id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
57.2k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
RHSA-2015:0087 | Red Hat Security Advisory: kernel security and bug fix update | Kernel: ALSA: control: integer overflow in id.index & id.numid kernel: net: sctp: NULL pointer dereference in af->from_addr_param on malformed packet | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
ICSA-22-020-01 | ICONICS and Mitsubishi Electric HMI SCADA | ICONICS MobileHMI and Mitsubishi Electric MC Mobile products lack proper validation checks on user input and external data when they are used to render a page to the client.CVE-2022-23127 has been assigned to this vulnerability. A CVSS v3 base score of 4.2 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N). The FrameWorX Server in all ICONICS Suite and Mitsubishi Electric MC Works64 products can allow an attacker to bypass GENESIS64 /MC Works64 security when opening a communication channel to the WebSocket endpoint (Port 80 or 443) of the FrameWorX Server.CVE-2022-23128 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). The GENESIS64 and MC Works64 Workbench export to CSV function may expose a password in plain text when used to export the GridWorX Server configuration.CVE-2022-23129 has been assigned to this vulnerability. A CVSS v3 base score of 7.7 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H). A coding error in the SQL query engine memory allocation code makes it possible to execute a series of SQL commands in a GENESIS64 system or a MC Works64 system, which could cause a crash of the SQL Query Engine and result in the disabling of the SQL Server.CVE-2022-23130 has been assigned to this vulnerability. A CVSS v3 base score of 5.9 has been calculated; the CVSS vector string is (AV:A/AC:H/PR:H/UI:R/S:C/C:N/I:L/A:H). | [] | null | null | 5.9 | null |
CVE-2007-2804 | Multiple cross-site scripting (XSS) vulnerabilities in scripts/prodList.asp in CandyPress Store 3.5.2.14 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) brand and (2) Msg parameters. | [
"cpe:2.3:a:candypress:candypress_store:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-35h8-7h6c-x54q | Multiple directory traversal vulnerabilities in the (1) tar_extract_glob and (2) tar_extract_all functions in libtar 1.2.20 and earlier allow remote attackers to overwrite arbitrary files via a .. (dot dot) in a crafted tar file. | [] | null | null | null | null |
|
CVE-2002-2254 | The experimental IP packet queuing feature in Netfilter / IPTables in Linux kernel 2.4 up to 2.4.19 and 2.5 up to 2.5.31, when a privileged process exits and network traffic is not being queued, may allow a later process with the same Process ID (PID) to access certain network traffic that would otherwise be restricted. | [
"cpe:2.3:o:linux:linux_kernel:2.4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.0:test1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.0:test10:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.0:test11:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.0:test12:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.0:test2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.0:test3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.0:test4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.0:test5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.0:test6:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.0:test7:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.0:test8:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.0:test9:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.11:pre3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.12:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.13:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.14:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.15:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.16:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.17:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.18:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.18:pre1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.18:pre2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.18:pre3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.18:pre4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.18:pre5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.18:pre6:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.18:pre7:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.18:pre8:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.18:pre9:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.19:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.19:pre1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.19:pre2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.19:pre3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.19:pre4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.19:pre5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.4.19:pre6:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.5.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.5.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.5.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.5.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.5.12:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.5.13:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.5.14:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.5.15:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.5.16:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.5.17:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.5.18:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.5.19:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.5.20:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.5.21:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.5.22:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.5.23:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.5.24:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.5.25:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.5.26:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.5.27:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.5.28:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.5.29:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.5.30:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.5.31:*:*:*:*:*:*:*"
] | null | null | null | 2.1 |
|
CVE-2024-42584 | A Cross-Site Request Forgery (CSRF) in the component delete_product.php of Warehouse Inventory System v2.0 allows attackers to escalate privileges. | [
"cpe:2.3:a:siamonhasan:warehouse_inventory_system:2.0:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
|
