id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2018-9847 | In Gxlcms QY v1.0.0713, the update function in Lib\Lib\Action\Admin\TplAction.class.php allows remote attackers to execute arbitrary PHP code by placing this code into a template. | [
"cpe:2.3:a:gxlcms:gxlcms_qy:1.0.0713:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 |
|
GHSA-jv2p-68ph-w4mw | Use after free in extensions in Google Chrome prior to 83.0.4103.116 allowed an attacker who convinced a user to install a malicious extension to potentially perform a sandbox escape via a crafted Chrome Extension. | [] | null | 9.6 | null | null |
|
CVE-2023-42464 | A Type Confusion vulnerability was found in the Spotlight RPC functions in afpd in Netatalk 3.1.x before 3.1.17. When parsing Spotlight RPC packets, one encoded data structure is a key-value style dictionary where the keys are character strings, and the values can be any of the supported types in the underlying protocol. Due to a lack of type checking in callers of the dalloc_value_for_key() function, which returns the object associated with a key, a malicious actor may be able to fully control the value of the pointer and theoretically achieve Remote Code Execution on the host. This issue is similar to CVE-2023-34967. | [
"cpe:2.3:a:netatalk:netatalk:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
GHSA-q34h-prv2-8p9p | On Juniper Networks EX4300-MP Series, EX4600 Series and QFX5K Series deployed in a Virtual Chassis configuration, receipt of a stream of specific layer 2 frames can cause high CPU load, which could lead to traffic interruption. This issue does not occur when the device is deployed in Stand Alone configuration. The offending layer 2 frame packets can originate only from within the broadcast domain where the device is connected. This issue affects Juniper Networks Junos OS on EX4300-MP Series, EX4600 Series and QFX5K Series: 17.3 versions prior to 17.3R3-S9; 17.4 versions prior to 17.4R2-S11, 17.4R3-S2, 17.4R3-S3; 18.1 versions prior to 18.1R3-S11; 18.2 versions prior to 18.2R3-S5; 18.3 versions prior to 18.3R2-S4, 18.3R3-S3; 18.4 versions prior to 18.4R2-S5, 18.4R3-S4; 19.1 versions prior to 19.1R3-S2; 19.2 versions prior to 19.2R1-S5, 19.2R3; 19.3 versions prior to 19.3R2-S4, 19.3R3; 19.4 versions prior to 19.4R1-S3, 19.4R2-S1, 19.4R3; 20.1 versions prior to 20.1R1-S3, 20.1R2. | [] | null | null | null | null |
|
CVE-2021-36147 | An issue was discovered in ACRN before 2.5. It allows a devicemodel/hw/pci/virtio/virtio_net.c virtio_net_ping_rxq NULL pointer dereference for vq->used. | [
"cpe:2.3:o:linux:acrn:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
CVE-2023-25554 |
A CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS
Command Injection') vulnerability exists that allows a local privilege escalation on the appliance
when a maliciously crafted Operating System command is entered on the device.
Affected products: StruxureWare Data Center Expert (V7.9.2 and prior)
| [
"cpe:2.3:a:schneider-electric:struxureware_data_center_expert:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
|
GHSA-5x3v-2gxr-59m2 | Directory traversal in Apache RocketMQ | In Apache RocketMQ 4.2.0 to 4.6.0, when the automatic topic creation in the broker is turned on by default, an evil topic like “../../../../topic2020” is sent from rocketmq-client to the broker, a topic folder will be created in the parent directory in brokers, which leads to a directory traversal vulnerability. Users of the affected versions should apply one of the following: Upgrade to Apache RocketMQ 4.6.1 or later. | [] | null | null | null | null |
GHSA-ggwx-jvrg-2332 | IBM Maximo Asset Management 7.6 through 7.6.3 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 145505. | [] | null | null | 5.4 | null |
|
GHSA-rpvm-69vv-cpww | The Social Media Widget WordPress plugin before 4.0.9 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) | [] | null | 4.8 | null | null |
|
CVE-2018-19944 | Cleartext Transmission of Sensitive Information in SNMP | A cleartext transmission of sensitive information vulnerability has been reported to affect certain QTS devices. If exploited, this vulnerability allows a remote attacker to gain access to sensitive information. QNAP have already fixed this vulnerability in the following versions: QTS 4.4.3.1354 build 20200702 (and later) | [
"cpe:2.3:o:qnap:qts:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
GHSA-m45m-xf2m-pmfw | The message_options function in includes/ucp/ucp_pm_options.php in phpBB before 3.0.13 does not properly validate the form key, which allows remote attackers to conduct CSRF attacks and change the full folder setting via unspecified vectors. | [] | null | null | null | null |
|
GHSA-jpgv-32fg-p7jv | Tobesoft Xplatform 9.2.2.250 and earlier version have an arbitrary code execution vulnerability by using method supported by Xplatform ActiveX Control. It allows attacker to cause remote code execution. | [] | null | null | null | null |
|
CVE-2024-1357 | The Shortcodes and extra features for Phlox theme plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's aux_timeline shortcode in all versions up to, and including, 2.15.5 due to insufficient input sanitization and output escaping on user supplied attributes such as thumb_mode and date_type. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [
