id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 38
232
⌀ |
---|---|---|---|---|---|---|---|---|
GHSA-97gc-j846-38jc
|
SolarWinds Web Help Desk 12.7.0 allows XSS via the Request Type parameter of a ticket.
|
[] | null | null | null | null | null |
|
CVE-2008-1352
|
Directory traversal vulnerability in search.php in EdiorCMS (ecms) 3.0 allows remote attackers to read arbitrary files via a .. (dot dot) in the _SearchTemplate parameter during a Title search.
|
[
"cpe:2.3:a:hangzhou_network_technology_development:ediorcms:3.0:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
ICSA-22-349-15
|
Siemens Teamcenter Visualization and JT2Go
|
The APDFL.dll contains a stack-based buffer overflow vulnerability that could be triggered while parsing specially crafted PDF files. This could allow an attacker to execute code in the context of the current process. The APDFL.dll contains an out of bounds write past the fixed-length heap-based buffer while parsing specially crafted PDF files. This could allow an attacker to execute code in the context of the current process. The APDFL.dll contains a memory corruption vulnerability while parsing specially crafted PDF files. This could allow an attacker to execute code in the context of the current process.
|
[] | null | 7.8 | null | null | null |
GHSA-f853-gwm3-3gj2
|
In JetBrains YouTrack before 2019.2.55152, removing tags from the issues list without the corresponding permission was possible.
|
[] | null | 5.3 | null | null | null |
|
CVE-2024-53810
|
WordPress Simple User Registration plugin <= 5.5 - Broken Access Control on User Deletion vulnerability
|
Missing Authorization vulnerability in Najeeb Ahmad Simple User Registration allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Simple User Registration: from n/a through 5.5.
|
[
"cpe:2.3:a:n-media:simple_user_registration:*:*:*:*:*:*:*:*"
] | null | 9.1 | null | null | null |
GHSA-cf94-c7h7-gf34
|
A downgrade issue was addressed with additional code-signing restrictions. This issue is fixed in macOS Sequoia 15.6. An app may be able to access protected user data.
|
[] | null | 5.5 | null | null | null |
|
CVE-2023-47775
|
WordPress wpDiscuz Plugin <= 7.6.11 is vulnerable to Cross Site Request Forgery (CSRF)
|
Cross-Site Request Forgery (CSRF) vulnerability in gVectors Team Comments — wpDiscuz plugin <= 7.6.11 versions.
|
[
"cpe:2.3:a:gvectors:wpdiscuz:*:*:*:*:*:wordpress:*:*"
] | null | 4.3 | null | null | null |
GHSA-746g-3gfp-hfhw
|
Devise Gem for Ruby Unauthorized Access Using "Remember Me" Cookie
|
Devise version before 3.5.4 uses cookies to implement a "Remember me" functionality. However, it generates the same cookie for all devices. If an attacker manages to steal a remember me cookie and the user does not change the password frequently, the cookie can be used to gain access to the application indefinitely.
|
[] | null | 7.5 | null | null | null |
CVE-2024-21158
|
Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: Portal). Supported versions that are affected are 8.59, 8.60 and 8.61. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. While the vulnerability is in PeopleSoft Enterprise PeopleTools, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise PeopleTools accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.1 Base Score 6.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N).
|
[
"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.59:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.60:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.61:*:*:*:*:*:*:*"
] | null | 6.4 | null | null | null |
|
CVE-2021-33443
|
An issue was discovered in mjs (mJS: Restricted JavaScript engine), ES6 (JavaScript version 6). There is stack buffer overflow in mjs_execute() in mjs.c.
|
[
"cpe:2.3:a:cesanta:mjs:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
|
GHSA-28mj-h58q-vmmm
|
The Insights from Google PageSpeed WordPress plugin before 4.0.7 does not verify for CSRF before doing various actions such as deleting Custom URLs, which could allow attackers to make a logged in admin perform such actions via CSRF attacks
|
[] | null | 8.8 | null | null | null |
|
CVE-2007-6044
|
Multiple unspecified vulnerabilities in IBM WebSphere MQ 6.0 have unknown impact and remote attack vectors involving "memory corruption." NOTE: as of 20071116, the only disclosure is a vague pre-advisory with no actionable information. However, since it is from a well-known researcher, it is being assigned a CVE identifier for tracking purposes.
|
[
"cpe:2.3:a:ibm:websphere_mq:6.0:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
CVE-2019-1000005
|
mPDF version 7.1.7 and earlier contains a CWE-502: Deserialization of Untrusted Data vulnerability in getImage() method of Image/ImageProcessor class that can result in Arbitry code execution, file write, etc.. This attack appears to be exploitable via attacker must host crafted image on victim server and trigger generation of pdf file with content <img src="phar://path/to/crafted/image">. This vulnerability appears to have been fixed in 7.1.8.
|
[
"cpe:2.3:a:mpdf_project:mpdf:*:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.8 | null |
|
GHSA-3fgq-wvwm-xq86
|
xrdp 0.9.1 calls the PAM function auth_start_session() in an incorrect location, leading to PAM session modules not being properly initialized, with a potential consequence of incorrect configurations or elevation of privileges, aka a pam_limits.so bypass.
|
[] | null | 7.3 | null | null | null |
|
GHSA-8xcw-x64j-h58v
|
The Flynax Bridge plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 2.2.0. This is due to the plugin not properly validating a user's identity prior to updating their details like email. This makes it possible for unauthenticated attackers to change arbitrary user's email addresses, including administrators, and leverage that to reset the user's password and gain access to their account.
|
[] | null | 9.8 | null | null | null |
|
CVE-2021-21047
|
Adobe Photoshop Out-Of-Bounds Write Vulnerability Could Lead To Remote Code Execution
|
Adobe Photoshop versions 21.2.4 (and earlier) and 22.1.1 (and earlier) are affected by an Out-of-bounds Write vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[
"cpe:2.3:a:adobe:photoshop:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | null | 7.8 | null | null |
GHSA-3pwh-chfw-xjh7
|
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.2.20. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).
|
[] | null | null | 8.6 | null | null |
|
GHSA-gqvc-8jxg-v7qf
|
PHP remote file inclusion vulnerability in template.class.php in Carbonize Lazarus Guestbook before 1.7.3 allows remote attackers to execute arbitrary PHP code via a URL in the include_path parameter to admin.php, probably due to a dynamic variable evaluation vulnerability.
