id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
57.2k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-8h28-5hcj-h4qw | munin-cgi-graph in Munin 2.0 rc4 allows remote attackers to cause a denial of service (disk or memory consumption) via many image requests with large values in the (1) size_x or (2) size_y parameters. | [] | null | null | null | null |
|
GHSA-gx69-h78g-vjrh | In the Linux kernel, the following vulnerability has been resolved:wifi: ath11k: fix dfs radar event lockingThe ath11k active pdevs are protected by RCU but the DFS radar event
handling code calling ath11k_mac_get_ar_by_pdev_id() was not marked as a
read-side critical section.Mark the code in question as an RCU read-side critical section to avoid
any potential use-after-free issues.Compile tested only. | [] | null | 8.8 | null | null |
|
CVE-2024-34558 | WordPress WOLF plugin <= 1.0.8.2 - Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in realmag777 WOLF allows Stored XSS.This issue affects WOLF: from n/a through 1.0.8.2.
| [] | null | 5.9 | null | null |
GHSA-p3q5-qxhp-fpcg | Due to failure in validating the length provided by an attacker-crafted RTPS packet, Wireshark version 4.0.5 and prior, by default, is susceptible to a heap-based buffer overflow, and possibly code execution in the context of the process running Wireshark. | [] | null | 8.8 | null | null |
|
GHSA-99r6-932q-94cq | An issue was discovered on XIAOMI XIAOAI speaker Pro LX06 1.52.4. Attackers can get root shell by accessing the UART interface and then they can (i) read Wi-Fi SSID or password, (ii) read the dialogue text files between users and XIAOMI XIAOAI speaker Pro LX06, (iii) use Text-To-Speech tools pretend XIAOMI speakers' voice achieve social engineering attacks, (iv) eavesdrop on users and record what XIAOMI XIAOAI speaker Pro LX06 hears, (v) modify system files, (vi) use commands to send any IR code through IR emitter on XIAOMI XIAOAI Speaker Pro LX06, (vii) stop voice assistant service, (viii) enable the XIAOMI XIAOAI Speaker Pro’ SSH or TELNET service as a backdoor, (IX) tamper with the router configuration of the router in the local area networks. | [] | null | null | null | null |
|
CVE-2007-2796 | Arris Cadant C3 CMTS allows remote attackers to cause a denial of service (service termination) via a malformed IP packet with an invalid IP option. | [
"cpe:2.3:h:arris:cadant_c3_cmts:*:*:*:*:*:*:*:*"
] | null | null | null | 7.8 |
|
GHSA-923r-gp72-rmm4 | Memory corruption is possible when an attempt is made from userspace or console to write some haptics effects pattern to the haptics debugfs file. | [] | null | 6.7 | null | null |
|
CVE-2020-14311 | There is an issue with grub2 before version 2.06 while handling symlink on ext filesystems. A filesystem containing a symbolic link with an inode size of UINT32_MAX causes an arithmetic overflow leading to a zero-sized memory allocation with subsequent heap-based buffer overflow. | [
"cpe:2.3:a:gnu:grub2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*"
] | null | 5.7 | null | null |
|
GHSA-x2hc-692w-3vgc | Solaris dmispd dmi_cmd allows local users to fill up restricted disk space by adding files to the /var/dmi/db database. | [] | null | null | null | null |
|
CVE-2018-15133 | In Laravel Framework through 5.5.40 and 5.6.x through 5.6.29, remote code execution might occur as a result of an unserialize call on a potentially untrusted X-XSRF-TOKEN value. This involves the decrypt method in Illuminate/Encryption/Encrypter.php and PendingBroadcast in gadgetchains/Laravel/RCE/3/chain.php in phpggc. The attacker must know the application key, which normally would never occur, but could happen if the attacker previously had privileged access or successfully accomplished a previous attack. | [
"cpe:2.3:a:laravel:laravel:*:*:*:*:*:*:*:*"
] | null | 8.1 | null | 6.8 |
|
CVE-2019-0174 | Logic condition in specific microprocessors may allow an authenticated user to potentially enable partial physical address information disclosure via local access. | [
"cpe:2.3:o:intel:i9-9900x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i9-9900x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i9-9920x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i9-9920x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i9-9960x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i9-9960x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i9-9980xe_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i9-9980xe:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i9-9940x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i9-9940x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i9-7960x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i9-7960x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i9-7980xe_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i9-7980xe:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i9-7940x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i9-7940x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i9-7920x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i9-7920x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i9-7900x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i9-7900x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i7-7820x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i7-7820x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i7-7800x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i7-7800x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i5-4422e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i5-4422e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i5-4410e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i5-4410e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i5-4402ec_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i5-4402ec:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i5-4402e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i5-4402e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i5-4400e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i5-4400e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i5-4460t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i5-4460t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i5-4460s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i5-4460s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i5-4460_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i5-4460:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i5-4440s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i5-4440s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i5-4440_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i5-4440:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i5-4430s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i5-4430s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i5-4300m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i5-4300m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i5-4300u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i5-4300u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i5-4300y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i5-4300y:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i5-4302y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i5-4302y:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i5-4308u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i5-4308u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i5-4310m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i5-4310m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i5-4310u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i5-4310u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i5-4330m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i5-4330m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i5-4340m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i5-4340m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i5-4350u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i5-4350u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i5-4360u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i5-4360u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i5-4200h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i5-4200h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i5-4200m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i5-4200m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i5-4200u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i5-4200u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i5-4200y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i5-4200y:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i5-4202y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i5-4202y:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i5-4210h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i5-4210h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i5-4210m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i5-4210m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i5-4210u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i5-4210u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i5-4210y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i5-4210y:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i5-4220y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i5-4220y:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i5-4250u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i5-4250u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i5-4258u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i5-4258u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i5-4260u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i5-4260u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i5-4278u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i5-4278u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i5-4288u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i5-4288u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i3-4330_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i3-4330:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i3-4330t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i3-4330t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i3-4330te_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i3-4330te:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i3-4340_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i3-4340:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i3-4340te_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i3-4340te:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i3-4350_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i3-4350:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i3-4350t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i3-4350t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i3-4360_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i3-4360:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i3-4360t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i3-4360t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i3-4370_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i3-4370:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i3-4370t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i3-4370t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i3-4100e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i3-4100e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i3-4100m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i3-4100m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i3-4100u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i3-4100u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i3-4102e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i3-4102e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i3-4110e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i3-4110e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i3-4110m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i3-4110m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i3-4112e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i3-4112e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i3-4120u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i3-4120u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i3-4158u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i3-4158u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i3-4170t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i3-4170t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i3-4170_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i3-4170:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i3-4160t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i3-4160t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i3-4160_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i3-4160:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i3-4150t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i3-4150t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i3-4150_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i3-4150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i3-4130t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i3-4130t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i3-4130_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i3-4130:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i3-4000m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i3-4000m