"cpe:2.3:a:averta:depicter_slider:*:*:*:*:*:wordpress:*:*"
] | null | 6.4 | null | null |
|
GHSA-q49w-v89m-366g | In GitLab before 13.2.3, project sharing could temporarily allow too permissive access. | [] | null | null | null | null |
|
PYSEC-2024-162 | null | A Regular Expression Denial of Service (ReDoS) vulnerability exists in the XMLFeedSpider class of the scrapy/scrapy project, specifically in the parsing of XML content. By crafting malicious XML content that exploits inefficient regular expression complexity used in the parsing process, an attacker can cause a denial-of-service (DoS) condition. This vulnerability allows for the system to hang and consume significant resources, potentially rendering services that utilize Scrapy for XML processing unresponsive. | [] | null | 6.5 | null | null |
RHSA-2024:5145 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.18 Security update | undertow: LearningPushHandler can lead to remote memory DoS attacks undertow: response write hangs in case of Java 17 TLSv1.3 NewSessionTicket httpd: CONTINUATION frames DoS netty-codec-http: Allocation of Resources Without Limits or Throttling org.bouncycastle: Importing an EC certificate with crafted F2m parameters may lead to Denial of Service bc-java: BouncyCastle vulnerable to a timing variant of Bleichenbacher (Marvin Attack) org.bouncycastle:bcprov-jdk18on: Infinite loop in ED25519 verification in the ScalarUtil class | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el9"
] | null | 7.5 | null | null |
GHSA-8qhm-ch8h-xgjr | Remote code execution in JFinal CMS | JFinal CMS v5.1.0 was discovered to contain a remote code execution (RCE) vulnerability via the ActionEnter function. | [] | null | 9.8 | null | null |
CVE-2019-16660 | joyplus-cms 1.6.0 has admin_ajax.php?action=savexml&tab=vodplay CSRF. | [
"cpe:2.3:a:joyplus_project:joyplus:1.6.0:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.8 |
|
GHSA-xp9c-82jq-4pp7 | Information leak in doeditvotes.cgi in Bugzilla before 2.14.1 may allow remote attackers to more easily conduct attacks on the login. | [] | null | null | null | null |
|
CVE-2015-1807 | Directory traversal vulnerability in Jenkins before 1.600 and LTS before 1.596.1 allows remote authenticated users with certain permissions to read arbitrary files via a symlink, related to building artifacts. | [
"cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*",
"cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openshift:*:*:*:*:enterprise:*:*:*"
] | null | null | null | 3.5 |
|
GHSA-7r76-xfcg-jhgf | Stack-based buffer overflow in the SMTP service support in vsmon.exe in Zone Labs ZoneAlarm before 4.5.538.001, ZoneLabs Integrity client 4.0 before 4.0.146.046, and 4.5 before 4.5.085, allows remote attackers to execute arbitrary code via a long RCPT TO argument. | [] | null | null | null | null |
|
CVE-2017-0834 | A remote code execution vulnerability in the Android media framework (libmpeg2). Product: Android. Versions: 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0. Android ID: A-63125953. | [
"cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*"
] | null | null | 7.8 | 9.3 |
|
CVE-2020-36368 | Stack overflow vulnerability in parse_statement Cesanta MJS 1.20.1, allows remote attackers to cause a Denial of Service (DoS) via a crafted file. | [
"cpe:2.3:a:cesanta:mjs:1.20.1:*:*:*:*:*:*:*"
] | null | 5.5 | null | 4.3 |
|
GHSA-xg32-vp89-8jq5 | usb-creator before 0.2.38.3ubuntu0.1 on Ubuntu 12.04 LTS, before 0.2.56.3ubuntu0.1 on Ubuntu 14.04 LTS, before 0.2.62ubuntu0.3 on Ubuntu 14.10, and before 0.2.67ubuntu0.1 on Ubuntu 15.04 allows local users to gain privileges by leveraging a missing call check_polkit for the KVMTest method. | [] | null | null | 7.8 | null |
|
GHSA-mq24-q99r-6fpw | MISP before 2.4.115 allows privilege escalation in certain situations. After updating to 2.4.115, escalation attempts are blocked by the __checkLoggedActions function with a "This could be an indication of an attempted privilege escalation on older vulnerable versions of MISP (<2.4.115)" message. | [] | null | 6.5 | null | null |
|
CVE-2023-44220 | SonicWall NetExtender Windows (32-bit and 64-bit) client 10.2.336 and earlier versions have a DLL Search Order Hijacking vulnerability in the start-up DLL component. Successful exploitation via a local attacker could result in command execution in the target system. | [
"cpe:2.3:a:sonicwall:netextender:10.2.336:*:*:*:*:windows:*:*",
"cpe:2.3:a:sonicwall:netextender:*:*:*:*:*:windows:*:*"
] | null | 7.3 | null | null |
|
CVE-2020-6380 | Insufficient policy enforcement in extensions in Google Chrome prior to 79.0.3945.130 allowed a remote attacker who had compromised the renderer process to bypass site isolation via a crafted Chrome Extension. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.8 |
|
GHSA-8x67-9g37-h2j3 | An issue was discovered in certain Apple products. iOS before 10.2 is affected. The issue involves the "SpringBoard" component, which allows physically proximate attackers to bypass the passcode attempt counter and unlock a device via unspecified vectors. | [] | null | null | 6.8 | null |
|
GHSA-jh2g-xhqq-x4w9 | Send/Sync bound needed on T for Send/Sync impl of RcuCell<T> | Affected versions of this crate unconditionally implement Send/Sync for `RcuCell<T>`.