|
[] | null | null | null | null | null |
|
GHSA-86j7-6frw-pfwj
|
A SQL Injection vulnerability in Nozomi Networks Guardian and CMC, due to improper input validation in certain fields used in the Asset Intelligence functionality of our IDS, may allow an unauthenticated attacker to execute arbitrary SQL statements on the DBMS used by the web application by sending specially crafted malicious network packets.Malicious users with extensive knowledge on the underlying system may be able to extract arbitrary information from the DBMS in an uncontrolled way, or to alter its structure and data.
|
[] | 9.2 | 8.1 | null | null | null |
|
GHSA-v2vm-8pr4-wgpw
|
IBM Cloud Pak for Business Automation 18.0.0, 18.0.1, 18.0.2, 19.0.1, 19.0.2, 19.0.3, 20.0.1, 20.0.2, 20.0.3, 21.0.1, 21.0.2, 21.0.3, 22.0.1, and 22.0.2 may reveal sensitive information contained in application configuration to developer and administrator users. IBM X-Force ID: 264805.
|
[] | null | 4.9 | null | null | null |
|
CVE-2008-5890
|
SQL injection vulnerability in feeds.php in Injader before 2.1.2 allows remote attackers to execute arbitrary SQL commands via the id parameter.
|
[
"cpe:2.3:a:injader:injader:*:*:*:*:*:*:*:*",
"cpe:2.3:a:injader:injader:1.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:injader:injader:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:injader:injader:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:injader:injader:2.1.0:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2024-23837
|
LibHTP unbounded folded header handling leads to denial service
|
LibHTP is a security-aware parser for the HTTP protocol. Crafted traffic can cause excessive processing time of HTTP headers, leading to denial of service. This issue is addressed in 0.5.46.
|
[
"cpe:2.3:a:oisf:libhtp:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
CVE-2017-18721
|
Certain NETGEAR devices are affected by a stack-based buffer overflow by an unauthenticated attacker. This affects D6200 before 1.1.00.24, R6700v2 before 1.1.0.42, R6800 before 1.1.0.42, and R6900v2 before 1.1.0.42.
|
[
"cpe:2.3:o:netgear:d6200_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:d6200:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6700_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6700:v2:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6800_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6800:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6900_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6900:v2:*:*:*:*:*:*:*"
] | null | null | 8.8 | null | null |
|
CVE-2024-21789
|
BIG-IP ASM and Advanced WAF vulnerability
|
When a BIG-IP ASM/Advanced WAF security policy is configured on a virtual server, undisclosed requests can cause an increase in memory resource utilization.
Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated
|
[
"cpe:2.3:a:f5:big-ip:-:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
CVE-2014-5075
|
The Ignite Realtime Smack XMPP API 4.x before 4.0.2, and 3.x and 2.x when a custom SSLContext is used, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
|
[
"cpe:2.3:a:redhat:jboss_fuse:*:*:*:*:*:*:*:*",
"cpe:2.3:a:igniterealtime:smack_api:*:*:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
CVE-2022-1130
|
Insufficient validation of trust input in WebOTP in Google Chrome on Android prior to 100.0.4896.60 allowed a remote attacker to send arbitrary intents from any app via a malicious app.
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] | null | 8.1 | null | null | null |
|
GHSA-xggx-9p6w-334x
|
Rejected reason: Not used
|
[] | null | null | null | null | null |
|
GHSA-x645-349v-xwm6
|
An issue has been discovered in GitLab EE affecting all versions starting from 16.5 before 16.7.6, all versions starting from 16.8 before 16.8.3, all versions starting from 16.9 before 16.9.1. When a user is assigned a custom role with admin_group_member permission, they may be able to make a group, other members or themselves Owners of that group, which may lead to privilege escalation.
|
[] | null | 6.7 | null | null | null |
|
GHSA-qmfq-w4vr-f499
|
Improper check of unusual conditions when launching msiexec.exe in safensec.com (SysWatch service) in SAFE'N'SEC SoftControl/SafenSoft SysWatch, SoftControl/SafenSoft TPSecure, and SoftControl/SafenSoft Enterprise Suite before 4.4.9 allows the local attacker to bypass a code-signing protection mechanism and install/execute an unauthorized program by modifying the system configuration and installing a forged MSI file. (The intended behavior is that the component SysWatch does not allow installation of MSI files unless they are signed by a limited list of certificates.)
|
[] | null | null | 7.8 | null | null |
|
CVE-2024-32132
|
WordPress CBX Bookmark & Favorite plugin <= 1.7.20 - SQL Injection vulnerability
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Codeboxr Team CBX Bookmark & Favorite.This issue affects CBX Bookmark & Favorite: from n/a through 1.7.20.
|
[] | null | 7.6 | null | null | null |
GHSA-gpxh-j79m-whcj
|
Unrestricted Upload of File with Dangerous Type vulnerability in STAGGS STAGGS allows Upload a Web Shell to a Web Server. This issue affects STAGGS: from n/a through 2.11.0.
|
[] | null | 10 | null | null | null |
|
GHSA-f6fw-jqcv-qfw7
|
masqmail 0.2.21 through 0.2.30 improperly calls seteuid() in src/log.c and src/masqmail.c that results in improper privilege dropping.
|
[] | null | null | null | null | null |
|
GHSA-pj2j-cmxg-76xc
|
The Meeting Server in IBM Sametime 8.x through 8.5.2.1 and 9.x through 9.0.0.1 does not send the HSTS Strict-Transport-Security header, which makes it easier for man-in-the-middle attackers to hijack sessions or obtain sensitive information by leveraging the presence of HTTP requests.
|
[] | null | null | null | null | null |
|
CVE-2018-8142
|
A security feature bypass exists when Windows incorrectly validates kernel driver signatures, aka "Windows Security Feature Bypass Vulnerability." This affects Windows Server 2016, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-1035.
|
[
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1709:*:*:*:*:*:*:*"
] | null | null | 5.3 | 4.6 | null |
|
GHSA-vg5x-5wm4-7r4x
|
In isFullScreen of FillUi.java, there is a possible way to view another user's images due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
|
[] | null | 3.3 | null | null | null |
|
CVE-2023-46979
|
TOTOLINK X6000R V9.4.0cu.852_B20230719 was discovered to contain a command injection vulnerability via the enable parameter in the setLedCfg function.
