id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-pv6c-7f5h-fjj3 | Multiple PHP remote file inclusion vulnerabilities in SnippetMaster 2.2.2, when register_globals is enabled, allow remote attackers to execute arbitrary PHP code via a URL in the (1) _SESSION[SCRIPT_PATH] parameter to includes/vars.inc.php and the (2) g_pcltar_lib_dir parameter to includes/tar_lib/pcltar.lib.php. | [] | null | null | null | null |
|
GHSA-mpvq-c99j-qj2v | XMP Toolkit 2021.07 (and earlier) is affected by a Null pointer dereference vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [] | null | 5.5 | null | null |
|
GHSA-hm73-gc3g-3542 | Race condition in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges, and consequently read the contents of arbitrary kernel memory locations, via a crafted application, a different vulnerability than other CVEs listed in MS13-016. | [] | null | null | null | null |
|
CVE-2007-6018 | IMP Webmail Client 4.1.5, Horde Application Framework 3.1.5, and Horde Groupware Webmail Edition 1.0.3 does not validate unspecified HTTP requests, which allows remote attackers to (1) delete arbitrary e-mail messages via a modified numeric ID or (2) "purge" deleted emails via a crafted email message. | [
"cpe:2.3:a:horde:framework:3.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:horde:groupware_webmail_edition:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:horde:horde:3.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:horde:imp:4.1.5:*:*:*:*:*:*:*"
] | null | null | null | 5.8 |
|
GHSA-m584-rmpj-6q5p | Shenzhen Tuoshi Network Communications Co.,Ltd 5G CPE Router NR500-EA RG500UEAABxCOMSLICv3.2.2543.12.18 was discovered to contain a command injection vulnerability via the component at_command.asp. | [] | null | 8.8 | null | null |
|
GHSA-6m2h-c4q5-c6rp | SerenityOS 2021-03-27 contains a buffer overflow vulnerability in the EndOfCentralDirectory::read() function. | [] | null | 9.1 | null | null |
|
CVE-2023-30930 | In telephony service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. | [
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc7731e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc9832e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t310:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
|
CVE-2020-13458 | An issue was discovered in the Image Resizer plugin before 2.0.9 for Craft CMS. There are CSRF issues with the log-clear controller action. | [
"cpe:2.3:a:verbb:image_resizer:*:*:*:*:*:craft_cms:*:*"
] | null | 8.8 | null | 6.8 |
|
GHSA-9x6h-j393-8wqx | A logic issue existed with the display of notification previews. This issue was addressed with improved validation. This issue is fixed in iOS 13. Notification previews may show on Bluetooth accessories even when previews are disabled. | [] | null | null | null | null |
|
GHSA-mgmj-2jxj-v92v | SEMCMS v 1.2 is vulnerable to SQL Injection via SEMCMS_User.php. | [] | null | 9.8 | null | null |
|
GHSA-fhm6-67qq-3q35 | An ActiveX control in GenLaunch.htm in ICONICS GENESIS32 8.0, 8.02, 8.04, and 8.05 allows remote attackers to execute arbitrary programs via a crafted HTML document. | [] | null | null | null | null |
|
CVE-2021-41336 | Windows Kernel Information Disclosure Vulnerability | Windows Kernel Information Disclosure Vulnerability | [
"cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.288:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_21h2:10.0.22000.258:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_11_21h2:10.0.22000.258:*:*:*:*:*:arm64:*"
] | null | 5.5 | null | null |
GHSA-6wvr-gh66-4v68 | A logic issue was addressed with improved state management. This issue is fixed in macOS Catalina 10.15.6. A remote attacker may be able to cause a denial of service. | [] | null | null | null | null |
|
RHSA-2023:4591 | Red Hat Security Advisory: RHUI 4.5.0 release - Security, Bug Fixes, and Enhancements | sqlparse: Parser contains a regular expression that is vulnerable to ReDOS (Regular Expression Denial of Service) python-django: Potential bypass of validation when uploading multiple files using one form field | [
"cpe:/a:redhat:rhui:4::el8"
] | null | 6.5 | null | null |
GHSA-xc29-2cr2-88rr | Multiple buffer overflows in pbm212030 allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted PBM image, related to (1) stream line data, which triggers a heap-based buffer overflow, or (2) vectors related to an "internal intermediate heap-based buffer." | [] | null | null | null | null |
|
GHSA-5976-p6p4-vfw3 | CSRF in admin/edit-glossary.php in Chadha PHPKB Standard Multi-Language 9 allows attackers to edit a glossary term, given the id, via a crafted request. | [] | null | 4.3 | null | null |
|
GHSA-q574-jmrv-grv3 | Microsoft Internet Explorer 5.01 SP4, 6, and 6 SP1 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, leading to memory corruption, aka "Uninitialized Memory Corruption Vulnerability." | [] | null | null | null | null |
|
CVE-2014-6485 | Unspecified vulnerability in Oracle Java SE 8u20 and JavaFX 2.2.65 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. | [
"cpe:2.3:a:oracle:jre:1.8.0:update_20:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
