id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
4.89k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2023-43086 |
Dell Command | Configure, versions prior to 4.11.0, contains an improper access control vulnerability. A local malicious user could potentially modify files inside installation folder during application upgrade, leading to privilege escalation.
| [
"cpe:2.3:a:dell:command\\|configure:*:*:*:*:*:*:*:*"
] | null | 7.3 | null | null |
|
GHSA-gq2r-g8hr-hq6q | Webvendome - Webvendome Internal Server IP Disclosure. Send GET Request to the request which is shown in the picture. Internal Server IP and Full path disclosure. | [] | null | 5.3 | null | null |
|
GHSA-x6jv-vvrj-p92p | Adobe Shockwave Player versions 12.3.4.204 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution. | [] | null | null | null | null |
|
CVE-2022-20840 | Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device.
These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information. In some cases, it is also possible to cause a temporary availability impact to portions of the FMC Dashboard. | [
"cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.9:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.10:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.11:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.12:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.13:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.14:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.15:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.16:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.17:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.18:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.3.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.5.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.6.7:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:7.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:7.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:7.0.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:7.0.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:7.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:7.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:7.2.0:*:*:*:*:*:*:*"
] | null | 4.8 | null | null |
|
CVE-2020-35531 | In LibRaw, an out-of-bounds read vulnerability exists within the get_huffman_diff() function (libraw\src\x3f\x3f_utils_patched.cpp) when reading data from an image file. | [
"cpe:2.3:a:libraw:libraw:0.20.0:-:*:*:*:*:*:*",
"cpe:2.3:a:libraw:libraw:0.20.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:libraw:libraw:0.20.1:*:*:*:*:*:*:*",
"cpe:2.3:a:libraw:libraw:0.20.2:*:*:*:*:*:*:*",
"cpe:2.3:a:libraw:libraw:0.21.0:beta1:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
|
GHSA-hp6r-93x9-m75r | Unspecified vulnerability in Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allows attackers to execute arbitrary code via a crafted image, a different vulnerability than CVE-2010-3629. | [] | null | null | null | null |
|
CVE-2017-8209 | The driver of honor 5C,honor 6x Huawei smart phones with software of versions earlier than NEM-AL10C00B356, versions earlier than Berlin-L21HNC432B360 have a buffer overflow vulnerability due to the lack of parameter validation. An attacker tricks a user into installing a malicious APP which has the root privilege of the Android system, the APP can send a specific parameter to the driver of the smart phone, causing a system reboot or arbitrary code execution. | [
"cpe:2.3:o:huawei:honor_5c_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:honor_5c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:honor_6x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:honor_6x:-:*:*:*:*:*:*:*"
] | null | null | 7.8 | 9.3 |
|
GHSA-c8q6-g23p-58gh | An information exposure through log file vulnerability exists in the Palo Alto Networks GlobalProtect app on Windows that logs the cleartext credentials of the connecting GlobalProtect user when authenticating using Connect Before Logon feature. This issue impacts GlobalProtect App 5.2 versions earlier than 5.2.9 on Windows. This issue does not affect the GlobalProtect app on other platforms. | [] | null | null | null | null |
|
RHSA-2017:3194 | Red Hat Security Advisory: httpd security update | httpd: ap_get_basic_auth_pw() authentication bypass httpd: mod_ssl NULL pointer dereference httpd: ap_find_token() buffer overread httpd: mod_mime buffer overread httpd: Uninitialized memory reflection in mod_auth_digest httpd: Use-after-free by limiting unregistered HTTP method (Optionsbleed) | [
"cpe:/o:redhat:rhel_eus:7.3::computenode",
"cpe:/o:redhat:rhel_eus:7.3::server"
] | null | null | 5.9 | null |
CVE-2023-49618 | Improper buffer restrictions in some Intel(R) System Security Report and System Resources Defense firmware may allow a privileged user to potentially enable escalation of privilege via local access. | [] | 8.7 | 7.5 | null | null |
|
CVE-2012-1635 | The hook_node_access function in the revisioning module 7.x-1.x before 7.x-1.3 for Drupal checks the permissions of the current user even when it is called to check permissions of other users, which allows remote attackers to bypass intended access restrictions, as demonstrated when using the XML sitemap module to obtain sensitive information about unpublished content. | [
"cpe:2.3:a:rik_de_boer:revisioning:7.x-1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:rik_de_boer:revisioning:7.x-1.0:alpha1:*:*:*:*:*:*",
"cpe:2.3:a:rik_de_boer:revisioning:7.x-1.0:alpha2:*:*:*:*:*:*",
"cpe:2.3:a:rik_de_boer:revisioning:7.x-1.0:alpha3:*:*:*:*:*:*",
"cpe:2.3:a:rik_de_boer:revisioning:7.x-1.0:alpha4:*:*:*:*:*:*",
"cpe:2.3:a:rik_de_boer:revisioning:7.x-1.0:alpha5:*:*:*:*:*:*",
"cpe:2.3:a:rik_de_boer:revisioning:7.x-1.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:rik_de_boer:revisioning:7.x-1.0:beta10:*:*:*:*:*:*",