This allows users to send `T: !Send` to other threads (while `T` enclosed within `RcuCell<T>`), and allows users to concurrently access `T: !Sync` by using the APIs of `RcuCell<T>` that provide access to `&T`.This can result in memory corruption caused by data races. | [] | null | null | null | null |
GHSA-3gxj-2579-vrcc | ColdFusion versions 2023.12, 2021.18, 2025.0 and earlier are affected by an Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability that could lead to a security feature bypass. An attacker could exploit this vulnerability to access files and directories that are stored outside the intended restricted directory. Exploitation of this issue requires user interaction. | [] | null | 8.7 | null | null |
|
GHSA-fvjg-w742-28hw | unsp.c in ClamAV before 0.90.3 and 0.91 before 0.91rc1 does not properly calculate the end of a certain buffer, with unknown impact and remote attack vectors. | [] | null | null | null | null |
|
CVE-2010-2514 | Cross-site scripting (XSS) vulnerability in the JFaq (com_jfaq) component 1.2 for Joomla! allows remote attackers to inject arbitrary web script or HTML via the question parameter in an add2 action to index.php. | [
"cpe:2.3:a:dacian_strain:com_jfaq:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-jqxw-j9cr-8v8p | Cross-Site Request Forgery (CSRF) vulnerability in Adam Nowak Buddypress Humanity allows Cross Site Request Forgery. This issue affects Buddypress Humanity: from n/a through 1.2. | [] | null | 9.8 | null | null |
|
CVE-2017-9365 | CSRF exists in BigTree CMS through 4.2.18 with the force parameter to /admin/pages/revisions.php - for example: /admin/pages/revisions/1/?force=false. A page with id=1 can be unlocked. | [
"cpe:2.3:a:bigtreecms:bigtree_cms:*:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.8 |
|
CVE-2022-35887 | Four format string injection vulnerabilities exist in the web interface /action/wirelessConnect functionality of Abode Systems, Inc. iota All-In-One Security Kit 6.9Z and 6.9X. A specially-crafted HTTP request can lead to memory corruption, information disclosure and denial of service. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.This vulnerability arises from format string injection via the `default_key_id` HTTP parameter, as used within the `/action/wirelessConnect` handler. | [
"cpe:2.3:o:goabode:iota_all-in-one_security_kit_firmware:6.9x:*:*:*:*:*:*:*",
"cpe:2.3:o:goabode:iota_all-in-one_security_kit_firmware:6.9z:*:*:*:*:*:*:*"
] | null | null | 8.2 | null |
|
GHSA-jpm5-h62g-6xp3 | PHP remote file inclusion vulnerability in php121db.php in osDate 2.0.8 and possibly earlier versions allows remote attackers to execute arbitrary PHP code via a URL in the php121dir parameter. | [] | null | null | null | null |
|
CVE-2016-6466 | A vulnerability in the IPsec component of StarOS for Cisco ASR 5000 Series routers could allow an unauthenticated, remote attacker to terminate all active IPsec VPN tunnels and prevent new tunnels from establishing, resulting in a denial of service (DoS) condition. This vulnerability affects the following Cisco products: Cisco ASR 5000/5500 Series routers, Cisco Virtualized Packet Core (VPC). More Information: CSCva13631. Known Affected Releases: 20.0.0 20.1.0 20.2.0 20.2.3 20.2.v1 21.0.0 21.0.M0.64246. Known Fixed Releases: 20.2.3 20.2.3.65026 20.2.a4.65307 20.2.v1 20.2.v1.65353 20.3.M0.65037 20.3.T0.65043 21.0.0 21.0.0.65256 21.0.M0.64595 21.0.M0.64860 21.0.M0.65140 21.0.V0.65052 21.0.V0.65150 21.0.V0.65366 21.0.VC0.64639 21.1.A0.64861 21.1.A0.65145 21.1.PP0.65270 21.1.R0.65130 21.1.R0.65135 21.1.R0.65154 21.1.VC0.64898 21.1.VC0.65203 21.2.A0.65147. | [
"cpe:2.3:a:cisco:asr_5000_series_software:20.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:20.0.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:asr_5000_series_software:20.0.2.v1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:virtualized_packet_core:20.0_base:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
CVE-2020-6204 | The selection query in SAP Treasury and Risk Management (Transaction Management) (EA-FINSERV?versions 600, 603, 604, 605, 606, 616, 617, 618, 800 and S4CORE versions 101, 102, 103, 104) returns more records than it should be when selecting and displaying the contract number, leading to Missing Authorization Check. | [
"cpe:2.3:a:sap:treasury_and_risk_management_\\(ea-finserv\\):600:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:treasury_and_risk_management_\\(ea-finserv\\):603:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:treasury_and_risk_management_\\(ea-finserv\\):604:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:treasury_and_risk_management_\\(ea-finserv\\):605:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:treasury_and_risk_management_\\(ea-finserv\\):606:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:treasury_and_risk_management_\\(ea-finserv\\):616:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:treasury_and_risk_management_\\(ea-finserv\\):617:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:treasury_and_risk_management_\\(ea-finserv\\):618:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:treasury_and_risk_management_\\(ea-finserv\\):800:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:treasury_and_risk_management_\\(s4core\\):101:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:treasury_and_risk_management_\\(s4core\\):102:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:treasury_and_risk_management_\\(s4core\\):103:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:treasury_and_risk_management_\\(s4core\\):104:*:*:*:*:*:*:*"
] | null | null | 4.3 | null |
|
CVE-2013-4061 | IBM Rational Policy Tester 8.5 before 8.5.0.5 does not properly check authorization for changes to the set of authentication hosts, which allows remote authenticated users to perform spoofing attacks involving an HTTP redirect via unspecified vectors. | [
"cpe:2.3:a:ibm:rational_policy_tester:8.5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_policy_tester:8.5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_policy_tester:8.5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_policy_tester:8.5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_policy_tester:8.5.0.4:*:*:*:*:*:*:*"
] | null | null | null | 4 |
|
GHSA-87cm-47xv-j472 | Potential double free in Bluez 5 module of PulseAudio could allow a local attacker to leak memory or crash the program. The modargs variable may be freed twice in the fail condition in src/modules/bluetooth/module-bluez5-device.c and src/modules/bluetooth/module-bluez5-device.c. Fixed in 1:8.0-0ubuntu3.14. | [] | null | null | null | null |
|
CVE-2024-12332 | School Management System – WPSchoolPress <= 2.2.14 - Authenticated (Student/Parent+) SQL Injection | The School Management System – WPSchoolPress plugin for WordPress is vulnerable to SQL Injection via the 'cid' parameter in all versions up to, and including, 2.2.14 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Student/Parent-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. | [] | null | 6.5 | null | null |
GHSA-h2fp-7rxc-44gq | The nfs_can_extend_write function in fs/nfs/write.c in the Linux kernel before 3.13.3 relies on a write delegation to extend a write operation without a certain up-to-date verification, which allows local users to obtain sensitive information from kernel memory in opportunistic circumstances by writing to a file in an NFS filesystem and then reading the same file. | [] | null | null | null | null |
|
CVE-2013-4662 | The Quick Search API in CiviCRM 4.2.0 through 4.2.9 and 4.3.0 through 4.3.3 allows remote authenticated users to bypass the validation layer and conduct SQL injection attacks via a direct request to the "second layer" of the API, related to contact.getquick. | [