CVE-2024-6242 | Rockwell Automation Chassis Restrictions Bypass Vulnerability in Select Logix Devices | A vulnerability exists in Rockwell Automation affected products that allows a threat actor to bypass the Trusted® Slot feature in a ControlLogix® controller. If exploited on any affected module in a 1756 chassis, a threat actor could potentially execute CIP commands that modify user projects and/or device configuration on a Logix controller in the chassis. | [] | 7.3 | null | null | null |
GHSA-qhvg-j82m-w264 | MariaDB before 10.6.2 allows an application crash because of mishandling of a pushdown from a HAVING clause to a WHERE clause. | [] | null | 5.5 | null | null |
|
GHSA-g9w9-w88h-63r7 | A vulnerability classified as problematic has been found in SimplePHPscripts News Script PHP Pro 2.4. This affects an unknown part of the file /preview.php of the component URL Parameter Handler. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The identifier VDB-233289 was assigned to this vulnerability. | [] | null | null | 3.5 | null |
|
GHSA-5jgv-8q3q-fffv | The PDF Flipbook, 3D Flipbook WordPress – DearFlip WordPress plugin before 1.7.10 does not escape the class attribute of its shortcode before outputting it back in an attribute, which could allow users with a role as low as Contributor to perform Stored Cross-Site Scripting attacks | [] | null | null | null | null |
|
GHSA-38p6-9wh4-q95c | A vulnerability classified as problematic was found in aitangbao springboot-manager 3.0. This vulnerability affects unknown code of the file /sys/dept. The manipulation of the argument name leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well. The vendor was contacted early about this disclosure but did not respond in any way. | [] | 4.8 | 2.4 | null | null |
|
GHSA-wgvj-j87f-295m | IBM MQ 9.2 LTS, 9.3 LTS, and 9.3 CD Internet Pass-Thru could allow a remote user to cause a denial of service by sending HTTP requests that would consume all available resources. IBM X-Force ID: 281278. | [] | null | 7.5 | null | null |
|
CVE-2021-45682 | An issue was discovered in the bronzedb-protocol crate through 2021-01-03 for Rust. ReadKVExt may read from uninitialized memory locations. | [
"cpe:2.3:a:bronzedb-protocol_project:bronzedb-protocol:0.1.0:*:*:*:*:rust:*:*"
] | null | 9.8 | null | 7.5 |
|
GHSA-c8f7-58h9-9239 | The SMTP Listener of Secure Email Gateway from Cellopoint does not properly validate user input, leading to a Buffer Overflow vulnerability. An unauthenticated remote attacker can exploit this vulnerability to execute arbitrary system commands on the remote server. | [] | null | 9.8 | null | null |
|
RHSA-2023:4064 | Red Hat Security Advisory: thunderbird security update | Mozilla: Use-after-free in WebRTC certificate generation Mozilla: Potential use-after-free from compartment mismatch in SpiderMonkey Mozilla: Fullscreen notification obscured Mozilla: Lack of warning when opening Diagcab files Mozilla: Memory safety bugs fixed in Firefox 115, Firefox ESR 102.13, and Thunderbird 102.13 | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 8.8 | null | null |
GHSA-vw6m-fc47-cf73 | Squid 2.4 STABLE3 and earlier does not properly disable HTCP, even when "htcp_port 0" is specified in squid.conf, which could allow remote attackers to bypass intended access restrictions. | [] | null | null | null | null |
|
RHSA-2009:0258 | Red Hat Security Advisory: thunderbird security update | Firefox layout crashes with evidence of memory corruption Firefox javascript crashes with evidence of memory corruption Firefox local file stealing with SessionStore Firefox 2 and 3 - Layout engine crashes Firefox 2 and 3 crashes in the JavaScript engine Firefox XUL Linked Clones Double Free Vulnerability Firefox XML data theft via RDFXMLDataSource and cross-domain redirect | [
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client"
] | null | null | null | null |
GHSA-5cr8-75x7-7j9w | SQL Server Native Client Remote Code Execution Vulnerability | [] | null | 8.8 | null | null |
|
GHSA-g27q-hphj-9pm4 | SQL injection vulnerability in the Photo Gallery plugin 1.2.7 for WordPress allows remote attackers to execute arbitrary SQL commands via the order_by parameter in a GalleryBox action to wp-admin/admin-ajax.php. | [] | null | null | null | null |
|
GHSA-v5fp-vjgx-32cr | There is a SEGV in Exiv2::Internal::TiffParserWorker::findPrimaryGroups of tiffimage_int.cpp in Exiv2 0.27-RC3. A crafted input will lead to a remote denial of service attack. | [] | null | null | 6.5 | null |
|
GHSA-68cm-mgv7-vg5c | Directory Traversal in utahcityfinder | Affected versions of `utahcityfinder` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.**Example request:**RecommendationNo patch is available for this vulnerability.It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead. | [] | null | null | 7.5 | null |
CVE-2008-4321 | Buffer overflow in FlashGet (formerly JetCar) FTP 1.9 allows remote FTP servers to execute arbitrary code via a long response to the PWD command. | [
"cpe:2.3:a:flashget:flashget_ftp:1.9:*:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