RHSA-2019:3149 | Red Hat Security Advisory: OpenShift Container Platform logging-elasticsearch5-container security update | jackson-databind: Deserialization vulnerability via readValue method of ObjectMapper jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-7525) jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-15095) jackson-databind: unsafe deserialization due to incomplete blacklist (incomplete fix for CVE-2017-7525 and CVE-2017-17485) jackson-databind: incomplete fix for CVE-2017-7525 permits unsafe serialization via c3p0 libraries guava: Unbounded memory allocation in AtomicDoubleArray and CompoundOrdering classes allow remote attackers to cause a denial of service jackson-databind: Potential information exfiltration with default typing, serialization gadget from MyBatis jackson-databind: improper polymorphic deserialization of types from Jodd-db library jackson-databind: improper polymorphic deserialization of types from Oracle JDBC driver jackson-databind: arbitrary code execution in slf4j-ext class jackson-databind: arbitrary code execution in blaze-ds-opt and blaze-ds-core classes jackson-databind: exfiltration/XXE in some JDK classes jackson-databind: server-side request forgery (SSRF) in axis2-jaxws class jackson-databind: improper polymorphic deserialization in axis2-transport-jms class jackson-databind: improper polymorphic deserialization in openjpa class jackson-databind: improper polymorphic deserialization in jboss-common-core class jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server. jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server via crafted JSON message. jackson-databind: default typing mishandling leading to remote code execution | [
"cpe:/a:redhat:openshift:3.11::el7"
] | null | null | 9.8 | null |
GHSA-fxw9-g742-2frj | The issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14.2. An app may be able to access user-sensitive data. | [] | null | 5.5 | null | null |
|
CVE-1999-1426 | Solaris Solstice AdminSuite (AdminSuite) 2.1 follows symbolic links when updating an NIS database, which allows local users to overwrite arbitrary files. | [
"cpe:2.3:a:sun:solstice_adminsuite:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:solstice_adminsuite:2.1:*:x86:*:*:*:*:*",
"cpe:2.3:a:sun:solstice_adminsuite:2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:solstice_adminsuite:2.2:*:x86:*:*:*:*:*"
] | null | null | null | 6.2 |
|
GHSA-rjg6-f836-fcpw | NVIDIA Shield TV Experience prior to v8.0, NVIDIA Tegra bootloader contains a vulnerability in nvtboot where the Trusted OS image is improperly authenticated, which may lead to code execution, denial of service, escalation of privileges, and information disclosure, code execution, denial of service, or escalation of privileges | [] | null | null | 7.8 | null |
|
CVE-2025-23544 | WordPress StatPressCN plugin <= 1.9.1 - Reflected Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in heart5 StatPressCN allows Reflected XSS. This issue affects StatPressCN: from n/a through 1.9.1. | [] | null | 7.1 | null | null |
CVE-2017-5243 | The default SSH configuration in Rapid7 Nexpose hardware appliances shipped before June 2017 does not specify desired algorithms for key exchange and other important functions. As a result, it falls back to allowing ALL algorithms supported by the relevant version of OpenSSH and makes the installations vulnerable to a range of MITM, downgrade, and decryption attacks. | [
"cpe:2.3:a:rapid7:nexpose:*:*:*:*:*:*:*:*"
] | null | null | 8.5 | 6.8 |
|
GHSA-j8m3-q4pf-6c8c | Vulnerability in the Solaris component of Oracle Sun Systems Products Suite (subcomponent: Kernel). Supported versions that are affected are 10 and 11. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Solaris executes to compromise Solaris. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Solaris accessible data. CVSS 3.0 Base Score 1.8 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:L/A:N). | [] | null | null | 1.8 | null |
|
CVE-2005-3937 | SQL injection vulnerability in Softbiz B2B Trading Marketplace Script 1.1 and earler allows remote attackers to execute arbitrary SQL commands via the cid parameter in (1) selloffers.php, (2) buyoffers.php, (3) products.php, or (4) profiles.php. | [
"cpe:2.3:a:softbiz:b2b_trading_marketplace_script:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2019-19228 | Fronius Solar Inverter devices before 3.14.1 (HM 1.12.1) allow attackers to bypass authentication because the password for the today account is stored in the /tmp/web_users.conf file. | [
"cpe:2.3:o:fronius:datamanager_box_2.0_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:datamanager_box_2.0:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:eco_25.0-3-s_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:eco_25.0-3-s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:eco_27.0-3-s_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:eco_27.0-3-s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:galvo_1.5-1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:galvo_1.5-1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:galvo_1.5-1_208-240_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:galvo_1.5-1_208-240:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:galvo_2.0-1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:galvo_2.0-1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:galvo_2.0-1_208-240_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:galvo_2.0-1_208-240:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:galvo_2.5-1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:galvo_2.5-1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:galvo_2.5-1_208-240_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:galvo_2.5-1_208-240:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:galvo_3.0-1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:galvo_3.0-1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:galvo_3.1-1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:galvo_3.1-1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:galvo_3.1-1_208-240_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:galvo_3.1-1_208-240:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:primo_10.0-1_208-240_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:primo_10.0-1_208-240:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:primo_11.4-1_208-240_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:primo_11.4-1_208-240:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:primo_12.5-1_208-240_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:primo_12.5-1_208-240:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:primo_15.0-1_208-240_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:primo_15.0-1_208-240:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:primo_3.0-1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:primo_3.0-1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:primo_3.5-1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:primo_3.5-1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:primo_3.6-1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:primo_3.6-1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:primo_3.8-1_208-240_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:primo_3.8-1_208-240:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:primo_4.0-1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:primo_4.0-1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:primo_4.6-1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:primo_4.6-1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:primo_5.0-1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:primo_5.0-1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:primo_5.0-1_208-240_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:primo_5.0-1_208-240:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