"cpe:2.3:a:civicrm:civicrm:4.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:civicrm:civicrm:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:civicrm:civicrm:4.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:civicrm:civicrm:4.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:civicrm:civicrm:4.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:civicrm:civicrm:4.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:civicrm:civicrm:4.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:civicrm:civicrm:4.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:civicrm:civicrm:4.2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:civicrm:civicrm:4.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:civicrm:civicrm:4.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:civicrm:civicrm:4.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:civicrm:civicrm:4.3.3:*:*:*:*:*:*:*"
] | null | null | null | 6.5 |
|
GHSA-8px7-w4mw-2rcm | Directory traversal vulnerability in the zip download functionality in QuiXplorer before 2.5.5 allows remote attackers to read arbitrary files via a .. (dot dot) in the selitems[] parameter in a download_selected action to index.php. | [] | null | null | null | null |
|
CVE-2005-3556 | Multiple cross-site scripting (XSS) vulnerabilities in PHPlist 2.10.1 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) listname parameter in (a) admin/editlist.php, (2) title parameter in (b) admin/spageedit.php, (3) title field in (c) admin/template.php, (4) filter, (5) delete, and (6) start parameters in (d) admin/eventlog.php, (7) id parameter in (e) admin/configure.php, (8) find parameter in (f) admin/users.php, (9) start parameter in (g) admin/admin.php, and (10) action parameter in (h) admin/fckphplist.php. | [
"cpe:2.3:a:tincan:phplist:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2018-4095 | An issue was discovered in certain Apple products. iOS before 11.2.5 is affected. tvOS before 11.2.5 is affected. watchOS before 4.2.2 is affected. The issue involves the "Core Bluetooth" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app. | [
"cpe:2.3:a:apple:apple_tv:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | 9.3 |
|
CVE-2022-40005 | Intelbras WiFiber 120AC inMesh before 1-1-220826 allows command injection by authenticated users, as demonstrated by the /boaform/formPing6 and /boaform/formTracert URIs for ping and traceroute. | [
"cpe:2.3:o:intelbras:wifiber_120ac_inmesh_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intelbras:wifiber_120ac_inmesh:-:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
|
GHSA-mmmr-m93v-3xqg | This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit PhantomPDF 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the username property of a TextField. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-7145. | [] | null | null | 8.8 | null |
|
CVE-2010-2152 | Unspecified vulnerability in JustSystems Ichitaro 2004 through 2009, Ichitaro Government 2006 through 2009, and Just School 2008 and 2009 allows remote attackers to execute arbitrary code via unknown vectors related to "product character attribute processing" for a document. | [
"cpe:2.3:a:justsystems:ichitaro:2004:*:*:*:*:*:*:*",
"cpe:2.3:a:justsystems:ichitaro:2005:*:*:*:*:*:*:*",
"cpe:2.3:a:justsystems:ichitaro:2006:*:*:*:*:*:*:*",
"cpe:2.3:a:justsystems:ichitaro:2007:*:*:*:*:*:*:*",
"cpe:2.3:a:justsystems:ichitaro:2008:*:*:*:*:*:*:*",
"cpe:2.3:a:justsystems:ichitaro:2009:*:*:*:*:*:*:*",
"cpe:2.3:a:justsystems:ichitaro:2006:-:government:*:*:*:*:*",
"cpe:2.3:a:justsystems:ichitaro:2007:-:government:*:*:*:*:*",
"cpe:2.3:a:justsystems:ichitaro:2008:-:government:*:*:*:*:*",
"cpe:2.3:a:justsystems:ichitaro:2009:-:government:*:*:*:*:*",
"cpe:2.3:a:justsystems:just_school:2008:*:*:*:*:*:*:*",
"cpe:2.3:a:justsystems:just_school:2009:*:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
GHSA-8294-mrxj-h85p | Unrestricted file upload vulnerability in ajaxfilemanager.php in the Wp-FileManager 1.2 plugin for WordPress allows remote attackers to upload and execute arbitrary PHP code via unspecified vectors. | [] | null | null | null | null |
|
CVE-2024-8335 | OpenRapid RapidCMS runlogon.php sql injection | A vulnerability classified as critical has been found in OpenRapid RapidCMS up to 1.3.1. Affected is an unknown function of the file /resource/runlogon.php. The manipulation of the argument username leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. | [
"cpe:2.3:a:yuque:rapidcms:*:*:*:*:*:*:*:*",
"cpe:2.3:a:openrapid:rapidcms:*:*:*:*:*:*:*:*"
] | 5.3 | 6.3 | 6.3 | 6.5 |
CVE-2014-6618 | Cross-site scripting (XSS) vulnerability in Your Online Shop allows remote attackers to inject arbitrary web script or HTML via the products_id parameter. | [
"cpe:2.3:a:your_online_shop_project:your_online_shop:-:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
PYSEC-2018-18 | null | Jupyter Notebook before 5.7.2 allows XSS via a crafted directory name because notebook/static/tree/js/notebooklist.js handles certain URLs unsafely. | [] | null | null | null | null |
GHSA-42jj-9j7q-98jv | Script injection vulnerability in the email module.Successful exploitation of this vulnerability may affect service confidentiality, integrity, and availability. | [] | null | 9.8 | null | null |
|
GHSA-7cgh-j584-9v44 | win32k.sys in the kernel in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 Gold and SP2 does not correctly validate an argument to an unspecified system call, which allows local users to gain privileges via a crafted application that triggers a NULL pointer dereference, aka "Win32k NULL Pointer Dereferencing Vulnerability." | [] | null | null | null | null |
|
GHSA-xf76-6hww-jr27 | cPanel before 62.0.17 allows demo accounts to execute code via the Htaccess::setphppreference API (SEC-232). | [] | null | null | 6.3 | null |
|
CVE-2021-23377 | Arbitrary Command Injection | This affects all versions of package onion-oled-js. If attacker-controlled user input is given to the scroll function, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization. | [
"cpe:2.3:a:onion-oled-js_project:onion-oled-js:*:*:*:*:*:node.js:*:*"
] | null | 9.8 | null | null |
CVE-2021-29103 | There is a reflected Cross Site Scripting (XSS) vulnerability in Esri ArcGIS Server version 10.8.1 and below. | A reflected Cross Site Scripting (XXS) vulnerability in ArcGIS Server version 10.8.1 and below may allow a remote attacker able to convince a user to click on a crafted link which could potentially execute arbitrary JavaScript code in the user’s browser. | [
"cpe:2.3:a:esri:arcgis_server:*:*:*:*:*:*:x64:*"
] | null | null | 6.1 | null |
GHSA-q6v6-32hh-pq9p | Improper Neutralization of Formula Elements in a CSV File vulnerability in WPDeveloper ReviewX – Multi-criteria Rating & Reviews for WooCommerce.This issue affects ReviewX – Multi-criteria Rating & Reviews for WooCommerce: from n/a through 1.6.7. | [] | null | 9.8 | null | null |
|
CVE-2015-4240 | Cisco IP Communicator 8.6(4) allows remote attackers to cause a denial of service (service outage) via an unspecified URL in a GET request, aka Bug ID CSCuu37656. | [
"cpe:2.3:a:cisco:ip_communicator:8.6\\(4\\):*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2020-12788 | CMAC verification functionality in Microchip Atmel ATSAMA5 products is vulnerable to vulnerable to timing and power analysis attacks. | [