GHSA-wcqp-hrg4-jgjg | In the Linux kernel, the following vulnerability has been resolved:mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again(struct dirty_throttle_control *)->thresh is an unsigned long, but is
passed as the u32 divisor argument to div_u64(). On architectures where
unsigned long is 64 bytes, the argument will be implicitly truncated.Use div64_u64() instead of div_u64() so that the value used in the "is
this a safe division" check is the same as the divisor.Also, remove redundant cast of the numerator to u64, as that should happen
implicitly.This would be difficult to exploit in memcg domain, given the ratio-based
arithmetic domain_drity_limits() uses, but is much easier in global
writeback domain with a BDI_CAP_STRICTLIMIT-backing device, using e.g.
vm.dirty_bytes=(1<<32)*PAGE_SIZE so that dtc->thresh == (1<<32) | [] | null | null | null | null |
|
CVE-2023-52112 | Unauthorized file access vulnerability in the wallpaper service module. Successful exploitation of this vulnerability may cause features to perform abnormally. | [
"cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:2.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*"
] | null | 5.3 | null | null |
|
GHSA-p29c-jpgj-v57r | Froxlor arbitrary code execution via the database configuration options | An issue was discovered in Froxlor before 0.10.14. Remote attackers with access to the installation routine could have executed arbitrary code via the database configuration options that were passed unescaped to exec, because of _backupExistingDatabase in install/lib/class.FroxlorInstall.php. | [] | null | 8.8 | null | null |
cisco-sa-amp-imm-dll-tu79hvkO | Cisco Advanced Malware Protection for Endpoints Windows Connector, ClamAV for Windows, and Immunet DLL Hijacking Vulnerability | A vulnerability in the dynamic link library (DLL) loading mechanism in Cisco Advanced Malware Protection (AMP) for Endpoints Windows Connector, ClamAV for Windows, and Immunet could allow an authenticated, local attacker to perform a DLL hijacking attack on an affected Windows system. To exploit this vulnerability, the attacker would need valid credentials on the system.
The vulnerability is due to insufficient validation of directory search paths at run time. An attacker could exploit this vulnerability by placing a malicious DLL file on an affected system. A successful exploit could allow the attacker to execute arbitrary code with SYSTEM privileges.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
| [] | null | 7 | null | null |
GHSA-6gc3-p5fw-m833 | A stack-based buffer overflow in processCommandUploadLog in libcommon.so in Petwant PF-103 firmware 4.22.2.42 and Petalk AI 3.2.2.30 allows remote attackers to cause denial of service or run arbitrary code as the root user. | [] | null | null | null | null |
|
CVE-2025-32553 | WordPress RestroPres Plugin <= 3.1.8.4 - Reflected Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Magnigenie RestroPress allows Reflected XSS. This issue affects RestroPress: from n/a through 3.1.8.4. | [] | null | 7.1 | null | null |
CVE-2005-4624 | The m_join function in channel.c for PTnet ircd 1.5 and 1.6 allows remote attackers to cause a denial of service (memory exhaustion that triggers a daemon restart) via a large number of requests to join a "charmed channel" such as PTnet, #PTnoticias and #*.log, which causes ircd to open the channel even though it does not have any valid users. | [
"cpe:2.3:a:ptnet:ptnet_ircd:1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ptnet:ptnet_ircd:1.6:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2004-2417 | Format string vulnerability in smtp.c for smtp.proxy 1.1.3 and earlier allows remote attackers to execute arbitrary code via format string specifiers in the (1) client hostname or (2) message-id, which are injected into a syslog message. | [
"cpe:2.3:a:smtp.proxy:smtp.proxy:1.1.3:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2006-3560 | SQL injection vulnerability in topics.php in Blue Dojo Graffiti Forums 1.0 allows remote attackers to execute arbitrary SQL commands via the f parameter. | [
"cpe:2.3:a:blue_dojo:graffiti_forums:1.0:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-7962-fqpx-4h4f | The Web Proxy Auto-Discovery (WPAD) functionality in Microsoft .NET Framework 2.0 SP2, 3.5, 3.5.1, 4, and 4.5 does not validate configuration data that is returned during acquisition of proxy settings, which allows remote attackers to execute arbitrary JavaScript code by providing crafted data during execution of (1) an XAML browser application (aka XBAP) or (2) a .NET Framework application, aka "Web Proxy Auto-Discovery Vulnerability." | [] | null | null | null | null |
|
CVE-2023-5853 | Incorrect security UI in Downloads in Google Chrome prior to 119.0.6045.105 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Medium) | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*"
] | null | 4.3 | null | null |
|