:primo_5.0-1_aus_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:primo_5.0-1_aus:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:primo_5.0-1_sc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:primo_5.0-1_sc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:primo_6.0-1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:primo_6.0-1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:primo_6.0-1_208-240_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:primo_6.0-1_208-240:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:primo_7.6-1_208-240_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:primo_7.6-1_208-240:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:primo_8.2-1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:primo_8.2-1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:primo_8.2-1_208-240_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:primo_8.2-1_208-240:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:symo_10.0-3-m_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:symo_10.0-3-m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:symo_10.0-3-m-os_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:symo_10.0-3-m-os:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:symo_10.0-3_208-240_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:symo_10.0-3_208-240:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:symo_10.0-3_480_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:symo_10.0-3_480:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:symo_12.0-3_208-240_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:symo_12.0-3_208-240:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:symo_12.5-3-m_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:symo_12.5-3-m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:symo_12.5-3_480_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:symo_12.5-3_480:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:symo_15.0-3-m_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:symo_15.0-3-m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:symo_15.0-3_107_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:symo_15.0-3_107:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:symo_15.0-3_480_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:symo_15.0-3_480:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:symo_17.5-3-m_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:symo_17.5-3-m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:symo_17.5-3_480_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:symo_17.5-3_480:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:symo_20.0-3-m_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:symo_20.0-3-m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:symo_20.0-3_480_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:symo_20.0-3_480:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:symo_22.7-3_480_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:symo_22.7-3_480:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:symo_24.0-3_480_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:symo_24.0-3_480:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:symo_3.0-3-m_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:symo_3.0-3-m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:symo_3.0-3-s_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:symo_3.0-3-s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:symo_3.7-3-m_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:symo_3.7-3-m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:symo_3.7-3-s_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:symo_3.7-3-s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:symo_4.5-3-m_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:symo_4.5-3-m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:symo_4.5-3-s_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:symo_4.5-3-s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:symo_5.0-3-m_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:symo_5.0-3-m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:symo_6.0-3-m_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:symo_6.0-3-m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:symo_7.0-3-m_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:symo_7.0-3-m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:symo_8.2-3-m_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:symo_8.2-3-m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:symo_advanced_10.0-3_208-240_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:symo_advanced_10.0-3_208-240:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:symo_advanced_12.0-3_208-240_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:symo_advanced_12.0-3_208-240:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:symo_advanced_15.0-3_480_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:symo_advanced_15.0-3_480:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:symo_advanced_20.0-3_480_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:symo_advanced_20.0-3_480:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:symo_advanced_22.7-3_480_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:symo_advanced_22.7-3_480:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:symo_advanced_24.0-3_480_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:symo_advanced_24.0-3_480:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:symo_hybrid_3.0-3-m_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:symo_hybrid_3.0-3-m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:symo_hybrid_4.0-3-m_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:symo_hybrid_4.0-3-m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:symo_hybrid_5.0-3-m_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:symo_hybrid_5.0-3-m:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | 5 |
|
GHSA-5j7j-27cq-wg7x | Buffer overflow in the msTmpFile function in maputil.c in mapserv in MapServer before 4.10.6 and 5.x before 5.6.4 allows local users to cause a denial of service via vectors involving names of temporary files. | [] | null | null | null | null |
|
CVE-2025-32658 | WordPress HelpGent plugin <= 2.2.4 - PHP Object Injection vulnerability | Deserialization of Untrusted Data vulnerability in wpWax HelpGent allows Object Injection. This issue affects HelpGent: from n/a through 2.2.4. | [] | null | 9.8 | null | null |
GHSA-p5pr-vm3j-jxxf | Mattermost Exposure of Sensitive Information to an Unauthorized Actor vulnerability | Mattermost fails to properly validate the "Show Full Name" option in a few endpoints in Mattermost Boards, allowing a member to get the full name of another user even if the Show Full Name option was disabled. | [] | null | 4.3 | null | null |
GHSA-4jmg-gg6g-x7j5 | The codection "Import users from CSV with meta" plugin before 1.14.2.2 for WordPress allows wp-admin/admin-ajax.php?action=acui_delete_attachment CSRF. | [] | null | 5.7 | null | null |
|
CVE-2019-12972 | An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.32. There is a heap-based buffer over-read in _bfd_doprnt in bfd.c because elf_object_p in elfcode.h mishandles an e_shstrndx section of type SHT_GROUP by omitting a trailing '\0' character. | [