"cpe:2.3:o:microchip:atsama5d21c-cu_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d21c-cu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d21c-cur_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d21c-cur:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d22c-cn_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d22c-cn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d22c-cnr_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d22c-cnr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d22c-cu_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d22c-cu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d22c-cur_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d22c-cur:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d23c-cn_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d23c-cn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d23c-cnr_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d23c-cnr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d23c-cu_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d23c-cu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d23c-cur_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d23c-cur:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d24c-cu_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d24c-cu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d24c-cuf_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d24c-cuf:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d24c-cur_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d24c-cur:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d26c-cn_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d26c-cn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d26c-cnr_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d26c-cnr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d26c-cu_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d26c-cu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d26c-cur_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d26c-cur:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d27c-cn_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d27c-cn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d27c-cnr_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d27c-cnr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d27c-cu_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d27c-cu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d27c-cur_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d27c-cur:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d28c-cn_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d28c-cn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d28c-cnr_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d28c-cnr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d28c-cu_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d28c-cu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d28c-cur_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d28c-cur:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d27c-cnvao_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d27c-cnvao:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d27c-cnrvao_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d27c-cnrvao:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d225c-d1m-cur_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d225c-d1m-cur:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d27c-d5m-cu_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d27c-d5m-cu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d27c-d5m-cur_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d27c-d5m-cur:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d27c-d1g-cu_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d27c-d1g-cu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d27c-d1g-cur_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d27c-d1g-cur:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d28c-d1g-cu_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d28c-d1g-cu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d28c-d1g-cur_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d28c-d1g-cur:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d27c-ld1g-cu_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d27c-ld1g-cu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d27c-ld1g-cur_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d27c-ld1g-cur:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d27c-ld2g-cu_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d27c-ld2g-cu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d27c-ld2g-cur_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d27c-ld2g-cur:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d28c-ld1g-cu_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d28c-ld1g-cu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d28c-ld1g-cur_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d28c-ld1g-cur:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d28c-ld2g-cu_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d28c-ld2g-cu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d28c-ld2g-cur_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d28c-ld2g-cur:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d27-wlsom1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d27-wlsom1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d27-som1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d27-som1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d31a-cu_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d31a-cu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d31a-cur_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d31a-cur:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d31a-cfu_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d31a-cfu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d31a-cfur_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d31a-cfur:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d33a-cu_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d33a-cu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d33a-cur_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d33a-cur:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d34a-cu_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d34a-cu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d34a-cur_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d34a-cur:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d35a-cu_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d35a-cu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d35a-cur_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d35a-cur:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d35a-cn_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d35a-cn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d35a-cnr_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d35a-cnr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d36a-cu_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d36a-cu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d36a-cur_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d36a-cur:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d36a-cn_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d36a-cn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d36a-cnr_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d36a-cnr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d41a-cu_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d41a-cu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d41a-cur_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d41a-cur:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d41b-cu_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d41b-cu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d41b-cur_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d41b-cur:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d42a-cu_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d42a-cu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d42a-cur_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d42a-cur:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d42b-cu_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d42b-cu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d42b-cur_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d42b-cur:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d43a-cu_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d43a-cu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d43a-cur_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d43a-cur:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d43b-cu_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d43b-cu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d43b-cur_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d43b-cur:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d44a-cu_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d44a-cu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d44a-cur_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d44a-cur:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d44b-cu_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d44b-cu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d44b-cur_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d44b-cur:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