GHSA-8vxv-2766-5v4v | Luxion KeyShot JT File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Luxion KeyShot. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of jt files. The issue results from the lack of proper validation of user-supplied data, which can result in a read before the start of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-23826. | [] | null | null | 7.8 | null |
|
GHSA-c5wx-4cqq-ff6w | Mesa Labs AmegaView version 3.0 is vulnerable to a command injection, which may allow an attacker to remotely execute arbitrary code. | [] | null | null | null | null |
|
CVE-2013-1933 | The extract_from_ocr function in lib/docsplit/text_extractor.rb in the Karteek Docsplit (karteek-docsplit) gem 0.5.4 for Ruby allows context-dependent attackers to execute arbitrary commands via shell metacharacters in a PDF filename. | [
"cpe:2.3:a:documentcloud:karteek-docsplit:0.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
CVE-2023-3178 | POST SMTP Mailer < 2.5.7 - Arbitrary Log Deletion via CSRF | The POST SMTP Mailer WordPress plugin before 2.5.7 does not have proper CSRF checks in some AJAX actions, which could allow attackers to make logged in users with the manage_postman_smtp capability delete arbitrary logs via a CSRF attack. | [
"cpe:2.3:a:wpexperts:post_smtp:*:*:*:*:*:wordpress:*:*"
] | null | 4.3 | null | null |
CVE-2019-10991 | In WebAccess/SCADA, Versions 8.3.5 and prior, multiple stack-based buffer overflow vulnerabilities are caused by a lack of proper validation of the length of user-supplied data. Exploitation of these vulnerabilities may allow remote code execution. | [
"cpe:2.3:a:advantech:webaccess:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
|
CVE-2024-3220 | Default mimetype known files writeable on Windows | There is a defect in the CPython standard library module “mimetypes” where on Windows the default list of known file locations are writable meaning other users can create invalid files to cause MemoryError to be raised on Python runtime startup or have file extensions be interpreted as the incorrect file type.
This defect is caused by the default locations of Linux and macOS platforms (such as “/etc/mime.types”) also being used on Windows, where they are user-writable locations (“C:\etc\mime.types”).
To work-around this issue a user can call mimetypes.init() with an empty list (“[]”) on Windows platforms to avoid using the default list of known file locations. | [] | 2.3 | null | null | null |
CVE-2025-22402 | Dell Update Manager Plugin, version(s) 1.5.0 through 1.6.0, contain(s) an Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Information exposure. | [] | null | 2.6 | null | null |
|
GHSA-cmhm-c9j2-c4m6 | A vulnerability classified as problematic was found in H3C GR-1100-P, GR-1108-P, GR-1200W, GR-1800AX, GR-2200, GR-3200, GR-5200, GR-8300, ER2100n, ER2200G2, ER3200G2, ER3260G2, ER5100G2, ER5200G2 and ER6300G2 up to 20230908. This vulnerability affects unknown code of the file /userLogin.asp of the component Config File Handler. The manipulation leads to path traversal. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. VDB-240238 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | [] | null | null | 3.7 | null |
|
RHSA-2011:0464 | Red Hat Security Advisory: kdelibs security update | kdelibs: SSL certificate for IP address accepted as valid for hosts that resolve to the IP kdelibs: partially universal XSS in Konqueror error pages | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
GHSA-5w2g-x88g-pwjj | In Content, here is a possible way to determine whether an app is installed, without query permissions, due to side channel information disclosure. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. | [] | null | 5.5 | null | null |
|
CVE-2019-11585 | The startup.jsp resource in Jira before version 7.13.6, from version 8.0.0 before version 8.2.3, and from version 8.3.0 before version 8.3.2 allows remote attackers to redirect users to a different website which they may use as part of performing a phishing attack via an open redirect. | [
"cpe:2.3:a:atlassian:jira:*:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:jira_server:*:*:*:*:*:*:*:*"
] | null | null | 6.1 | 5.8 |
|
GHSA-jmgx-h3ph-4gpf | In lwis_buffer_alloc of lwis_buffer.c, there is a possible arbitrary code execution due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-209436980References: N/A | [] | null | 6.7 | null | null |
|
CVE-2025-23107 | An issue was discovered in Samsung Mobile Processor Exynos 1480 and 2400. The lack of a length check leads to out-of-bounds writes. | [] | null | 8.6 | null | null |
|
CVE-2015-7912 | The Ice Faces servlet in ag_server_service.exe in the AggreGate Server Service in Tibbo AggreGate before 5.30.06 allows remote attackers to upload and execute arbitrary Java code via a crafted XML document. | [
"cpe:2.3:a:tibbo:aggregate:*:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
GHSA-5rcp-4jvr-rpqr | Luxion KeyShot DAE File Parsing Access of Uninitialized Pointer Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Luxion KeyShot. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of dae files. The issue results from the lack of proper initialization of a pointer prior to accessing it. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-23698. | [] | null | null | 7.8 | null |