|
[
"cpe:2.3:o:totolink:x6000r_firmware:9.4.0cu.852_b20230719:*:*:*:*:*:*:*",
"cpe:2.3:h:totolink:x6000r:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
|
CVE-2023-33733
|
Reportlab up to v3.6.12 allows attackers to execute arbitrary code via supplying a crafted PDF file.
|
[
"cpe:2.3:a:reportlab:reportlab:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
|
CVE-2023-28195
|
A privacy issue was addressed with improved private data redaction for log entries. This issue is fixed in macOS Ventura 13.3. An app may be able to read sensitive location information.
|
[
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*"
] | null | 3.3 | null | null | null |
|
GHSA-pp24-hg2j-66jm
|
Buffer Overflow vulnerability in _nc_find_entry function in tinfo/comp_hash.c:66 in ncurses 6.1 allows remote attackers to cause a denial of service via crafted command.
|
[] | null | 6.5 | null | null | null |
|
RHSA-2019:1479
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: lack of check for mmap minimum address in expand_downwards in mm/mmap.c leads to NULL pointer dereferences exploit on non-SMAP platforms Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service
|
[
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | null | 5.3 | null | null |
CVE-2023-40289
|
A command injection issue was discovered on Supermicro X11SSM-F, X11SAE-F, and X11SSE-F 1.66 devices. An attacker can exploit this to elevate privileges from a user with BMC administrative privileges.
|
[
"cpe:2.3:h:supermicro:x11ssm-f:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x11sae-f:-:*:*:*:*:*:*:*",
"cpe:2.3:h:supermicro:x11sse-f:-:*:*:*:*:*:*:*"
] | null | 7.2 | null | null | null |
|
CVE-2024-13169
|
An out-of-bounds read in Ivanti EPM before the 2024 January-2025 Security Update and 2022 SU6 January-2025 Security Update allows a local authenticated attacker to escalate their privileges.
|
[] | null | 7.8 | null | null | null |
|
CVE-2017-6612
|
A vulnerability in the gateway GPRS support node (GGSN) of Cisco ASR 5000 Series Aggregation Services Routers 17.3.9.62033 through 21.1.2 could allow an unauthenticated, remote attacker to redirect HTTP traffic sent to an affected device. More Information: CSCvc67927.
|
[
"cpe:2.3:a:cisco:asr_5000_series_software:17.3.9.62033:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:17.7.5:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:19.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:20.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:20.2.12:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:21.1.2:*:*:*:*:*:*:*"
] | null | null | 8.6 | 5 | null |
|
CVE-2021-4382
|
The Recently plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the fetch_external_image() function in versions up to, and including, 3.0.4. This makes it possible for authenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
|
[
"cpe:2.3:a:recently_project:recently:*:*:*:*:*:wordpress:*:*"
] | null | 8.8 | null | null | null |
|
CVE-2023-32763
|
An issue was discovered in Qt before 5.15.15, 6.x before 6.2.9, and 6.3.x through 6.5.x before 6.5.1. When a SVG file with an image inside it is rendered, a QTextLayout buffer overflow can be triggered.
|
[
"cpe:2.3:a:qt:qt:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
|
CVE-2010-0286
|
Unspecified vulnerability in the OpenID Identity Authentication extension in TYPO3 4.3.0 allows remote attackers to bypass authentication and gain access to a backend user account via unknown attack vectors in which both the attacker and victim have an OpenID provider that discards identities during authentication.
|
[
"cpe:2.3:a:typo3:typo3:4.3.0:*:*:*:*:*:*:*"
] | null | null | null | 5.1 | null |
|
GHSA-j6h8-65gx-v495
|
This High severity Information Disclosure vulnerability was introduced in versions 9.4.0, 9.12.0, and 9.15.0 of Jira Core Data Center.
|
[] | null | null | 7.4 | null | null |
|
CVE-2020-11590
|
An issue was discovered in CIPPlanner CIPAce 9.1 Build 2019092801. An unauthenticated attacker can make an HTTP GET request to HealthPage.aspx and obtain the internal server name.
|
[
"cpe:2.3:a:cipplanner:cipace:*:*:*:*:*:*:*:*"
] | null | 5.3 | null | 5 | null |
|
GHSA-86r4-gcfx-wv72
|
An issue has been discovered in hunter2 affecting all versions before 2.1.0. Improper handling of auto-completion input allows an authenticated attacker to extract other users email addresses
|
[] | null | 6.5 | null | null | null |
|
CVE-2017-6339
|
Trend Micro InterScan Web Security Virtual Appliance (IWSVA) 6.5 before CP 1746 mismanages certain key and certificate data. Per IWSVA documentation, by default, IWSVA acts as a private Certificate Authority (CA) and dynamically generates digital certificates that are sent to client browsers to complete a secure passage for HTTPS connections. It also allows administrators to upload their own certificates signed by a root CA. An attacker with low privileges can download the current CA certificate and Private Key (either the default ones or ones uploaded by administrators) and use those to decrypt HTTPS traffic, thus compromising confidentiality. Also, the default Private Key on this appliance is encrypted with a very weak passphrase. If an appliance uses the default Certificate and Private Key provided by Trend Micro, an attacker can simply download these and decrypt the Private Key using the default/weak passphrase.
|
[
"cpe:2.3:a:trendmicro:interscan_web_security_virtual_appliance:*:*:*:*:*:*:*:*"
] | null | null | 6.5 | 4 | null |
|
CVE-2021-37593
|
PEEL Shopping version 9.4.0 allows remote SQL injection. A public user/guest (unauthenticated) can inject a malicious SQL query in order to affect the execution of predefined SQL commands. Upon a successful SQL injection attack, an attacker can read sensitive data from the database and possibly modify database data.
|
[
"cpe:2.3:a:peel:peel_shopping:9.4.0:*:*:*:*:*:*:*"
] | null | 9.1 | null | 6.4 | null |
|
GHSA-529p-jj47-w3m3
|
Decidim cross-site scripting (XSS) in the admin panel
|
ImpactThe admin panel is subject to potential XSS attach in case the attacker manages to modify some records being uploaded to the server.The attacker is able to change e.g. to `<svg onload=alert('XSS')>` if they know how to craft these requests themselves. And then enter the returned blob ID to the form inputs manually by modifying the edit page source.PatchesAvailable in versions 0.27.6 and 0.28.1.WorkaroundsReview the user accounts that have access to the admin panel (i.e. general Administrators, and participatory space's Administrators) and remove access to them if they don't need it.ReferencesOWASP ASVS v4.0.3-5.1.3
|
[] | 6.8 | 5.4 | null | null | null |
GHSA-22hw-3cx7-9m9g
|
The kernel in ENEA OSE on the Emerson Process Management ROC800 RTU with software 3.50 and earlier, DL8000 RTU with software 2.30 and earlier, and ROC800L RTU with software 1.20 and earlier allows remote attackers to execute arbitrary code by connecting to the debug service.