GHSA-w4pq-45h8-g86g | Cross-Site Request Forgery (CSRF) vulnerability in Ichi translit it! allows Stored XSS. This issue affects translit it!: from n/a through 1.6. | [] | null | 7.1 | null | null |
|
CVE-2022-27469 | Monstaftp v2.10.3 was discovered to allow attackers to execute Server-Side Request Forgery (SSRF). | [
"cpe:2.3:a:monstaftp:monsta_ftp:2.10.3:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
|
CVE-2021-20078 | Manage Engine OpManager builds below 125346 are vulnerable to a remote denial of service vulnerability due to a path traversal issue in spark gateway component. This allows a remote attacker to remotely delete any directory or directories on the OS. | [
"cpe:2.3:a:zohocorp:manageengine_opmanager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125000:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125002:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125100:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125101:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125102:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125108:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125110:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125111:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125112:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125113:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125114:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125116:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125117:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125118:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125120:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125121:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125123:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125124:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125125:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125136:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125137:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125139:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125140:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125143:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125144:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125145:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125156:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125157:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125158:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125159:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125161:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125163:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125174:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125175:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125176:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125177:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125178:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125180:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125181:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125192:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125193:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125194:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125195:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125196:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125197:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125198:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125201:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125204:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125212:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125213:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125214:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125215:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125216:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125228:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125229:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125230:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125231:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125232:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125233:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125312:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125323:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125324:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125326:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125328:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125329:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125340:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125341:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125342:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125343:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125344:*:*:*:*:*:*"
] | null | 9.1 | null | 9.4 |
|
GHSA-2p4j-8pc7-8jg8 | The vCard functions in Joomla! 1.0.5 use predictable sequential IDs for vcards and do not restrict access to them, which allows remote attackers to obtain valid e-mail addresses to conduct spam attacks by modifying the contact_id parameter to index2.php. | [] | null | null | null | null |
|
CVE-2020-11543 | OpsRamp Gateway before 7.0.0 has a backdoor account vadmin with the password 9vt@f3Vt that allows root SSH access to the server. This issue has been resolved in OpsRamp Gateway firmware version 7.0.0 where an administrator and a system user accounts are the only available user accounts for the gateway appliance. | [
"cpe:2.3:a:opsramp:gateway:3.0.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | 10 |
|
CVE-2022-23058 | ERPNext - Stored XSS in My Settings | ERPNext in versions v12.0.9-v13.0.3 are affected by a stored XSS vulnerability that allows low privileged users to store malicious scripts in the ‘username’ field in ‘my settings’ which can lead to full account takeover. | [
"cpe:2.3:a:frappe:erpnext:*:*:*:*:*:*:*:*"
] | null | null | null | 3.5 |
GHSA-c2xw-mj3m-66cw | A vulnerability classified as critical has been found in Hospital Management Center. Affected is an unknown function of the file patient-info.php. The manipulation of the argument pt_id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-213786 is the identifier assigned to this vulnerability. | [] | null | 9.8 | null | null |
|
GHSA-prq4-3c39-j9jq | Libde265 v1.0.11 was discovered to contain a heap buffer overflow via the function derive_collocated_motion_vectors at motion.cc. | [] | null | 8.8 | null | null |
|
CVE-2024-0116 | NVIDIA Triton Inference Server contains a vulnerability where a user may cause an out-of-bounds read issue by releasing a shared memory region while it is in use. A successful exploit of this vulnerability may lead to denial of service. | [] | null | 4.9 | null | null |
|
RHSA-2007:0848 | Red Hat Security Advisory: openoffice.org security update | openoffice.org TIFF parsing heap overflow | [
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client"
] | null | null | null | null |
