id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
57.2k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-2fw2-jxh6-36cg | Tenda AC6V1.0 V15.03.05.19 was discovered to contain a buffer overflow via the time parameter in the setSmartPowerManagement function. | [] | null | 7.5 | null | null |
|
GHSA-6x3m-hh2g-4gwp | A vulnerability in the web-based management interface of ClearPass Policy Manager could allow a remote attacker authenticated with low privileges to access sensitive information. A successful exploit allows an attacker to retrieve information which could be used to potentially gain further privileges on the ClearPass instance. | [] | null | 6.5 | null | null |
|
CVE-2023-35360 | Windows Kernel Elevation of Privilege Vulnerability | Windows Kernel Elevation of Privilege Vulnerability | [
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*"
] | null | 7 | null | null |
CVE-2023-28804 | Linux ZCC allows unsigned updates, allowing elevated Code Execution | An Improper Verification of Cryptographic Signature vulnerability in Zscaler Client Connector on Linux allows replacing binaries.This issue affects Linux Client Connector: before 1.4.0.105 | [
"cpe:2.3:a:zscaler:client_connector:*:*:*:*:*:*:*:*",
"cpe:2.3:a:zscaler:client_connector:*:*:*:*:*:linux:*:*"
] | null | 8.2 | null | null |
CVE-2014-4491 | The extension APIs in the kernel in Apple iOS before 8.1.3, Apple OS X before 10.10.2, and Apple TV before 7.0.3 do not prevent the presence of addresses within an OSBundleMachOHeaders key in a response, which makes it easier for attackers to bypass the ASLR protection mechanism via a crafted app. | [
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2018-5768 | A remote, unauthenticated attacker can gain remote code execution on the the Tenda AC15 router with a specially crafted password parameter for the COOKIE header. | [
"cpe:2.3:o:tendacn:ac15_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tendacn:ac15:-:*:*:*:*:*:*:*"
] | null | null | 9.8 | 10 |
|
GHSA-3c3c-2xp4-j4qp | The wp-slimstat plugin before 4.8.1 for WordPress has XSS. | [] | null | 6.1 | null | null |
|
GHSA-r4fx-3jx4-5mcm | Vintra SMTP MailServer allows remote attackers to cause a denial of service via a malformed "EXPN *@" command. | [] | null | null | null | null |
|
CVE-2020-14712 | Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 5.0 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N). | [
"cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*"
] | null | 5 | null | null |
|
RHSA-2023:1013 | Red Hat Security Advisory: Red Hat OpenStack Platform 17.0 (openstack-swift) security update | openstack-swift: Arbitrary file access through custom S3 XML entities | [
"cpe:/a:redhat:openstack:17.0::el9"
] | null | 7.7 | null | null |
GHSA-xj48-9vrg-vxxc | SpamAssassin before 3.1.3, when running with vpopmail and the paranoid (-P) switch, allows remote attackers to execute arbitrary commands via a crafted message that is not properly handled when invoking spamd with the virtual pop username. | [] | null | null | null | null |
|
CVE-2022-2255 | A vulnerability was found in mod_wsgi. The X-Client-IP header is not removed from a request from an untrusted proxy, allowing an attacker to pass the X-Client-IP header to the target WSGI application because the condition to remove it is missing. | [
"cpe:2.3:a:modwsgi:mod_wsgi:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
|
RHSA-2014:1053 | Red Hat Security Advisory: openssl security update | openssl: DoS when sending invalid DTLS handshake openssl: DTLS packet processing double free openssl: DTLS memory exhaustion openssl: information leak in pretty printing functions openssl: DTLS anonymous (EC)DH denial of service | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
GHSA-c429-fc87-8669 | This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the boundItem method of a TimeField. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-6484. | [] | null | null | 8.8 | null |
|
GHSA-qrqj-j85r-f7h4 | The WooCommerce WordPress plugin before 8.6 does not prevent users with at least the contributor role from leaking products they shouldn't have access to. (e.g. private, draft and trashed products) | [] | null | 4.9 | null | null |
|
GHSA-r52f-5hg7-pqvr | PHP remote file inclusion vulnerability in param.peoplebook.php in the Peoplebook Component for Mambo (com_peoplebook) 1.0 and earlier, and possibly 1.1.2, when register_globals and allow_url_fopen are enabled, allows remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter. | [] | null | null | null | null |
|
CVE-2014-9941 | In the Embedded File System in all Android releases from CAF using the Linux kernel, a Time-of-Check Time-of-Use Race Condition vulnerability could potentially exist. | [
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] | null | null | 7 | 7.6 |
|
GHSA-qjh7-2cqf-c2cr | IBM Security Secret Server up to 11.0 could allow an attacker to enumerate usernames due to improper input validation. IBM X-Force ID: 199243. | [] | null | null | null | null |