"cpe:2.3:a:gnu:binutils:2.32:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"
] | null | 5.5 | null | 4.3 |
|
CVE-2022-49050 | memory: renesas-rpc-if: fix platform-device leak in error path | In the Linux kernel, the following vulnerability has been resolved:
memory: renesas-rpc-if: fix platform-device leak in error path
Make sure to free the flash platform device in the event that
registration fails during probe. | [] | null | null | null | null |
GHSA-vxvg-fm2c-8444 | An issue was discovered in Scada-LTS v2.7.5.2 build 4551883606 and before, allows remote attackers with low-level authentication to escalate privileges, execute arbitrary code, and obtain sensitive information via Event Handlers function. | [] | null | 8.8 | null | null |
|
GHSA-q23q-4mrr-rg29 | The web service of iSherlock from HGiga has an OS Command Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary OS commands and execute them on the server. | [] | null | 9.8 | null | null |
|
GHSA-qqpx-rhfx-8mgf | Memory leak in the __res_vinit function in the IPv6 name server management code in libresolv in GNU C Library (aka glibc or libc6) before 2.24 allows remote attackers to cause a denial of service (memory consumption) by leveraging partial initialization of internal resolver data structures. | [] | null | null | 7.5 | null |
|
GHSA-8cr5-wjqg-r3m8 | SQL injection vulnerability in index.php in MASA2EL Music City 1.0 and 1.1 allows remote attackers to execute arbitrary SQL commands via the id parameter in a singer action. | [] | null | null | null | null |
|
GHSA-fvfc-8pqr-wjpv | Missing Authorization in Jenkins S3 publisher Plugin | Jenkins S3 publisher Plugin prior to 0.11.7 and 0.11.5.1 does not perform Run/Artifacts permission checks in various HTTP endpoints and API models.This allows attackers with Item/Read permission to obtain information about artifacts uploaded to S3, if the optional Run/Artifacts permission is enabled.Jenkins S3 publisher Plugin 0.11.7 and 0.11.5.1 requires Run/Artifacts permission to obtain information about artifacts if this permission is enabled. | [] | null | 4.3 | null | null |
GHSA-5994-4pv5-xvvm | A privilege escalation vulnerability exists in the oslo.privsep functionality of OpenStack git master 05194e7618 and prior. Overly permissive functionality within tools leveraging this library within a container can lead increased privileges. | [] | null | 8.8 | null | null |
|
GHSA-gwqv-9cvv-vp58 | Arbitrary File Deletion vulnerability in XOS-Shop xos_shop_system 1.0.9 via current_manufacturer_image parameter to /shop/admin/categories.php | [] | null | 8.1 | null | null |
|
GHSA-6m2w-qjg4-2qq2 | Cross-site scripting (XSS) vulnerability in down.pl in Widexl Download Tracker 1.06 allows remote attackers to inject arbitrary web script or HTML via the ID parameter. | [] | null | null | null | null |
|
CVE-2019-7667 | Prima Systems FlexAir, Versions 2.3.38 and prior. The application generates database backup files with a predictable name, and an attacker can use brute force to identify the database backup file name. A malicious actor can exploit this issue to download the database file and disclose login information, which can allow the attacker to bypass authentication and have full access to the system. | [
"cpe:2.3:a:primasystems:flexair:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | 6.4 |
|
CVE-2018-14994 | The Essential Phone Android device with a build fingerprint of essential/mata/mata:8.1.0/OPM1.180104.166/297:user/release-keys contains a pre-installed platform app with a package name of com.ts.android.hiddenmenu (versionName=1.0, platformBuildVersionName=8.1.0) that contains an exported activity app component named com.ts.android.hiddenmenu.rtn.RTNResetActivity that allows any app co-located on the device to programmatically initiate a factory reset. In addition, the app initiating the factory reset does not require any permissions. A factory reset will remove all user data and apps from the device. This will result in the loss of any data that have not been backed up or synced externally. The capability to perform a factory reset is not directly available to third-party apps (those that the user installs themselves with the exception of enabled Mobile Device Management (MDM) apps), although this capability can be obtained by leveraging an unprotected app component of a pre-installed platform app. | [
"cpe:2.3:o:essential:phone_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:essential:phone:-:*:*:*:*:*:*:*"
] | null | null | 7.5 | 9.4 |
|
CVE-2020-35884 | An issue was discovered in the tiny_http crate through 2020-06-16 for Rust. HTTP Request smuggling can occur via a malformed Transfer-Encoding header. | [
"cpe:2.3:a:tiny-http_project:tiny-http:*:*:*:*:*:rust:*:*",
"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*"
] | null | 6.5 | null | 6.4 |
|
GHSA-xm77-6vqw-642h | An issue (known as XSA-212) was discovered in Xen, with fixes available for 4.8.x, 4.7.x, 4.6.x, 4.5.x, and 4.4.x. The earlier XSA-29 fix introduced an insufficient check on XENMEM_exchange input, allowing the caller to drive hypervisor memory accesses outside of the guest provided input/output arrays. | [] | null | null | 8.2 | null |
|
GHSA-86jf-64jm-h97c | NetScreen ScreenOS before 2.6.1 does not support a maximum number of concurrent sessions for a system, which allows an attacker on the trusted network to cause a denial of service (resource exhaustion) via a port scan to an external network, which consumes all available connections. | [] | null | null | null | null |
|
GHSA-h57x-v5j7-4f26 | Buffer overflow in canuum program for Canna input system allows local users to gain root privileges. | [] | null | null | null | null |
|
RHSA-2017:2000 | Red Hat Security Advisory: tigervnc and fltk security, bug fix, and enhancement update | tigervnc: VNC server can crash when TLS handshake terminates early tigervnc: Buffer overflow in ModifiablePixelBuffer::fillRect tigervnc: SSecurityVeNCrypt memory leak tigervnc: Double free via crafted fences tigervnc: Server crash via long usernames tigervnc: Integer overflow in SMsgReader::readClientCutText tigervnc: SecurityServer and ClientServer memory leaks | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 3.7 | null |
CVE-2024-47208 | Apache OFBiz: URLs allowing remote use of Groovy expressions, leading to RCE | Server-Side Request Forgery (SSRF), Improper Control of Generation of Code ('Code Injection') vulnerability in Apache OFBiz.
This issue affects Apache OFBiz: before 18.12.17.
Users are recommended to upgrade to version 18.12.17, which fixes the issue. | [] | null | 9.8 | null | null |
GHSA-mp33-8vpj-672c | In Dataiku DSS before 8.0.6, insufficient access control in the Jupyter notebooks integration allows users (who have coding permissions) to read and overwrite notebooks in projects that they are not authorized to access. | [] | null | null | null | null |
|
CVE-2010-3151 | Untrusted search path vulnerability in Adobe On Location CS4 Build 315 allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse ibfs32.dll that is located in the same folder as an OLPROJ file. | [