|
[] | null | null | null | null | null |
|
ICSA-16-287-03
|
Siemens SIMATIC STEP 7 (TIA Portal) Information Disclosure Vulnerabilities
|
Siemens SIMATIC STEP 7 (TIA Portal) before 14 uses an improper format for managing TIA project files during version updates, which makes it easier for local users to obtain sensitive configuration information via unspecified vectors. Siemens SIMATIC STEP 7 (TIA Portal) before 14 improperly stores pre-shared key data in TIA project files, which makes it easier for local users to obtain sensitive information by leveraging access to a file and conducting a brute-force attack.
|
[] | null | null | 2.5 | null | null |
GHSA-m892-xwwm-ghj3
|
NetApp OnCommand System Manager 8.3.x before 8.3.2 allows remote authenticated users to execute arbitrary code via unspecified vectors.
|
[] | null | null | 8.8 | null | null |
|
GHSA-vh52-rw4g-55j6
|
Bluetooth HCI Adaptor from Realtek has a Link Following vulnerability. Local attackers with regular privileges can create a symbolic link with the same name as a specific file, causing the product to delete arbitrary files pointed to by the link. Subsequently, attackers can leverage arbitrary file deletion to privilege escalation.
|
[] | 8.5 | 7.8 | null | null | null |
|
CVE-2024-23521
|
WordPress Happyforms plugin <= 1.25.10 - Broken Access Control vulnerability
|
Missing Authorization vulnerability in Happyforms.This issue affects Happyforms: from n/a through 1.25.10.
|
[
"cpe:2.3:a:happyforms:happyforms:*:*:*:*:*:wordpress:*:*"
] | null | 5.3 | null | null | null |
CVE-2024-20701
|
SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability
|
SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability
|
[
"cpe:2.3:a:microsoft:sql_server_2016:13.0.6441.1:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sql_server_2016:13.0.7037.1:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sql_server_2017:14.0.2056.2:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sql_server_2017:14.0.3471.2:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sql_server_2019:15.0.2116.2:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sql_server_2019:15.0.4382.1:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sql_server_2022:16.0.1121.4:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sql_server_2022:16.0.4131.2:*:*:*:*:*:*:*"
] | null | 8.8 | null | null | null |
RHSA-2021:1702
|
Red Hat Security Advisory: brotli security update
|
brotli: buffer overflow when input chunk is larger than 2GiB
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 6.5 | null | null | null |
GHSA-mrhf-fc63-5c55
|
The configuration utility in MatrikonOPC Security Gateway 1.0 allows remote attackers to cause a denial of service (unhandled exception and application crash) via a TCP RST packet.
|
[] | null | null | null | null | null |
|
CVE-2009-3491
|
SQL injection vulnerability in the Kinfusion SportFusion (com_sportfusion) component 0.2.2 through 0.2.3 for Joomla! allows remote attackers to execute arbitrary SQL commands via the cid[0] parameter in a teamdetail action to index.php.
|
[
"cpe:2.3:a:joomla:joomla\\!:*:*:*:*:*:*:*:*",
"cpe:2.3:a:kinfusion:com_sportfusion:0.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:kinfusion:com_sportfusion:0.2.3:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-g7p3-8636-5h4v
|
In _PMRLogicalOffsetToPhysicalOffset of the PowerVR kernel driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android SoCAndroid ID: A-246824784
|
[] | null | 7.8 | null | null | null |
|
CVE-2024-32617
|
HDF5 Library through 1.14.3 contains a heap-based buffer over-read caused by the unsafe use of strdup in H5MM_xstrdup in H5MM.c (called from H5G__ent_to_link in H5Glink.c).
|
[
"cpe:2.3:a:hdfgroup:hdf5:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | null | null |
|
CVE-2025-7928
|
code-projects Church Donation System edit_user.php sql injection
|
A vulnerability was found in code-projects Church Donation System 1.0 and classified as critical. This issue affects some unknown processing of the file /members/edit_user.php. The manipulation of the argument firstname leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.
|
[] | 6.9 | 7.3 | 7.3 | 7.5 | null |
CVE-2025-4327
|
MRCMS cross-site request forgery
|
A vulnerability was found in MRCMS 3.1.2. It has been classified as problematic. Affected is an unknown function. The manipulation leads to cross-site request forgery. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Multiple endpoints might be affected.
|
[] | 5.3 | 4.3 | 4.3 | 5 | null |
ICSA-20-042-09
|
Siemens OZW Web Server
|
Vulnerable versions of OZW Web Server use predictable path names for project files that legitimately authenticated users have created by using the application's export function. By accessing a specific uniform resource locator on the web server, a remote attacker could be able to download a project file without prior authentication. The security vulnerability could be exploited by an unauthenticated attacker with network access to the affected system. No user interaction is required to exploit this security vulnerability. Successful exploitation of the security vulnerability compromises the confidentiality of the targeted system.
|
[] | null | 5.3 | null | null | null |
CVE-2020-14763
|
Vulnerability in the Oracle Application Express Quick Poll component of Oracle Database Server. The supported version that is affected is Prior to 20.2. Easily exploitable vulnerability allows low privileged attacker having Valid User Account privilege with network access via HTTP to compromise Oracle Application Express Quick Poll. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Application Express Quick Poll, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Application Express Quick Poll accessible data as well as unauthorized read access to a subset of Oracle Application Express Quick Poll accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N).
|
[
"cpe:2.3:a:oracle:application_express:*:*:*:*:*:*:*:*"
] | null | 5.4 | null | null | null |
|
GHSA-vhwm-93rm-63jm
|
A vulnerability has been found in code-projects Simple Admin Panel 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file updateOrderStatus.php. The manipulation of the argument record leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
|
[] | 5.3 | 6.3 | null | null | null |
|
CVE-2018-17156
|
In FreeBSD before 11.2-STABLE(r340268) and 11.2-RELEASE-p5, due to incorrectly accounting for padding on 64-bit platforms, a buffer underwrite could occur when constructing an ICMP reply packet when using a non-standard value for the net.inet.icmp.quotelen sysctl.
