2:*:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:6.0.5:*:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:6.0.5:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:6.0.5:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.0.0:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.0.0:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.0.1:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.0.1:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.0.2:*:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.0.2:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.0.2:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.1.0:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.1.0:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.1.1:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.1.1:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.2.0:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.2.0:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.3.0:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.3.0:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.3.1:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.3.1:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.3.2:*:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.3.2:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.3.2:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.4:*:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.4.0:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.4.0:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.4.1:*:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.4.1:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.4.1:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.4.2:*:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.4.2:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.4.2:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.4.3:*:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.5:*:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.5.0:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.5.0:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.6:*:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.6.0:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.6.0:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.6.1:*:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.6.1:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.6.1:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.6.2:*:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.6.2:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.6.2:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.7:*:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.7.0:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.7.0:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.7.1:*:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.7.1:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.7.1:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:8.0:*:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:8.0:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:8.0:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:8.0.0:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:8.0.0:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:8.0.1:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:8.0.2:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:8.0.2:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:8.1:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:8.1:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:8.1.1:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:8.1.1:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:8.2:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:8.2:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:8.2.1:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:8.2.1:-:windows:*:*:*:*:*"
] | null | null | null | 9.3 |
|
GHSA-jfw7-2fxj-fw3j | A CWE-257: Storing Passwords in a Recoverable Format vulnerability exists that could result in unwanted access to a DCE instance when performed over a network by a malicious third-party. Affected Products: Data Center Expert (Versions prior to V7.9.0) | [] | null | 9.8 | null | null |
|
GHSA-9gqr-xp86-f87h | Code injection in npm git | All versions of package git are vulnerable to Remote Code Execution (RCE) due to missing sanitization in the Git.git method, which allows execution of OS commands rather than just git commands. At this time, there is no known workaround. There has been no patch released. | [] | null | 6.6 | null | null |
CVE-2022-31875 | Trendnet IP-110wn camera fw_tv-ip110wn_v2(1.2.2.68) has an xss vulnerability via the proname parameter in /admin/scheprofile.cgi | [
"cpe:2.3:o:trendnet:tv-ip110wn_firmware:1.2.2.68:*:*:*:*:*:*:*",
"cpe:2.3:h:trendnet:tv-ip110wn:-:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 |
|
CVE-2022-4905 | UDX Stateless Media Plugin class-settings.php setup_wizard_interface cross site scripting | A vulnerability was found in UDX Stateless Media Plugin 3.1.1 on WordPress. It has been declared as problematic. This vulnerability affects the function setup_wizard_interface of the file lib/classes/class-settings.php. The manipulation of the argument settings leads to cross site scripting. The attack can be initiated remotely. Upgrading to version 3.2.0 is able to address this issue. The patch is identified as 6aee7ae0b0beeb2232ce6e1c82aa7e2041ae151a. It is recommended to upgrade the affected component. VDB-220750 is the identifier assigned to this vulnerability. | [
"cpe:2.3:a:udx:stateless_media_plugin:3.1.1:*:*:*:*:wordpress:*:*"
] | null | 3.5 | 3.5 | 4 |
CVE-2022-27162 | CSZ CMS 1.2.2 is vulnerable to SQL Injection via cszcms_admin_Members_editUser | [
"cpe:2.3:a:cszcms:csz_cms:1.2.2:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
|
CVE-2022-2886 | Laravel deserialization | A vulnerability, which was classified as critical, was found in Laravel 5.1. Affected is an unknown function. The manipulation leads to deserialization. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-206688. | [
"cpe:2.3:a:laravel:laravel:*:*:*:*:*:*:*:*"
] | null | 5 | null | null |
CVE-2006-7220 | Unspecified vulnerability in SAP SAPLPD and SAPSPRINT allows remote attackers to cause a denial of service (application crash) via a certain print job request. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | [
"cpe:2.3:a:sap:saplpd:*:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:sapsprint:*:*:*:*:*:*:*:*"
] | null | null | null | 7.8 |
|
GHSA-2jxj-259p-q826 | class.showtime2_image.php in CMS Made Simple (CMSMS) before 2.2.10 does not ensure that a watermark file has a standard image file extension (GIF, JPG, JPEG, or PNG). | [] | null | null | 6.5 | null |
|
GHSA-rpx6-6266-hrf9 | A vulnerability has been found in Ruijie EG2000K 11.1(6)B2 and classified as critical. This vulnerability affects unknown code of the file /tool/index.php?c=download&a=save. The manipulation of the argument content leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | [] | 5.1 | 4.7 | null | null |
|
CVE-2024-25737 | A Server-Side Request Forgery (SSRF) vulnerability in the /Cover/Show route (showAction in CoverController.php) in Open Library Foundation VuFind 2.4 through 9.1 before 9.1.1 allows remote attackers to access internal HTTP servers and perform Cross-Site Scripting (XSS) attacks by proxying arbitrary URLs via the proxy GET parameter. | [] | null | 5.4 | null | null |
|
GHSA-3xrp-cm65-f8f5 | A SQL Injection vulnerability in the OPCUA interface of Gallagher Command Centre allows a remote unprivileged Command Centre Operator to modify Command Centre databases undetected. This issue affects: Gallagher Command Centre 8.40 versions prior to 8.40.1888 (MR3); 8.30 versions prior to 8.30.1359 (MR3); 8.20 versions prior to 8.20.1259 (MR5); 8.10 versions prior to 8.10.1284 (MR7); version 8.00 and prior versions. | [] | null | null | null | null |
|
CVE-2023-35730 | D-Link DAP-2622 DDP Reset Auth Password Stack-based Buffer Overflow Remote Code Execution Vulnerability | D-Link DAP-2622 DDP Reset Auth Password Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DAP-2622 routers. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the DDP service. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root.