"cpe:2.3:a:adobe:onlocation_cs4:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:onlocation_cs4:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:onlocation_cs4:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:premiere_pro_cs4:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:premiere_pro_cs4:4.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:premiere_pro_cs4:4.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:premiere_pro_cs4:4.2.1:*:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
GHSA-c4v9-g4cm-vgvx | In the Linux kernel, the following vulnerability has been resolved:spi: mchp-pci1xxx: Fix a possible null pointer dereference in pci1xxx_spi_probeIn function pci1xxxx_spi_probe, there is a potential null pointer that
may be caused by a failed memory allocation by the function devm_kzalloc.
Hence, a null pointer check needs to be added to prevent null pointer
dereferencing later in the code.To fix this issue, spi_bus->spi_int[iter] should be checked. The memory
allocated by devm_kzalloc will be automatically released, so just directly
return -ENOMEM without worrying about memory leaks. | [] | null | 5.5 | null | null |
|
GHSA-659r-6ccr-7pp8 | Missing Authorization vulnerability in Porto Theme Porto Theme - Functionality allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Porto Theme - Functionality: from n/a before 2.12.1. | [] | null | 5.3 | null | null |
|
GHSA-q77f-7g38-65hw | Buffer overflow in the base64 decoder in MERCUR Mailserver 4.2 before SP3a allows remote attackers to cause a denial of service and possibly execute arbitrary code via a long (1) AUTH command to the POP3 server or (2) AUTHENTICATE command to the IMAP server. | [] | null | null | null | null |
|
GHSA-xqmf-wf6x-2cx6 | Improper access control in the Intel(R) NUC HDMI Firmware Update Tool for NUC7i3DN, NUC7i5DN and NUC7i7DN before version 1.78.2.0.7 may allow an authenticated user to potentially enable escalation of privilege via local access. | [] | null | 7.8 | null | null |
|
GHSA-hwxc-7rw6-2gqf | A remote code execution vulnerability exists when Windows Hyper-V on a host server fails to properly validate input from an authenticated user on a guest operating system, aka 'Windows Hyper-V Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-1397, CVE-2019-1398. | [] | null | null | null | null |
|
CVE-2022-25833 | Improper authentication in ImsService prior to SMR Apr-2022 Release 1 allows attackers to get IMSI without READ_PRIVILEGED_PHONE_STATE permission. | [
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*"
] | null | 3.3 | null | null |
|
GHSA-9ggf-9pgf-qpq9 | In Hardware Sentry KM before 10.0.01 for BMC PATROL, a cleartext password may be discovered after a failure or timeout of a command. | [] | null | null | null | null |
|
RHSA-2023:4172 | Red Hat Security Advisory: java-1.8.0-openjdk security update | OpenJDK: array indexing integer overflow issue (8304468) OpenJDK: improper handling of slash characters in URI-to-path conversion (8305312) | [
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 3.7 | null | null |
CVE-2022-43076 | A cross-site scripting (XSS) vulnerability in /admin/edit-admin.php of Web-Based Student Clearance System v1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the txtemail parameter. | [
"cpe:2.3:a:web-based_student_clearance_system_project:web-based_student_clearance_system:1.0:*:*:*:*:*:*:*"
] | null | 4.8 | null | null |
|
CVE-2023-48419 | An attacker in the wifi vicinity of a target Google Home can spy on the victim, resulting in EoP | An attacker in the wifi vicinity of a target Google Home can spy on the victim, resulting in Elevation of Privilege
| [
"cpe:2.3:o:google:nest_audio_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:google:nest_audio:-:*:*:*:*:*:*:*",
"cpe:2.3:o:google:nest_mini_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:google:nest_mini:-:*:*:*:*:*:*:*",
"cpe:2.3:o:google:home_mini_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:google:home_mini:-:*:*:*:*:*:*:*",
"cpe:2.3:o:google:home_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:google:home:-:*:*:*:*:*:*:*"
] | null | 10 | null | null |
GHSA-gpjp-7j74-g24x | Tenda routers G1 and G3 v15.11.0.17(9502)_CN were discovered to contain a stack overflow in the function formAddDnsForward. This vulnerability allows attackers to cause a Denial of Service (DoS) via the DnsForwardRule parameter. | [] | null | null | null | null |
|
CVE-2025-30616 | WordPress Latest Custom Post Type Updates plugin <= 1.3.0 - Reflected Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Latest Custom Post Type Updates allows Reflected XSS. This issue affects Latest Custom Post Type Updates: from n/a through 1.3.0. | [] | null | 7.1 | null | null |
GHSA-v9rc-q6vq-c368 | Cross-site scripting (XSS) vulnerability in the jumpmenu function in functions.php for paFileDB 3.1 and earlier allows remote attackers to inject arbitrary web script or HTML via the URL parameters, which is not properly cleansed in the $pageurl variable, as demonstrated using pafiledb.php. | [] | null | null | null | null |
|
GHSA-7qxv-9465-xvp7 | Multiple cross-site request forgery (CSRF) vulnerabilities in the web administration console in Fortinet FortiWeb before 5.2.0 allow remote attackers to hijack the authentication of administrators via system/config/adminadd and other unspecified vectors. | [] | null | null | null | null |
|
CVE-2023-23566 | A 2-Step Verification problem in Axigen 10.3.3.52 allows an attacker to access a mailbox by bypassing 2-Step Verification when they try to add an account to any third-party webmail service (or add an account to Outlook or Gmail, etc.) with IMAP or POP3 without any verification code. | [
"cpe:2.3:a:axigen:axigen_mail_server:10.3.3.52:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
GHSA-vr5f-php7-rg24 | Pimcore Admin Classic Bundle allows user enumeration | pimcore/admin-ui-classic-bundle provides a Backend UI for Pimcore. In affected versions an error message discloses existing accounts and leads to user enumeration on the target via "Forgot password" function. No generic error message has been implemented. This issue has been addressed in version 1.7.4 and all users are advised to upgrade. There are no known workarounds for this vulnerability. | [] | 6.9 | null | null | null |
RHSA-2024:7925 | Red Hat Security Advisory: OpenShift Container Platform 4.17.1 packages and security update | Podman: Buildah: cri-o: FIPS Crypto-Policy Directory Mounting Issue in containers/common Go Library | [
"cpe:/a:redhat:openshift:4.17::el8",
"cpe:/a:redhat:openshift:4.17::el9"
] | null | 5.4 | null | null |
GHSA-fx83-22h6-wqxv | Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to a buffer overflow. An attacker can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the set_dmvpn function with the cisco_secret variable. | [] | null | 7.2 | null | null |
|
GHSA-9q3c-fv37-7prc | IBM MQ and IBM MQ Appliance 7.1, 7.5, 8.0, 9.0 LTS, 9.1 LTS, and 9.1 CD could allow a local attacker to obtain sensitive information by inclusion of sensitive data within trace. IBM X-Force ID: 168862. | [] | null | null | null | null |
|
GHSA-8ghc-464q-f7vj | Windows Kernel-Mode Driver Elevation of Privilege Vulnerability | [] | null | 7.8 | null | null |
|
CVE-2022-23387 | An issue was discovered in taocms 3.0.2. This is a SQL blind injection that can obtain database data through the Comment Update field. | [