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i3-4005u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i3-4005u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i3-4010u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i3-4010u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i3-4010y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i3-4010y:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i3-4012y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i3-4012y:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i3-4020y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i3-4020y:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i3-4025u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i3-4025u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i3-4030u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i3-4030u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i3-4030y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i3-4030y:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:3550m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:3550m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:3556u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:3556u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:3558u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:3558u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:3560m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:3560m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:3560y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:3560y:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:3561y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:3561y:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:3805u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:3805u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:3825u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:3825u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:2981u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:2981u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:2980u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:2980u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:2970m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:2970m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:2961y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:2961y:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:2957u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:2957u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:2955u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:2955u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:2950m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:2950m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:2002e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:2002e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:2000e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:2000e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e7-8893_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e7-8893:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e7-8891_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e7-8891:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e7-8890_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e7-8890:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e7-8880l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e7-8880l:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e7-8880_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e7-8880:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e7-8870_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e7-8870:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e7-8867_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e7-8867:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e7-8860_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e7-8860:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e7-4850_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e7-4850:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e7-4830_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e7-4830:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e7-4820_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e7-4820:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e7-4809_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e7-4809:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-2699_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e5-2699:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-4669_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e5-4669:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-2438l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e5-2438l:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-1428l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e5-1428l:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-4667_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e5-4667:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-2428l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e5-2428l:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-1620_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e5-1620:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-4660_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e5-4660:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-2418l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e5-2418l:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-1630_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e5-1630:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-2698_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e5-2698:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-4655_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e5-4655:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-2408l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e5-2408l:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-2697_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e5-2697:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-1650_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e5-1650:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-4650_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e5-4650:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-1660_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e5-1660:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-4648_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e5-4648:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-1680_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e5-1680:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-2695_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e5-2695:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-4640_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e5-4640:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-2690_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e5-2690:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-4627_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e5-4627:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-2687w_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e5-2687w:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-4620_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e5-4620:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-4610_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e5-4610:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-2683_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e5-2683:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-2680_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e5-2680:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-2670_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e5-2670:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-2667_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e5-2667:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-2660_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e5-2660:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-2658a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e5-2658a:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-2658_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e5-2658:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-2650l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e5-2650l:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-2650_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e5-2650:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-2648l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e5-2648l:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-2643_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e5-2643:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-2640_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e5-2640:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-2637_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e5-2637:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-2630l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e5-2630l:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-2630_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e5-2630:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-2628l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e5-2628l:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-2623_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e5-2623:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-2620_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e5-2620:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-2618l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e5-2618l:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-2609_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e5-2609:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-2608l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e5-2608l:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-2603_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e5-2603:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e3-1286l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e3-1286l:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e3-1286_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e3-1286:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e3-1285l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e3-1285l:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e3-1285_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e3-1285:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e3-1281_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e3-1281:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e3-1280_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e3-1280:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e3-1276_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e3-1276:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e3-1275l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e3-1275l:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e3-1270_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e3-1270:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e3-1268l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e3-1268l:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e3-1271_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e3-1271:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e3-1275_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e3-1275:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e3-1265l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e3-1265l:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e3-1246_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e3-1246:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e3-1245_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e3-1245:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e3-1241_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e3-1241:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e3-1240l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e3-1240l:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e3-1240_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e3-1240:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e3-1231_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e3-1231:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e3-1230l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e3-1230l:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e3-1230_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e3-1230:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e3-1226_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e3-1226:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e3-1225_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e3-1225:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e3-1220l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e3-1220l:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e3-1220_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e3-1220:3:*:*:*:*:*:*:*"
] | null | null | 3.3 | 2.1 |
|
CVE-2024-33575 | WordPress User Meta plugin <= 3.0 - Sensitive Data Exposure vulnerability | Exposure of Sensitive Information to an Unauthorized Actor vulnerability in User Meta user-meta.This issue affects User Meta: from n/a through 3.0.