. Was ZDI-CAN-20057. | [
"cpe:2.3:a:d-link:dap-2622:*:*:*:*:*:*:*:*"
] | null | null | 8.8 | null |
CVE-2006-0673 | Multiple SQL injection vulnerabilities in cms/index.php in Magic Calendar Lite 1.02, with magic_quotes_gpc disabled, allow remote attackers to execute arbitrary SQL commands via the (1) $total_login and (2) $total_password parameter. | [
"cpe:2.3:a:reamday_enterprises:magic_calendar_lite:1.02:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
RHSA-2023:5964 | Red Hat Security Advisory: Red Hat OpenStack Platform 16.2.5 (collectd-libpod-stats) security update | golang: crypto/tls: large handshake records may cause panics golang: net/http, mime/multipart: denial of service from excessive resource consumption golang: net/http, net/textproto: denial of service from excessive memory allocation golang: net/http, net/textproto, mime/multipart: denial of service from excessive resource consumption golang: go/parser: Infinite loop in parsing golang: html/template: backticks not treated as string delimiters golang: crypto/tls: slow verification of certificate chains containing large RSA keys golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) | [
"cpe:/a:redhat:openstack:16.2::el8"
] | null | 7.5 | null | null |
CVE-2015-1965 | Stack-based buffer overflow in the server in IBM Tivoli Storage Manager FastBack 6.1 before 6.1.12 allows remote attackers to cause a denial of service (daemon crash) via unspecified vectors, a different vulnerability than CVE-2015-1924, CVE-2015-1925, CVE-2015-1929, CVE-2015-1930, CVE-2015-1948, CVE-2015-1953, CVE-2015-1954, CVE-2015-1962, CVE-2015-1963, and CVE-2015-1964. | [
"cpe:2.3:a:ibm:tivoli_storage_manager_fastback:6.1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager_fastback:6.1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager_fastback:6.1.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager_fastback:6.1.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager_fastback:6.1.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager_fastback:6.1.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager_fastback:6.1.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager_fastback:6.1.10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager_fastback:6.1.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager_fastback:6.1.11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager_fastback:6.1.11.1:*:*:*:*:*:*:*"
] | null | null | null | 7.8 |
|
GHSA-fw55-4344-fx84 | SQL injection vulnerability in riddle.php in Riddles Website 1.2.1 allows remote attackers to execute arbitrary SQL commands via the riddleid parameter. | [] | null | null | null | null |
|
CVE-2022-1416 | Missing sanitization of data in Pipeline error messages in GitLab CE/EE affecting all versions starting from 1.0.2 before 14.8.6, all versions from 14.9.0 before 14.9.4, and all versions from 14.10.0 before 14.10.1 allows for rendering of attacker controlled HTML tags and CSS styling | [
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:14.10.0:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:14.10.0:*:*:*:enterprise:*:*:*"
] | null | 4.3 | null | null |
|
CVE-2022-36198 | Multiple SQL injections detected in Bus Pass Management System 1.0 via buspassms/admin/view-enquiry.php, buspassms/admin/pass-bwdates-reports-details.php, buspassms/admin/changeimage.php, buspassms/admin/search-pass.php, buspassms/admin/edit-category-detail.php, and buspassms/admin/edit-pass-detail.php | [
"cpe:2.3:a:phpgurukul:bus_pass_management_system:1.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
CVE-2024-38723 | WordPress Get Use APIs – JSON Content Importer plugin <= 1.5.6 - Server Side Request Forgery (SSRF) vulnerability | Server-Side Request Forgery (SSRF) vulnerability in Bernhard Kux JSON Content Importer.This issue affects JSON Content Importer: from n/a through 1.5.6. | [
"cpe:2.3:a:json-content-importer:json_content_importer:*:*:*:*:*:wordpress:*:*"
] | null | 6.4 | null | null |
CVE-2018-11826 | In all android releases (Android for MSM, Firefox OS for MSM, QRD Android) from CAF using the linux kernel, lack of check on integer overflow while calculating memory can lead to Buffer overflow in WLAN ext scan handler. | [
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] | null | null | 7.8 | 7.2 |
|
CVE-2010-4917 | SQL injection vulnerability in sources/search.php in A-Blog 2.0 allows remote attackers to execute arbitrary SQL commands via the words parameter. | [
"cpe:2.3:a:a-blog:a-blog:2.0:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
RHSA-2021:3812 | Red Hat Security Advisory: kernel security update | kernel: SVM nested virtualization issue in KVM (AVIC support) kernel: SVM nested virtualization issue in KVM (VMLOAD/VMSAVE) kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c kernel: powerpc: KVM guest OS users can cause host OS memory corruption | [
"cpe:/o:redhat:rhel_aus:7.6::server",
"cpe:/o:redhat:rhel_e4s:7.6::server",
"cpe:/o:redhat:rhel_tus:7.6::server"
] | null | 7.8 | null | null |
CVE-2008-6035 | Cross-site scripting (XSS) vulnerability in dispatch.php in Achievo 1.3.2-STABLE allows remote attackers to inject arbitrary web script or HTML via the atknodetype parameter. | [
"cpe:2.3:a:achievo:achievo:1.3.2:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-whmw-g3g3-wh9q | Use-after-free vulnerability in Adobe Flash Player before 18.0.0.324 and 19.x and 20.x before 20.0.0.267 on Windows and OS X and before 11.2.202.559 on Linux, Adobe AIR before 20.0.0.233, Adobe AIR SDK before 20.0.0.233, and Adobe AIR SDK & Compiler before 20.0.0.233 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8634, CVE-2015-8635, CVE-2015-8638, CVE-2015-8639, CVE-2015-8640, CVE-2015-8641, CVE-2015-8643, CVE-2015-8646, CVE-2015-8647, CVE-2015-8648, CVE-2015-8649, and CVE-2015-8650. | [] | null | null | 8.8 | null |
|
GHSA-gh7x-xrjp-pg53 | Broken Access Control vulnerability in WordPress LoginPress plugin <= 1.6.2 on WordPress leading to unauth. changing of Opt-In or Opt-Out tracking settings. | [] | null | 5.3 | null | null |
|
GHSA-gf3r-ccj6-h68v | Mozilla Firefox before 49.0 does not properly restrict the scheme in favicon requests, which might allow remote attackers to obtain sensitive information via unspecified vectors, as demonstrated by a jar: URL for a favicon resource. | [] | null | null | 6.5 | null |
|
CVE-2023-32032 | .NET and Visual Studio Elevation of Privilege Vulnerability | .NET and Visual Studio Elevation of Privilege Vulnerability | [
"cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | null |