|
[
"cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:11.2:p5:*:*:*:*:*:*"
] | null | null | 5.9 | 4.3 | null |
|
GHSA-p5w9-79w8-xpr3
|
Adobe Experience Manager versions 6.5.22 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
|
[] | null | 5.4 | null | null | null |
|
GHSA-74gf-43jg-q6vr
|
The OneClickSigninHelper::ShowInfoBarIfPossible function in browser/ui/sync/one_click_signin_helper.cc in Google Chrome before 31.0.1650.63 uses an incorrect URL during realm validation, which allows remote attackers to conduct session fixation attacks and hijack web sessions by triggering improper sync after a 302 (aka Found) HTTP status code.
|
[] | null | null | null | null | null |
|
CVE-2015-1451
|
Multiple cross-site scripting (XSS) vulnerabilities in Fortinet FortiOS 5.0 Patch 7 build 4457 allow remote authenticated users to inject arbitrary web script or HTML via the (1) WTP Name or (2) WTP Active Software Version field in a CAPWAP Join request.
|
[
"cpe:2.3:o:fortinet:fortios:5.0.7:*:*:*:*:*:*:*"
] | null | null | null | 3.5 | null |
|
GHSA-pq7m-3gw7-gq5x
|
Execution with Unnecessary Privileges in ipython
|
We’d like to disclose an arbitrary code execution vulnerability in IPython that stems from IPython executing untrusted files in CWD. This vulnerability allows one user to run code as another.Proof of conceptUser1:User2:User2 will see:Patched release and documentationSee https://ipython.readthedocs.io/en/stable/whatsnew/version8.html#ipython-8-0-1-cve-2022-21699,Version 8.0.1, 7.31.1 for current Python version are recommended.
Version 7.16.3 has also been published for Python 3.6 users,
Version 5.11 (source only, 5.x branch on github) for older Python versions.
|
[] | 8.5 | 8.2 | null | null | null |
GHSA-rhqp-4h92-3mxh
|
Cross-site scripting (XSS) vulnerability in Horde Dynamic IMP (DIMP) before 1.1.5, and Horde Groupware Webmail Edition before 1.2.7, allows remote attackers to inject arbitrary web script or HTML via vectors related to displaying mailbox names.
|
[] | null | null | null | null | null |
|
CVE-2024-13394
|
ViewMedica 9 <= 1.4.15 - Authenticated (Contributor+) Stored Cross-Site Scripting
|
The ViewMedica 9 plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'viewmedica' shortcode in all versions up to, and including, 1.4.15 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] | null | 6.4 | null | null | null |
GHSA-gq9v-6frh-4qfx
|
A buffer copy without checking size of input vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated administrators to execute code via a network.We have already fixed the vulnerability in the following versions:
QTS 5.1.3.2578 build 20231110 and later
QuTS hero h5.1.3.2578 build 20231110 and later
QuTScloud c5.1.5.2651 and later
|
[] | null | 3.8 | null | null | null |
|
GHSA-fwr2-2xv7-44g4
|
Adobe Digital Editions versions 4.5.4 and earlier have an exploitable memory corruption vulnerability in the PDF processing engine. Successful exploitation could lead to arbitrary code execution.
|
[] | null | null | 9.8 | null | null |
|
CVE-2014-7824
|
D-Bus 1.3.0 through 1.6.x before 1.6.26, 1.8.x before 1.8.10, and 1.9.x before 1.9.2 allows local users to cause a denial of service (prevention of new connections and connection drop) by queuing the maximum number of file descriptors. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-3636.1.
|
[
"cpe:2.3:a:freedesktop:dbus:1.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:freedesktop:dbus:1.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:freedesktop:dbus:1.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:freedesktop:dbus:1.6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:freedesktop:dbus:1.6.8:*:*:*:*:*:*:*",
"cpe:2.3:a:freedesktop:dbus:1.6.10:*:*:*:*:*:*:*",
"cpe:2.3:a:freedesktop:dbus:1.6.12:*:*:*:*:*:*:*",
"cpe:2.3:a:freedesktop:dbus:1.6.14:*:*:*:*:*:*:*",
"cpe:2.3:a:freedesktop:dbus:1.6.16:*:*:*:*:*:*:*",
"cpe:2.3:a:freedesktop:dbus:1.6.18:*:*:*:*:*:*:*",
"cpe:2.3:a:freedesktop:dbus:1.6.20:*:*:*:*:*:*:*",
"cpe:2.3:a:freedesktop:dbus:1.6.22:*:*:*:*:*:*:*",
"cpe:2.3:a:freedesktop:dbus:1.6.24:*:*:*:*:*:*:*",
"cpe:2.3:a:freedesktop:dbus:1.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:freedesktop:dbus:1.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:freedesktop:dbus:1.8.4:*:*:*:*:*:*:*",
"cpe:2.3:a:freedesktop:dbus:1.8.6:*:*:*:*:*:*:*",
"cpe:2.3:a:freedesktop:dbus:1.8.8:*:*:*:*:*:*:*",
"cpe:2.3:a:freedesktop:dbus:1.9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:mageia_project:mageia:3:*:*:*:*:*:*:*",
"cpe:2.3:o:mageia_project:mageia:4:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*"
] | null | null | null | 2.1 | null |
|
CVE-2022-36319
|
When combining CSS properties for overflow and transform, the mouse cursor could interact with different coordinates than displayed. This vulnerability affects Firefox ESR < 102.1, Firefox ESR < 91.12, Firefox < 103, Thunderbird < 102.1, and Thunderbird < 91.12.
|
[
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
|
GHSA-99pg-5rf4-r9x9
|
When the LDAP connector is started with StartTLS configured, unauthenticated access is granted. This issue affects: all versions of the LDAP connector prior to 1.5.20.9. The LDAP connector is bundled with Identity Management (IDM) and Remote Connector Server (RCS)
|
[] | null | 9.8 | null | null | null |
|
GHSA-gj3r-w588-cxh9
|
Unspecified vulnerability in the IBM Web Interface for Content Management (aka WEBi) 1.0.4 before FP3 has unknown impact and attack vectors.