"cpe:2.3:a:rik_de_boer:revisioning:7.x-1.0:beta11:*:*:*:*:*:*",
"cpe:2.3:a:rik_de_boer:revisioning:7.x-1.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:rik_de_boer:revisioning:7.x-1.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:rik_de_boer:revisioning:7.x-1.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:rik_de_boer:revisioning:7.x-1.0:beta5:*:*:*:*:*:*",
"cpe:2.3:a:rik_de_boer:revisioning:7.x-1.0:beta6:*:*:*:*:*:*",
"cpe:2.3:a:rik_de_boer:revisioning:7.x-1.0:beta7:*:*:*:*:*:*",
"cpe:2.3:a:rik_de_boer:revisioning:7.x-1.0:beta8:*:*:*:*:*:*",
"cpe:2.3:a:rik_de_boer:revisioning:7.x-1.0:beta9:*:*:*:*:*:*",
"cpe:2.3:a:rik_de_boer:revisioning:7.x-1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:rik_de_boer:revisioning:7.x-1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:rik_de_boer:revisioning:7.x-1.x:*:*:*:*:*:*:*",
"cpe:2.3:a:rik_de_boer:revisioning:7.x-1.x:dev:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:-:*:*:*:*:*:*:*"
] | null | null | null | 6.4 |
|
CVE-2020-24930 | Beijing Wuzhi Internet Technology Co., Ltd. Wuzhi CMS 4.0.1 is an open source content management system. The five fingers CMS backend in***.php file has arbitrary file deletion vulnerability. Attackers can use vulnerabilities to delete arbitrary files. | [
"cpe:2.3:a:wuzhicms:wuzhicms:4.1.0:*:*:*:*:*:*:*"
] | null | 8.1 | null | 5.5 |
|
CVE-2025-31832 | WordPress ACF City Selector plugin <= 1.16.0 - Sensitive Data Exposure vulnerability | Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in Beee ACF City Selector allows Retrieve Embedded Sensitive Data. This issue affects ACF City Selector: from n/a through 1.16.0. | [] | null | 5.3 | null | null |
CVE-2023-38185 | Microsoft Exchange Server Remote Code Execution Vulnerability | Microsoft Exchange Server Remote Code Execution Vulnerability | [
"cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_23:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_12:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_13:*:*:*:*:*:*"
] | null | 8.8 | null | null |
CVE-2022-1516 | A NULL pointer dereference flaw was found in the Linux kernel’s X.25 set of standardized network protocols functionality in the way a user terminates their session using a simulated Ethernet card and continued usage of this connection. This flaw allows a local user to crash the system. | [
"cpe:2.3:o:linux:linux_kernel:5.18:rc1:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
] | null | 5.5 | null | 4.9 |
|
RHSA-2024:5328 | Red Hat Security Advisory: firefox security update | mozilla: Fullscreen notification dialog can be obscured by document content mozilla: Out of bounds memory access in graphics shared memory handling mozilla: Type confusion in WebAssembly mozilla: Incomplete WebAssembly exception handing mozilla: Out of bounds read in editor component mozilla: CSP strict-dynamic bypass using web-compatibility shims mozilla: Missing permission check when creating a StreamFilter mozilla: Uninitialized memory used by WebGL mozilla: Use-after-free in JavaScript garbage collection mozilla: Use-after-free in IndexedDB mozilla: Document content could partially obscure security prompts | [
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 6.1 | null | null |
GHSA-r6pj-4h6q-3r9q | In ccu, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09065033; Issue ID: MSV-1754. | [] | null | 6.7 | null | null |
|
RHSA-2013:1457 | Red Hat Security Advisory: libgcrypt security update | GnuPG susceptible to Yarom/Falkner flush+reload cache side-channel attack | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
CVE-2022-39375 | Cross-Site Scripting (XSS) through public RSS feed in GLPI | GLPI stands for Gestionnaire Libre de Parc Informatique. GLPI is a Free Asset and IT Management Software package that provides ITIL Service Desk features, licenses tracking and software auditing. Users may be able to create a public RSS feed to inject malicious code in dashboards of other users. This issue has been patched, please upgrade to version 10.0.4. There are currently no known workarounds. | [
"cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*"
] | null | 4.5 | null | null |
GHSA-2j4g-v4fv-rhwg | Centreon updateContactHostCommands SQL Injection Remote Code Execution Vulnerability | Centreon updateContactHostCommands SQL Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Centreon. Authentication is required to exploit this vulnerability.The specific flaw exists within the updateContactHostCommands function. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-22298. | [] | null | null | 7.2 | null |
CVE-2016-3341 | The kernel-mode drivers in Transaction Manager in Microsoft Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold, 1511, and 1607 allow local users to gain privileges via a crafted application, aka "Windows Transaction Manager Elevation of Privilege Vulnerability." | [
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*"
] | null | null | 7.8 | 9.3 |
|
CVE-2021-20770 | Cross-site scripting vulnerability in Message of Cybozu Garoon 4.6.0 to 5.0.2 allows a remote authenticated attacker to inject an arbitrary script via unspecified vectors. | [
"cpe:2.3:a:cybozu:garoon:*:*:*:*:*:*:*:*"
] | null | 5.4 | null | 3.5 |
|
GHSA-f39r-cpmj-whcg | Command Injection in ffmpegdotjs | This affects all versions of package ffmpegdotjs. If attacker-controlled user input is given to the trimvideo function, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization. | [] | null | 9.8 | null | null |
GHSA-r8mj-p2jm-m792 | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in WPBlockart Magazine Blocks allows Stored XSS.This issue affects Magazine Blocks: from n/a through 1.3.6. | [] | null | 5.9 | null | null |
|
CVE-2001-0984 | Password Safe 1.7(1) leaves cleartext passwords in memory when a user copies the password to the clipboard and minimizes Password Safe with the "Clear the password when minimized" and "Lock password database on minimize and prompt on restore" options enabled, which could allow an attacker with access to the memory (e.g. an administrator) to read the passwords. | [