|
GHSA-28xh-wpgr-7fm8 | Command Injection in open | Versions of `open` before 6.0.0 are vulnerable to command injection when unsanitized user input is passed in.The package does come with the following warning in the readme:Recommendation`open` is now the deprecated `opn` package. Upgrading to the latest version is likely have unwanted effects since it now has a very different API but will prevent this vulnerability. | [] | null | null | null | null |
GHSA-34pj-24jp-2jcf | Unspecified vulnerability in Oracle MySQL Server 5.6.12 and earlier allows remote authenticated users to affect availability via unknown vectors related to InnoDB, a different vulnerability than CVE-2013-5793. | [] | null | null | null | null |
|
GHSA-fc9r-7hhq-7wqj | An issue was discovered in Optimizely EPiServer.CMS.Core before 12.32.0. A medium-severity vulnerability exists in the CMS, where the application does not properly validate uploaded files. This allows the upload of potentially malicious file types, including .docm .html. When accessed by application users, these files can be used to execute malicious actions or compromise users' systems. | [] | null | 8 | null | null |
|
CVE-2023-0125 | Control iD Gerencia Web Web Interface cross site scripting | A vulnerability was found in Control iD Gerencia Web 1.30. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the component Web Interface. The manipulation of the argument Nome leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-217717 was assigned to this vulnerability. | [
"cpe:2.3:a:control_id_panel_project:control_id_panel:-:*:*:*:*:*:*:*"
] | null | 2.4 | 2.4 | 3.3 |
RHSA-2014:0831 | Red Hat Security Advisory: Red Hat Developer Toolset Version 1 Retirement Notice | This is the final notification for the retirement of Red Hat Developer
Toolset Version 1. This notification applies only to those customers with
subscriptions for Red Hat Developer Toolset Version 1. | [] | null | null | null | null |
GHSA-cv78-m463-jgpw | Tenda W30E V1.0.1.25(633) was discovered to contain a stack overflow via the page parameter at /goform/webExcptypemanFilter. | [] | null | 7.5 | null | null |
|
GHSA-qjg7-q66x-8cc5 | The Musulmanin.com (aka com.wSalyafiyailimurdjiya) application 0.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [] | null | null | null | null |
|
GHSA-9hx8-2mrv-r674 | Deserialization of Untrusted Data in Apache jUDDI | Apache jUDDI uses several classes related to Java's Remote Method Invocation (RMI) which (as an extension to UDDI) provides an alternate transport for accessing UDDI services.RMI uses the default Java serialization mechanism to pass parameters in RMI invocations. A remote attacker can send a malicious serialized object to the above RMI entries. The objects get deserialized without any check on the incoming data. In the worst case, it may let the attacker run arbitrary code remotely.For both jUDDI web service applications and jUDDI clients, the usage of RMI is disabled by default. Since this is an optional feature and an extension to the UDDI protocol, the likelihood of impact is low. Starting with 3.3.10, all RMI related code was removed. | [] | null | 9.8 | null | null |
CVE-2018-14274 | This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the scroll method. By performing actions in JavaScript, an attacker can trigger a type confusion condition. An attacker can leverage this vulnerability to execute code under the context of the current process. Was ZDI-CAN-6037. | [
"cpe:2.3:a:foxitsoftware:foxit_reader:*:*:*:*:*:*:*:*",
"cpe:2.3:a:foxitsoftware:phantompdf:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.8 |
|
RHSA-2012:1041 | Red Hat Security Advisory: redhat-ds-base security update | rhds/389: plaintext password disclosure flaw rhds/389: plaintext password disclosure in audit log | [
"cpe:/a:redhat:directory_server:8::el5"
] | null | null | null | null |
CVE-2010-3018 | RSA Access Manager Server 5.5.3 before 5.5.3.172, 6.0.4 before 6.0.4.53, and 6.1 before 6.1.2.01 does not properly perform cache updates, which allows remote attackers to obtain sensitive information via unspecified vectors. | [
"cpe:2.3:a:rsa:access_manager_server:5.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:rsa:access_manager_server:6.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:rsa:access_manager_server:6.1:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2025-47849 | Apache CloudStack: Insecure access of user's API/Secret Keys in the same domain | A privilege escalation vulnerability exists in Apache CloudStack versions 4.10.0.0 through 4.20.0.0 where a malicious Domain Admin user in the ROOT domain can get the API key and secret key of user-accounts of Admin role type in the same domain. This operation is not appropriately restricted and allows the attacker to assume control over higher-privileged user-accounts. A malicious Domain Admin attacker can impersonate an Admin user-account and gain access to sensitive APIs and resources that could result in the compromise of resource integrity and confidentiality, data loss, denial of service, and availability of infrastructure managed by CloudStack.