|
GHSA-r959-q5rq-6m45 | The encrypted loop device in Linux kernel 2.4.10 and earlier does not authenticate the entity that is encrypting data, which allows local users to modify encrypted data without knowing the key. | [] | null | null | null | null |
|
GHSA-fw7q-f8mv-grpv | The memory-management implementation in the Virtual Machine Monitor (aka VMM or hypervisor) in Microsoft Virtual PC 2007 Gold and SP1, Virtual Server 2005 Gold and R2 SP1, and Windows Virtual PC does not properly restrict access from the guest OS to memory locations in the VMM work area, which allows context-dependent attackers to bypass certain anti-exploitation protection mechanisms on the guest OS via crafted input to a vulnerable application. NOTE: the vendor reportedly found that only systems with an otherwise vulnerable application are affected, because "the memory areas accessible from the guest cannot be leveraged to achieve either remote code execution or elevation of privilege and ... no data from the host is exposed to the guest OS." | [] | null | null | null | null |
|
CVE-2013-4674 | Cross-site scripting (XSS) vulnerability in the Web Email Protection component in Symantec Encryption Management Server (formerly Symantec PGP Universal Server) before 3.3.0 MP2 allows remote authenticated users to inject arbitrary web script or HTML via a crafted encrypted e-mail attachment. | [
"cpe:2.3:a:symantec:encryption_management_server:*:mp1:*:*:*:*:*:*",
"cpe:2.3:a:symantec:encryption_management_server:3.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:pgp_universal_server:3.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:pgp_universal_server:3.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:pgp_universal_server:3.2.1:mp2:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2017-0407 | A remote code execution vulnerability in Mediaserver could enable an attacker using a specially crafted file to cause memory corruption during media file and data processing. This issue is rated as Critical due to the possibility of remote code execution within the context of the Mediaserver process. This affects the libhevc library. Product: Android. Versions: 6.0, 6.0.1, 7.0, 7.1.1. Android ID: A-32873375. | [
"cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*"
] | null | null | 7.8 | 9.3 |
|
GHSA-mhmm-m867-5r8p | LibRaw before 0.18.4 has a heap-based Buffer Overflow in the processCanonCameraInfo function via a crafted file. | [] | null | null | 8.8 | null |
|
RHSA-2008:0389 | Red Hat Security Advisory: nss_ldap security and bug fix update | nss_ldap randomly replying with wrong user's data | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
CVE-2022-2979 | Omron CX-Programmer | Opening a specially crafted file could cause the affected product to fail to release its memory reference potentially resulting in arbitrary code execution. | [
"cpe:2.3:a:omron:cx-programmer:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
CVE-2023-26822 | D-Link Go-RT-AC750 revA_v101b03 was discovered to contain a command injection vulnerability via the service parameter at soapcgi.main. | [
"cpe:2.3:o:dlink:go-rt-ac750_firmware:reva_v101b03:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:go-rt-ac750:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
CVE-2008-0726 | Integer overflow in Adobe Reader and Acrobat 8.1.1 and earlier allows remote attackers to execute arbitrary code via crafted arguments to the printSepsWithParams, which triggers memory corruption. | [
"cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
CVE-2024-8679 | Library Management System <= 3.0.0 - Authenticated (Admin+) SQL Injection | The Library Management System – Manage e-Digital Books Library plugin for WordPress is vulnerable to SQL Injection via the ‘value' parameter of the owt_lib_handler AJAX action in all versions up to, and including, 3.0.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. | [] | null | 6.8 | null | null |
CVE-2023-46630 | WordPress Admin and Site Enhancements (ASE) plugin <= 5.7.1 - Password Protected View Bypass Vulnerability vulnerability | Improper Authentication vulnerability in wpase Admin and Site Enhancements (ASE) allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Admin and Site Enhancements (ASE): from n/a through 5.7.1. | [] | null | 7.5 | null | null |
GHSA-v5q8-78qh-4p63 | ftcms <=2.1 was discovered to be vulnerable to Arbitrary File Read via tp.php | [] | null | 6.5 | null | null |
|
CVE-2016-4924 | vMX: Information leak vulnerability | An incorrect permissions vulnerability in Juniper Networks Junos OS on vMX may allow local unprivileged users on a host system read access to vMX or vPFE images and obtain sensitive information contained in them such as private cryptographic keys. This issue was found during internal product security testing. Juniper SIRT is not aware of any malicious exploitation of this vulnerability. No other Juniper Networks products or platforms are affected by this issue. Affected releases are Juniper Networks Junos OS 15.1 prior to 15.1F5; 14.1 prior to 14.1R8 | [