"cpe:2.3:a:taocms:taocms:3.0.2:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
RHSA-2023:1513 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.10 on RHEL 8 security update | SnakeYaml: Constructor Deserialization Remote Code Execution undertow: Server identity in https connection is not checked by the undertow client snakeyaml: Uncaught exception in java.base/java.util.ArrayList.hashCode hsqldb: Untrusted input may lead to RCE attack dev-java/snakeyaml: DoS via stack overflow codec-haproxy: HAProxyMessageDecoder Stack Exhaustion DoS apache-james-mime4j: Temporary File Information Disclosure in MIME4J TempFileStorageProvider RESTEasy: creation of insecure temp files Undertow: Infinite loop in SslConduit during close | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el8"
] | null | 7.5 | null | null |
CVE-2010-1418 | Cross-site scripting (XSS) vulnerability in WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1 on Mac OS X 10.4, allows remote attackers to inject arbitrary web script or HTML via a FRAME element with a SRC attribute composed of a javascript: sequence preceded by spaces. | [
"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:4.0.0b:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:webkit:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.5.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.5.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.5.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.5.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.5.6:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.5.7:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.5.8:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.6.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.6.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.6:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.7:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.8:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.6.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.6.3:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.6:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.7:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.8:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.9:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.10:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.11:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.6:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.7:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.8:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.9:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.10:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.11:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
RHSA-2018:1815 | Red Hat Security Advisory: chromium-browser security update | chromium-browser: Use after free in Blink chromium-browser: Type confusion in Blink chromium-browser: Overly permissive policy in WebUSB Skia: Heap buffer overflow rasterizing paths in SVG chromium-browser: Use after free in indexedDB chromium-browser: Out of bounds memory access in WebRTC chromium-browser: Out of bounds memory access in WebRTC chromium-browser: Incorrect mutability protection in WebAssembly chromium-browser: Use of uninitialized memory in WebRTC chromium-browser: URL spoof in Omnibox chromium-browser: Referrer Policy bypass in Blink chromium-browser: UI spoofing in Blink chromium-browser: Out of bounds memory access in V8 chromium-browser: Leak of visited status of page in Blink chromium-browser: Overly permissive policy in Extensions chromium-browser: Restrictions bypass in the debugger extension API chromium-browser: Restrictions bypass in the debugger extension API chromium-browser: Heap buffer overflow in Skia chromium-browser: Out of bounds memory access in V8 chromium-browser: Out of bounds memory access in V8 chromium-browser: Out of bounds memory access in PDFium chromium-browser: Incorrect escaping of MathML in Blink chromium-browser: Password fields not taking advantage of OS protections in Views | [
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 4.3 | null |
CVE-2021-31496 | This vulnerability allows remote attackers to execute arbitrary code on affected installations of OpenText Brava! Desktop 16.6.3.84. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of DXF files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-13308. | [
"cpe:2.3:a:opentext:brava\\!_desktop:16.6.3.84:*:*:*:*:*:*:*"
] | null | null | 7.8 | null |
|
GHSA-fwwm-g9v9-26x8 | ganglia-web (aka Ganglia Web Frontend) through 3.7.5 allows XSS via the header.php ce parameter. | [] | null | null | null | null |
|
GHSA-2w7f-7xgm-cj5w | In mtk-aie, there is a possible use after free due to a logic error. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07262518; Issue ID: ALPS07262518. | [] | null | 6.7 | null | null |
|
GHSA-9p87-pv6m-h275 | An issue was discovered in certain Apple products. iOS before 11 is affected. The issue involves the "Location Framework" component. It allows attackers to obtain sensitive location information via a crafted app that reads the location variable. | [] | null | null | 3.3 | null |
|
RHSA-2022:0477 | Red Hat Security Advisory: Red Hat OpenShift GitOps security update | gitops: Path traversal and dereference of symlinks when passing Helm value files | [
"cpe:/a:redhat:openshift_gitops:1.4::el8"
] | null | 7.7 | null | null |
CVE-2024-41315 | TOTOLINK A6000R V1.0.1-B20201211.2000 was discovered to contain a command injection vulnerability via the ifname parameter in the apcli_do_enr_pin_wps function. | [
"cpe:2.3:o:totolink:a6000r_firmware:1.0.1-b20201211.2000:*:*:*:*:*:*:*"
] | null | 6.8 | null | null |
|
CVE-2022-34196 | Jenkins REST List Parameter Plugin 1.5.2 and earlier does not escape the name and description of REST list parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. | [
"cpe:2.3:a:jenkins:rest_list_parameter:*:*:*:*:*:jenkins:*:*"
] | null | 5.4 | null | 3.5 |
|
CVE-2010-2498 | The psh_glyph_find_strong_points function in pshinter/pshalgo.c in FreeType before 2.4.0 does not properly implement hinting masks, which allows remote attackers to cause a denial of service (heap memory corruption and application crash) or possibly execute arbitrary code via a crafted font file that triggers an invalid free operation. | [
"cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
GHSA-r5r8-g427-8mp7 | The IP2Location Country Blocker WordPress plugin before 2.26.6 does not have CSRF check in the ip2location_country_blocker_save_rules AJAX action, allowing attackers to make a logged in admin block arbitrary country, or block all of them at once, preventing users from accessing the frontend. | [] | null | null | null | null |
|
CVE-2025-24057 | Microsoft Office Remote Code Execution Vulnerability | Heap-based buffer overflow in Microsoft Office allows an unauthorized attacker to execute code locally. | [] | null | 7.8 | null | null |