Users are recommended to upgrade to Apache CloudStack 4.19.3.0 or 4.20.1.0, which fixes the issue with the following:
* Strict validation on Role Type hierarchy: the caller's role must be equal to or higher than the target user's role.
* API privilege comparison: the caller must possess all privileges of the user they are operating on.
* Two new domain-level settings (restricted to the default admin):
- role.types.allowed.for.operations.on.accounts.of.same.role.type: Defines which role types are allowed to act on users of the same role type. Default: "Admin, DomainAdmin, ResourceAdmin".
- allow.operations.on.users.in.same.account: Allows/disallows user operations within the same account. Default: true. | [] | null | 8.8 | null | null |
CVE-2019-25051 | objstack in GNU Aspell 0.60.8 has a heap-based buffer overflow in acommon::ObjStack::dup_top (called from acommon::StringMap::add and acommon::Config::lookup_list). | [
"cpe:2.3:a:gnu:aspell:0.60.8:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*"
] | null | 7.8 | null | 4.6 |
|
CVE-2021-27762 | HCL BigFix Platform is affected by misconfigured security-related HTTP headers | Misconfigured security-related HTTP headers: Several security-related headers were missing or mis-configured on the web responses | [
"cpe:2.3:a:hcltech:bigfix_platform:*:*:*:*:*:*:*:*"
] | null | 4.7 | null | null |
RHSA-2019:4098 | Red Hat Security Advisory: OpenShift Container Platform 4.2 ose-cluster-kube-controller-manager-operator-container security update | library-go: Secret data written to static pod logs when operator set at Debug level or higher | [
"cpe:/a:redhat:openshift:4.2::el7"
] | null | null | 5.3 | null |
GHSA-76j2-hf4j-xjhq | An out-of-bounds memory access flaw was found in the Linux kernel Intel’s iSMT SMBus host controller driver in the way a user triggers the I2C_SMBUS_BLOCK_DATA (with the ioctl I2C_SMBUS) with malicious input data. This flaw allows a local user to crash the system. | [] | null | 5.5 | null | null |
|
RHSA-2019:2977 | Red Hat Security Advisory: bind security update | bind: Limiting simultaneous TCP clients is ineffective | [
"cpe:/o:redhat:rhel_eus:7.5::computenode",
"cpe:/o:redhat:rhel_eus:7.5::server"
] | null | null | 8.6 | null |
CVE-2025-24829 | Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis Cyber Protect Cloud Agent (Windows) before build 39378. | [] | null | null | 6.3 | null |
|
CVE-2025-39567 | WordPress Web Directory Free plugin <= 1.7.8 - Reflected Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Shamalli Web Directory Free allows Reflected XSS. This issue affects Web Directory Free: from n/a through 1.7.8. | [] | null | 7.1 | null | null |
CVE-2012-6648 | gdm/guest-session-cleanup.sh in gdm-guest-session 0.24 and earlier, as used in Ubuntu Linux 10.04 LTS, 10.10, and 11.04, allows local users to delete arbitrary files via a space in the name of a file in /tmp. NOTE: this identifier was SPLIT from CVE-2012-0943 per ADT1/ADT2 due to different codebases and affected versions. CVE-2012-0943 is used for the guest-account issue. | [
"cpe:2.3:a:gdm-guest-session_project:gdm-guest-session:*:*:*:*:*:*:*:*",
"cpe:2.3:a:gdm-guest-session_project:gdm-guest-session:0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:gdm-guest-session_project:gdm-guest-session:0.21:*:*:*:*:*:*:*",
"cpe:2.3:a:gdm-guest-session_project:gdm-guest-session:0.22:*:*:*:*:*:*:*",
"cpe:2.3:a:gdm-guest-session_project:gdm-guest-session:0.23:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*"
] | null | null | null | 2.1 |
|
GHSA-2p4f-vc9q-r5vp | Typo3 Arbitrary file upload and XML External Entity processing | It has been discovered that Flow 3.0.0 allows arbitrary file uploads, inlcuding server-side scripts, posing the risk of attacks. If those scripts are executed by the server when accessed through their public URL, anything not blocked through other means is possible (information disclosure, placement of backdoors, data removal, …).Note: The upload of files is only possible if the application built on Flow provides means to do so, and whether or not the upload of files poses a risk is dependent on the system setup. If uploaded script files are not executed by the server, there is no risk. In versions prior to 3.0.0 the upload of files with the extension php was blocked.In Flow 2.3.0 to 2.3.6 a potential XML External Entity processing vulnerability has been discovered in the MediaTypeConverter. | [] | null | null | null | null |
GHSA-qmwh-rh2g-3682 | Magento 2 Community Edition Cross-site Scripting Vulnerability | A stored cross-site scripting vulnerability exists in the admin panel of Magento Open Source prior to 1.9.4.2, and Magento Commerce prior to 1.14.4.2, Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2. This could be exploited by an authenticated user with privileges to newsletter templates. | [] | null | null | 4.8 | null |
CVE-2004-1228 | The install scripts in SugarCRM Sugar Sales 2.0.1c and earlier are not removed after installation, which allows attackers to obtain the MySQL administrative password in cleartext from an installation form, or to cause a denial of service by changing database settings to the default. | [
"cpe:2.3:a:sugarcrm:sugar_sales:*:*:*:*:*:*:*:*"
] | null | null | null | 6.4 |
|
GHSA-w7w4-rx65-9vww | An exploitable NULL pointer dereference vulnerability exists in the tinysvcmdns library version 2017-11-05. A specially crafted packet can make the library dereference a NULL pointer leading to a server crash and denial of service. An attacker needs to send a DNS query to trigger this vulnerability. | [] | null | null | 7.5 | null |