"cpe:2.3:o:juniper:junos:15.1:f1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f2-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f2-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1:r4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1:r5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1:r6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1:r7:*:*:*:*:*:*"
] | null | null | 8.4 | null |
CVE-2021-24931 | Secure Copy Content Protection and Content Locking < 2.8.2 - Unauthenticated SQL Injection | The Secure Copy Content Protection and Content Locking WordPress plugin before 2.8.2 does not escape the sccp_id parameter of the ays_sccp_results_export_file AJAX action (available to both unauthenticated and authenticated users) before using it in a SQL statement, leading to an SQL injection. | [
"cpe:2.3:a:ays-pro:secure_copy_content_protection_and_content_locking:*:*:*:*:*:wordpress:*:*"
] | null | 9.8 | null | 7.5 |
CVE-2014-3518 | jmx-remoting.sar in JBoss Remoting, as used in Red Hat JBoss Enterprise Application Platform (JEAP) 5.2.0, Red Hat JBoss BRMS 5.3.1, Red Hat JBoss Portal Platform 5.2.2, and Red Hat JBoss SOA Platform 5.3.1, does not properly implement the JSR 160 specification, which allows remote attackers to execute arbitrary code via unspecified vectors. | [
"cpe:2.3:a:redhat:jboss_enterprise_application_platform:5.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:jboss_enterprise_brms_platform:5.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:jboss_enterprise_portal_platform:5.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:jboss_enterprise_soa_platform:5.3.1:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
GHSA-4252-96vf-89m5 | Redatam7 (formerly Redatam WebServer) allows remote attackers to read arbitrary files via /redbin/rpwebutilities.exe/text?LFN=../ directory traversal. | [] | null | null | 7.5 | null |
|
GHSA-m3j3-4h27-6j85 | Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JAXP). Supported versions that are affected are Java SE: 6u141, 7u131 and 8u121; Java SE Embedded: 8u121; JRockit: R28.3.13. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H). | [] | null | null | 5.9 | null |
|
GHSA-j7m6-xxhh-82qr | A vulnerability classified as problematic was found in Weaver e-cology up to 9.0. Affected by this vulnerability is the function RequestInfoByXml of the component API. The manipulation leads to xml external entity reference. The associated identifier of this vulnerability is VDB-229411. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | [] | null | null | 5.5 | null |
|
GHSA-ggw2-ggph-4wc2 | Directory traversal vulnerability in visualizza.php in Way Of The Warrior (WOTW) 5.0 and earlier allows remote attackers to read arbitrary files via a .. (dot dot) in the plancia parameter. | [] | null | null | null | null |
|
CVE-2024-0086 | CVE | NVIDIA vGPU software for Linux contains a vulnerability where the software can dereference a NULL pointer. A successful exploit of this vulnerability might lead to denial of service and undefined behavior in the vGPU plugin. | [
"cpe:2.3:a:nvidia:virtual_gpu:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:-:*:*:*:*:*:*:*",
"cpe:2.3:o:citrix:hypervisor:-:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_kernel-based_virtual_machine:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vmware:vsphere:-:*:*:*:*:*:*:*",
"cpe:2.3:a:nvidia:cloud_gaming:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
RHSA-2024:5025 | Red Hat Security Advisory: Red Hat JBoss Web Server 5.8.1 release and security update | tomcat: Improper Handling of Exceptional Conditions tomcat: Denial of Service in Tomcat | [
"cpe:/a:redhat:jboss_enterprise_web_server:5.8"
] | null | 7.5 | null | null |
CVE-2018-20908 | cPanel before 71.9980.37 allows arbitrary file-read operations during pkgacct custom template handling (SEC-435). | [
"cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*"
] | null | null | 5.5 | 2.1 |
|
CVE-2014-9344 | Cross-site request forgery (CSRF) vulnerability in Snowfox CMS before 1.0.10 allows remote attackers to hijack the authentication of administrators for requests that add a new admin account via a submit action in the admin/accounts/create uri to snowfox/. | [
"cpe:2.3:a:globiz_solutions:snowfox_content_management_system:*:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
CVE-2021-27799 | ean_leading_zeroes in backend/upcean.c in Zint Barcode Generator 2.9.1 has a stack-based buffer overflow that is reachable from the C API through an application that includes the Zint Barcode Generator library code. | [
"cpe:2.3:a:zint:barcode_generator:2.9.1:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
RHSA-2024:11255 | Red Hat Security Advisory: Red Hat Trusted Profile Analyzer 1.2.1 | protobuf: StackOverflow vulnerability in Protocol Buffers http-proxy-middleware: Denial of Service cross-spawn: regular expression denial of service | [