"cpe:2.3:a:counterpane:password_safe:1.7.1:*:*:*:*:*:*:*"
] | null | null | null | 4.6 |
|
GHSA-wcqg-p5p5-g8cf | Cross-site scripting vulnerability in Cybozu Garoon 5.0.0 to 5.0.1 allows attacker with administrator rights to inject an arbitrary script via unspecified vectors. | [] | null | null | null | null |
|
CVE-2015-2616 | Unspecified vulnerability in Oracle Sun Solaris 3.3 and 4.2 allows local users to affect availability via unknown vectors related to DevFS. | [
"cpe:2.3:a:oracle:oracle_and_sun_systems_product_suite:3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:oracle_and_sun_systems_product_suite:4.2:*:*:*:*:*:*:*"
] | null | null | null | 4.9 |
|
GHSA-xjxf-w237-rjjp | On D-Link DIR-818LW Rev.A 2.05.B03 and DIR-860L Rev.B 2.03.B03 devices, unauthenticated remote OS command execution can occur in the soap.cgi service of the cgibin binary via an "&&" substring in the service parameter. NOTE: this issue exists because of an incomplete fix for CVE-2018-6530. | [] | null | 9.8 | null | null |
|
GHSA-3rfm-4g97-5f9p | A certain Red Hat patch to the KVM subsystem in the kernel package before 2.6.32-358.11.1.el6 on Red Hat Enterprise Linux (RHEL) 6 does not properly implement the PV EOI feature, which allows guest OS users to cause a denial of service (host OS crash) by leveraging a time window during which interrupts are disabled but copy_to_user function calls are possible. | [] | null | null | null | null |
|
GHSA-fp5v-pr7j-hxj9 | Cross-Site Request Forgery (CSRF) vulnerability in WPWeb WooCommerce Social Login allows Cross Site Request Forgery.This issue affects WooCommerce Social Login: from n/a through 2.8.2. | [] | null | 4.3 | null | null |
|
GHSA-rgp2-m7fc-79r8 | An issue was discovered in BS_RCIO64.sys in Biostar RACING GT Evo 2.1.1905.1700. A low-integrity process can open the driver's device object and issue IOCTLs to read or write to arbitrary physical memory locations (or call an arbitrary address), leading to execution of arbitrary code. This is associated with 0x226040, 0x226044, and 0x226000. | [] | null | 7.8 | null | null |
|
CVE-2023-30470 | A use-after-free related to unsound inference in the bytecode generation when optimizations are enabled for Hermes prior to commit da8990f737ebb9d9810633502f65ed462b819c09 could have been used by an attacker to achieve remote code execution. Note that this is only exploitable in cases where Hermes is used to execute untrusted JavaScript. Hence, most React Native applications are not affected. | [
"cpe:2.3:a:facebook:hermes:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
GHSA-cq8g-mwjh-cwqg | F-Secure Anti-Virus 2003 through 2006 and other versions, Internet Security 2003 through 2006, and Service Platform for Service Providers 6.x and earlier does not scan files contained on removable media when "Scan network drives" is disabled, which allows remote attackers to bypass anti-virus controls. | [] | null | null | null | null |
|
CVE-2018-0086 | A vulnerability in the application server of the Cisco Unified Customer Voice Portal (CVP) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on the affected device. The vulnerability is due to malformed SIP INVITE traffic received on the CVP during communications with the Cisco Virtualized Voice Browser (VVB). An attacker could exploit this vulnerability by sending malformed SIP INVITE traffic to the targeted appliance. An exploit could allow the attacker to impact the availability of services and data on the device, causing a DoS condition. This vulnerability affects Cisco Unified CVP running any software release prior to 11.6(1). Cisco Bug IDs: CSCve85840. | [
"cpe:2.3:a:cisco:unified_customer_voice_portal:*:*:*:*:*:*:*:*"
] | null | null | 8.6 | 5 |
|
CVE-2014-7488 | The Vineyard All In (aka com.wVineyardAllIn) application 0.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [
"cpe:2.3:a:highlighterstudio:vineyard_all_in:0.1:*:*:*:*:android:*:*"
] | null | null | null | 5.4 |
|
GHSA-9p3h-4f9c-6m6g | Cross-site scripting (XSS) vulnerability in Scoop 1.1 RC1 and earlier allows remote attackers to inject arbitrary web script or HTML via the (1) type and (2) count parameters, and (3) the query string in a story. | [] | null | null | null | null |
|
CVE-1999-0337 | AIX batch queue (bsh) allows local and remote users to gain additional privileges when network printing is enabled. | [
"cpe:2.3:o:ibm:aix:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:3.2:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
ICSA-20-324-02 | Paradox IP150 (Update A) | The affected product is vulnerable to three stack-based buffer overflows, which may allow an unauthenticated attacker to remotely execute arbitrary code.CVE-2020-25189 has been assigned to these vulnerabilities. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). The affected product is vulnerable to five post-authentication buffer overflows, which may allow a logged in user to remotely execute arbitrary code.CVE-2020-25185 has been assigned to these vulnerabilities. A CVSS v3 base score of 8.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). | [] | null | null | 8.8 | null |
GHSA-hm22-52r8-h92c | A vulnerability, which was classified as critical, was found in YouDianCMS 7. Affected is an unknown function of the file /Public/ckeditor/plugins/multiimage/dialogs/image_upload.php. The manipulation of the argument files leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-273252. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | [] | 5.3 | 6.3 | null | null |
|
CVE-2022-3993 | Improper Restriction of Excessive Authentication Attempts in kareadita/kavita | Improper Restriction of Excessive Authentication Attempts in GitHub repository kareadita/kavita prior to 0.6.0.3.
