id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-3q6w-vp42-26vx | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Ajay Sharma wordpress login form to anywhere allows Stored XSS. This issue affects wordpress login form to anywhere: from n/a through 0.2. | [] | null | 5.9 | null | null |
|
GHSA-wj5v-7qmm-hqcg | Huawei FusionSphere OpenStack V100R006C000SPC102 (NFV) has an information leak vulnerability due to the use of a low version transmission protocol by default. An attacker could intercept packets transferred by a target device. Successful exploit could cause an information leak. | [] | null | null | 3.7 | null |
|
GHSA-w9j2-68r5-mpp4 | A vulnerability was found in ageerle ruoyi-ai up to 2.0.1 and classified as critical. Affected by this issue is some unknown functionality of the file ruoyi-modules/ruoyi-system/src/main/java/org/ruoyi/system/controller/system/SysModelController.java of the component API Interface. The manipulation leads to improper authorization. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 2.0.2 is able to address this issue. The name of the patch is c0daf641fb25b244591b7a6c3affa35c69d321fe. It is recommended to upgrade the affected component. | [] | 6.9 | 7.3 | null | null |
|
CVE-2025-27702 | Permissions bypass in the management console of Absolute Secure Access prior to version 13.54 | CVE-2025-27702 is a vulnerability in the management console of Absolute
Secure Access prior to version 13.54. Attackers with administrative
access to the console and who have been assigned a certain set of
permissions can bypass those permissions to improperly modify settings.
The attack complexity is low, there are no preexisting attack
requirements; the privileges required are high, and there is no user
interaction required. There is no impact to system confidentiality or
availability, impact to system integrity is high. | [] | 6.9 | null | null | null |
CVE-2013-0915 | The GPU process in Google Chrome OS before 25.0.1364.173 allows attackers to cause a denial of service or possibly have unspecified other impact via vectors related to an "overflow." | [
"cpe:2.3:o:google:chrome_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.3:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.5:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.7:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.8:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.9:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.10:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.11:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.12:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.13:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.14:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.15:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.16:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.17:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.18:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.19:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.20:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.21:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.22:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.23:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.24:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.25:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.26:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.27:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.28:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.29:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.30:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.31:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.32:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.33:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.34:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.35:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.36:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.37:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.38:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.39:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.40:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.41:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.42:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.43:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.44:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.45:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.46:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.47:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.48:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.49:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.50:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.51:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.52:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.53:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.54:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.55:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.56:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.57:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.58:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.61:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.62:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.63:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.65:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.66:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.67:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.68:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.70:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.72:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.73:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.74:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.75:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.76:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.77:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.78:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.79:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.80:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.81:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.82:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.84:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.85:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.86:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.87:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.88:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.89:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.90:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.91:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.92:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.93:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.95:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.98:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.99:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.108:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.110:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.112:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.113:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.114:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.115:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.116:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.117:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.118:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.119:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.120:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.121:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.122:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.123:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.124:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.125:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.126:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.152:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.154:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.155:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.156:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.159:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.160:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.161:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.168:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.169:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.170:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:25.0.1364.171:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
GHSA-7jhf-r279-2cjx | The SSL client implementation in BEA WebLogic Server 7.0 SP7, 8.1 SP2 through SP6, 9.0, 9.1, 9.2 Gold through MP2, and 10.0 sometimes selects the null cipher when others are available, which might allow remote attackers to intercept communications. | [] | null | null | null | null |
|
CVE-2025-4807 | SourceCodester Online Student Clearance System exposure of information through directory listing | A vulnerability, which was classified as problematic, was found in SourceCodester Online Student Clearance System 1.0. This affects an unknown part. The manipulation leads to exposure of information through directory listing. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. | [] | 6.9 | 5.3 | 5.3 | 5 |
CVE-1999-0876 | Buffer overflow in Internet Explorer 4.0 via EMBED tag. | [
"cpe:2.3:a:microsoft:ie:3.0:*:mac_os:*:*:*:*:*",
"cpe:2.3:a:microsoft:ie:3.1:*:mac_os:*:*:*:*:*",
"cpe:2.3:a:microsoft:ie:4.0:a:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:4.1:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
CVE-2019-14611 | Integer overflow in firmware for Intel(R) NUC(R) may allow a privileged user to potentially enable escalation of privilege via local access. | [
"cpe:2.3:o:intel:nuc_8_mainstream_game_kit_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_8_mainstream_game_kit:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_8_mainstream_game_mini_computer_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_8_mainstream_game_mini_computer:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc8i7bek_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc8i7bek:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:cd1p64gk_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:cd1p64gk:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc8i3cysm_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc8i3cysm:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc8i7hnk_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc8i7hnk:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc7i7dnke_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc7i7dnke:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc7i5dnke_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc7i5dnke:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc7i3dnhe_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc7i3dnhe:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:stk2mv64cc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:stk2mv64cc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:stk2m3w64cc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:stk2m3w64cc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc6i7kyk_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc6i7kyk:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc6i5syh_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc6i5syh:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc7cjyh_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc7cjyh:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:cd1m3128mk_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:cd1m3128mk:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:cd1iv128mk_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:cd1iv128mk:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc6cays_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc6cays:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:de3815tybe_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:de3815tybe:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:d34010wyb_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:d34010wyb:-:*:*:*:*:*:*:*"
] | null | 6.7 | null | 4.6 |
|
CVE-2022-49373 | watchdog: ts4800_wdt: Fix refcount leak in ts4800_wdt_probe | In the Linux kernel, the following vulnerability has been resolved:
watchdog: ts4800_wdt: Fix refcount leak in ts4800_wdt_probe
of_parse_phandle() returns a node pointer with refcount
incremented, we should use of_node_put() on it when done.