|
[] | null | null | null | null | null |
|
CVE-2020-8707
|
Buffer overflow in daemon for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.
|
[
"cpe:2.3:o:intel:server_board_s2600wt_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_board_s2600wt2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_board_s2600wt2r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_board_s2600wtt:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_board_s2600wttr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:server_system_r1000wt_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_r1208wt2gs:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_r1208wt2gsr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_r1208wttgs:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_r1208wttgsbpp:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_r1208wttgsr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_r1304wt2gs:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_r1304wt2gsr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_r1304wttgs:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_r1304wttgsr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:server_system_r2000wt_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_r2208wt2ys:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_r2208wt2ysr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_r2208wttyc1:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_r2208wttyc1r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_r2208wttys:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_r2208wttysr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_r2224wttys:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_r2224wttysr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_r2308wttys:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_r2308wttysr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_r2312wttys:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_r2312wttysr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:server_board_s2600cw:*:*:*:*:*:*:*:*",
"cpe:2.3:a:intel:server_board_s2600cw2:-:*:*:*:*:*:*:*",
"cpe:2.3:a:intel:server_board_s2600cw2r:-:*:*:*:*:*:*:*",
"cpe:2.3:a:intel:server_board_s2600cw2s:-:*:*:*:*:*:*:*",
"cpe:2.3:a:intel:server_board_s2600cw2sr:-:*:*:*:*:*:*:*",
"cpe:2.3:a:intel:server_board_s2600cwt:-:*:*:*:*:*:*:*",
"cpe:2.3:a:intel:server_board_s2600cwtr:-:*:*:*:*:*:*:*",
"cpe:2.3:a:intel:server_board_s2600cwts:-:*:*:*:*:*:*:*",
"cpe:2.3:a:intel:server_board_s2600cwtsr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:compute_module_hns2600kp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:compute_module_hns2600kp:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:compute_module_hns2600kpf:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:compute_module_hns2600kpfr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:compute_module_hns2600kpr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:server_board_s2600kp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_board_s2600kp:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_board_s2600kpf:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_board_s2600kpfr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_board_s2600kpr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_board_s2600kptr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:compute_module_hns2600tp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:compute_module_hns2600tp:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:compute_module_hns2600tp24r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:compute_module_hns2600tp24sr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:compute_module_hns2600tpf:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:compute_module_hns2600tpfr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:compute_module_hns2600tpr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:compute_module_s2600tp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_board_s2600tp:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_board_s2600tpf:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_board_s2600tpfr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_board_s2600tpr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:server_board_s1200sp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_board_s1200spl:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_board_s1200splr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_board_s1200spo:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_board_s1200spor:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_board_s1200sps:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_board_s1200spsr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:server_system_lr1304sp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_lr1304spcfg1:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_lr1304spcfg1r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_lr1304spcfsgx1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:server_system_lsvrp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_lsvrp4304es6xx1:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_lsvrp4304es6xxr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:server_system_r1000sp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_r1208sposhor:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_r1208sposhorr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_r1304sposhbn:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_r1304sposhbnr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_r1304sposhor:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_r1304sposhorr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:server_board_s2600wf_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_board_s2600wf0:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_board_s2600wf0r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_board_s2600wfq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_board_s2600wfqr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_board_s2600wft:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_board_s2600wftr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:server_system_r1000wf_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_lnetcnt3y:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_mcb2208wfaf4:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_mcb2208wfaf5:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_mcb2208wfaf6:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_mcb2208wfhy2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_nb2208wfqnfvi:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_r1208wfqysr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_r1208wftys:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_r1208wftysr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_r1304wf0ys:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_r1304wf0ysr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_r1304wftys:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_r1304wftysr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:server_system_r2000wf_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_r2208wf0zs:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_r2208wf0zsr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_r2208wfqzs:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_r2208wfqzsr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_r2208wftzs:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_r2208wftzsr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_r2224wfqzs:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_r2224wftzs:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_r2224wftzsr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_r2308wftzs:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_r2308wftzsr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_r2312wf0np:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_r2312wf0npr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_r2312wfqzs:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_r2312wftzs:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_r2312wftzsr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_vrn2208waf6:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_vrn2208wfaf81:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_vrn2208wfaf82:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_vrn2208wfaf83:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_vrn2208wfhy6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:server_board_s2600st_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_board_s2600stb:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_board_s2600stbr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_board_s2600stq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_board_s2600stqr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:compute_module_hns2600bp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:compute_module_hns2600bpb:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:compute_module_hns2600bpb24:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:compute_module_hns2600bpb24r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:compute_module_hns2600bpblc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:compute_module_hns2600bpblc24:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:compute_module_hns2600bpblc24r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:compute_module_hns2600bpblcr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:compute_module_hns2600bpbr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:compute_module_hns2600bpq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:compute_module_hns2600bpq24:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:compute_module_hns2600bpq24r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:compute_module_hns2600bpqr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:compute_module_hns2600bps:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:compute_module_hns2600bps24:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:compute_module_hns2600bps24r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:compute_module_hns2600bpsr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:server_board_s2600bp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_board_s2600bpb:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_board_s2600bpbr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_board_s2600bpq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_board_s2600bpqr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_board_s2600bps:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_board_s2600bpsr:-:*:*:*:*:*:*:*"
] | null | 8.8 | null | 5.8 | null |
|
GHSA-m4f3-xvj4-9r9f
|
An access control issue in Makves DCAP v3.0.0.122 allows unauthenticated attackers to obtain cleartext credentials via a crafted web request to the product API.