| [
"cpe:2.3:a:kavitareader:kavita:*:*:*:*:*:*:*:*"
] | null | 9.4 | null | null |
CVE-2021-21144 | Heap buffer overflow in Tab Groups in Google Chrome prior to 88.0.4324.146 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.8 |
|
RHSA-2015:0783 | Red Hat Security Advisory: kernel security and bug fix update | kernel: infiniband: uverbs: unprotected physical memory access xen: Insufficient bounding of "REP MOVS" to MMIO emulated inside the hypervisor (xsa112) | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
GHSA-vx26-cfxm-6ghm | eramba c2.8.1 and Enterprise before e2.19.3 has a weak password recovery token (createHash has only a million possibilities). | [] | null | null | null | null |
|
CVE-2023-4983 | app1pro Shopicial search cross site scripting | A vulnerability was found in app1pro Shopicial up to 20230830. It has been declared as problematic. This vulnerability affects unknown code of the file search. The manipulation of the argument from with the input comments</script>'"><img src=x onerror=alert(document.cookie)> leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-239794 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | [
"cpe:2.3:a:app1pro:shopicial:*:*:*:*:*:shopify:*:*"
] | null | 4.3 | 4.3 | 5 |
GHSA-hg35-mp25-qf6h | phpseclib a large prime can cause a denial of service | An issue was discovered in phpseclib 1.x before 1.0.23, 2.x before 2.0.47, and 3.x before 3.0.36. An attacker can construct a malformed certificate containing an extremely large prime to cause a denial of service (CPU consumption for an isPrime primality check). NOTE: this issue was introduced when attempting to fix CVE-2023-27560. | [] | 8.7 | 7.5 | null | null |
CVE-2023-43824 | Delta Electronics Delta Industrial Automation DOPSoft DPS File wTitleTextLen Buffer Overflow Remote Code Execution | A stack based buffer overflow exists in Delta Electronics Delta Industrial Automation DOPSoft when parsing the wTitleTextLen field of a DPS file. A remote, unauthenticated attacker can exploit this vulnerability by enticing a user to open a specially crafted DPS file to achieve remote code execution. | [
"cpe:2.3:a:deltaww:dopsoft:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.8 |
CVE-2003-1490 | SonicWall Pro running firmware 6.4.0.1 allows remote attackers to cause a denial of service (device reset) via a long HTTP POST to the internal interface, possibly due to a buffer overflow. | [
"cpe:2.3:h:sonicwall:pro100:6.4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:pro200:6.4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:pro300:6.4.0.1:*:*:*:*:*:*:*"
] | null | null | null | 7.8 |
|
GHSA-7j5g-jfh2-w58c | A type confusion bug in WebAssembly could be leveraged by an attacker to potentially achieve code execution. This vulnerability affects Firefox < 129 and Firefox ESR < 128.1. | [] | null | 8.8 | null | null |
|
GHSA-j69x-v3vw-7m6g | Cisco ACE Application Control Engine Module for Catalyst 6500 Switches and 7600 Routers before A2(1.1) uses default (1) usernames and (2) passwords for (a) the administrator and (b) web management, which makes it easier for remote attackers to perform configuration changes or obtain operating-system access. | [] | null | null | null | null |
|
GHSA-fqq3-69m6-g84r | Use-after-free vulnerability in the Cascading Style Sheets (CSS) implementation in Google Chrome before 19.0.1084.52 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the :first-letter pseudo-element. | [] | null | null | null | null |
|
GHSA-pvr2-2hwp-5vqc | The Registration Forms WordPress plugin before 3.8.1.3 does not have authorisation and CSRF when deleting users via an init action handler, allowing unauthenticated attackers to delete arbitrary users (along with their posts) | [] | null | 6.5 | null | null |
|
GHSA-hwfq-fq3m-38ww | An issue was discovered in certain Apple products. macOS before 10.13.1 is affected. The issue involves the "Quick Look" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory consumption) via a crafted Office document. | [] | null | null | 7.8 | null |
|
GHSA-34cx-hvm4-vx7j | An issue was discovered in Mattermost Server before 4.0.0, 3.10.2, and 3.9.2. A password-reset request was sometime sent to an attacker-provided e-mail address. | [] | null | null | null | null |
|
GHSA-87mg-gx7c-q5gr | ** Unsupported When Assigned ** Cisco Catalyst 2940 Series Switches provided by Cisco Systems, Inc. contain a reflected cross-site scripting vulnerability regarding error page generation. An arbitrary script may be executed on the web browser of the user who is using the product. The affected firmware is prior to 12.2(50)SY released in 2011, and Cisco Catalyst 2940 Series Switches have been retired since January 2015. | [] | null | 6.1 | null | null |
|
CVE-2024-3040 | Netentsec NS-ASG Application Security Gateway list_crl_conf sql injection | A vulnerability, which was classified as critical, was found in Netentsec NS-ASG Application Security Gateway 6.3. This affects an unknown part of the file /admin/list_crl_conf. The manipulation of the argument CRLId leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-258429 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | [
"cpe:2.3:a:netentsec:application_security_gateway:6.3:*:*:*:*:*:*:*"
] | null | 6.3 | 6.3 | 6.5 |
CVE-2022-39292 | Exposure of sensitive Slack webhook URLs in debug logs and traces | Slack Morphism is a modern client library for Slack Web/Events API/Socket Mode and Block Kit. Debug logs expose sensitive URLs for Slack webhooks that contain private information. The problem is fixed in version 1.3.2 which redacts sensitive URLs for webhooks. As a workaround, people who use Slack webhooks may disable or filter debug logs. | [
"cpe:2.3:a:slack_morphism_project:slack_morphism:*:*:*:*:*:rust:*:*"
] | null | 7.5 | null | null |
GHSA-h2jf-rm43-q5gj | Cross-Site Request Forgery (CSRF) vulnerability in Vladimir Prelovac Smart YouTube PRO plugin <= 4.3 versions. | [] | null | 4.3 | null | null |
|
CVE-2024-26801 | Bluetooth: Avoid potential use-after-free in hci_error_reset | In the Linux kernel, the following vulnerability has been resolved:
Bluetooth: Avoid potential use-after-free in hci_error_reset
While handling the HCI_EV_HARDWARE_ERROR event, if the underlying
BT controller is not responding, the GPIO reset mechanism would
free the hci_dev and lead to a use-after-free in hci_error_reset.