Add missing of_node_put() in some error paths. | [] | null | 5.5 | null | null |
CVE-2006-5888 | SQL injection vulnerability in viewarticle.asp in Superfreaker Studios UPublisher 1.0 allows remote attackers to execute arbitrary SQL commands via the ID parameter. | [
"cpe:2.3:a:superfreaker_studios:upublisher:1.0:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-r8xm-w48h-9p2p | A vulnerability in the web application of ctrlX OS allows a remote unauthenticated attacker to conduct various attacks against users of the vulnerable system, including web cache poisoning or Man-in-the-Middle (MitM), via a crafted HTTP request. | [] | null | 5 | null | null |
|
CVE-2000-0873 | netstat in AIX 4.x.x does not properly restrict access to the -Zi option, which allows local users to clear network interface statistics and possibly hide evidence of unusual network activities. | [
"cpe:2.3:o:ibm:aix:4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:4.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:4.3.2:*:*:*:*:*:*:*"
] | null | null | null | 2.1 |
|
CVE-2020-5571 | SHARP AQUOS series (AQUOS SH-M02 build number 01.00.05 and earlier, AQUOS SH-RM02 build number 01.00.04 and earlier, AQUOS mini SH-M03 build number 01.00.04 and earlier, AQUOS Keitai SH-N01 build number 01.00.01 and earlier, AQUOS L2 (UQ mobile/J:COM) build number 01.00.05 and earlier, AQUOS sense lite SH-M05 build number 03.00.04 and earlier, AQUOS sense (UQ mobile) build number 03.00.03 and earlier, AQUOS compact SH-M06 build number 02.00.02 and earlier, AQUOS sense plus SH-M07 build number 02.00.02 and earlier, AQUOS sense2 SH-M08 build number 02.00.05 and earlier, and AQUOS sense2 (UQ mobile) build number 02.00.06 and earlier) allow an attacker to obtain the sensitive information of the device via malicious applications installed on the device. | [
"cpe:2.3:o:sharp:aquos_sh-m02_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:aquos_sh-m02:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:aquos_sh-rm02_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:aquos_sh-rm02:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:aquos_mini_sh-m03_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:aquos_mini_sh-m03:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:aquos_l2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:aquos_l2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:aquos_sense_lite_sh-m05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:aquos_sense_lite_sh-m05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:aquos_sense_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:aquos_sense:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:aquos_compact_sh-m06_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:aquos_compact_sh-m06:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:aquos_sense_plus_sh-m07_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:aquos_sense_plus_sh-m07:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:aquos_sense2_sh-m08_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:aquos_sense2_sh-m08:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sharp:aquos_sense2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sharp:aquos_sense2:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
GHSA-2fxx-275j-35vm | EMC RSA Identity Governance and Lifecycle versions 7.0.1, 7.0.2 (all patch levels); RSA Via Lifecycle and Governance version 7.0 (all patch levels); and RSA Identity Management and Governance (IMG) version 6.9.1 (all patch levels) have Stored Cross Site Scripting vulnerabilities that could potentially be exploited by malicious users to compromise an affected system. | [] | null | 5.4 | null | null |
|
GHSA-p4j8-rc7w-24gr | An improper input validation the CSRF filter results in unsanitized user input written to the application logs. | [] | 5.3 | null | null | null |
|
CVE-2009-3425 | Directory traversal vulnerability in includes/inc.thcms_admin_dirtree.php in MaxCMS 3.11.20b allows remote attackers to read arbitrary files via directory traversal sequences in the thCMS_root parameter. | [
"cpe:2.3:a:databay:maxcms:3.11.20b:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2014-9962 | In all Android releases from CAF using the Linux kernel, a vulnerability exists in the parsing of a DRM provisioning command. | [