| [
"cpe:2.3:a:usermeta:user_meta_user_profile_builder_and_user_management:1.0.0:*:*:*:*:wordpress:*:*"
] | null | 5.3 | null | null |
GHSA-63fp-m4v5-qwjh | Cross-site scripting (XSS) vulnerability in the BibTex Publications (si_bibtex) extension 0.2.3 for TYPO3 allows remote attackers to inject arbitrary web script or HTML via vectors related to the import functionality. | [] | null | null | null | null |
|
CVE-2022-21547 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Federated). Supported versions that are affected are 8.0.29 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | [
"cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*",
"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*"
] | null | 4.9 | null | null |
|
CVE-2006-1288 | Multiple SQL injection vulnerabilities in Invision Power Board (IPB) 2.0.4 and 2.1.4 before 20060105 allow remote attackers to execute arbitrary SQL commands via cookies, related to (1) arrays of id/stamp pairs and (2) the keys in arrays of key/value pairs in ipsclass.php; (3) the topics variable in usercp.php; and the topicsread cookie in (4) topics.php, (5) search.php, and (6) forums.php. | [
"cpe:2.3:a:invision_power_services:invision_power_board:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:invision_power_services:invision_power_board:2.1.4:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2024-26450 | An issue exists within Piwigo before v.14.2.0 allowing a malicious user to take over the application. This exploit involves chaining a Cross Site Request Forgery vulnerability to issue a Stored Cross Site Scripting payload stored within an Admin user's dashboard, executing remote JavaScript. This can be used to upload a new PHP file under an administrator and directly call that file from the victim's instance to connect back to a malicious listener. | [] | null | 5.4 | null | null |
|
RHSA-2024:2773 | Red Hat Security Advisory: OpenShift Container Platform 4.15.13 bug fix and security update | goproxy: Denial of service (DoS) via unspecified vectors. opentelemetry: DoS vulnerability in otelhttp golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS opentelemetry-go-contrib: DoS vulnerability in otelgrpc due to unbound cardinality metrics golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON jose-go: improper handling of highly compressed data | [
"cpe:/a:redhat:openshift:4.15::el8",
"cpe:/a:redhat:openshift:4.15::el9"
] | null | 4.3 | null | null |
CVE-2003-1426 | Openwebmail in cPanel 5.0, when run using suid Perl, adds the directory in the SCRIPT_FILENAME environment variable to Perl's @INC include array, which allows local users to execute arbitrary code by modifying SCRIPT_FILENAME to reference a directory containing a malicious openwebmail-shared.pl executable. | [
"cpe:2.3:a:cpanel:cpanel:5.0:*:*:*:*:*:*:*"
] | null | null | null | 3.3 |
|
cisco-sa-ise-stored-xss-TWwjVPdL | Cisco Identity Services Engine Stored Cross-Site Scripting Vulnerabilities | Multiple vulnerabilities in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user.
These vulnerabilities exist because the web-based management interface does not sufficiently validate user-supplied input. An attacker could exploit these vulnerabilities by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit these vulnerabilities, the attacker would need valid administrative credentials.
Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.
| [] | null | 4.8 | null | null |
CVE-2022-34185 | Jenkins Date Parameter Plugin 0.0.4 and earlier does not escape the name and description of Date parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. | [
"cpe:2.3:a:jenkins:date_parameter:*:*:*:*:*:jenkins:*:*"
] | null | 5.4 | null | 3.5 |
|
GHSA-r8qm-cxjj-8wpg | Improper Neutralization of Special Elements used in an SQL Command leading to Unauthenticated SQL Injection vulnerability, impacting SonicWall GMS 9.3.1-SP2-Hotfix1, Analytics On-Prem 2.5.0.3-2520 and earlier versions. | [] | null | 9.8 | null | null |
|
CVE-2022-39885 | Improper access control vulnerability in BootCompletedReceiver_CMCC in DeviceManagement prior to SMR Nov-2022 Release 1 allows local attacker to access to Device information. | [
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*"
] | null | 5.9 | null | null |
|
RHSA-2003:270 | Red Hat Security Advisory: kdebase security update | security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
GHSA-5jfm-fvc2-73xf | An issue has been discovered in GitLab CE/EE affecting all versions starting from 9.3 before 16.0.8, all versions starting from 16.1 before 16.1.3, all versions starting from 16.2 before 16.2.2. A Regular Expression Denial of Service was possible via sending crafted payloads which use ProjectReferenceFilter to the preview_markdown endpoint. | [] | null | 7.5 | null | null |
|
CVE-2013-1174 | Cisco Tivoli Business Service Manager (TBSM) in Hosted Collaboration Mediation (HCM) in Cisco Hosted Collaboration Solution allows remote attackers to cause a denial of service (temporary service hang) by sending many TCP packets to certain ports, aka Bug ID CSCue03703. | [
"cpe:2.3:a:cisco:hosted_collaboration_solution:-:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-39qv-pm69-m738 | Cross-Site Request Forgery (CSRF) vulnerability in finnj Frontier Post allows Cross Site Request Forgery.This issue affects Frontier Post: from n/a through 6.1. | [] | null | 5.4 | null | null |
|
CVE-2017-13796 | An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari before 11.0.1 is affected. iCloud before 7.1 on Windows is affected. iTunes before 12.7.1 on Windows is affected. tvOS before 11.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site. | [