|
GHSA-fx7f-7phm-xwv9 | ZNC 1.0 allows remote authenticated users to cause a denial of service (NULL pointer reference and crash) via a crafted request to the (1) editnetwork, (2) editchan, (3) addchan, or (4) delchan page in modules/webadmin.cpp. | [] | null | null | null | null |
|
GHSA-7549-2wm3-m2v6 | A vulnerability was found in code-projects Wazifa System 1.0. It has been classified as critical. This affects an unknown part of the file /controllers/logincontrol.php. The manipulation of the argument username leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. | [] | 6.9 | 7.3 | null | null |
|
RHSA-2024:0267 | Red Hat Security Advisory: java-17-openjdk security and bug fix update | OpenJDK: array out-of-bounds access due to missing range check in C1 compiler (8314468) OpenJDK: JVM class file verifier flaw allows unverified bytecode execution (8314295) OpenJDK: range check loop optimization issue (8314307) OpenJDK: incorrect handling of ZIP files with duplicate entries (8276123) OpenJDK: logging of digital signature private keys (8316976) OpenJDK: RSA padding issue and timing side-channel attack against TLS (8317547) | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/a:redhat:rhel_eus:8.8::appstream",
"cpe:/a:redhat:rhel_eus:8.8::crb",
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/a:redhat:rhel_eus:9.2::crb"
] | null | 7.4 | null | null |
CVE-2018-2846 | Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Performance Schema). Supported versions that are affected are 5.7.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | [
"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*",
"cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*",
"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*"
] | null | null | 4.9 | 4 |
|
GHSA-c29m-p6xf-ppgw | An issue has been found in the API component of PowerDNS Authoritative 4.x up to and including 4.0.4 and 3.x up to and including 3.4.11, where some operations that have an impact on the state of the server are still allowed even though the API has been configured as read-only via the api-readonly keyword. This missing check allows an attacker with valid API credentials to flush the cache, trigger a zone transfer or send a NOTIFY. | [] | null | null | 7.1 | null |
|
GHSA-24pf-h82m-5vvv | An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A stack out-of-bounds write in onigenc_unicode_get_case_fold_codes_by_str() occurs during regular expression compilation. Code point 0xFFFFFFFF is not properly handled in unicode_unfold_key(). A malformed regular expression could result in 4 bytes being written off the end of a stack buffer of expand_case_fold_string() during the call to onigenc_unicode_get_case_fold_codes_by_str(), a typical stack buffer overflow. | [] | null | null | 9.8 | null |
|
GHSA-fwcw-5qw2-87mp | fuelux vulnerable to Cross-Site Scripting in Pillbox feature | Affected versions of `fuelux` contain a cross-site scripting vulnerability in the Pillbox feature. By supplying a script as a value for a new pillbox, it is possible to cause arbitrary script execution.RecommendationUpdate to version 3.15.7 or later. | [] | null | null | null | null |
CVE-2019-19070 | A memory leak in the spi_gpio_probe() function in drivers/spi/spi-gpio.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering devm_add_action_or_reset() failures, aka CID-d3b0ffa1d75d. NOTE: third parties dispute the relevance of this because the system must have already been out of memory before the probe began | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.5:rc1:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*"
] | null | 7.5 | null | 7.8 |
|
GHSA-73xm-rcxq-249m | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Metagauss RegistrationMagic.This issue affects RegistrationMagic: from n/a through 5.1.9.2. | [] | null | 5.3 | null | null |
|
GHSA-8w9v-5prf-r8mm | PHP remote file inclusion vulnerability in admin.tour_toto.php in the Tour de France Pool (com_tour_toto) 1.0.1 module for Joomla! allows remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter. | [] | null | null | null | null |
|
CVE-2023-28383 | Improper conditions check in some Intel(R) BIOS PPAM firmware may allow a privileged user to potentially enable escalation of privilege via local access. | [
"cpe:2.3:h:intel:tiger_lake:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:alder_lake:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:comet_lake:-:*:*:*:client:*:*:*",
"cpe:2.3:h:intel:rocket_lake:-:*:*:*:*:*:*:*"
] | null | 6.1 | null | null |
|
GHSA-xf6g-wjr6-2444 | Tenda AC9 v15.03.2.21 was discovered to contain a stack overflow via the deviceId parameter in the saveparentcontrolinfo function. | [] | null | 9.8 | null | null |
|
CVE-2017-12787 | A network interface of the novi_process_manager_daemon service, included in the NoviWare software distribution through NW400.2.6 and deployed on NoviSwitch devices, can be inadvertently exposed if an operator attempts to modify ACLs, because of a bug when ACL modifications are applied. This could be leveraged by remote, unauthenticated attackers to gain resultant privileged (root) code execution on the switch, because incoming packet data can contain embedded OS commands, and can also trigger a stack-based buffer overflow. | [
"cpe:2.3:a:noviflow:noviware:*:*:*:*:*:*:*:*"
] | null | null | 9.8 | 10 |
|