"cpe:/a:redhat:trusted_profile_analyzer:1.2::el9"
] | null | 4.4 | null | null |
CVE-2011-2442 | Adobe Reader and Acrobat 8.x before 8.3.1, 9.x before 9.4.6, and 10.x before 10.1.1 allow attackers to execute arbitrary code via unspecified vectors, related to a "logic error vulnerability." | [
"cpe:2.3:a:adobe:acrobat_reader:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.1:*:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
GHSA-fjfr-24j5-f8cq | An improper neutralization of special elements used in an OS command vulnerability [CWE-78] in FortiADC 5.x all versions, 6.0 all versions, 6.1 all versions, 6.2.0 through 6.2.4, 7.0.0 through 7.0.3, 7.1.0; FortiDDoS 4.x all versions, 5.0 all versions, 5.1 all versions, 5.2 all versions, 5.3 all versions, 5.4 all versions, 5.5 all versions, 5.6 all versions and FortiDDoS-F 6.4.0, 6.3.0 through 6.3.3, 6.2.0 through 6.2.2, 6.1.0 through 6.1.4 may allow an authenticated attacker to execute unauthorized commands via specifically crafted arguments to existing commands. | [] | null | 7.8 | null | null |
|
CVE-2007-2988 | A certain admin script in Inout Meta Search Engine sends a redirect to the web browser but does not exit when administrative credentials are missing, which allows remote attackers to inject arbitrary PHP code, as demonstrated by a request to admin/create_engine.php followed by a request to admin/generate_tabs.php. | [
"cpe:2.3:a:inout_scripts:inout_meta_search_engine:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
RHSA-2020:2102 | Red Hat Security Advisory: kernel security and bug fix update | Kernel: kvm: nVMX: L2 guest may trick the L0 hypervisor to access sensitive L1 resources Kernel: NetLabel: null pointer dereference while receiving CIPSO packet with null category may cause kernel panic Kernel: s390: page table upgrade in secondary address mode may lead to privilege escalation | [
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7 | null | null |
CVE-2016-0823 | The pagemap_open function in fs/proc/task_mmu.c in the Linux kernel before 3.19.3, as used in Android 6.0.1 before 2016-03-01, allows local users to obtain sensitive physical-address information by reading a pagemap file, aka Android internal bug 25739721. | [
"cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | null | 4 | 2.1 |
|
CVE-2024-7221 | SourceCodester School Log Management System manage_user.php sql injection | A vulnerability, which was classified as critical, has been found in SourceCodester School Log Management System 1.0. Affected by this issue is some unknown functionality of the file /admin/manage_user.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-272792. | [
"cpe:2.3:a:oretnom23:school_log_management_system:1.0:*:*:*:*:*:*:*"
] | 5.3 | 6.3 | 6.3 | 6.5 |
RHSA-2018:0666 | Red Hat Security Advisory: krb5 security, bug fix, and enhancement update | krb5: Authentication bypass by improper validation of certificate EKU and SAN krb5: Invalid S4U2Self or S4U2Proxy request causes assertion failure | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 6.5 | null |
GHSA-gq9p-fgf8-xxr3 | A Denial of Service issue exists in China Telecom Corporation EPON Tianyi Gateway ZXHN F450(EPON ONU) 3.0. Tianyi Gateway is a hardware terminal of "Optical Modem Smart Router." Attackers can use this vulnerability to restart the device multiple times. | [] | null | null | null | null |
|
GHSA-2595-5937-8f4h | Domoticz 4.10717 has XSS via item.Name. | [] | null | null | 5.4 | null |
|
GHSA-cmv9-xrg2-ccmg | The Bugzilla::Search::build_subselect function in Bugzilla 2.x and 3.x before 3.6.13 and 3.7.x and 4.0.x before 4.0.10 generates different error messages for invalid product queries depending on whether a product exists, which allows remote attackers to discover private product names by using debug mode for a query. | [] | null | null | null | null |
|
GHSA-gfmq-483m-qx6r | The XT Ajax Add To Cart for WooCommerce plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 1.1.2. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. | [] | null | 6.1 | null | null |
|
CVE-2022-49661 | can: gs_usb: gs_usb_open/close(): fix memory leak | In the Linux kernel, the following vulnerability has been resolved:
can: gs_usb: gs_usb_open/close(): fix memory leak
The gs_usb driver appears to suffer from a malady common to many USB
CAN adapter drivers in that it performs usb_alloc_coherent() to
allocate a number of USB request blocks (URBs) for RX, and then later
relies on usb_kill_anchored_urbs() to free them, but this doesn't
actually free them. As a result, this may be leaking DMA memory that's
been used by the driver.
This commit is an adaptation of the techniques found in the esd_usb2
driver where a similar design pattern led to a memory leak. It
explicitly frees the RX URBs and their DMA memory via a call to
usb_free_coherent(). Since the RX URBs were allocated in the
gs_can_open(), we remove them in gs_can_close() rather than in the
disconnect function as was done in esd_usb2.