"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:webkit:-:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.8 |
|
CVE-2022-40899 | An issue discovered in Python Charmers Future 0.18.2 and earlier allows remote attackers to cause a denial of service via crafted Set-Cookie header from malicious web server. | [
"cpe:2.3:a:pythoncharmers:python-future:*:*:*:*:*:python:*:*"
] | null | 7.5 | null | null |
|
GHSA-5rh6-96pv-hfcx | Vulnerability in the PeopleSoft Enterprise PT PeopleTools component of Oracle PeopleSoft Products (subcomponent: SQR). Supported versions that are affected are 8.54, 8.55 and 8.56. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PT PeopleTools. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise PT PeopleTools accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise PT PeopleTools accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of PeopleSoft Enterprise PT PeopleTools. CVSS 3.0 Base Score 7.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L). | [] | null | null | 7.3 | null |
|
CVE-2017-11565 | debian/tor.init in the Debian tor_0.2.9.11-1~deb9u1 package for Tor was designed to execute aa-exec from the standard system pathname if the apparmor package is installed, but implements this incorrectly (with a wrong assumption that the specific pathname would remain the same forever), which allows attackers to bypass intended AppArmor restrictions by leveraging the silent loss of this protection mechanism. NOTE: this does not affect systems, such as default Debian stretch installations, on which Tor startup relies on a systemd unit file (instead of this tor.init script). | [
"cpe:2.3:a:debian:tor:0.2.9.11-1:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
CVE-2020-14131 | The Xiaomi Security Center expresses heartfelt thanks to ADLab of VenusTech ! At the same time, we also welcome more outstanding and professional security experts and security teams to join the Mi Security Center (MiSRC) to jointly ensure the safe access of millions of Xiaomi users worldwide Life. | [
"cpe:2.3:a:mi:xiaomi:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
GHSA-g759-wxh6-x7jp | Evernote 6.15 on Windows has an incorrectly repaired stored XSS vulnerability. An attacker can use this XSS issue to inject Node.js code under Present mode. After a victim opens an affected note under Present mode, the attacker can read the victim's files and achieve remote execution command on the victim's computer. | [] | null | null | null | null |
|
CVE-2005-4817 | Format string vulnerability in ui.c in Textbased MSN Client (TMSNC) before 0.2.5 allows attackers to cause a denial of service and possibly execute arbitrary code via unknown attack vectors that cause format strings to be injected into the wprintw function. | [
"cpe:2.3:a:tmsnc:tmsnc:0.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tmsnc:tmsnc:0.1.0a:*:*:*:*:*:*:*",
"cpe:2.3:a:tmsnc:tmsnc:0.1.0b:*:*:*:*:*:*:*",
"cpe:2.3:a:tmsnc:tmsnc:0.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tmsnc:tmsnc:0.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:tmsnc:tmsnc:0.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:tmsnc:tmsnc:0.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:tmsnc:tmsnc:0.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:tmsnc:tmsnc:0.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tmsnc:tmsnc:0.2.0b:*:*:*:*:*:*:*",
"cpe:2.3:a:tmsnc:tmsnc:0.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tmsnc:tmsnc:0.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:tmsnc:tmsnc:0.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:tmsnc:tmsnc:0.2.4:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-h7c9-gjhc-27w5 | A vulnerability has been identified in XHQ (All versions < V6.0.0.2). The web interface could allow for an an attacker to craft the input in a form that is not expected, causing the application to behave in unexpected ways for legitimate users. Successful exploitation requires for an attacker to be authenticated to the web interface. A successful attack could cause the application to have unexpected behavior. This could allow the attacker to modify contents of the web application. At the time of advisory publication no public exploitation of this security vulnerability was known. | [] | null | null | null | null |
|
CVE-2021-31180 | Microsoft Office Graphics Remote Code Execution Vulnerability | Microsoft Office Graphics Remote Code Execution Vulnerability | [
"cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:microsoft:office:2013:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2013:sp1:*:*:rt:*:*:*",
"cpe:2.3:a:microsoft:office:2019:*:*:*:*:-:*:*",
"cpe:2.3:a:microsoft:word:2013:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:word:2013:sp1:*:*:rt:*:*:*",
"cpe:2.3:a:microsoft:word:2016:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2013:sp1:*:*:*:*:x86:*",
"cpe:2.3:a:microsoft:office:2013:sp1:*:*:*:*:x64:*"
] | null | 7.8 | null | null |
GHSA-cw43-6v89-qww5 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | [] | null | null | null | null |
|
GHSA-77j3-wqmc-3rp8 | The Ultimate Member WordPress plugin before 2.6.7 does not prevent visitors from creating user accounts with arbitrary capabilities, effectively allowing attackers to create administrator accounts at will. This is actively being exploited in the wild. | [] | null | 9.8 | null | null |
|
CVE-2023-1429 | Cross-site Scripting (XSS) - Reflected in pimcore/pimcore | Cross-site Scripting (XSS) - Reflected in GitHub repository pimcore/pimcore prior to 10.5.19. | [
"cpe:2.3:a:pimcore:pimcore:*:*:*:*:*:*:*:*"
] | null | null | 4 | null |