GHSA-q57g-38pc-jwv8 | Microweber Improper Access Control vulnerability | Improper Access Control in GitHub repository microweber/microweber prior to 2.0.0. | [] | null | 4.3 | null | null |
CVE-2023-0819 | Heap-based Buffer Overflow in gpac/gpac | Heap-based Buffer Overflow in GitHub repository gpac/gpac prior to v2.3.0-DEV. | [
"cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | null |
GHSA-8j7j-8w2r-72pq | When in an endless loop, a website specifying a custom cursor using CSS could make it look like the user is interacting with the user interface, when they are not. This could lead to a perceived broken state, especially when interactions with existing browser dialogs and warnings do not work. This vulnerability affects Firefox ESR < 78.1, Firefox < 79, and Thunderbird < 78.1. | [] | null | 6.5 | null | null |
|
CVE-2003-1409 | TOPo 1.43 allows remote attackers to obtain sensitive information by sending an HTTP request with an invalid parameter to (1) in.php or (2) out.php, which reveals the path to the TOPo directory in the error message. | [
"cpe:2.3:a:ej3:topo:1.43:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2017-7223 | GNU assembler in GNU Binutils 2.28 is vulnerable to a global buffer overflow (of size 1) while attempting to unget an EOF character from the input stream, potentially leading to a program crash. | [
"cpe:2.3:a:gnu:binutils:2.28:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
CVE-2017-8584 | Windows 10 1607 and Windows Server 2016 allow an attacker to execute code remotely via a specially crafted WiFi packet aka "HoloLens Remote Code Execution Vulnerability." | [
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*"
] | null | null | 7.5 | 7.9 |
|
CVE-2016-5809 | An issue was discovered on Schneider Electric IONXXXX series power meters ION73XX series, ION75XX series, ION76XX series, ION8650 series, ION8800 series, and PM5XXX series. There is no CSRF Token generated to authenticate the user during a session. Successful exploitation of this vulnerability can allow unauthorized configuration changes to be made and saved. | [
"cpe:2.3:h:schneider-electric:ion5000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:ion7300:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:ion7500:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:ion7600:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:ion8650:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:ion8800:-:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.8 |
|
CVE-2020-0353 | In libmp4extractor, there is a possible resource exhaustion due to a missing bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-124777526 | [
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4.3 |
|
GHSA-fc38-5jq6-2248 | A vulnerability has been identified in CP-8000 MASTER MODULE WITH I/O -25/+70°C (All versions < CPC80 V16.30), CP-8000 MASTER MODULE WITH I/O -40/+70°C (All versions < CPC80 V16.30), CP-8021 MASTER MODULE (All versions < CPC80 V16.30), CP-8022 MASTER MODULE WITH GPRS (All versions < CPC80 V16.30). When using the HTTPS server under specific conditions, affected devices do not properly free resources. This could allow an unauthenticated remote attacker to put the device into a denial of service condition. | [] | null | 7.5 | null | null |
|
RHSA-2003:150 | Red Hat Security Advisory: LPRng security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
CVE-2008-6772 | login/register_form.php in YourPlace 1.0.2 and earlier does not check that a username already exists when a new account is created, which allows remote attackers to bypass intended access restrictions by registering a new account with the username of a target user. | [
"cpe:2.3:a:peterselie:yourplace:*:*:*:*:*:*:*:*",
"cpe:2.3:a:peterselie:yourplace:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:peterselie:yourplace:1.0.1:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2024-11871 | Social Media Shortcodes <= 1.3.0 - Authenticated (Contributor+) Stored Cross-Site Scripting | The Social Media Shortcodes plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'patreon' shortcode in all versions up to, and including, 1.3.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] | null | 6.4 | null | null |
CVE-2019-9795 | A vulnerability where type-confusion in the IonMonkey just-in-time (JIT) compiler could potentially be used by malicious JavaScript to trigger a potentially exploitable crash. This vulnerability affects Thunderbird < 60.6, Firefox ESR < 60.6, and Firefox < 66. | [
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 |
|
CVE-2007-5943 | Simple Machines Forum (SMF) 1.1.4 allows remote attackers to read a message in private forums by using the advanced search module with the "show results as messages" option, then searching for possible keywords contained in that message. | [
"cpe:2.3:a:simple_machines:simple_machines_forum:1.1.4:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2004-1922 | Microsoft Internet Explorer 5.5 and 6.0 allocates memory based on the memory size written in the BMP file instead of the actual BMP file size, which allows remote attackers to cause a denial of service (memory consumption) via a small BMP file with has a large memory size. | [
"cpe:2.3:a:microsoft:internet_explorer:5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:6.0:*:*:*:*:*:*:*"
] | null | null | null | 2.6 |
|
GHSA-65jc-4ffp-3p86 | Authenticated (author+) Stored Cross-Site Scripting (XSS) vulnerability in WHA's Word Search Puzzles game plugin <= 2.0.1 at WordPress. | [] | null | 4.8 | null | null |
|
GHSA-74j8-m9mj-w7wj | wac commit 385e1 was discovered to contain a heap overflow via the interpret function at /wac-asan/wa.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted wasm file. | [] | null | 6.2 | null | null |
|
GHSA-3fmh-frpw-xcrq | webctrl.cgi.elf on Christie Digital DWU850-GS V06.46 devices allows attackers to perform any desired action via a crafted query containing an unspecified Cookie header. Authentication bypass can be achieved by including an administrative cookie that the device does not validate. | [] | null | null | null | null |
|
GHSA-4g44-xjmc-rxcq | Privilege Escalation vulnerability in the web interface in McAfee Advanced Threat Defense (ATD) 3.10, 3.8, 3.6, 3.4 allows remote authenticated users to gain elevated privileges via the GUI or GUI terminal commands. | [] | null | null | 8.8 | null |
|
RHSA-2012:1539 | Red Hat Security Advisory: Red Hat Network Proxy server jabberd security update | jabberd: Prone to unsolicited XMPP Dialback attacks | [
"cpe:/a:redhat:network_proxy:5.5::el5",
"cpe:/a:redhat:network_proxy:5.5::el6"
] | null | null | null | null |