For more information, see the 928150fad41b ("can: esd_usb2: fix memory
leak"). | [] | null | null | null | null |
CVE-2006-1218 | Unspecified vulnerability in the HTTP proxy in Novell BorderManager 3.8 and earlier allows remote attackers to cause a denial of service (CPU consumption and ABEND) via unknown attack vectors related to "media streaming over HTTP 1.1". | [
"cpe:2.3:a:novell:bordermanager:3.8:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:bordermanager:3.8:sp4:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-46pf-26gp-xmxp | IBM Intelligent Operations Center (IOC) 5.1.0 through 5.2.0 could allow an authenciated user to create arbitrary users which could cause ID management issues and result in code execution. IBM X-Force ID: 157011. | [] | null | null | null | null |
|
GHSA-v36g-jjr7-wrpv | An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site. | [] | null | null | 8.8 | null |
|
GHSA-7426-cf9r-3rp5 | pluginconfig.php in the Image Uploader and Browser plugin before 4.1.9 for CKEditor mishandles certain characters in pathnames. | [] | null | null | null | null |
|
CVE-2023-4722 | Integer Overflow or Wraparound in gpac/gpac | Integer Overflow or Wraparound in GitHub repository gpac/gpac prior to 2.3-DEV. | [
"cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*"
] | null | null | 5.9 | null |
CVE-2020-1259 | A security feature bypass vulnerability exists when Windows Host Guardian Service improperly handles hashes recorded and logged, aka 'Windows Host Guardian Service Security Feature Bypass Vulnerability'. | [
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
] | null | 4.3 | null | 4 |
|
RHSA-2014:1689 | Red Hat Security Advisory: openstack-nova security, bug fix, and enhancement update | openstack-nova: Nova VMware driver may connect VNC to another tenant's console | [
"cpe:/a:redhat:openstack:4::el6"
] | null | null | null | null |
CVE-2014-3326 | SQL injection vulnerability in the web framework in Cisco Security Manager 4.5 and 4.6 allows remote authenticated users to execute arbitrary SQL commands via unspecified vectors, aka Bug ID CSCup26957. | [
"cpe:2.3:a:cisco:security_manager:4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:security_manager:4.6:*:*:*:*:*:*:*"
] | null | null | null | 6.5 |
|
CVE-2014-1546 | The response function in the JSONP endpoint in WebService/Server/JSONRPC.pm in jsonrpc.cgi in Bugzilla 3.x and 4.x before 4.0.14, 4.1.x and 4.2.x before 4.2.10, 4.3.x and 4.4.x before 4.4.5, and 4.5.x before 4.5.5 accepts certain long callback values and does not restrict the initial bytes of a JSONP response, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks, and obtain sensitive information, via a crafted OBJECT element with SWF content consistent with the _bz_callback character set. | [
"cpe:2.3:a:mozilla:bugzilla:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.2:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.2:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.4:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.4.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.4.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.4.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.4.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.4.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.6:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.6.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.6.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.6.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.6.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.6.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.6.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.6.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.2:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.2:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.4:-:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.4:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.4:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.5.4:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2024-30157 | A vulnerability in the Suite Applications Services component of Mitel MiCollab through 9.7.1.110 could allow an authenticated attacker with administrative privileges to conduct a SQL Injection attack due to insufficient validation of user input. A successful exploit could allow an attacker to execute arbitrary database and management operations. | [
"cpe:2.3:a:mitel:micollab:*:*:*:*:*:*:*:*"
] | null | 7.2 | null | null |
|
CVE-2019-1324 | An information disclosure vulnerability exists when the Windows TCP/IP stack improperly handles IPv6 flowlabel filled in packets, aka 'Windows TCP/IP Information Disclosure Vulnerability'. | [
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
] | null | 5.3 | null | 5 |
|
GHSA-4w3m-xm3w-43g9 | In Modicon Quantum all firmware versions, CWE-264: Permissions, Privileges, and Access Control vulnerabilities could cause a denial of service or unauthorized modifications of the PLC configuration when using Ethernet/IP protocol. | [] | null | null | null | null |
|