CVE-2020-14825 | Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via IIOP, T3 to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). | [
"cpe:2.3:a:oracle:weblogic_server:12.2.1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:weblogic_server:14.1.1.0.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
CVE-2017-9208 | libqpdf.a in QPDF 6.0.0 allows remote attackers to cause a denial of service (infinite recursion and stack consumption) via a crafted PDF document, related to releaseResolved functions, aka qpdf-infiniteloop1. | [
"cpe:2.3:a:qpdf_project:qpdf:6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*"
] | null | null | 5.5 | 4.3 |
|
GHSA-4jcj-f5hc-phm8 | SuiteCRM before 7.10.33 and 7.11.22 allows information disclosure via Directory Traversal. An attacker can partially include arbitrary files via the importFile parameter of the RefreshMapping import functionality. | [] | null | null | null | null |
|
CVE-2021-46343 | There is an Assertion 'context_p->token.type == LEXER_LITERAL' failed at /jerry-core/parser/js/js-parser-expr.c in JerryScript 3.0.0. | [
"cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*"
] | null | 5.5 | null | 4.3 |
|
GHSA-xcwm-wrf2-369r | An issue was addressed with improved handling of temporary files. This issue is fixed in macOS Monterey 12.7.2, macOS Ventura 13.6.3, iOS 17.2 and iPadOS 17.2, iOS 16.7.3 and iPadOS 16.7.3, macOS Sonoma 14.2. An app may be able to modify protected parts of the file system. | [] | null | 5.5 | null | null |
|
CVE-2009-1669 | The smarty_function_math function in libs/plugins/function.math.php in Smarty 2.6.22 allows context-dependent attackers to execute arbitrary commands via shell metacharacters in the equation attribute of the math function. NOTE: some of these details are obtained from third party information. | [
"cpe:2.3:a:smarty:smarty:2.6.22:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
RHSA-2021:4859 | Red Hat Security Advisory: kpatch-patch security update | kernel: use-after-free in drivers/infiniband/core/ucma.c ctx use-after-free | [
"cpe:/o:redhat:rhel_eus:8.2::baseos"
] | null | 7.8 | null | null |
CVE-2011-0117 | WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1. | [
"cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:6.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:6.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:6.0.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:6.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.6:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.7:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:8.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:8.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:8.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:8.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:8.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:9.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:9.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:9.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:9.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:9.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:10.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:10.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:webkit:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*"
] | null | null | null | 7.6 |
|
GHSA-f7cx-mjqx-2qmw | Rockwell Automation MicroLogix 1400 Controllers Series B v21.001 and prior, Series A, all versions, MicroLogix 1100 Controller, all versions, RSLogix 500 Software v12.001 and prior, The cryptographic function utilized to protect the password in MicroLogix is discoverable. | [] | null | null | null | null |
|
CVE-2024-7409 | Qemu: denial of service via improper synchronization in qemu nbd server during socket closure | A flaw was found in the QEMU NBD Server. This vulnerability allows a denial of service (DoS) attack via improper synchronization during socket closure when a client keeps a socket open as the server is taken offline. | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/a:redhat:rhel_eus:9.4::appstream",
"cpe:/a:redhat:openshift:4.13::el8",
"cpe:/a:redhat:openshift:4.13::el9",
"cpe:/a:redhat:openshift:4.14::el8",
"cpe:/a:redhat:openshift:4.14::el9",
"cpe:/a:redhat:openshift:4.15::el9",
"cpe:/a:redhat:openshift:4.15::el8",
"cpe:/a:redhat:openshift:4.16::el9",
"cpe:/a:redhat:openshift:4.17::el9",
"cpe:/o:redhat:enterprise_linux:6",
"cpe:/o:redhat:enterprise_linux:7",
"cpe:/a:redhat:advanced_virtualization:8::el8"
] | null | null | 7.5 | null |
CVE-2020-19697 | Cross Site Scripting vulnerability found in Pandao Editor.md v.1.5.0 allows a remote attacker to execute arbitrary code via a crafted script in the <iframe>src parameter. | [
"cpe:2.3:a:ipandao:editor.md:1.5.0:*:*:*:*:*:*:*"
] | null | 6.1 | null | null |
|
GHSA-x9fc-f93f-rjcg | Vulnerability in wordpress plugin add-edit-delete-listing-for-member-module v1.0, The plugin author does not sanitize user supplied input via $act before passing it into an SQL statement. | [] | null | null | 7.2 | null |
|
GHSA-9723-3qmw-g98x | Imlib before 1.9.13 sometimes uses the NetPBM package to load trusted images, which could allow attackers to cause a denial of service (crash) and possibly execute arbitrary code via certain weaknesses of NetPBM. | [] | null | null | null | null |
|
GHSA-h632-qvv7-2623 | A use of uninitialized pointer vulnerability exists in the GRO format res functionality of Open Babel 3.1.1 and master commit 530dbfa3. A specially crafted malformed file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability. | [] | null | 9.8 | null | null |