Here's the call trace observed on a ChromeOS device with Intel AX201:
queue_work_on+0x3e/0x6c
__hci_cmd_sync_sk+0x2ee/0x4c0 [bluetooth <HASH:3b4a6>]
? init_wait_entry+0x31/0x31
__hci_cmd_sync+0x16/0x20 [bluetooth <HASH:3b4a 6>]
hci_error_reset+0x4f/0xa4 [bluetooth <HASH:3b4a 6>]
process_one_work+0x1d8/0x33f
worker_thread+0x21b/0x373
kthread+0x13a/0x152
? pr_cont_work+0x54/0x54
? kthread_blkcg+0x31/0x31
ret_from_fork+0x1f/0x30
This patch holds the reference count on the hci_dev while processing
a HCI_EV_HARDWARE_ERROR event to avoid potential crash. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.8:rc6:*:*:*:*:*:*"
] | null | 5.5 | null | null |
CVE-2017-10985 | An FR-GV-302 issue in FreeRADIUS 3.x before 3.0.15 allows "Infinite loop and memory exhaustion with 'concat' attributes" and a denial of service. | [
"cpe:2.3:a:freeradius:freeradius:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:freeradius:freeradius:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:freeradius:freeradius:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:freeradius:freeradius:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:freeradius:freeradius:3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:freeradius:freeradius:3.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:freeradius:freeradius:3.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:freeradius:freeradius:3.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:freeradius:freeradius:3.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:freeradius:freeradius:3.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:freeradius:freeradius:3.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:freeradius:freeradius:3.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:freeradius:freeradius:3.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:freeradius:freeradius:3.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:freeradius:freeradius:3.0.14:*:*:*:*:*:*:*"
] | null | null | 7.5 | 7.8 |
|
CVE-2018-15447 | Cisco Integrated Management Controller Supervisor SQL Injection Vulnerability | A vulnerability in the web framework code of Cisco Integrated Management Controller (IMC) Supervisor could allow an unauthenticated, remote attacker to execute arbitrary SQL queries. The vulnerability is due to a lack of proper validation of user-supplied input in SQL queries. An attacker could exploit this vulnerability by sending crafted URLs that contain malicious SQL statements to the affected application. | [
"cpe:2.3:a:cisco:integrated_management_controller:-:*:*:*:*:*:*:*"
] | null | null | 6.5 | null |
GHSA-mch6-3hjm-3qj2 | Cross-Site Request Forgery (CSRF) vulnerability in ThemeFusion Fusion Builder.This issue affects Fusion Builder: from n/a through 3.11.1. | [] | null | 7.1 | null | null |
|
CVE-2025-25244 | Missing Authorization Check in SAP Business Warehouse (Process Chains) | SAP Business Warehouse (Process Chains) allows an attacker to manipulate the process execution due to missing authorization check. An attacker with display authorization for the process chain object could set one or all processes to be skipped. This means corresponding activities, such as data loading, activation, or deletion, will not be executed as initially modeled. This could lead to unexpected results in business reporting leading to a significant impact on integrity. However, there is no impact on confidentiality or availability. | [] | null | 5.7 | null | null |
GHSA-44jc-833q-7hj8 | In wlan service, there is a possible command injection due to improper input validation. This could lead to remote code execution with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00244189; Issue ID: WCNCR00244189. | [] | null | 7.2 | null | null |
|
CVE-2012-3450 | pdo_sql_parser.re in the PDO extension in PHP before 5.3.14 and 5.4.x before 5.4.4 does not properly determine the end of the query string during parsing of prepared statements, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted parameter value. | [
"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.3.8:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.3.9:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.3.10:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.3.11:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.3.12:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.4.3:*:*:*:*:*:*:*"
] | null | null | null | 2.6 |
|
GHSA-9xhx-3vqf-8fhx | D-LINK DI-8003 v16.07.26A1 was discovered to contain a buffer overflow via the host_ip parameter in the ipsec_road_asp function. | [] | null | 4.9 | null | null |
|
CVE-2022-30703 | Trend Micro Security 2021 and 2022 (Consumer) is vulnerable to an exposed dangerous method vulnerability that could allow an attacker to obtain access to leaked kernel addresses and disclose sensitive information. This vulnerability could also potentially be chained for privilege escalation. | [
"cpe:2.3:a:trendmicro:security:2021:*:*:*:*:*:*:*",
"cpe:2.3:a:trendmicro:security:2022:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | 4.6 |
|
RHSA-2018:3425 | Red Hat Security Advisory: qemu-kvm security update | hw: cpu: speculative store bypass | [
"cpe:/o:redhat:rhel_aus:6.6::server",
"cpe:/o:redhat:rhel_tus:6.6::server"
] | null | null | 5.6 | null |
CVE-2003-0805 | Multiple buffer overflows in UMN gopher daemon (gopherd) 2.x and 3.x before 3.0.6 allows attackers to execute arbitrary code via (1) a long filename as a result of a LIST command, and (2) the GSisText function, which calculates the view-type. | [
"cpe:2.3:a:university_of_minnesota:gopherd:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:university_of_minnesota:gopherd:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:university_of_minnesota:gopherd:2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:university_of_minnesota:gopherd:2.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:university_of_minnesota:gopherd:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:university_of_minnesota:gopherd:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:university_of_minnesota:gopherd:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:university_of_minnesota:gopherd:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:university_of_minnesota:gopherd:3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:university_of_minnesota:gopherd:3.0.5:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-xx6j-wqj7-mrv3 | The HTTP client in the Build tool in Gradle before 5.6 sends authentication credentials originally destined for the configured host. If that host returns a 30x redirect, Gradle also sends those credentials to all subsequent hosts that the request redirects to. This is similar to CVE-2018-1000007. | [] | null | 9.8 | null | null |