CVE-2009-4356 | Multiple integer overflows in the jpeg.w5s and png.w5s filters in Winamp before 5.57 allow remote attackers to execute arbitrary code via malformed (1) JPEG or (2) PNG data in an MP3 file. | [
"cpe:2.3:a:nullsoft:winamp:*:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:0.20a:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:0.92:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:1.006:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:1.90:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:2.5e:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:2.6x:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:2.7x:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:2.24:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:2.50:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:2.60:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:2.60:*:full:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:2.60:*:lite:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:2.61:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:2.61:*:full:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:2.62:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:2.62:*:standard:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:2.64:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:2.64:*:standard:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:2.65:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:2.70:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:2.70:*:full:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:2.71:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:2.72:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:2.73:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:2.73:*:full:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:2.74:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:2.75:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:2.76:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:2.77:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:2.78:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:2.79:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:2.80:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:2.81:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:2.90:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:2.91:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:2.92:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:2.95:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.01:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.1:-:surround:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.02:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.03:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.03a:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.04:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.05:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.06:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.07:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.08:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.08:c:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.08:d:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.08:e:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.08c:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.08d:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.08e:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.09:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.11:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.12:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.13:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.21:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.22:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.23:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.24:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.31:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.32:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.33:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.34:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.35:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.36:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.51:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.52:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.53:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.54:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.55:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.091:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.093:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.094:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.111:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.112:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.531:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.541:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.551:*:*:*:*:*:*:*",
"cpe:2.3:a:nullsoft:winamp:5.552:*:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
CVE-2017-8513 | A remote code execution vulnerability exists in Microsoft PowerPoint when the software fails to properly handle objects in memory, aka "Microsoft PowerPoint Remote Code Execution Vulnerability". | [
"cpe:2.3:a:microsoft:powerpoint:2007:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_server:2007:sp3:*:*:*:*:*:*"
] | null | null | 7.8 | 9.3 |
|
GHSA-2c6h-xvj7-f2xc | Win32k Elevation of Privilege Vulnerability | [] | null | 7.8 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.