GHSA-j7q6-wvv8-qj98 | InHand Networks InRouter 900 Industrial 4G Router before v1.0.0.r11700 was discovered to contain a remote code execution (RCE) vulnerability via the function sub_122D0. This vulnerability is triggered via a crafted packet. | [] | null | 9.8 | null | null |
|
CVE-2017-12756 | Command inject in transfer from another server in extplorer 2.1.9 and prior allows attacker to inject command via the userfile[0] parameter. | [
"cpe:2.3:a:extplorer:extplorer:*:*:*:*:*:*:*:*"
] | null | null | 7.2 | 6.5 |
|
CVE-2024-45312 | Arbitrary language parameter can passed to `aspell` executable via spelling requests in overleaf | Overleaf is a web-based collaborative LaTeX editor. Overleaf Community Edition and Server Pro prior to version 5.0.7 (or 4.2.7 for the 4.x series) contain a vulnerability that allows an arbitrary language parameter in client spelling requests to be passed to the `aspell` executable running on the server. This causes `aspell` to attempt to load a dictionary file with an arbitrary filename. File access is limited to the scope of the overleaf server. The problem is patched in versions 5.0.7 and 4.2.7. Previous versions can be upgraded using the Overleaf toolkit `bin/upgrade` command. Users unable to upgrade may block POST requests to `/spelling/check` via a Web Application Firewall will prevent access to the vulnerable spell check feature. However, upgrading is advised. | [
"cpe:2.3:a:overleaf:overleaf:*:*:*:*:*:*:*:*",
"cpe:2.3:a:overleaf:overleaf:*:*:*:*:community:*:*:*",
"cpe:2.3:a:overleaf:overleaf:*:*:server_pro:*:*:*:*:*"
] | null | 5.3 | null | null |
CVE-2006-5588 | Multiple PHP remote file inclusion vulnerabilities in CMS Faethon 2.0 Ultimate and earlier, when register_globals and magic_quotes_gpc are enabled, allow remote attackers to execute arbitrary PHP code via a URL in the mainpath parameter to (1) includes/rss-reader.php or (2) admin/config.php, different vectors than CVE-2006-3185. | [
"cpe:2.3:a:cms_faethon:cms_faethon:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2018-0573 | baserCMS (baserCMS 4.1.0.1 and earlier versions, baserCMS 3.0.15 and earlier versions) allows remote attackers to bypass access restriction for a content to view a file which is uploaded by a site user via unspecified vectors. | [
"cpe:2.3:a:basercms:basercms:*:*:*:*:*:*:*:*"
] | null | null | 5.3 | 5 |
|
GHSA-cp42-9jh9-448f | Integer overflow in libswscale/x86/swscale.c in libav 11.8 allows remote attackers to cause a denial of service (crash) via a crafted file. | [] | null | null | 5.5 | null |
|
GHSA-vrmh-w38h-3phx | A JavaScript focused window could overlap the fullscreen notification in Fullscreen in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to obscure the full screen warning via a crafted HTML page. | [] | null | null | 6.5 | null |
|
GHSA-w876-744c-hf5g | An uncontrolled search path element vulnerability (DLL hijacking) has been discovered that could allow a locally authenticated adversary to escalate privileges to SYSTEM. Alternatively, they could host a trojanized version of the software and trick victims into downloading and installing their malicious version to gain initial access and code execution. | [] | null | 6.3 | null | null |
|
CVE-2024-3751 | Seriously Simple Podcasting < 3.3.0 - Admin+ Stored XSS | The Seriously Simple Podcasting WordPress plugin before 3.3.0 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) | [
"cpe:2.3:a:castos:seriously_simple_podcasting:*:*:*:*:*:wordpress:*:*"
] | null | 4.8 | null | null |
CVE-2011-0076 | Unspecified vulnerability in the Java Embedding Plugin (JEP) in Mozilla Firefox before 3.5.19 and 3.6.x before 3.6.17, and SeaMonkey before 2.0.14, on Mac OS X allows remote attackers to bypass intended access restrictions via unknown vectors. | [
"cpe:2.3:a:mozilla:firefox:3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.16:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0:alpha:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1:alpha:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.18:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.19:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.5.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.5.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.5.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:alpha_1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:alpha_2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:alpha_3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:beta_1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:beta_2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0:preview_release:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.17:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-qxhp-mp7h-vg86 | The biometric lock in Devolutions Password Hub for iOS before 2021.3.4 allows attackers to access the application because of authentication bypass. An attacker must rapidly make failed biometric authentication attempts. | [] | null | 6.6 | null | null |
|
GHSA-qvpg-g989-h8h6 | Buffer overflow in Windows Kernel allows local users to gain privileges by causing certain error messages to be passed to a debugger. | [] | null | null | null | null |
|
CVE-2024-51722 | Vulnerabilities in SecuSUITE Server Components Impact SecuSUITE | A local privilege escalation vulnerability in the SecuSUITE Server (System Configuration) of SecuSUITE versions 5.0.420 and earlier could allow a successful attacker that had gained control of code running under one of the system accounts listed in the configuration file to potentially issue privileged script commands. | [
"cpe:2.3:a:blackberry:secusuite:*:*:*:*:*:*:*:*"
] | null | 6.4 | null | null |
GHSA-c2j7-87j8-wc4m | The Job Board Vanila WordPress plugin is vulnerable to Stored Cross-Site Scripting due to insufficient input validation and sanitization via the psjb_exp_in and the psjb_curr_in parameters found in the ~/job-settings.php file which allowed attackers with administrative user access to inject arbitrary web scripts, in versions up to and including 1.0. This affects multi-site installations where unfiltered_html is disabled for administrators, and sites where unfiltered_html is disabled. | [] | null | null | null | null |
|
ICSA-21-159-04 | Schneider Electric IGSS | Exploitation of this vulnerability could result in loss of data or remote code execution due to missing length checks when a malicious CGF file is imported to IGSS Definition.CVE-2021-22750 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been assigned; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). Exploitation of this vulnerability could result in disclosure of information or execution of arbitrary code due to lack of input validation when a malicious CGF (Configuration Group File) is imported to IGSS Definition.CVE-2021-22751 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been assigned; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). Exploitation of this vulnerability could result in loss of data or remote code execution due to missing size checks when a malicious WSP (Workspace) file is being parsed by IGSS Definition.CVE-2021-22752 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been assigned; the CVSS vector string is AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). Exploitation of this vulnerability could result in loss of data or remote code execution due to missing length checks when a malicious WSP file is being parsed by IGSS Definition.CVE-2021-22753 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been assigned; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). Exploitation of this vulnerability could result in loss of data or remote code execution due to lack of proper validation of user-supplied data when a malicious CGF file is imported to IGSS Definition.CVE-2021-22754 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been assigned; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). Exploitation of this vulnerability could result