CVE-2018-2719 | Vulnerability in the Oracle Financial Services Hedge Management and IFRS Valuations component of Oracle Financial Services Applications (subcomponent: User Interface). The supported version that is affected is 8.0.x. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Financial Services Hedge Management and IFRS Valuations. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Financial Services Hedge Management and IFRS Valuations, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Financial Services Hedge Management and IFRS Valuations accessible data as well as unauthorized read access to a subset of Oracle Financial Services Hedge Management and IFRS Valuations accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N). | [
"cpe:2.3:a:oracle:financial_services_hedge_management_and_ifrs_valuations:8.0.5.0.0:*:*:*:*:*:*:*"
] | null | null | 6.1 | 5.8 |
|
CVE-2007-6564 | Cross-site scripting (XSS) vulnerability in admin.php in Limbo CMS 1.0.4.2 allows remote attackers to inject arbitrary web script or HTML via the com_option parameter. | [
"cpe:2.3:a:limbo_cms:limbo_cms:1.0.4.2:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-w697-w7c7-c9pp | Microsoft Excel Remote Code Execution Vulnerability | [] | null | 7.8 | null | null |
|
RHSA-2021:2290 | Red Hat Security Advisory: nginx:1.16 security update | nginx: Off-by-one in ngx_resolver_copy() when labels are followed by a pointer to a root domain name | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:rhel_eus:8.1::appstream",
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 8.1 | null | null |
GHSA-vj6f-mgq8-fwxp | In SWFTools 0.9.2, the png_load function in lib/png.c does not check the return value of a realloc call, which allows remote attackers to cause a denial of service (invalid write and application crash) or possibly have unspecified other impact via vectors involving an IDAT tag in a crafted PNG file. | [] | null | null | 7.8 | null |
|
GHSA-r754-r2fw-63fg | A vulnerability has been identified in Desigo DXR2 (All versions < V01.21.142.5-22), Desigo PXC3 (All versions < V01.21.142.4-18), Desigo PXC4 (All versions < V02.20.142.10-10884), Desigo PXC5 (All versions < V02.20.142.10-10884). The login functionality of the application fails to normalize the response times of login attempts performed with wrong usernames with the ones executed with correct usernames. A remote unauthenticated attacker could exploit this side-channel information to perform a username enumeration attack and identify valid usernames. | [] | null | 5.3 | null | null |
|
GHSA-82fc-m9m7-w2mg | The upgrade functionality in Malwarebytes Anti-Malware (MBAM) consumer before 2.0.3 and Malwarebytes Anti-Exploit (MBAE) consumer 1.04.1.1012 and earlier allow man-in-the-middle attackers to execute arbitrary code by spoofing the update server and uploading an executable. | [] | null | null | null | null |
|
CVE-2022-31700 | VMware Workspace ONE Access and Identity Manager contain an authenticated remote code execution vulnerability. VMware has evaluated the severity of this issue to be in the Important severity range with a maximum CVSSv3 base score of 7.2. | [
"cpe:2.3:a:vmware:access:21.08.0.0:*:*:*:*:linux:*:*",
"cpe:2.3:a:vmware:access:21.08.0.1:*:*:*:*:linux:*:*",
"cpe:2.3:a:vmware:cloud_foundation:-:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:identity_manager:3.3.6:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 7.2 | null | null |
|
CVE-2011-3294 | Cross-site scripting (XSS) vulnerability in the login page in the administrative interface on Cisco TelePresence Video Communication Servers (VCS) with software before X7.0 allows remote attackers to inject arbitrary web script or HTML via the User-Agent HTTP header, aka Bug ID CSCts80342. | [
"cpe:2.3:h:cisco:telepresence_video_communication_servers:*:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:telepresence_video_communication_servers_software:*:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:telepresence_video_communication_servers_software:x5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:telepresence_video_communication_servers_software:x6.0:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2016-3903 | drivers/media/platform/msm/camera_v2/sensor/csid/msm_csid.c in the Qualcomm camera driver in Android before 2016-10-05 on Nexus 5, Nexus 5X, Nexus 6, Nexus 6P, and Android One devices allows attackers to gain privileges via a crafted application, aka Android internal bug 29513227 and Qualcomm internal bug CR 1040857. | [
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | 9.3 |
|
CVE-2024-36977 | usb: dwc3: Wait unconditionally after issuing EndXfer command | In the Linux kernel, the following vulnerability has been resolved:
usb: dwc3: Wait unconditionally after issuing EndXfer command
Currently all controller IP/revisions except DWC3_usb3 >= 310a
wait 1ms unconditionally for ENDXFER completion when IOC is not
set. This is because DWC_usb3 controller revisions >= 3.10a
supports GUCTL2[14: Rst_actbitlater] bit which allows polling
CMDACT bit to know whether ENDXFER command is completed.
Consider a case where an IN request was queued, and parallelly
soft_disconnect was called (due to ffs_epfile_release). This
eventually calls stop_active_transfer with IOC cleared, hence
send_gadget_ep_cmd() skips waiting for CMDACT cleared during
EndXfer. For DWC3 controllers with revisions >= 310a, we don't
forcefully wait for 1ms either, and we proceed by unmapping the
requests. If ENDXFER didn't complete by this time, it leads to
SMMU faults since the controller would still be accessing those
requests.