CVE-2022-34449 |
PowerPath Management Appliance with versions 3.3 & 3.2* contains a Hardcoded Cryptographic Keys vulnerability. Authenticated admin users can exploit the issue that leads to view and modifying sensitive information stored in the application.
| [
"cpe:2.3:a:dell:powerpath_management_appliance:3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:dell:powerpath_management_appliance:3.3:*:*:*:*:*:*:*"
] | null | 6 | null | null |
|
CVE-2007-4736 | SQL injection vulnerability in category.php in CartKeeper CKGold Shopping Cart 2.0 allows remote attackers to execute arbitrary SQL commands via the category_id parameter. | [
"cpe:2.3:a:cartkeeper:ckgold_shopping_cart:2.0:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2018-21243 | An issue was discovered in Foxit PhantomPDF before 8.3.6. It has COM object mishandling when Microsoft Word is used. | [
"cpe:2.3:a:foxitsoftware:phantompdf:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4.3 |
|
GHSA-vv96-jq6f-v366 | XSS can occur in GNOME Web (aka Epiphany) before 40.4 and 41.x before 41.1 because a server's suggested_filename is used as the pdf_name value in PDF.js. | [] | null | null | null | null |
|
RHSA-2022:1283 | Red Hat Security Advisory: firefox security update | Mozilla: Use-after-free in NSSToken objects Mozilla: Use-after-free after VR Process destruction Mozilla: Denial of Service via complex regular expressions Mozilla: Out of bounds write due to unexpected WebAuthN Extensions Mozilla: Use-after-free in DocumentL10n::TranslateDocument Mozilla: Incorrect AliasSet used in JIT Codegen Mozilla: iframe contents could be rendered outside the border Mozilla: Memory safety bugs fixed in Firefox 99 and Firefox ESR 91.8 | [
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 8.8 | 6.1 | null |
GHSA-mxrp-q3rj-mrqf | An issue in Ecommerce-CodeIgniter-Bootstrap commit v. d22b54e8915f167a135046ceb857caaf8479c4da allows a remote attacker to execute arbitrary code via the saveLanguageFiles method of the Languages.php component. | [] | null | 9.8 | null | null |
|
GHSA-v9mf-j57r-5vpr | The official plone Docker images before version of 4.3.18-alpine (Alpine specific) contain a blank password for a root user. System using the plone docker container deployed by affected versions of the docker image may allow a remote attacker to achieve root access with a blank password. | [] | null | null | null | null |
|
RHSA-2018:0047 | Red Hat Security Advisory: redhat-virtualization-host security update | An update for redhat-virtualization-host is now available for RHEV 4.X, RHEV-H, and Agents for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. | [
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | null | null | null |
CVE-2022-22237 | Junos OS: Peers not configured for TCP-AO can establish a BGP or LDP session even if authentication is configured locally | An Improper Authentication vulnerability in the kernel of Juniper Networks Junos OS allows an unauthenticated, network-based attacker to cause an impact on confidentiality or integrity. A vulnerability in the processing of TCP-AO will allow a BGP or LDP peer not configured with authentication to establish a session even if the peer is locally configured to use authentication. This could lead to untrusted or unauthorized sessions being established. This issue affects Juniper Networks Junos OS: 21.2 versions prior to 21.2R3-S1; 21.3 versions prior to 21.3R2-S2, 21.3R3; 21.4 versions prior to 21.4R2-S1, 21.4R3; 22.1 versions prior to 22.1R1-S1, 22.1R2. This issue does not affect Juniper Networks Junos OS Evolved. | [
"cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.3:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.3:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.3:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.3:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.3:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.3:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.4:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.4:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.4:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.1:r1:*:*:*:*:*:*"
] | null | 6.5 | null | null |
GHSA-pg22-9hrc-63jf | Cross-Site Request Forgery (CSRF) vulnerability in Elise Bosse Frontpage Manager.This issue affects Frontpage Manager: from n/a through 1.3. | [] | null | 5.4 | null | null |
|
GHSA-p8vw-8hj3-966h | A vulnerability in the web framework of Cisco Small Business Managed Switches software could allow an unauthenticated, remote attacker to conduct an HTTP response splitting attack against a user of the web interface of an affected system. The vulnerability is due to insufficient input validation of some parameters that are passed to the web server of the affected system. An attacker could exploit this vulnerability by convincing a user to follow a malicious link or by intercepting a user request and injecting malicious code into the request. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected web interface or allow the attacker to access sensitive browser-based information. This vulnerability affects the following Cisco Small Business 300 and 500 Series Managed Switches: Cisco 350 Series Managed Switches, Cisco 350X Series Stackable Managed Switches, Cisco 550X Series Stackable Managed Switches, Cisco ESW2 Series Advanced Switches, Cisco Small Business 300 Series Managed Switches, Cisco Small Business 500 Series Stackable Managed Switches. Cisco Bug IDs: CSCvg29980. | [] | null | 6.1 | null | null |
|
CVE-2022-21590 | Vulnerability in the Oracle BI Publisher product of Oracle Fusion Middleware (component: Core Formatting API). Supported versions that are affected are 5.9.0.0, 6.4.0.0.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle BI Publisher. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle BI Publisher accessible data as well as unauthorized update, insert or delete access to some of Oracle BI Publisher accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle BI Publisher. CVSS 3.1 Base Score 7.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L). | [
"cpe:2.3:a:oracle:bi_publisher:5.9.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:bi_publisher:6.4.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:bi_publisher:12.2.1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:bi_publisher:12.2.1.4.0:*:*:*:*:*:*:*"
] | null | 7.6 | null | null |
|
GHSA-hrx9-224c-cq6j | The migme (aka com.projectgoth) application 4.03.002 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [] | null | null | null | null |
|