|
GHSA-949q-m2rc-xq42 | Buffer overflow in ntdll.dll on Microsoft Windows NT 4.0, Windows NT 4.0 Terminal Server Edition, Windows 2000, and Windows XP allows remote attackers to execute arbitrary code, as demonstrated via a WebDAV request to IIS 5.0. | [] | null | null | null | null |
|
CVE-2024-26159 | Microsoft ODBC Driver Remote Code Execution Vulnerability | Microsoft ODBC Driver Remote Code Execution Vulnerability | [
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
CVE-2018-8569 | A remote code execution vulnerability exists in the Yammer desktop application due to the loading of arbitrary content, aka "Yammer Desktop Application Remote Code Execution Vulnerability." This affects Yammer Desktop App. | [
"cpe:2.3:a:microsoft:yammer:-:*:*:*:*:*:*:*"
] | null | null | 7.8 | 6.8 |
|
CVE-2019-1020008 | stacktable.js before 1.0.4 allows XSS. | [
"cpe:2.3:a:stacktable.js_project:stacktable.js:*:*:*:*:*:jquery:*:*"
] | null | null | 6.1 | 4.3 |
|
GHSA-q33x-v84x-v9q4 | Cross-site scripting (XSS) vulnerability in the Uk Cookie (aka uk-cookie) plugin for WordPress allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | [] | null | null | null | null |
|
CVE-2009-3698 | An unspecified function in the Dalvik API in Android 1.5 and earlier allows remote attackers to cause a denial of service (system process restart) via a crafted application, possibly a related issue to CVE-2009-2656. | [
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-8xvc-jc9j-m9q3 | In all Android releases from CAF using the Linux kernel, an untrusted pointer dereference vulnerability exists in WideVine DRM. | [] | null | null | 7.8 | null |
|
CVE-2009-4352 | Multiple cross-site scripting (XSS) vulnerabilities in TransWARE Active! mail 2003 build 2003.0139.0871 and earlier, and possibly other versions before 2003.0139.0939, allow remote attackers to inject arbitrary web script or HTML via the (1) From, (2) To, (3) Cc, and (4) Bcc parameters. | [
"cpe:2.3:a:transware:active_mail_2003:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2021-26305 | An issue was discovered in Deserializer::read_vec in the cdr crate before 0.2.4 for Rust. A user-provided Read implementation can gain access to the old contents of newly allocated heap memory, violating soundness. | [
"cpe:2.3:a:cdr_project:cdr:*:*:*:*:*:rust:*:*"
] | null | 9.8 | null | 7.5 |
|
CVE-2023-32398 | A use-after-free issue was addressed with improved memory management. This issue is fixed in watchOS 9.5, tvOS 16.5, macOS Ventura 13.4, iOS 15.7.6 and iPadOS 15.7.6, macOS Big Sur 11.7.7, macOS Monterey 12.6.6, iOS 16.5 and iPadOS 16.5. An app may be able to execute arbitrary code with kernel privileges. | [
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
|
GHSA-455w-hgxv-564m | A Time-of-Check to Time-of-Use (TOCTOU) vulnerability has been identified in the driver of the NDD Print solution, which could allow an unprivileged user to exploit this flaw and gain SYSTEM-level access on the device. The vulnerability affects version 5.24.3 and before of the software. | [] | null | 7.8 | null | null |
|
GHSA-wxcf-mf79-c7x3 | Rejected reason: This is unused. | [] | null | null | null | null |
|
GHSA-92m2-25h5-v72m | TP-Link M7350 devices through 1.0.16 Build 181220 Rel.1116n allow portMappingProtocol OS Command Injection (issue 3 of 5). | [] | null | 9.8 | null | null |
|
CVE-2011-4063 | chan_sip.c in the SIP channel driver in Asterisk Open Source 1.8.x before 1.8.7.1 and 10.x before 10.0.0-rc1 does not properly initialize variables during request parsing, which allows remote authenticated users to cause a denial of service (daemon crash) via a malformed request. | [
"cpe:2.3:a:asterisk:open_source:1.8.7:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:10.0.0:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
CVE-2020-25494 | Xinuos (formerly SCO) Openserver v5 and v6 allows attackers to execute arbitrary commands via shell metacharacters in outputform or toclevels parameter to cgi-bin/printbook. | [
"cpe:2.3:a:xinuos:openserver:5.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:xinuos:openserver:6.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
|
CVE-2020-27782 | A flaw was found in the Undertow AJP connector. Malicious requests and abrupt connection closes could be triggered by an attacker using query strings with non-RFC compliant characters resulting in a denial of service. The highest threat from this vulnerability is to system availability. This affects Undertow 2.1.5.SP1, 2.0.33.SP2, and 2.2.3.SP1. | [
"cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openshift_application_runtimes:-:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:undertow:2.0.33:sp2:*:*:*:*:*:*",
"cpe:2.3:a:redhat:undertow:2.1.5:sp1:*:*:*:*:*:*",
"cpe:2.3:a:redhat:undertow:2.2.3:sp1:*:*:*:*:*:*"
] | null | 7.5 | null | 7.8 |
|
CVE-2014-0231 | The mod_cgid module in the Apache HTTP Server before 2.4.10 does not have a timeout mechanism, which allows remote attackers to cause a denial of service (process hang) via a request to a CGI script that does not read from its stdin file descriptor. | [
"cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-p5cg-9ppf-9gvh | Microsoft Internet Explorer 6 and 8 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability." | [] | null | null | null | null |
|
CVE-2017-5251 | In version 1012 and prior of Insteon's Insteon Hub, the radio transmissions used for communication between the hub and connected devices are not encrypted. | [
"cpe:2.3:o:insteon:insteon_hub_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:insteon:insteon_hub:-:*:*:*:*:*:*:*"
] | null | null | 8.1 | 6.8 |
|