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | 9.3 |
|
CVE-2025-23593 | WordPress EmailPress plugin <= 1.0 - Reflected Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound EmailPress allows Reflected XSS. This issue affects EmailPress: from n/a through 1.0. | [] | null | 7.1 | null | null |
RHSA-2018:0241 | Red Hat Security Advisory: openstack-nova security and bug fix update | openstack-nova: Nova Filter Scheduler bypass through rebuild action | [
"cpe:/a:redhat:openstack:12::el7"
] | null | null | 5.4 | null |
CVE-2019-10771 | Characters in the GET url path are not properly escaped and can be reflected in the server response. | [
"cpe:2.3:a:iobroker:iobroker.web:*:*:*:*:*:node.js:*:*"
] | null | 6.1 | null | 4.3 |
|
CVE-2017-9978 | On the OSNEXUS QuantaStor v4 virtual appliance before 4.3.1, a flaw was found with the error message sent as a response for users that don't exist on the system. An attacker could leverage this information to fine-tune and enumerate valid accounts on the system by searching for common usernames. | [
"cpe:2.3:a:osnexus:quantastor:*:*:*:*:*:*:*:*"
] | null | null | 5.3 | 5 |
|
cisco-sa-anyconnect-dll-injec-pQnryXLf | Cisco AnyConnect Secure Mobility Client for Windows DLL Injection Vulnerability | A vulnerability in the Network Access Manager and Web Security Agent components of Cisco AnyConnect Secure Mobility Client for Windows could allow an authenticated, local attacker to perform a DLL injection attack. To exploit this vulnerability, the attacker would need to have valid credentials on the Windows system.
The vulnerability is due to insufficient validation of resources that are loaded by the application at run time. An attacker could exploit this vulnerability by inserting a configuration file in a specific path in the system which, in turn, causes a malicious DLL file to be loaded when the application starts. A successful exploit could allow the attacker to execute arbitrary code on the affected machine with SYSTEM privileges.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-anyconnect-dll-injec-pQnryXLf ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-anyconnect-dll-injec-pQnryXLf"] | [] | null | 7.8 | null | null |
CVE-2013-1227 | Cross-site scripting (XSS) vulnerability in the web framework in Cisco Unified Communications Domain Manager allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka Bug ID CSCug37902. | [
"cpe:2.3:a:cisco:unified_communications_domain_manager:-:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-3cj3-jrrp-9rxf | Unchecked Return Value in xcb | An issue was discovered in the xcb crate through 2021-02-04 for Rust. It has a soundness violation because transmutation to the wrong type can happen after xcb::base::cast_event uses std::mem::transmute to return a reference to an arbitrary type. | [] | null | 8.8 | null | null |
GHSA-v379-6hwf-84m7 | The do_tmem_op function in the Transcendent Memory (TMEM) in Xen 4.0, 4.1, and 4.2 allow local guest OS users to cause a denial of service (host crash) and possibly have other unspecified impacts via unspecified vectors related to "broken locking checks" in an "error path." NOTE: this issue was originally published as part of CVE-2012-3497, which was too general; CVE-2012-3497 has been SPLIT into this ID and others. | [] | null | null | null | null |
|
GHSA-jwrv-r6rm-vqh2 | This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View 10.15.0.75. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of JT files. Crafted data in a JT file can trigger a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14829. | [] | null | null | null | null |
|
CVE-2019-13951 | The set_ipv4() function in zscan_rfc1035.rl in gdnsd 3.x before 3.2.1 has a stack-based buffer overflow via a long and malformed IPv4 address in zone data. | [
"cpe:2.3:a:gdnsd:gdnsd:3.2.0:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 |
|
GHSA-6625-2573-pv96 | CouchDB version 3.0.0 shipped with a new configuration setting that governs access control to the entire database server called `require_valid_user_except_for_up`. It was meant as an extension to the long standing setting `require_valid_user`, which in turn requires that any and all requests to CouchDB will have to be made with valid credentials, effectively forbidding any anonymous requests. The new `require_valid_user_except_for_up` is an off-by-default setting that was meant to allow requiring valid credentials for all endpoints except for the `/_up` endpoint. However, the implementation of this made an error that lead to not enforcing credentials on any endpoint, when enabled. CouchDB versions 3.0.1[1] and 3.1.0[2] fix this issue. | [] | null | null | null | null |