CVE-2018-10319 | Frog CMS 0.9.5 has XSS via the admin/?/snippet/edit snippet[name] parameter, aka Edit Snippet. | [
"cpe:2.3:a:frogcms_project:frogcms:0.9.5:*:*:*:*:*:*:*"
] | null | null | 4.8 | 3.5 |
|
CVE-2018-6383 | Monstra CMS through 3.0.4 has an incomplete "forbidden types" list that excludes .php (and similar) file extensions but not the .pht or .phar extension, which allows remote authenticated Admins or Editors to execute arbitrary PHP code by uploading a file, a different vulnerability than CVE-2017-18048. | [
"cpe:2.3:a:monstra:monstra:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.5 |
|
GHSA-34v3-f2p3-76vj | NetMotion Mobility before 11.73 and 12.x before 12.02 allows unauthenticated remote attackers to execute arbitrary code as SYSTEM because of Java deserialization in SupportRpcServlet. | [] | null | null | null | null |
|
GHSA-g34v-j3w9-h65r | Integer overflow in the load_multiboot function in hw/i386/multiboot.c in QEMU (aka Quick Emulator) allows local guest OS users to execute arbitrary code on the host via crafted multiboot header address values, which trigger an out-of-bounds write. | [] | null | 8.8 | null | null |
|
GHSA-7h34-qgwr-5w42 | The IPv6 capability in IRIX 6.5.19 allows remote attackers to cause a denial of service (hang) in inetd via port scanning. | [] | null | null | null | null |
|
GHSA-jg52-mx67-ggv2 | Unknown vulnerability in APC PowerChute Business Edition 6.0 through 7.0.1 allows remote attackers to cause a denial of service via unknown attack vectors. | [] | null | null | null | null |
|
GHSA-wrjw-52pw-744r | NVIDIA Triton Inference Server for Linux contains a vulnerability in shared memory APIs, where a user can cause an improper memory access issue by a network API. A successful exploit of this vulnerability might lead to denial of service and data tampering. | [] | null | 5.5 | null | null |
|
CVE-2023-0026 | 2023-06: Out-of-Cycle Security Bulletin: Junos OS and Junos OS Evolved: A BGP session will flap upon receipt of a specific, optional transitive attribute | An Improper Input Validation vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS). When a BGP update message is received over an established BGP session, and that message contains a specific, optional transitive attribute, this session will be torn down with an update message error. This issue cannot propagate beyond an affected system as the processing error occurs as soon as the update is received. This issue is exploitable remotely as the respective attribute can propagate through unaffected systems and intermediate AS (if any). Continuous receipt of a BGP update containing this attribute will create a sustained Denial of Service (DoS) condition. Some customers have experienced these BGP session flaps which prompted Juniper SIRT to release this advisory out of cycle before fixed releases are widely available as there is an effective workaround.
This issue affects:
Juniper Networks Junos OS
15.1R1 and later versions prior to 20.4R3-S8;
21.1 version 21.1R1 and later versions prior to 21.2R3-S6;
21.3 versions prior to 21.3R3-S5;
21.4 versions prior to 21.4R3-S4;
22.1 versions prior to 22.1R3-S4;
22.2 versions prior to 22.2R3-S2;
22.3 versions prior to 22.3R2-S2, 22.3R3-S1;
22.4 versions prior to 22.4R2-S1, 22.4R3;
23.1 versions prior to 23.1R1-S1, 23.1R2.
Juniper Networks Junos OS Evolved
All versions prior to 20.4R3-S8-EVO;
21.1 version 21.1R1-EVO and later versions prior to 21.2R3-S6-EVO;
21.3 versions prior to 21.3R3-S5-EVO;
21.4 versions prior to 21.4R3-S4-EVO;
22.1 versions prior to 22.1R3-S4-EVO;
22.2 versions prior to 22.2R3-S2-EVO;
22.3 versions prior to 22.3R2-S2-EVO, 22.3R3-S1-EVO;
22.4 versions prior to 22.4R2-S1-EVO, 22.4R3-EVO;
23.1 versions prior to 23.1R1-S1-EVO, 23.1R2-EVO.
| [
"cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r3-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r3-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r3-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r3-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.1:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.1:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.1:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.1:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.1:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.1:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.1:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.1:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.1:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.1:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.1:r3-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.1:r3-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:r3-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:r3-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.3:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.3:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.3:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.3:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.3:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.3:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.3:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.3:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.3:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.3:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.3:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.3:r3-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.4:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.4:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.4:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.4:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.4:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.4:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.4:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.4:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.4:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.1:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.1:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.1:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.1:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.1:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.1:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.1:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.1:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.1:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.1:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.2:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.2:