CVE-2025-22354 | WordPress Digi Store theme <= 1.1.4 - Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Code Themes Digi Store allows DOM-Based XSS.This issue affects Digi Store: from n/a through 1.1.4. | [] | null | 6.5 | null | null |
CVE-2020-35678 | Autobahn|Python before 20.12.3 allows redirect header injection. | [
"cpe:2.3:a:crossbar:autobahn:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | 5.8 |
|
CVE-2016-6497 | main/java/org/apache/directory/groovyldap/LDAP.java in the Groovy LDAP API in Apache allows attackers to conduct LDAP entry poisoning attacks by leveraging setting returnObjFlag to true for all search methods. | [
"cpe:2.3:a:apache:groovy_ldap:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
CVE-2015-10048 | bmattoso desafio_buzz_woody sql injection | A vulnerability was found in bmattoso desafio_buzz_woody. It has been rated as critical. This issue affects some unknown processing. The manipulation leads to sql injection. The identifier of the patch is cb8220cbae06082c969b1776fcb2fdafb3a1006b. It is recommended to apply a patch to fix this issue. The identifier VDB-218357 was assigned to this vulnerability. | [
"cpe:2.3:a:desafio_buzz_woody_project:desafio_buzz_woody:*:*:*:*:*:*:*:*"
] | null | 5.5 | 5.5 | 5.2 |
CVE-2023-31002 | IBM Security Access Manager Container information disclosure | IBM Security Access Manager Container 10.0.0.0 through 10.0.6.1 temporarily stores sensitive information in files that could be accessed by a local user. IBM X-Force ID: 254657. | [
"cpe:2.3:a:ibm:security_access_manager_container:*:*:*:*:*:*:*:*"
] | null | 5.1 | null | null |
CVE-2019-15251 | Cisco SPA100 Series Analog Telephone Adapters Remote Code Execution Vulnerabilities | Multiple vulnerabilities in Cisco SPA100 Series Analog Telephone Adapters (ATAs) could allow an authenticated, adjacent attacker to execute arbitrary code with elevated privileges. The vulnerabilities are due to improper validation of user-supplied input to the web-based management interface. An attacker could exploit these vulnerabilities by authenticating to the web-based management interface and sending crafted requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code with elevated privileges. Note: The web-based management interface is enabled by default. | [
"cpe:2.3:o:cisco:spa112_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:spa112_firmware:1.4.1:-:*:*:*:*:*:*",
"cpe:2.3:o:cisco:spa112_firmware:1.4.1:sr1:*:*:*:*:*:*",
"cpe:2.3:o:cisco:spa112_firmware:1.4.1:sr2:*:*:*:*:*:*",
"cpe:2.3:o:cisco:spa112_firmware:1.4.1:sr3:*:*:*:*:*:*",
"cpe:2.3:o:cisco:spa112_firmware:1.4.1:sr4:*:*:*:*:*:*",
"cpe:2.3:h:cisco:spa112:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:spa122_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:spa122_firmware:1.4.1:-:*:*:*:*:*:*",
"cpe:2.3:o:cisco:spa122_firmware:1.4.1:sr1:*:*:*:*:*:*",
"cpe:2.3:o:cisco:spa122_firmware:1.4.1:sr2:*:*:*:*:*:*",
"cpe:2.3:o:cisco:spa122_firmware:1.4.1:sr3:*:*:*:*:*:*",
"cpe:2.3:o:cisco:spa122_firmware:1.4.1:sr4:*:*:*:*:*:*",
"cpe:2.3:h:cisco:spa122:-:*:*:*:*:*:*:*"
] | null | null | 8 | null |
GHSA-g636-q5fc-4pr7 | accounts: Hash account number using Salt | @alovak found that currently when we build hash of account number we do not "salt" it. Which makes it vulnerable to rainbow table attack.**What did you expect to see?**
I expected salt (some random number from configuration) to be used in [hash.AccountNumber](https://github.com/moov-io/customers/blob/master/pkg/secrets/hash/account_number.go#L13)I would generate salt per tenant at least (maybe per organization). | [] | null | null | null | null |
CVE-2025-28913 | WordPress WP Add Active Class To Menu Item plugin <=1.0 - Cross Site Request Forgery (CSRF) vulnerability | Cross-Site Request Forgery (CSRF) vulnerability in Aftab Ali Muni WP Add Active Class To Menu Item allows Cross Site Request Forgery. This issue affects WP Add Active Class To Menu Item: from n/a through 1.0. | [] | null | 4.3 | null | null |
CVE-2020-13860 | An issue was discovered on Mofi Network MOFI4500-4GXeLTE 4.0.8-std devices. The one-time password algorithm for the undocumented system account mofidev generates a predictable six-digit password. | [
"cpe:2.3:o:mofinetwork:mofi4500-4gxelte_firmware:4.0.8-std:*:*:*:*:*:*:*",
"cpe:2.3:h:mofinetwork:mofi4500-4gxelte:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
CVE-2022-41678 | Apache ActiveMQ: Insufficient API restrictions on Jolokia allow authenticated users to perform RCE | Once an user is authenticated on Jolokia, he can potentially trigger arbitrary code execution.
In details, in ActiveMQ configurations, jetty allows
org.jolokia.http.AgentServlet to handler request to /api/jolokia
org.jolokia.http.HttpRequestHandler#handlePostRequest is able to
create JmxRequest through JSONObject. And calls to
org.jolokia.http.HttpRequestHandler#executeRequest.
Into deeper calling stacks,
org.jolokia.handler.ExecHandler#doHandleRequest can be invoked
through refection. This could lead to RCE through via
various mbeans. One example is unrestricted deserialization in jdk.management.jfr.FlightRecorderMXBeanImpl which exists on Java version above 11.
1 Call newRecording.
2 Call setConfiguration. And a webshell data hides in it.
3 Call startRecording.
4 Call copyTo method. The webshell will be written to a .jsp file.
The mitigation is to restrict (by default) the actions authorized on Jolokia, or disable Jolokia.
A more restrictive Jolokia configuration has been defined in default ActiveMQ distribution. We encourage users to upgrade to ActiveMQ distributions version including updated Jolokia configuration: 5.16.6, 5.17.4, 5.18.0, 6.0.0.