|
RHBA-2021:0231 | Red Hat Bug Fix Advisory: OpenShift Container Platform 4.5.30 bug fix update | openshift: builder allows read and write of block devices | [
"cpe:/a:redhat:openshift:4.5::el7",
"cpe:/a:redhat:openshift:4.5::el8"
] | null | 8.8 | null | null |
GHSA-r8pm-wfx6-w5v5 | An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory, aka 'Windows Graphics Component Information Disclosure Vulnerability'. | [] | null | null | null | null |
|
CVE-2019-9752 | An issue was discovered in Open Ticket Request System (OTRS) 5.x before 5.0.34, 6.x before 6.0.16, and 7.x before 7.0.4. An attacker who is logged into OTRS as an agent or a customer user may upload a carefully crafted resource in order to cause execution of JavaScript in the context of OTRS. This is related to Content-type mishandling in Kernel/Modules/PictureUpload.pm. | [
"cpe:2.3:a:otrs:otrs:*:*:*:*:*:*:*:*",
"cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*",
"cpe:2.3:a:opensuse:backports_sle:15.0:sp2:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*"
] | null | 5.4 | null | 3.5 |
|
CVE-2008-2556 | SQL injection vulnerability in read.php in PHP Visit Counter 0.4 and earlier allows remote attackers to execute arbitrary SQL commands via the datespan parameter in a read action. | [
"cpe:2.3:a:hessel_brouwer:php_visit_counter:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2014-2657 | Unspecified vulnerability in the print release functionality in PaperCut MF before 14.1 (Build 26983) has unknown impact and remote vectors, related to embedded MFPs. | [
"cpe:2.3:a:papercut:papercut_mf:14.1:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-x964-jvp7-fj3v | D-Link device DI-7200GV2.E1 v21.04.09E1 was discovered to contain a command injection vulnerability in the function version_upgrade.asp. This vulnerability allows attackers to execute arbitrary commands via the path parameter. | [] | null | 9.8 | null | null |
|
CVE-2014-3895 | The I-O DATA TS-WLCAM camera with firmware 1.06 and earlier, TS-WLCAM/V camera with firmware 1.06 and earlier, TS-WPTCAM camera with firmware 1.08 and earlier, TS-PTCAM camera with firmware 1.08 and earlier, TS-PTCAM/POE camera with firmware 1.08 and earlier, and TS-WLC2 camera with firmware 1.02 and earlier allow remote attackers to bypass authentication, and consequently obtain sensitive credential and configuration data, via unspecified vectors. | [
"cpe:2.3:o:iodata:ts-wlcam\\/v_camera_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:iodata:ts-wlcam\\/v_camera:-:*:*:*:*:*:*:*",
"cpe:2.3:o:iodata:ts-wptcam_camera_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:iodata:ts-wptcam_camera:-:*:*:*:*:*:*:*",
"cpe:2.3:o:iodata:ts-wlcam_camera_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:iodata:ts-wlcam_camera:-:*:*:*:*:*:*:*",
"cpe:2.3:h:iodata:ts-ptcam\\/poe_camera_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:iodata:ts-ptcam\\/poe_camera:-:*:*:*:*:*:*:*",
"cpe:2.3:o:iodata:ts-wlc2_camera_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:iodata:ts-wlc2_camera:-:*:*:*:*:*:*:*",
"cpe:2.3:o:iodata:ts-ptcam_camera_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:iodata:ts-ptcam_camera:-:*:*:*:*:*:*:*"
] | null | null | null | 6.4 |
|
CVE-2014-0525 | The API in Adobe Reader and Acrobat 10.x before 10.1.10 and 11.x before 11.0.07 on Windows and OS X does not prevent access to unmapped memory, which allows attackers to execute arbitrary code via unspecified API calls. | [
"cpe:2.3:a:adobe:acrobat_reader:10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:11.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:11.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:11.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:11.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:11.0.5:-:*:*:*:windows:*:*",
"cpe:2.3:a:adobe:acrobat_reader:11.0.6:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:11.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:11.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:11.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:11.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:11.0.5:-:*:*:*:windows:*:*",
"cpe:2.3:a:adobe:acrobat:11.0.6:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
GHSA-f4f8-xfww-r4hf | OS command injection occurring in versions of OpenEMR before 5.0.1.4 allows a remote authenticated attacker to execute arbitrary commands by making a crafted request to interface/fax/fax_dispatch.php after modifying the "hylafax_enscript" global variable in interface/super/edit_globals.php. | [] | null | null | 8.8 | null |
|
CVE-2020-11625 | An issue was discovered in AvertX Auto focus Night Vision HD Indoor/Outdoor IP Dome Camera HD838 and Night Vision HD Indoor/Outdoor Mini IP Bullet Camera HD438. Failed web UI login attempts elicit different responses depending on whether a user account exists. Because the responses indicate whether a submitted username is valid or not, they make it easier to identify legitimate usernames. If a login request is sent to ISAPI/Security/sessionLogin/capabilities using a username that exists, it will return the value of the salt given to that username, even if the password is incorrect. However, if a login request is sent using a username that is not present in the database, it will return an empty salt value. This allows attackers to enumerate legitimate usernames, facilitating brute-force attacks. NOTE: this is different from CVE-2020-7057. | [
"cpe:2.3:o:avertx:hd838_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:avertx:hd838:-:*:*:*:*:*:*:*",
"cpe:2.3:o:avertx:hd438_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:avertx:hd438:-:*:*:*:*:*:*:*"
] | null | 5.3 | null | 5 |