in disclosure of information or remote code execution due to lack of sanity checks on user-supplied data when a malicious CGF file is imported to IGSS Definition.CVE-2021-22755 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been assigned; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). Exploitation of this vulnerability could result in disclosure of information or remote code execution due to lack of user-supplied data validation when a malicious CGF file is imported to IGSS Definition.CVE-2021-22756 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been assigned; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). Exploitation of this vulnerability could result in disclosure of information or remote code execution due to lack of validation on user-supplied input data when a malicious CGF file is imported to IGSS Definition.CVE-2021-22757 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been assigned; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). Exploitation of this vulnerability could result in loss of data or remote code execution due to lack of validation of user-supplied input data when a malicious CGF file is imported to IGSS Definition.CVE-2021-22758 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been assigned; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). Exploitation of this vulnerability could result in loss of data or remote code execution due to use of unchecked input data when a malicious CGF file is imported to IGSS Definition.CVE-2021-22759 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been assigned; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). Exploitation of this vulnerability could result in loss of data or remote code execution due to missing checks of user-supplied input data when a malicious CGF file is imported to IGSS Definition.CVE-2021-22760 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been assigned; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). Exploitation of this vulnerability could result in disclosure of information or remote code execution due to missing length check on user supplied data when a malicious CGF file is imported to IGSS Definition.CVE-2021-22761 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been assigned; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). Exploitation of this vulnerability could result in remote code execution when a malicious CGF or WSP file is being parsed by IGSS Definition.CVE-2021-22762 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been assigned; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). | [] | null | null | 7.8 | null |
CVE-2012-4460 | The serializing/deserializing functions in the qpid::framing::Buffer class in Apache Qpid 0.20 and earlier allow remote attackers to cause a denial of service (assertion failure and daemon exit) via unspecified vectors. NOTE: this issue could also trigger an out-of-bounds read, but it might not trigger a crash. | [
"cpe:2.3:a:apache:qpid:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:qpid:0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:qpid:0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:qpid:0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:qpid:0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:qpid:0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:qpid:0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:qpid:0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:qpid:0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:qpid:0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:qpid:0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:qpid:0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:qpid:0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:qpid:0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:qpid:0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:qpid:0.19:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-r56m-jmm8-vfjf | Adobe Reader and Acrobat before 11.0.17, Acrobat and Acrobat Reader DC Classic before 15.006.30198, and Acrobat and Acrobat Reader DC Continuous before 15.017.20050 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4191, CVE-2016-4192, CVE-2016-4193, CVE-2016-4194, CVE-2016-4195, CVE-2016-4196, CVE-2016-4197, CVE-2016-4198, CVE-2016-4199, CVE-2016-4200, CVE-2016-4201, CVE-2016-4202, CVE-2016-4203, CVE-2016-4204, CVE-2016-4206, CVE-2016-4207, CVE-2016-4208, CVE-2016-4211, CVE-2016-4212, CVE-2016-4213, CVE-2016-4214, CVE-2016-4250, CVE-2016-4251, CVE-2016-4252, and CVE-2016-4254. | [] | null | null | 9.8 | null |
|
CVE-2002-0608 | Buffer overflow in Matu FTP client 1.74 allows remote FTP servers to execute arbitrary code via a long "220" banner. | [
"cpe:2.3:a:matu:matu_ftp:1.74:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2023-21080 | In register_notification_rsp of btif_rc.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-245916076 | [
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
|
CVE-2023-44340 | ZDI-CAN-21424: Adobe Acrobat Reader DC PDF File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability | Adobe Acrobat Reader versions 23.006.20360 (and earlier) and 20.005.30524 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*"
] | null | 5.5 | null | null |
GHSA-w45c-77r5-cpwj | H3C Magic R100 R100V100R005.bin was discovered to contain a stack overflow via the DelvsList interface at /goform/aspForm. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted payload. | [] | null | 4.9 | null | null |
|
GHSA-rpmq-xq2g-32wx | In the Linux kernel, the following vulnerability has been resolved:smb: client: fix potential UAF in smb2_is_valid_lease_break()Skip sessions that are being teared down (status == SES_EXITING) to
avoid UAF. | [] | null | 7.8 | null | null |
|
CVE-2025-47256 | Libxmp through 4.6.2 has a stack-based buffer overflow in depack_pha in loaders/prowizard/pha.c via a malformed Pha format tracker module in a .mod file. | [] | null | 5.6 | null | null |
|
GHSA-wx7c-g573-v6qm | A vulnerability, which was classified as critical, has been found in kiCode111 like-girl 5.2.0. This issue affects some unknown processing of the file /admin/ImgUpdaPost.php. The manipulation of the argument id/imgText/imgDatd/imgUrl leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | [] | 2 | 4.7 | null | null |
|
GHSA-g3rh-644p-2xqv | An elevation of privilege vulnerability exists when the Windows Backup Engine improperly handles memory.To exploit this vulnerability, an attacker would first have to gain execution on the victim system, aka 'Windows Backup Engine Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1535, CVE-2020-1536, CVE-2020-1539, CVE-2020-1540, CVE-2020-1542, CVE-2020-1543, CVE-2020-1544, CVE-2020-1545, CVE-2020-1546, CVE-2020-1547, CVE-2020-1551. | [] | null | 7.8 | null | null |
|
CVE-2014-6875 | The Woodforest Mobile Banking (aka com.woodforest) application 3.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [
"cpe:2.3:a:woodforest:woodforest_mobile_banking:3.1:*:*:*:*:android:*:*"
] | null | null | null | 5.4 |
|
GHSA-42g3-3jwm-63rx | Broken access control in Silverpeas | Silverpeas Core 6.3.1 administrative "Bin" feature is affected by broken access control. A user with low privileges is able to navigate directly to the bin, revealing all deleted spaces. The user can then restore or permanently delete the spaces. | [] | null | 5.4 | null | null |
CVE-2022-34195 | Jenkins Repository Connector Plugin 2.2.0 and earlier does not escape the name and description of Maven Repository Artifact parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. | [
"cpe:2.3:a:jenkins:repository_connector:*:*:*:*:*:jenkins:*:*"
] | null | 5.4 | null | 3.5 |
|
CVE-2024-43080 | In onReceive of AppRestrictionsFragment.java, there is a possible escalation of privilege due to unsafe deserialization. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. | [
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.