| [
"cpe:2.3:a:apache:activemq:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
GHSA-5pg2-qg87-vmj7 | Cross-site Scripting in microweber | Cross-site Scripting (XSS) - Stored in GitHub repository microweber/microweber prior to 1.2.19. | [] | null | 5.4 | null | null |
GHSA-p5ch-7hc9-cv48 | SAP Business One - version 10.0, allows an admin user to view DB password in plain text over the network, which should otherwise be encrypted. For an attacker to discover vulnerable function in-depth application knowledge is required, but once exploited the attacker may be able to completely compromise confidentiality, integrity, and availability of the application. | [] | null | null | null | null |
|
GHSA-cp2r-29q5-494x | The CRM WordPress Plugin – RepairBuddy plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 3.8120. This is due to the plugin not properly validating a user's identity prior to updating their email through the wc_update_user_data AJAX action. This makes it possible for authenticated attackers, with subscriber-level access and above, to change arbitrary user's email addresses, including administrators, and leverage that to reset the user's password and gain access to their account. | [] | null | 8.8 | null | null |
|
GHSA-p72g-cgh9-ghjg | Failing DTLS handshakes may cause throttling to block processing of records | ImpactFailing handshakes didn't cleanup counters for throttling. In consequence the threshold may get reached and will not be released again. The results in permanently dropping records. The issues was reported for certificate based handshakes, but it can't be excluded, that this happens also for PSK based handshakes. It generally affects client and server as well.Patchesmain: commit 726bac57659410da463dcf404b3e79a7312ac0b9
2.7.x: commit 5648a0c27c2c2667c98419254557a14bac2b1f3fUsers are requested to update to 3.7.0. If Californium 2 support is required, users are requested to update to 2.7.4.Workaroundsnone. | [] | null | 8.2 | null | null |
GHSA-4f8m-x9c7-gvcq | Before version 4.8.2, WordPress mishandled % characters and additional placeholder values in $wpdb->prepare, and thus did not properly address the possibility of plugins and themes enabling SQL injection attacks. | [] | null | null | 9.8 | null |
|
GHSA-3fcg-g48j-hrrr | The ElementsKit Elementor addons plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 3.0.3 via the ekit_widgetarea_content function. This makes it possible for unauthenticated attackers to obtain contents of posts in draft, private or pending review status that should not be visible to the general public. This applies to posts created with Elementor only. | [] | null | 5.3 | null | null |
|
GHSA-r36w-qc6c-g892 | A crafted request with invalid offsets may cause an out-of-bounds read or write access in CODESYS V2 Runtime Toolkit 32 Bit full and PLCWinNT prior to versions V2.4.7.56, resulting in a denial-of-service condition or local memory overwrite. | [] | null | 8.1 | null | null |
|
GHSA-82jw-whc4-3j7f | Microsoft Internet Explorer 7 through 11 and Microsoft Edge allow remote attackers to bypass the ASLR protection mechanism via a crafted web site, aka "Microsoft Browser ASLR Bypass." | [] | null | null | null | null |
|
CVE-2021-34696 | Cisco ASR 900 and ASR 920 Series Aggregation Services Routers Access Control List Bypass Vulnerability | A vulnerability in the access control list (ACL) programming of Cisco ASR 900 and ASR 920 Series Aggregation Services Routers could allow an unauthenticated, remote attacker to bypass a configured ACL. This vulnerability is due to incorrect programming of hardware when an ACL is configured using a method other than the configuration CLI. An attacker could exploit this vulnerability by attempting to send traffic through an affected device. A successful exploit could allow the attacker to bypass an ACL on the affected device. | [
"cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_902:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_903:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_907:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_920-10sz-pd:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_920-10sz-pd_r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_920-12cz-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_920-12cz-a_r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_920-12cz-d:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_920-12cz-d_r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_920-12sz-im:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_920-12sz-im_r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_920-24sz-im:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_920-24sz-im_r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_920-24sz-m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_920-24sz-m_r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_920-24tz-m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_920-24tz-m_r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_920-4sz-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_920-4sz-a_r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_920-4sz-d:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_920-4sz-d_r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_920u-12sz-im:-:*:*:*:*:*:*:*"
] | null | 5.8 | null | null |
GHSA-rvhx-68h5-664f | Diagnostics functionality on D-Link DSL-3782 devices with firmware EU v. 1.01 has a buffer overflow, allowing authenticated remote attackers to execute arbitrary code via a long Addr value to the 'set Diagnostics_Entry' function in an HTTP request, related to /userfs/bin/tcapi. | [] | null | null | 8.8 | null |
|
CVE-2025-21361 | Microsoft Outlook Remote Code Execution Vulnerability | Microsoft Outlook Remote Code Execution Vulnerability | [] | null | 7.8 | null | null |
CVE-2000-0031 | The initscripts package in Red Hat Linux allows local users to gain privileges via a symlink attack. | [
"cpe:2.3:o:redhat:linux:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:linux:6.1:*:*:*:*:*:*:*"
] | null | null | null | 6.2 |
|
CVE-2025-3793 | Buddypress Force Password Change <= 0.1 - Authenticated (Subscriber+) Account Takeover via Password Update | The Buddypress Force Password Change plugin for WordPress is vulnerable to authenticated account takeover due to the plugin not properly validating a user's identity prior to updating their password through the 'bp_force_password_ajax' function in all versions up to, and including, 0.1. This makes it possible for authenticated attackers, with subscriber-level access and above and under certain prerequisites, to change arbitrary user's passwords, including administrators, and leverage that to gain access to their accounts. | [] | null | 4.2 | null | null |
GHSA-qc22-6662-58rj | A technical user has hardcoded credentials in Wallstreet Suite TRM 7.4.83 (64-bit edition) with higher privilege than the average authenticated user. | [] | null | null | null | null |
|
CVE-2024-11032 | Parsi Date <= 5.1.1 - Reflected Cross-Site Scripting via add_query_arg Parameter | The Parsi Date plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 5.1.1. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. | [] | null | 6.1 | null | null |
GHSA-9g32-9j7m-w6rc | An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site. | [] | null | null | 8.8 | null |
|
GHSA-37c7-c3v8-w5p9 | The (1) Aruba Mobility Controllers 200, 600, 2400, and 6000 and (2) Alcatel-Lucent OmniAccess Wireless 43xx and 6000 do not properly implement authentication and privilege assignment for the guest account, which allows remote attackers to access administrative interfaces or the WLAN. | [] | null | null | null | null |
|
GHSA-7h3f-x6h2-qjgj | A vulnerability in the remote access SSL VPN features of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper validation of errors that are logged as a result of client connections that are made using remote access VPN. An attacker could exploit this vulnerability by sending crafted requests to an affected system. A successful exploit could allow the attacker to cause the affected device to restart, resulting in a DoS condition. | [] | null | 7.5 | null | null |
|
GHSA-jv5w-jhcc-wx4g | A vulnerability in pam_modules of SUSE Linux Enterprise allows attackers to log into accounts that should have been disabled. Affected releases are SUSE Linux Enterprise: versions prior to 12. | [] | null | null | 9.8 | null |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.