|
CVE-2024-24263 | Lotos WebServer v0.1.1 was discovered to contain a Use-After-Free (UAF) vulnerability via the response_append_status_line function at /lotos/src/response.c. | [
"cpe:2.3:a:chendotjs:lotos_webserver:0.1.1:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
|
GHSA-w4xc-2f8w-q8h5 | Heap-based buffer overflow in the PdfParser::ReadXRefSubsection function in base/PdfParser.cpp in PoDoFo allows attackers to have unspecified impact via vectors related to m_offsets.size. | [] | null | null | 9.8 | null |
|
GHSA-cj4w-9xfh-m2w2 | The IBM Notes Traveler Companion application 1.0 and 1.1 before 201411010515 for Window Phone, as distributed in IBM Notes Traveler 9.0.1, does not properly restrict the number of executions of the automatic configuration option, which makes it easier for remote attackers to capture credentials by conducting a phishing attack involving an encrypted e-mail message. | [] | null | null | null | null |
|
GHSA-7c68-jr35-q3c6 | SQL injection vulnerability in Arab Portal 3 allows remote attackers to execute arbitrary SQL commands via the showemail parameter in a signup action to members.php. | [] | null | null | null | null |
|
GHSA-mg66-qvc5-rm93 | Missing validation causes denial of service via `SparseTensorToCSRSparseMatrix` | ImpactThe implementation of [`tf.raw_ops.SparseTensorToCSRSparseMatrix`](https://github.com/tensorflow/tensorflow/blob/f3b9bf4c3c0597563b289c0512e98d4ce81f886e/tensorflow/core/kernels/sparse/sparse_tensor_to_csr_sparse_matrix_op.cc#L65-L119) does not fully validate the input arguments. This results in a `CHECK`-failure which can be used to trigger a denial of service attack:The code assumes `dense_shape` is a vector and `indices` is a matrix (as part of requirements for sparse tensors) but there is no validation for this:PatchesWe have patched the issue in GitHub commit [ea50a40e84f6bff15a0912728e35b657548cef11](https://github.com/tensorflow/tensorflow/commit/ea50a40e84f6bff15a0912728e35b657548cef11).The fix will be included in TensorFlow 2.9.0. We will also cherrypick this commit on TensorFlow 2.8.1, TensorFlow 2.7.2, and TensorFlow 2.6.4, as these are also affected and still in supported range.For more informationPlease consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.AttributionThis vulnerability has been reported by Neophytos Christou from Secure Systems Lab at Brown University. | [] | null | 5.5 | null | null |
GHSA-x49c-9h54-cv3p | In the KGSL driver function _gpuobj_map_useraddr() in Android for MSM, Firefox OS for MSM, and QRD Android before 2017-10-12, the contents of the stack can get leaked due to an uninitialized variable. | [] | null | null | 5.3 | null |
|
CVE-2021-30517 | Type confusion in V8 in Google Chrome prior to 90.0.4430.212 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.8 |
|
CVE-2015-3735 | WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-08-13-1 and APPLE-SA-2015-08-13-3. | [
"cpe:2.3:a:apple:itunes:12.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
CVE-2018-12223 | Insufficient access control in User Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables an unprivileged user to escape from a virtual machine guest-to-host via local access. | [
"cpe:2.3:a:intel:graphics_driver:15.33.43.4425:*:*:*:*:windows:*:*",
"cpe:2.3:a:intel:graphics_driver:15.33.45.4653:*:*:*:*:windows:*:*",
"cpe:2.3:a:intel:graphics_driver:15.33.46.4885:*:*:*:*:windows:*:*",
"cpe:2.3:a:intel:graphics_driver:15.36.26.4294:*:*:*:*:windows:*:*",
"cpe:2.3:a:intel:graphics_driver:15.36.28.4332:*:*:*:*:windows:*:*",
"cpe:2.3:a:intel:graphics_driver:15.36.31.4414:*:*:*:*:windows:*:*",
"cpe:2.3:a:intel:graphics_driver:15.36.33.4578:*:*:*:*:windows:*:*",
"cpe:2.3:a:intel:graphics_driver:15.36.34.4889:*:*:*:*:windows:*:*",
"cpe:2.3:a:intel:graphics_driver:15.40.34.4624:*:*:*:*:windows:*:*",
"cpe:2.3:a:intel:graphics_driver:15.40.36.4703:*:*:*:*:windows:*:*",
"cpe:2.3:a:intel:graphics_driver:15.40.37.4835:*:*:*:*:windows:*:*",
"cpe:2.3:a:intel:graphics_driver:15.40.38.4963:*:*:*:*:windows:*:*",
"cpe:2.3:a:intel:graphics_driver:15.40.41.5058:*:*:*:*:windows:*:*",
"cpe:2.3:a:intel:graphics_driver:15.45.18.4664:*:*:*:*:windows:*:*",
"cpe:2.3:a:intel:graphics_driver:15.45.19.4678:*:*:*:*:windows:*:*",
"cpe:2.3:a:intel:graphics_driver:15.45.21.4821:*:*:*:*:windows:*:*",
"cpe:2.3:a:intel:graphics_driver:15.45.23.4860:*:*:*:*:windows:*:*",
"cpe:2.3:a:intel:graphics_driver:24.20.100.6025:*:*:*:*:windows:*:*",
"cpe:2.3:a:intel:graphics_driver:24.20.100.6094:*:*:*:*:windows:*:*",
"cpe:2.3:a:intel:graphics_driver:24.20.100.6136:*:*:*:*:windows:*:*",
"cpe:2.3:a:intel:graphics_driver:24.20.100.6194:*:*:*:*:windows:*:*",
"cpe:2.3:a:intel:graphics_driver:24.20.100.6229:*:*:*:*:windows:*:*",
"cpe:2.3:a:intel:graphics_driver:24.20.100.6286:*:*:*:*:windows:*:*"
] | null | null | 6.3 | 4.6 |
|
GHSA-x697-98xp-h39f | A vulnerability was found in Tutorials-Website Employee Management System 1.0. It has been classified as critical. This affects an unknown part of the file /admin/update-user.php. The manipulation of the argument ID leads to improper authorization. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | [] | 6.9 | 5.3 | null | null |
|
GHSA-wjvx-jhpj-r54r | sagemaker-python-sdk vulnerable to Deserialization of Untrusted Data | Impactsagemaker.base_deserializers.NumpyDeserializer module before v2.218.0 allows potentially unsafe deserialization when untrusted data is passed as pickled object arrays. This consequently may allow an unprivileged third party to cause remote code execution, denial of service, affecting both confidentiality and integrity.Impacted versions: <2.218.0.CreditWe would like to thank HiddenLayer for collaborating on this issue through the coordinated vulnerability disclosure process.WorkaroundsDo not pass pickled numpy object arrays which originated from an untrusted source, or that could have been tampered with. Only pass pickled numpy object arrays from sources you trust.ReferencesIf you have any questions or comments about this advisory we ask that you contact AWS/Amazon Security via our vulnerability reporting page [1] or directly via email to [[email protected]](mailto:[email protected]). Please do not create a public GitHub issue.