GHSA-f43w-mfrf-mv66 | TeamViewer Desktop for Windows before 15.8.3 does not properly quote its custom URI handlers. A malicious website could launch TeamViewer with arbitrary parameters, as demonstrated by a teamviewer10: --play URL. An attacker could force a victim to send an NTLM authentication request and either relay the request or capture the hash for offline password cracking. This affects teamviewer10, teamviewer8, teamviewerapi, tvchat1, tvcontrol1, tvfiletransfer1, tvjoinv8, tvpresent1, tvsendfile1, tvsqcustomer1, tvsqsupport1, tvvideocall1, and tvvpn1. The issue is fixed in 8.0.258861, 9.0.258860, 10.0.258873, 11.0.258870, 12.0.258869, 13.2.36220, 14.2.56676, 14.7.48350, and 15.8.3. | [] | null | null | null | null |
|
CVE-2013-0397 | Unspecified vulnerability in the Oracle Applications Framework component in Oracle E-Business Suite 11.5.10.2, 12.0.6, and 12.1.3 allows remote attackers to affect confidentiality and integrity via unknown vectors related to Diagnostics. | [
"cpe:2.3:a:oracle:e-business_suite:11.5.10.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:e-business_suite:12.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:e-business_suite:12.1.3:*:*:*:*:*:*:*"
] | null | null | null | 6.4 |
|
CVE-2000-0431 | Cobalt RaQ2 and RaQ3 does not properly set the access permissions and ownership for files that are uploaded via FrontPage, which allows attackers to bypass cgiwrap and modify files. | [
"cpe:2.3:h:sun:cobalt_raq_2:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sun:cobalt_raq_3i:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2023-4937 | The BEAR for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.1.3.3. This is due to missing or incorrect nonce validation on the woobe_bulkoperations_apply_default_combination function. This makes it possible for unauthenticated attackers to manipulate products via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | [
"cpe:2.3:a:pluginus:bear_-_woocommerce_bulk_editor_and_products_manager_professional:*:*:*:*:*:wordpress:*:*"
] | null | 4.3 | null | null |
|
GHSA-g7w5-3c3r-2w69 | A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'UpdateConnectionVariablesWithImport' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with "NT AUTHORITY\NetworkService" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on. | [] | 8.7 | 8.8 | null | null |
|
CVE-2006-3146 | The TOSRFBD.SYS driver for Toshiba Bluetooth Stack 4.00.29 and earlier on Windows allows remote attackers to cause a denial of service (reboot) via a L2CAP echo request that triggers an out-of-bounds memory access, similar to "Ping o' Death" and as demonstrated by BlueSmack. NOTE: this issue was originally reported for 4.00.23. | [
"cpe:2.3:a:toshiba:bluetooth_stack:*:*:*:*:*:*:*:*",
"cpe:2.3:a:toshiba:bluetooth_stack:3.00.11:*:*:*:*:*:*:*",
"cpe:2.3:a:toshiba:bluetooth_stack:3.00.12:*:*:*:*:*:*:*",
"cpe:2.3:a:toshiba:bluetooth_stack:3.00.31a:*:*:*:*:*:*:*",
"cpe:2.3:a:toshiba:bluetooth_stack:3.00.32:*:*:*:*:*:*:*",
"cpe:2.3:a:toshiba:bluetooth_stack:3.01.03:*:*:*:*:*:*:*",
"cpe:2.3:a:toshiba:bluetooth_stack:3.10.00:*:*:*:*:*:*:*",
"cpe:2.3:a:toshiba:bluetooth_stack:3.20.00:*:*:*:*:*:*:*",
"cpe:2.3:a:toshiba:bluetooth_stack:3.20.01:*:*:*:*:*:*:*",
"cpe:2.3:a:toshiba:bluetooth_stack:3.20.02:*:*:*:*:*:*:*",
"cpe:2.3:a:toshiba:bluetooth_stack:3.20.04:*:*:*:*:*:*:*",
"cpe:2.3:a:toshiba:bluetooth_stack:4.00.01t:*:*:*:*:*:*:*",
"cpe:2.3:a:toshiba:bluetooth_stack:4.00.11:*:*:*:*:*:*:*",
"cpe:2.3:a:toshiba:bluetooth_stack:4.00.23:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-gx73-2498-r55c | Unsound casting in flatbuffers | The implementation of impl Follow for bool allows to reinterpret arbitrary bytes as a bool.In Rust bool has stringent requirements for its in-memory representation. Use of this function allows to violate these requirements and invoke undefined behaviour in safe code. | [] | null | 9.8 | null | null |
GHSA-wpqm-xrhc-3qcc | Zero One Tech (ZOT) P100s print server does not properly disable the SNMP service or change the default password, which could leave the server open to attack without the administrator's knowledge. | [] | null | null | null | null |
|
GHSA-wmfx-xjgg-239p | An improper access control vulnerability was identified in the Realtek audio driver. A local authenticated malicious user may potentially exploit this vulnerability by waiting for an administrator to launch the application and attach to the process to elevate privileges on the system. | [] | null | 7.3 | null | null |
|
GHSA-pxw3-v724-g6xr | An improper authorization vulnerability [CWE-285] in Fortinet FortiNAC version 9.4.0 through 9.4.1 and before 9.2.6 allows an unauthenticated user to perform some administrative operations over the FortiNAC instance via crafted HTTP POST requests. | [] | null | 9.8 | null | null |
|
GHSA-qmfx-q55g-7jjv | The WP Ultimate CSV Importer plugin for WordPress is vulnerable to Sensitive Information Exposure via Directory Listing due to missing restriction in export folder indexing in versions up to, and including, 7.9.8. This makes it possible for unauthenticated attackers to list and view exported files. | [] | null | 7.5 | null | null |
|
GHSA-5j8m-f4q8-6hvx | Multiple cross-site scripting (XSS) vulnerabilities in LightNEasy "no database" (aka flat) version 1.2.2, and possibly SQLite version 1.2.2, allow remote attackers to inject arbitrary web script or HTML via the page parameter to (1) index.php and (2) LightNEasy.php. | [] | null | null | null | null |
|
CVE-2021-42237 | Sitecore XP 7.5 Initial Release to Sitecore XP 8.2 Update-7 is vulnerable to an insecure deserialization attack where it is possible to achieve remote command execution on the machine. No authentication or special configuration is required to exploit this vulnerability. | [
"cpe:2.3:a:sitecore:experience_platform:7.5:-:*:*:*:*:*:*",
"cpe:2.3:a:sitecore:experience_platform:7.5:update1:*:*:*:*:*:*",
"cpe:2.3:a:sitecore:experience_platform:7.5:update2:*:*:*:*:*:*",
"cpe:2.3:a:sitecore:experience_platform:8.0:-:*:*:*:*:*:*",
"cpe:2.3:a:sitecore:experience_platform:8.0:sp1:*:*:*:*:*:*",
"cpe:2.3:a:sitecore:experience_platform:8.0:update1:*:*:*:*:*:*",
"cpe:2.3:a:sitecore:experience_platform:8.0:update2:*:*:*:*:*:*",
"cpe:2.3:a:sitecore:experience_platform:8.0:update3:*:*:*:*:*:*",
"cpe:2.3:a:sitecore:experience_platform:8.0:update4:*:*:*:*:*:*",
"cpe:2.3:a:sitecore:experience_platform:8.0:update5:*:*:*:*:*:*",
"cpe:2.3:a:sitecore:experience_platform:8.0:update6:*:*:*:*:*:*",
"cpe:2.3:a:sitecore:experience_platform:8.0:update7:*:*:*:*:*:*",
"cpe:2.3:a:sitecore:experience_platform:8.1:-:*:*:*:*:*:*",
"cpe:2.3:a:sitecore:experience_platform:8.1:update1:*:*:*:*:*:*",
"cpe:2.3:a:sitecore:experience_platform:8.1:update2:*:*:*:*:*:*",
"cpe:2.3:a:sitecore:experience_platform:8.1:update3:*:*:*:*:*:*",
"cpe:2.3:a:sitecore:experience_platform:8.2:-:*:*:*:*:*:*",
"cpe:2.3:a:sitecore:experience_platform:8.2:update1:*:*:*:*:*:*",
"cpe:2.3:a:sitecore:experience_platform:8.2:update2:*:*:*:*:*:*",
"cpe:2.3:a:sitecore:experience_platform:8.2:update3:*:*:*:*:*:*",
"cpe:2.3:a:sitecore:experience_platform:8.2:update4:*:*:*:*:*:*",
"cpe:2.3:a:sitecore:experience_platform:8.2:update5:*:*:*:*:*:*",
"cpe:2.3:a:sitecore:experience_platform:8.2:update6:*:*:*:*:*:*",
"cpe:2.3:a:sitecore:experience_platform:8.2:update7:*:*:*:*:*:*"
] | null | 9.8 | null | 10 |
|
CVE-2021-47475 | comedi: vmk80xx: fix transfer-buffer overflows | In the Linux kernel, the following vulnerability has been resolved:
comedi: vmk80xx: fix transfer-buffer overflows
The driver uses endpoint-sized USB transfer buffers but up until
recently had no sanity checks on the sizes.