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.2:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.2:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.2:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.2:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.2:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.2:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.3:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.3:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.3:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.3:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.3:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.4:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.4:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.4:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.4:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:*:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:20.4:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:20.4:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:20.4:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:20.4:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:20.4:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:20.4:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:20.4:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:20.4:r2-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:20.4:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:21.1:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:21.1:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:21.1:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:21.1:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:21.1:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:21.1:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:21.1:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:21.1:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:21.2:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:21.2:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:21.2:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:21.2:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:21.2:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:21.2:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:21.2:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:21.2:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:21.3:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:21.3:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:21.3:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:21.3:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:21.3:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:21.3:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:21.3:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:21.3:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:21.3:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:21.3:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:21.3:r3-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:21.4:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:21.4:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:21.4:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:21.4:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:21.4:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:21.4:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:21.4:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:21.4:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:22.1:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:22.1:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:22.1:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:22.1:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:22.1:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:22.1:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:22.1:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:22.1:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:22.1:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:22.2:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:22.2:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:22.2:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:22.2:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:22.2:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:22.2:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:22.2:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:22.3:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:22.3:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:22.3:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:22.3:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:22.3:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:22.4:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:22.4:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:22.4:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:22.4:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:23.1:r1:*:*:*:*:*:*"
] | null | 7.5 | null | null |
GHSA-jh7f-2hf7-8vxp | A vulnerability was found in CodeAstro Internet Banking System 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file pages_transfer_money.php. The manipulation of the argument account_number with the input 357146928--><ScRiPt%20>alert(9206)</ScRiPt><!-- leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-243134 is the identifier assigned to this vulnerability. | [] | null | null | 3.5 | null |
|
GHSA-hj4c-xf5q-wc53 | A vulnerability was found in Campcodes Complete Web-Based School Management System 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file /view/exam_timetable_insert_form.php. The manipulation of the argument exam leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-263624. | [] | 5.3 | 3.5 | null | null |
|
CVE-2024-5102 | Elevation of Privelage via symlinked file in Avast Antivirus | A sym-linked file accessed via the repair function in Avast Antivirus <24.2 on Windows may allow user to elevate privilege to delete arbitrary files or run processes as NT AUTHORITY\SYSTEM. The vulnerability exists within the "Repair" (settings -> troubleshooting -> repair) feature, which attempts to delete a file in the current user's AppData directory as NT AUTHORITY\SYSTEM. A low-privileged user can make a pseudo-symlink and a junction folder and point to a file on the system. This can provide a low-privileged user an Elevation of Privilege to win a race-condition which will re-create the system files and make Windows callback to a specially-crafted file which could be used to launch a privileged shell instance.