Fix this by ensuring ENDXFER completion by adding 1ms delay in
__dwc3_stop_active_transfer() unconditionally. | [] | null | 4.7 | null | null |
CVE-2024-41719 | BIG-IP Next Central Manager vulnerability | When generating QKView of BIG-IP Next instance from the BIG-IP Next Central Manager (CM), F5 iHealth credentials will be logged in the BIG-IP Central Manager logs. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. | [
"cpe:2.3:a:f5:big-ip_next_central_manager:*:*:*:*:*:*:*:*"
] | 5.1 | 4.2 | null | null |
CVE-2018-17098 | The WavFileBase class in WavFile.cpp in Olli Parviainen SoundTouch 2.0 allows remote attackers to cause a denial of service (heap corruption from size inconsistency) or possibly have unspecified other impact, as demonstrated by SoundStretch. | [
"cpe:2.3:a:surina:soundtouch:2.0.0:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.8 |
|
RHSA-2024:6726 | Red Hat Security Advisory: fence-agents security update | pypa/setuptools: Remote code execution via download functions in the package_index module in pypa/setuptools | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::highavailability",
"cpe:/a:redhat:enterprise_linux:9::resilientstorage"
] | null | 8.8 | null | null |
GHSA-mr86-rf34-87mq | EMC VMware Server before 1.0.4 Build 56528 writes passwords in cleartext to unspecified log files, which allows local users to obtain sensitive information by reading these files, a different vulnerability than CVE-2005-3620. | [] | null | null | null | null |
|
CVE-2003-1400 | Cross-site scripting (XSS) vulnerability in the Your_Account module for PHP-Nuke 5.0 through 6.0 allows remote attackers to inject arbitrary web script or HTML via the user_avatar parameter. | [
"cpe:2.3:a:francisco_burzi:php-nuke:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:francisco_burzi:php-nuke:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:francisco_burzi:php-nuke:5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:francisco_burzi:php-nuke:5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:francisco_burzi:php-nuke:5.2a:*:*:*:*:*:*:*",
"cpe:2.3:a:francisco_burzi:php-nuke:5.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:francisco_burzi:php-nuke:5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:francisco_burzi:php-nuke:5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:francisco_burzi:php-nuke:5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:francisco_burzi:php-nuke:6.0:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2024-23741 | An issue in Hyper on macOS version 3.4.1 and before, allows remote attackers to execute arbitrary code via the RunAsNode and enableNodeClilnspectArguments settings. | [
"cpe:2.3:a:hyper:hyper:-:*:*:*:*:macos:*:*",
"cpe:2.3:a:hyper:hyper:*:*:*:*:*:macos:*:*"
] | null | 9.8 | null | null |
|
GHSA-c447-v5h5-vwxf | Cross-site Scripting (XSS) - Generic in GitHub repository frappe/lms prior to 5614a6203fb7d438be8e2b1e3030e4528d170ec4. | [] | null | null | 7.1 | null |
|
CVE-2010-0189 | A certain ActiveX control in NOS Microsystems getPlus Download Manager (aka DLM or Downloader) 1.5.2.35, as used in Adobe Download Manager, improperly validates requests involving web sites that are not in subdomains, which allows remote attackers to force the download and installation of arbitrary programs via a crafted name for a download site. | [
"cpe:2.3:a:nos_microsystems:getplus_download_manager:1.5.2.35:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:download_manager:*:*:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
GHSA-gxp5-jq44-r688 | Cross-site scripting (XSS) vulnerability in Xcode Server in CoreCollaboration in Apple OS X Server before 3.2.1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | [] | null | null | 6.1 | null |
|
GHSA-9r4w-694r-fm3f | Incorrect default permissions in the installer software for some Intel(r) NUC Kit Wireless Adapter drivers for Windows 10 before version 22.40 may allow an authenticated user to potentially enable escalation of privilege via local access. | [] | null | 7.8 | null | null |
|
CVE-2015-8048 | Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK & Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454. | [
"cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:19.0.0.245:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
GHSA-p2jw-xr8p-fh9v | Heap-based buffer overflow in URLMON.DLL in Microsoft Internet Explorer 6 SP1 on Windows 2000 and XP SP1, with versions the MS06-042 patch before 20060912, allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a long URL in a GZIP-encoded website that was the target of an HTTP redirect, due to an incomplete fix for CVE-2006-3869. | [] | null | null | null | null |
|
CVE-2016-2942 | IBM UrbanCode Deploy could allow an authenticated attacker with special permissions to craft a script on the server in a way that will cause processes to run on a remote UCD agent machine. | [
"cpe:2.3:a:ibm:urbancode_deploy:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.0.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.0.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.0.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.0.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.0.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.0.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.0.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.0.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.0.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.0.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.0.1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.0.1.12:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.0.1.13:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.0.1.14:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.1.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.1.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.1.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.1.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.1.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.1.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.2.2.1:*:*:*:*:*:*:*"
] | null | null | 7.5 | 6 |
|
GHSA-2cmx-xmf3-qm89 | In Artifex MuPDF 1.14.0, there is an infinite loop in the function svg_dev_end_tile in fitz/svg-device.c, as demonstrated by mutool. | [] | null | null | 5.5 | null |
|
CVE-2023-5726 | A website could have obscured the full screen notification by using the file open dialog. This could have led to user confusion and possible spoofing attacks.