|
[] | null | 7.5 | null | null | null |
|
GHSA-m8rp-vv92-46c7
|
gix-path improperly resolves configuration path reported by Git
|
Summary`gix-path` runs `git` to find the path of a configuration file associated with the `git` installation, but improperly resolves paths containing unusual or non-ASCII characters, in rare cases enabling a local attacker to inject configuration leading to code execution.DetailsIn `gix_path::env`, the underlying implementation of the `installation_config` and `installation_config_prefix` functions calls `git config -l --show-origin` to find the path of a file to treat as belonging to the `git` installation.Affected versions of `gix-path` do not pass `-z`/`--null` to cause `git` to report literal paths ([`650a1b5`](https://github.com/Byron/gitoxide/commit/650a1b5cf25e086197cc55a68525a411e1c28031)). Instead, to cover the occasional case that `git` outputs a quoted path, they attempt to parse the path by stripping the quotation marks:https://github.com/Byron/gitoxide/blob/1cfe577d461293879e91538dbc4bbfe01722e1e8/gix-path/src/env/git/mod.rs#L138-L142The problem is that, when a path is quoted, it may change in substantial ways beyond the concatenation of quotation marks. If not reversed, these changes can result in another valid path that is not equivalent to the original.This is not limited to paths with unusual characters such as quotation marks or newlines. Unless `git` is explicitly configured with `core.quotePath` set to `false`, it also happens when the path contains most non-ASCII characters, including accented or non-English letters. For example, `é` is transformed to `\303\251`, with literal backslashes. (This is an octal representation of the bytes in its UTF-8 encoding. This behavior is not limited to systems that encode paths with UTF-8 on disk.)Rarely, the configuration file `gix-path` wrongly attempts to open can be created by an attacker who has a limited user account on the system. The attacker would often need to request an account username tailored to carrying out the attack.PoCQuick demonstration on UnixOn a Unix-like system in which Git supports no higher scope than `system` for configuration variables (i.e., not on macOS with Apple Git), in a locale that supports UTF-8, with `gitoxide` installed, run:If the above conditions are satisfied and the `gix` command was built against an affected version of `gix-path`, then the last command's output looks something like this:Demonstration across user accounts on WindowsOn a test system running Windows on which Git for Windows is *not* installed system-wide—resembling a scenario in which users who wish to use Git are expected to install it themselves for their accounts—create two accounts, with these usernames:*Renée*, the target of the attack. This user may be a limited user or an administrator. Its user profile directory is assumed to be `C:\Users\Renée`.*Ren*, the user who carries out the attack. This user should be a limited user, since an administrator would not need to exploit this vulnerability to inject configuration. Its user profile directory is assumed to be `C:\Users\Ren`.As *Ren*, run these commands in PowerShell:(The `gitconfig` file can instead be written manually, in which case *Ren* need not have `git`.)As *Renée*:Install Git for Windows in the default location for non-systemwide installations, which for that user account is inside `C:\Users\Renée\AppData\Local\Programs`. For a non-administrative installation, Git for Windows will pick this location automatically. Allow the installer to place the directory containing `git` in the user's `PATH`, as it does by default.(The scenario can be modified for any location the attacker can predict. So, for example, *Renée* can install Git for Windows with [`scoop`](https://scoop.sh/), and *Ren* could carry out the attack with correspondingly modified path components in place of `AppData\Local\Programs\Git`.)Install `gitoxide` using any common technique, such as by [installing Rust](https://www.rust-lang.org/tools/install) and then running `cargo install gitoxide`.Open a PowerShell window and run a `gix` command that attempts to run the SSH client for transport. For example:At least one, and usually two, instances of the Windows calculator will pop up. This happens because `calc.exe` was configured in the fake configuration file the user *Ren* was able to cause to be used, by placing it at the location `gix-path` wrongly resolved the path of *Renée*'s own configuration file to.The `gitconfig` file written by the attacker can be adjusted with an arbitrary choice of payload, or to set other configuration variables.ImpactOn a single-user system, it is not possible to exploit this, unless `GIT_CONFIG_SYSTEM` and `GIT_CONFIG_GLOBAL` have been set to unusual values or Git has been installed in an unusual way. Such a scenario is not expected.Exploitation is unlikely even on a multi-user system, though it is plausible in some uncommon configurations or use cases. It is especially unlikely with Apple Git on macOS, due to its very high scoped configuration in `/Library` or `/Applications` that would be detected instead, as in CVE-2024-45305.The likelihood of exploitation may be higher on Windows, where attacks such as those shown in the Windows proof-of-concept above can be performed due to the status of `\` as a directory separator, and where there is no restriction on usernames containing accented or non-English letters (though the latter is also permitted on some other systems). Even then, complex user interaction is required. In most cases, a system administrator would have to approve an innocuous-seeming username, and then the targeted user (who could be the same or a different user) would have to use an application that uses `gix-path`.In general, exploitation is more likely to succeed if at least one of the following applies:Users are expected to install `git` themselves, and are likely to do so in predictable locations.Locations where `git` is installed, whether due to usernames in their paths or otherwise, contain characters that `git` quotes by default in paths, such as non-English letters and accented letters.A custom `system`-scope configuration file is specified with the `GIT_CONFIG_SYSTEM` environment variable, and its path is in an unusual location or has strangely named components.A `system`-scope configuration file is absent, empty, or suppressed by means other than `GIT_CONFIG_NOSYSTEM`. Currently, `gix-path` can treat a `global`-scope configuration file as belonging to the installation if no higher scope configuration file is available. This increases the likelihood of exploitation even on a system where `git` is installed system-wide in an ordinary way.However, exploitation is expected to be very difficult even under any combination of those factors.Although the effect here is similar to [CVE-2022-24765](https://github.com/git-for-windows/git/security/advisories/GHSA-vw2c-22j4-2fh2) once exploited, a greater degree of user interaction would usually be required, and the attack complexity here is much higher because the necessary conditions are uncommon and challenging to predict.
|
[] | 5.3 | 6 | null | null | null |
CVE-2022-25028
|
Home Owners Collection Management System v1.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the collected_by parameter under the List of Collections module.
|
[
"cpe:2.3:a:home_owners_collection_management_system_project:home_owners_collection_management_system:1.0:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 | null |
|
CVE-2020-14507
|
Advantech iView, versions 5.6 and prior, is vulnerable to multiple path traversal vulnerabilities that could allow an attacker to create/download arbitrary files, limit system availability, and remotely execute code.
|
[
"cpe:2.3:a:advantech:iview:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 | null |
|
CVE-2016-2443
|
The Qualcomm MDP driver in Android before 2016-05-01 on Nexus 5 and Nexus 7 (2013) devices allows attackers to gain privileges via a crafted application, aka internal bug 26404525.
|
[
"cpe:2.3:h:google:nexus_5:-:*:*:*:*:*:*:*",
"cpe:2.3:h:google:nexus_7_\\(2013\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*"
] | null | null | 7 | 7.6 | null |
|
CVE-2023-23719
|
WordPress Premmerce Plugin <= 1.3.17 is vulnerable to Cross Site Request Forgery (CSRF)
|
Cross-Site Request Forgery (CSRF) vulnerability in Premmerce plugin <= 1.3.17 versions.
|
[
"cpe:2.3:a:premmerce:premmerce:*:*:*:*:*:wordpress:*:*"
] | null | 5.4 | null | null | null |
GHSA-rwgh-9h84-fcv3
|
Information disclosure in Kernel due to indirect branch misprediction.
|
[] | null | 7.1 | null | null | null |
|
CVE-2022-49090
|
arch/arm64: Fix topology initialization for core scheduling
|
In the Linux kernel, the following vulnerability has been resolved:
arch/arm64: Fix topology initialization for core scheduling
Arm64 systems rely on store_cpu_topology() to call update_siblings_masks()
to transfer the toplogy to the various cpu masks. This needs to be done
before the call to notify_cpu_starting() which tells the scheduler about
each cpu found, otherwise the core scheduling data structures are setup
in a way that does not match the actual topology.