This issue affects Avast Antivirus prior to 24.2. | [
"cpe:2.3:a:avast:antivirus:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | 7.3 | null | null | null |
GHSA-9p2r-6h2j-22xf | PHP remote file inclusion vulnerability in include.php in PHPCentral Login 1.0 allows remote attackers to execute arbitrary PHP code via a URL in the _SERVER[DOCUMENT_ROOT] parameter. NOTE: a third party disputes this vulnerability because of the special nature of the SERVER superglobal array. | [] | null | null | null | null |
|
CVE-2013-5174 | Integer signedness error in the kernel in Apple Mac OS X before 10.9 allows local users to cause a denial of service (system crash) via a crafted tty read operation. | [
"cpe:2.3:o:apple:mac_os_x:*:supplemental_update:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.8.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.8.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.8.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.8.5:*:*:*:*:*:*:*"
] | null | null | null | 4.9 |
|
CVE-2016-0276 | IBM Financial Transaction Manager (FTM) for ACH Services for Multi-Platform 2.1.1.2 and 3.0.0.x before fp0013, Financial Transaction Manager (FTM) for Check Services for Multi-Platform 2.1.1.2 and 3.0.0.x before fp0013, and Financial Transaction Manager (FTM) for Corporate Payment Services (CPS) for Multi-Platform 2.1.1.2 and 3.0.0.x before fp0013 allows remote attackers to execute arbitrary code via a crafted serialized Java Message Service (JMS) ObjectMessage object. IBM X-Force ID: 111084. | [
"cpe:2.3:a:ibm:financial_transaction_manager:*:*:*:*:*:ach_services:*:*",
"cpe:2.3:a:ibm:financial_transaction_manager:*:*:*:*:*:check_services:*:*",
"cpe:2.3:a:ibm:financial_transaction_manager:*:*:*:*:*:cps_services:*:*"
] | null | null | 6.3 | 6.5 |
|
CVE-2021-41672 | PEEL Shopping CMS 9.4.0 is vulnerable to authenticated SQL injection in utilisateurs.php. A user that belongs to the administrator group can inject a malicious SQL query in order to affect the execution logic of the application and retrive information from the database. | [
"cpe:2.3:a:peel:peel_shopping:9.4.0:*:*:*:*:*:*:*"
] | null | 6.5 | null | 5.5 |
|
GHSA-qgch-g3xj-q479 | Tenda AC15 V15.03.05.18 is avulnerable to Buffer Overflow via function formSetPPTPServer. | [] | null | 7.5 | null | null |
|
GHSA-g5xp-gp5r-x65p | SQL injection vulnerability in voteforus.php in the Vote For Us extension 1.0.1 and earlier for PunBB allows remote attackers to execute arbitrary SQL commands via the out parameter. | [] | null | null | null | null |
|
CVE-2010-4723 | Smarty before 3.0.0, when security is enabled, does not prevent access to the (1) dynamic and (2) private object members of an assigned object, which has unspecified impact and remote attack vectors. | [
"cpe:2.3:a:smarty:smarty:*:rc4:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:1.0a:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:1.0b:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:1.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:1.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:1.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:1.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:1.4.0:b1:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:1.4.0:b2:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:1.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:1.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:1.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:1.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:1.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:1.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:1.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:1.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.5.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.5.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.6.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.6.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.6.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.6.7:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.6.9:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.6.10:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.6.11:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.6.12:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.6.13:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.6.14:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.6.15:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.6.16:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.6.17:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.6.18:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.6.20:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.6.22:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.6.24:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.6.25:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:2.6.26:*:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:3.0.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:3.0.0:beta5:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:3.0.0:beta6:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:3.0.0:beta7:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:3.0.0:beta8:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:3.0.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:3.0.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:smarty:smarty:3.0.0:rc3:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