[1] Vulnerability reporting page: https://aws.amazon.com/security/vulnerability-reportingFixed by: [https://github.com/aws/sagemaker-python-sdk/pull/4557](https://github.com/aws/sagemaker-python-sdk/pull/4557) | [] | null | 7.8 | null | null |
GHSA-wrv9-wmj5-v6r7 | Hospital Management System v4.0 was discovered to contain a blind SQL injection vulnerability via the register function in func2.php. | [] | null | 7.5 | null | null |
|
GHSA-v59p-p692-v382 | Zend Framework Allows SQL Injection | Zend Framework before 2.2.10 and 2.3.x before 2.3.5 has Potential SQL injection in PostgreSQL Zend\Db adapter. | [] | null | 9.8 | null | null |
GHSA-8gq7-wx9r-qgf6 | Vulnerability in the Oracle Communications Operations Monitor product of Oracle Communications (component: Mediation Engine). Supported versions that are affected are 3.4, 4.2, 4.3, 4.4 and 5.0. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle Communications Operations Monitor. While the vulnerability is in Oracle Communications Operations Monitor, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Communications Operations Monitor accessible data as well as unauthorized read access to a subset of Oracle Communications Operations Monitor accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Communications Operations Monitor. CVSS 3.1 Base Score 6.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L). | [] | null | null | null | null |
|
CVE-2018-8800 | rdesktop versions up to and including v1.8.3 contain a Heap-Based Buffer Overflow in function ui_clip_handle_data() that results in a memory corruption and probably even a remote code execution. | [
"cpe:2.3:a:rdesktop:rdesktop:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
|
CVE-2015-4020 | RubyGems 2.0.x before 2.0.17, 2.2.x before 2.2.5, and 2.4.x before 2.4.8 does not validate the hostname when fetching gems or making API requests, which allows remote attackers to redirect requests to arbitrary domains via a crafted DNS SRV record with a domain that is suffixed with the original domain name, aka a "DNS hijack attack." NOTE: this vulnerability exists because to an incomplete fix for CVE-2015-3900. | [
"cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:2.0.0:preview2:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:2.0.0:preview2.1:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:2.0.0:preview2.2:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:2.0.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:2.0.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:2.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:2.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:2.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:2.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:2.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:2.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:2.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:2.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:2.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:2.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:2.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:2.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:2.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:2.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:2.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:2.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:2.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:2.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:2.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:2.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:2.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:2.4.7:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
RHSA-2015:1917 | Red Hat Security Advisory: libwmf security update | libwmf: heap overflow when decoding BMP images libwmf: heap overflow within the RLE decoding of embedded BMP images libwmf: heap buffer overread in meta.h libwmf: use-after-free flaw in meta.h | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
CVE-2023-42951 | The issue was addressed with improved handling of caches. This issue is fixed in iOS 17.1 and iPadOS 17.1. A user may be unable to delete browsing history items. | [
"cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"
] | null | 4.3 | null | null |
|
GHSA-hj48-8q8c-q7g9 | Cross-site scripting (XSS) vulnerability in post.php in Moodle before 1.3 allows remote attackers to inject arbitrary web script or HTML via the reply parameter. | [] | null | null | null | null |
|
CVE-2024-52347 | WordPress Website remote Install vor Gravity, WPForms, Formidable, Ninja, Caldera plugin <= 4.0 - Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in WP website creator Website remote Install vor Gravity, WPForms, Formidable, Ninja, Caldera allows Stored XSS.This issue affects Website remote Install vor Gravity, WPForms, Formidable, Ninja, Caldera: from n/a through 4.0. | [] | null | 6.5 | null | null |
CVE-2019-1594 | Cisco NX-OS Software 802.1X Extensible Authentication Protocol over LAN Denial of Service Vulnerability | A vulnerability in the 802.1X implementation for Cisco NX-OS Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to incomplete input validation of Extensible Authentication Protocol over LAN (EAPOL) frames. An attacker could exploit this vulnerability by sending a crafted EAPOL frame to an interface on the targeted device. A successful exploit could allow the attacker to cause the Layer 2 (L2) forwarding process to restart multiple times, leading to a system-level restart of the device and a DoS condition. Note: This vulnerability affects only NX-OS devices configured with 802.1X functionality. Cisco Nexus 1000V Switch for VMware vSphere devices are affected in versions prior to 5.2(1)SV3(1.4b). Nexus 3000 Series Switches are affected in versions prior to 7.0(3)I7(4). Nexus 3500 Platform Switches are affected in versions prior to 7.0(3)I7(4). Nexus 2000, 5500, 5600, and 6000 Series Switches are affected in versions prior to 7.3(5)N1(1) and 7.1(5)N1(1b). Nexus 7000 and 7700 Series Switches are affected in versions prior to 8.2(3). Nexus 9000 Series Fabric Switches in ACI Mode are affected in versions prior to 13.2(1l). Nexus 9000 Series Switches in Standalone NX-OS Mode are affected in versions prior to 7.0(3)I7(4). | [
"cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_1000v:-:*:*:*:*:vmware_vsphere:*:*",
"cpe:2.3:h:cisco:nexus_3000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3500:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_2000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5500:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_5600:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_6000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_7000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_7700:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9000_in_standalone_nx-os_mode:-:*:*:*:*:*:*:*"
] | null | null | 7.4 | null |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.