With smt_mask not setup correctly we bail on `cpumask_weight(smt_mask) == 1`
for !leaders in:
notify_cpu_starting()
cpuhp_invoke_callback_range()
sched_cpu_starting()
sched_core_cpu_starting()
which leads to rq->core not being correctly set for !leader-rq's.
Without this change stress-ng (which enables core scheduling in its prctl
tests in newer versions -- i.e. with PR_SCHED_CORE support) causes a warning
and then a crash (trimmed for legibility):
[ 1853.805168] ------------[ cut here ]------------
[ 1853.809784] task_rq(b)->core != rq->core
[ 1853.809792] WARNING: CPU: 117 PID: 0 at kernel/sched/fair.c:11102 cfs_prio_less+0x1b4/0x1c4
...
[ 1854.015210] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000010
...
[ 1854.231256] Call trace:
[ 1854.233689] pick_next_task+0x3dc/0x81c
[ 1854.237512] __schedule+0x10c/0x4cc
[ 1854.240988] schedule_idle+0x34/0x54
|
[] | null | null | null | null | null |
GHSA-c8qc-x3gq-8ffg
|
In com_android_internal_os_ZygoteCommandBuffer_nativeForkRepeatedly of com_android_internal_os_ZygoteCommandBuffer.cpp, there is a possible method to perform arbitrary code execution in any app zygote processes due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
|
[] | null | 7.4 | null | null | null |
|
CVE-2024-47089
|
Unauthorized Transaction Manipulation Vulnerability
|
This vulnerability exists in the Apex Softcell LD Geo due to improper validation of the transaction token ID in the API endpoint. An authenticated remote attacker could exploit this vulnerability by manipulating the transaction token ID in the API request leading to unauthorized access and modification of transactions belonging to other users.
|
[
"cpe:2.3:a:apexsoftcell:ld_geo:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apexsoftcell:ld_dp_back_office:*:*:*:*:*:*:*:*"
] | 8.7 | null | null | null | null |
CVE-2024-52982
|
Animate | Improper Input Validation (CWE-20)
|
Animate versions 23.0.8, 24.0.5 and earlier are affected by an Improper Input Validation vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[
"cpe:2.3:a:adobe:animate:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
CVE-2020-14400
|
An issue was discovered in LibVNCServer before 0.9.13. Byte-aligned data is accessed through uint16_t pointers in libvncserver/translate.c. NOTE: Third parties do not consider this to be a vulnerability as there is no known path of exploitation or cross of a trust boundary
|
[
"cpe:2.3:a:libvncserver_project:libvncserver:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*"
] | null | 7.5 | null | 5 | null |
|
GHSA-8xgq-ff8v-3g5m
|
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in SO WP Pinyin Slugs plugin <= 2.3.0 versions.
|
[] | null | 5.9 | null | null | null |
|
CVE-2023-22956
|
An issue was discovered on AudioCodes VoIP desk phones through 3.4.4.1000. Due to the use of a hard-coded cryptographic key, an attacker is able to decrypt encrypted configuration files and retrieve sensitive information.
|
[
"cpe:2.3:h:audiocodes_ltd:voip_phones:*:*:*:*:*:*:*:*",
"cpe:2.3:o:audiocodes:c470hd_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:audiocodes:c470hd:-:*:*:*:*:*:*:*",
"cpe:2.3:o:audiocodes:c455hd_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:audiocodes:c455hd:-:*:*:*:*:*:*:*",
"cpe:2.3:o:audiocodes:c435hd_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:audiocodes:c435hd:-:*:*:*:*:*:*:*",
"cpe:2.3:o:audiocodes:445hd_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:audiocodes:445hd:-:*:*:*:*:*:*:*",
"cpe:2.3:o:audiocodes:405hd_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:audiocodes:405hd:-:*:*:*:*:*:*:*",
"cpe:2.3:o:audiocodes:c450hd_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:audiocodes:c450hd:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
|
GHSA-gp97-hfp2-qjf7
|
Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality via unknown vectors related to 2D.
|
[] | null | null | null | null | null |
|
CVE-2025-6464
|
Forminator Forms – Contact Form, Payment Form & Custom Form Builder <= 1.44.2 - Unauthenticated PHP Object Injection (PHAR) Triggered via Administrator Form Submission Deletion
|
The Forminator Forms – Contact Form, Payment Form & Custom Form Builder plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.44.2 via deserialization of untrusted input in the 'entry_delete_upload_files' function. This makes it possible for unauthenticated attackers to inject a PHP Object through a PHAR file. No known POP chain is present in the vulnerable software, which means this vulnerability has no impact unless another plugin or theme containing a POP chain is installed on the site. If a POP chain is present via an additional plugin or theme installed on the target system, it may allow the attacker to perform actions like delete arbitrary files, retrieve sensitive data, or execute code depending on the POP chain present. Deserialization occurs when the form submission is deleted, whether by an Administrator or via auto-deletion determined by plugin settings.
|
[] | null | 7.5 | null | null | null |
CVE-2022-30133
|
Windows Point-to-Point Protocol (PPP) Remote Code Execution Vulnerability
|
Windows Point-to-Point Protocol (PPP) Remote Code Execution Vulnerability
|
[
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
CVE-2023-34651
|
PHPgurukl Hospital Management System v.1.0 is vulnerable to Cross Site Scripting (XSS).
|
[
"cpe:2.3:a:hospital_management_system_project:hospital_management_system:1.0:*:*:*:*:*:*:*"
] | null | 6.1 | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.