CVE-2023-25716 | WordPress Announce from the Dashboard Plugin <= 1.5.1 is vulnerable to Cross Site Scripting (XSS) | Auth (admin+) Stored Cross-Site Scripting (XSS) vulnerability in gqevu6bsiz Announce from the Dashboard plugin <= 1.5.1 versions. | [
"cpe:2.3:a:announce_from_the_dashboard_project:announce_from_the_dashboard:*:*:*:*:*:wordpress:*:*"
] | null | 5.9 | null | null |
CVE-2017-11752 | The ReadMAGICKImage function in coders/magick.c in ImageMagick 7.0.6-4 allows remote attackers to cause a denial of service (memory leak) via a crafted file. | [
"cpe:2.3:a:imagemagick:imagemagick:7.0.6-4:*:*:*:*:*:*:*"
] | null | null | 6.5 | 4.3 |
|
GHSA-qm3g-8hq8-9m7p | The Premium Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Link Wrapper functionality in all versions up to, and including, 4.10.17 due to insufficient input sanitization and output escaping on user supplied links. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] | null | 6.4 | null | null |
|
GHSA-gjwf-hgg5-m3rx | A vulnerability in DB Manager version 3.0.1.0 and previous and PerformA version 3.0.0.0 and previous allows an authorized user with access to a privileged account on a BD Kiestra system (Kiestra TLA, Kiestra WCA, and InoqulA+ specimen processor) to issue SQL commands, which may result in data corruption. | [] | null | null | 5.6 | null |
|
GHSA-fpm4-ph9q-4wjx | An issue in DataLife Engine v.17.1 and before is vulnerable to SQL Injection in dboption. | [] | null | 9.8 | null | null |
|
CVE-2024-31818 | Directory Traversal vulnerability in DerbyNet v.9.0 allows a remote attacker to execute arbitrary code via the page parameter of the kiosk.php component. | [
"cpe:2.3:a:derbynet:derbynet:9.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
GHSA-52gm-mw2g-p3w8 | Cisco TelePresence Video Communication Server (VCS) X8.5.2 allows remote authenticated users to execute arbitrary commands in the context of the nobody user account via an unspecified web-page parameter, aka Bug ID CSCuv12333. | [] | null | null | null | null |
|
CVE-2021-22147 | Elasticsearch before 7.14.0 did not apply document and field level security to searchable snapshots. This could lead to an authenticated user gaining access to information that they are unauthorized to view. | [
"cpe:2.3:a:elastic:elasticsearch:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4 |
|
GHSA-r27m-m9vv-f47r | Multiple cross-site scripting (XSS) vulnerabilities in Jupiter CMS allow remote attackers to inject arbitrary web script or HTML via the (1) language[Admin name] and (2) language[Admin back] parameters in (a) modules/blocks.php; the (3) language[Register title] and (4) language[Register title2] parameters in (b) modules/register.php; the (5) language[Mass-Email form title], (6) language[Mass-Email form desc], (7) language[Mass-Email form desc2] (8) language[Mass-Email form desc3], and (9) language[Mass-Email form desc4] parameters in (c) modules/mass-email.php; the (10) language[Forgotten title], (11) language[Forgotten desc], (12) language[Forgotten desc2], (13) language[Forgotten desc3], (14) language[Forgotten desc4], and (15) language[Forgotten desc5] parameters in (d) modules/register.php; and the (16) language[Search view desc], (17) language[Search view desc2], (18) language[Search view desc3], (19) language[Search view desc4], (20) language[Search view desc5], (21) language[Search view desc6], (22) language[Search view desc7], and (23) language[Search view desc8] parameters in (e) modules/search.php. | [] | null | null | null | null |
|
CVE-2008-2600 | Unspecified vulnerability in the Oracle Spatial component in Oracle Database 10.1.0.5, 10.2.0.3, and 11.1.0.6 has unknown impact and remote authenticated attack vectors related to MDSYS.SDO_TOPO_MAP. | [
"cpe:2.3:a:oracle:database_server:10.1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_server:10.2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:oracle_database:11.1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:spatial_component:*:*:*:*:*:*:*:*"
] | null | null | null | 6.5 |
|
CVE-2000-0545 | Buffer overflow in mailx mail command (aka Mail) on Linux systems allows local users to gain privileges via a long -c (carbon copy) parameter. | [
"cpe:2.3:a:sgi:mailx:3:*:*:*:*:*:*:*",
"cpe:2.3:a:sgi:mailx:4:*:*:*:*:*:*:*",
"cpe:2.3:a:sgi:mailx:5:*:*:*:*:*:*:*",
"cpe:2.3:a:sgi:mailx:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:sgi:mailx:6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:sgi:mailx:6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:sgi:mailx:6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:sgi:mailx:6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:sgi:mailx:6.5:*:*:*:*:*:*:*"
] | null | null | null | 4.6 |
|
CVE-2020-23705 | A global buffer overflow vulnerability in jfif_encode at jfif.c:701 of ffjpeg through 2020-06-22 allows attackers to cause a Denial of Service (DOS) via a crafted jpeg file. | [
"cpe:2.3:a:rockcarry:ffjpeg:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4.3 |
|
GHSA-h54r-mf9p-gj9p | NVIDIA DGX A100 BMC contains a vulnerability where an attacker may cause an LDAP user injection. A successful exploit of this vulnerability may lead to information disclosure. | [] | null | 6.5 | null | null |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.