Commit e1f13c879a7c ("staging: comedi: check validity of wMaxPacketSize
of usb endpoints found") inadvertently fixed NULL-pointer dereferences
when accessing the transfer buffers in case a malicious device has a
zero wMaxPacketSize.
Make sure to allocate buffers large enough to handle also the other
accesses that are done without a size check (e.g. byte 18 in
vmk80xx_cnt_insn_read() for the VMK8061_MODEL) to avoid writing beyond
the buffers, for example, when doing descriptor fuzzing.
The original driver was for a low-speed device with 8-byte buffers.
Support was later added for a device that uses bulk transfers and is
presumably a full-speed device with a maximum 64-byte wMaxPacketSize. | [] | null | null | null | null |
GHSA-hhh9-2rpp-h4h8 | Incorrect default permissions in some Intel Unite(R) Client Extended Display Plugin software installers before version 1.1.352.157 may allow an authenticated user to potentially enable escalation of privilege via local access. | [] | 5.4 | 6.7 | null | null |
|
CVE-2005-2986 | The v3flt2k.sys driver in AhnLab V3Pro 2004 Build 6.0.0.383, V3 VirusBlock 2005 Build 6.0.0.383, V3Net for Windows Server 6.0 Build 6.0.0.383 does not properly validate the source of the DeviceIoControl commands, which allows remote attackers to gain privileges. | [
"cpe:2.3:a:ahnlab:v3_virusblock_2005:6.0.0.383:*:*:*:*:*:*:*",
"cpe:2.3:a:ahnlab:v3net:6.0.0.383:*:win_server:*:*:*:*:*",
"cpe:2.3:a:ahnlab:v3pro_2004:6.0.0.383:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-7hh6-7v6v-4v2c | HEVC Video Extensions Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-24089, CVE-2021-26902, CVE-2021-27047, CVE-2021-27048, CVE-2021-27049, CVE-2021-27050, CVE-2021-27051, CVE-2021-27061, CVE-2021-27062. | [] | null | 7.8 | null | null |
|
GHSA-r334-cg32-8chf | The EventPrime – Events Calendar, Bookings and Tickets plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'offline_status' parameter in all versions up to, and including, 3.4.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] | null | 6.5 | null | null |
|
GHSA-mx4h-4r93-47mh | A Cross-Site Request Forgery (CSRF) in Openmrs 2.4.3 Build 0ff0ed allows attackers to execute arbitrary operations via a crafted GET request. | [] | null | 6.8 | null | null |
|
GHSA-8cg4-3m84-3pwg | Multiple cross-site scripting (XSS) vulnerabilities in member.php in MyBulletin Board (MyBB) 1.0.3 allow remote attackers to inject arbitrary web script or HTML via the (1) aim, (2) yahoo, (3) msn, or (4) website field. | [] | null | null | null | null |
|
GHSA-rr3v-f6qj-vgw6 | Unspecified vulnerability in the Oracle FLEXCUBE Universal Banking component in Oracle Financial Services Applications 11.3.0, 11.4.0, 12.0.1 through 12.0.3, 12.1.0, and 12.2.0 allows remote authenticated users to affect confidentiality and integrity via vectors related to INFRA, a different vulnerability than CVE-2016-5620. | [] | null | null | 8.1 | null |
|
CVE-2014-4671 | Adobe Flash Player before 13.0.0.231 and 14.x before 14.0.0.145 on Windows and OS X and before 11.2.202.394 on Linux, Adobe AIR before 14.0.0.137 on Android, Adobe AIR SDK before 14.0.0.137, and Adobe AIR SDK & Compiler before 14.0.0.137 do not properly restrict the SWF file format, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks against JSONP endpoints, and obtain sensitive information, via a crafted OBJECT element with SWF content satisfying the character-set requirements of a callback API. | [
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.2.202.223:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.2.202.228:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.2.202.233:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.2.202.235:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.2.202.236:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.2.202.238:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.2.202.243:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.2.202.251:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.2.202.258:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.2.202.261:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.2.202.262:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.2.202.270:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.2.202.273:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.2.202.275:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.2.202.280:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.2.202.285:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.2.202.291:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.2.202.297:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.2.202.310:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.2.202.332:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.2.202.335:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.2.202.336:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.2.202.341:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.2.202.346:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.2.202.350:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.2.202.356:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.2.202.359:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:13.0.0.83:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:13.0.0.111:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air_sdk:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air_sdk:13.0.0.83:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air_sdk:13.0.0.111:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:13.0.0.182:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:13.0.0.201:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:13.0.0.206:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:13.0.0.214:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:14.0.0.125:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2012-6606 | Palo Alto Networks GlobalProtect before 1.1.7, and NetConnect, does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof portal servers and obtain sensitive information via a crafted certificate. | [
"cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:*:*:*",
"cpe:2.3:a:paloaltonetworks:netconnect:-:*:*:*:*:*:*:*"
] | null | null | null | 5.8 |
|
RHSA-2019:4273 | Red Hat Security Advisory: container-tools:1.0 security update | HTTP/2: flood using PING frames results in unbounded memory growth HTTP/2: flood using HEADERS frames results in unbounded memory growth | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | null | 7.5 | null |
CVE-2019-5390 | A remote command injection vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09. | [
"cpe:2.3:a:hp:intelligent_management_center:*:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:-:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0503:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0504:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0504p02:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0504p04:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0506:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0506p03:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0506p07:*:*:*:*:*:*"
] | null | null | 9.8 | 10 |
|
CVE-2017-18050 | In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, improper input validation for vdev_map in wma_tbttoffset_update_event_handler(), which is received from firmware, leads to potential buffer overwrite and out of bounds memory read. | [
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] | null | null | 7.8 | 4.6 |
|
GHSA-wqgv-cf28-r9x6 | BitDefender Total Security 2018 allows local users to gain privileges or cause a denial of service by impersonating all the pipes through a use of an "insecurely created named pipe". Ensures full access to Everyone users group. | [] | null | null | 7.8 | null |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.