*Note: This issue only affected macOS operating systems. Other operating systems are unaffected.* This vulnerability affects Firefox < 119, Firefox ESR < 115.4, and Thunderbird < 115.4.1. | [
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*"
] | null | 4.3 | null | null |
|
GHSA-cmpf-fmf9-35pm | Potential vulnerabilities have been identified in HP Security Manager which may allow escalation of privilege, arbitrary code execution, and information disclosure. | [] | null | 8.8 | null | null |
|
GHSA-v4p4-65gh-94f7 | The Jira Importers Plugin in Atlassian Jira Server and Data Cente from version with 7.0.10 before 7.6.16, from 7.7.0 before 7.13.8, from 8.1.0 before 8.1.3, from 8.2.0 before 8.2.5, from 8.3.0 before 8.3.4 and from 8.4.0 before 8.4.1 allows remote attackers with Administrator permissions to gain remote code execution via a template injection vulnerability through the use of a crafted PUT request. | [] | null | 7.2 | null | null |
|
CVE-2024-9815 | Codezips Tourist Management System create-package.php unrestricted upload | A vulnerability has been found in Codezips Tourist Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /admin/create-package.php. The manipulation of the argument packageimage leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. | [
"cpe:2.3:a:codezips:tourist_management_system:*:*:*:*:*:*:*:*",
"cpe:2.3:a:codezips:tourist_management_system:1.0:*:*:*:*:*:*:*"
] | 5.1 | 4.7 | 4.7 | 5.8 |
GHSA-7jr7-q6f2-8m65 | Multiple cross-site scripting (XSS) vulnerabilities in (a) search.php, (b) search_cat.php, (c) search_price.php, and (d) product_details.php in the cosmicshop directory for CosmicShoppingCart allow remote attackers to inject arbitrary web script or HTML via multiple unspecified parameters, as demonstrated by the (1) query parameter in search.php and the (2) data parameter in search_cat.php. | [] | null | null | null | null |
|
GHSA-f3hv-249x-99cw | Symantec Endpoint Protection, prior to 14.2 RU1 & 12.1 RU6 MP10 and Symantec Endpoint Protection Small Business Edition, prior to 12.1 RU6 MP10c (12.1.7491.7002), may be susceptible to a privilege escalation vulnerability, which is a type of issue whereby an attacker may attempt to compromise the software application to gain elevated access to resources that are normally protected from an application or user. | [] | null | null | null | null |
|
CVE-2015-6859 | HPE Network Switches with software 15.16.x and 15.17.x allow local users to bypass intended access restrictions via unspecified vectors, a different vulnerability than CVE-2015-6860. | [
"cpe:2.3:o:hp:network_switch_software:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j8692a:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j8693a:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j8697a:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j8698a:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j8699a:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j8700a:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j8715a:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j8715b:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j8992a:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j9091a:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j9263a:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j9264a:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j9265a:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j9310a:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j9311a:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j9447a:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j9448a:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j9451a:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j9452a:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j9470a:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j9471a:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j9472a:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j9473a:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j9475a:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j9532a:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j9533a:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j9539a:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j9540a:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j9573a:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j9574a:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j9575a:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j9576a:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j9584a:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j9585a:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j9586a:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j9587a:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j9588a:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j9638a:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j9639a:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j9640a:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j9641a:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j9642a:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j9643a:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j9821a:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j9822a:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j9823a:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j9824a:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j9825a:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j9826a:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j9850a:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j9851a:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j9866a:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j9868a:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | 4.6 |
|
CVE-2015-5251 | OpenStack Image Service (Glance) before 2014.2.4 (juno) and 2015.1.x before 2015.1.2 (kilo) allow remote authenticated users to change the status of their images and bypass access restrictions via the HTTP x-image-meta-status header to images/*. | [
"cpe:2.3:a:openstack:image_registry_and_delivery_service_\\(glance\\):*:*:*:*:*:*:*:*",
"cpe:2.3:a:openstack:image_registry_and_delivery_service_\\(glance\\):2015.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:openstack:image_registry_and_delivery_service_\\(glance\\):2015.1.1:*:*:*:*:*:*:*"
] | null | null | null | 5.5 |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.