|
CVE-2019-17651 | An Improper Neutralization of Input vulnerability in the description and title parameters of a Device Maintenance Schedule in FortiSIEM version 5.2.5 and below may allow a remote authenticated attacker to perform a Stored Cross Site Scripting attack (XSS) by injecting malicious JavaScript code into the description field of a Device Maintenance schedule. | [
"cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*"
] | null | 5.4 | null | 3.5 |
|
GHSA-hqr6-633p-3x2j | A vulnerability in the application protocol handling features of Cisco Jabber for Windows could allow an unauthenticated, remote attacker to execute arbitrary commands. The vulnerability is due to improper handling of input to the application protocol handlers. An attacker could exploit this vulnerability by convincing a user to click a link within a message sent by email or other messaging platform. A successful exploit could allow the attacker to execute arbitrary commands on a targeted system with the privileges of the user account that is running the Cisco Jabber client software. | [] | null | null | null | null |
|
GHSA-24c6-8h6m-mfm3 | Multiple low security issues were discovered and fixed in a security audit of Mozilla VPN 2.x branch as part of a 3rd party security audit. This vulnerability affects Mozilla VPN < 2.3. | [] | null | null | null | null |
|
GHSA-m5gm-p83p-6vg3 | The Belkin WeMo Home Automation firmware before 3949 does not properly use the STUN and TURN protocols, which allows remote attackers to hijack connections and possibly have unspecified other impact by leveraging access to a single WeMo device. | [] | null | null | null | null |
|
GHSA-rrgq-q24f-79wv | AVEVA Wonderware System Platform 2017 Update 2 and prior uses an ArchestrA network user account for authentication of system processes and inter-node communications. A user with low privileges could make use of an API to obtain the credentials for this account. | [] | null | 8.8 | null | null |
|
GHSA-2hgm-xvx6-w372 | Netwrix Password Secure through 9.2 allows command injection. | [] | null | 9.8 | null | null |
|
CVE-2006-4019 | Dynamic variable evaluation vulnerability in compose.php in SquirrelMail 1.4.0 to 1.4.7 allows remote attackers to overwrite arbitrary program variables and read or write the attachments and preferences of other users. | [
"cpe:2.3:a:squirrelmail:squirrelmail:1.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:squirrelmail:squirrelmail:1.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:squirrelmail:squirrelmail:1.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:squirrelmail:squirrelmail:1.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:squirrelmail:squirrelmail:1.4.3_r3:*:*:*:*:*:*:*",
"cpe:2.3:a:squirrelmail:squirrelmail:1.4.3_rc1:*:*:*:*:*:*:*",
"cpe:2.3:a:squirrelmail:squirrelmail:1.4.3a:*:*:*:*:*:*:*",
"cpe:2.3:a:squirrelmail:squirrelmail:1.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:squirrelmail:squirrelmail:1.4.4_rc1:*:*:*:*:*:*:*",
"cpe:2.3:a:squirrelmail:squirrelmail:1.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:squirrelmail:squirrelmail:1.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:squirrelmail:squirrelmail:1.4.6_rc1:*:*:*:*:*:*:*",
"cpe:2.3:a:squirrelmail:squirrelmail:1.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:squirrelmail:squirrelmail:1.4_rc1:*:*:*:*:*:*:*",
"cpe:2.3:a:squirrelmail:squirrelmail:1.44:*:*:*:*:*:*:*"
] | null | null | null | 6.4 |
|
GHSA-r62h-rf3r-q857 | The onReadyRead function in core/coreauthhandler.cpp in Quassel before 0.12.4 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via invalid handshake data. | [] | null | null | 7.5 | null |
|
GHSA-v9v2-h9rf-2p2j | Tenda AX3 v16.03.12.10_CN was discovered to contain a stack overflow in the function formSetVirtualSer. This vulnerability allows attackers to cause a Denial of Service (DoS) via the list parameter. | [] | null | null | null | null |
|
ICSA-23-173-02 | Advantech R-SeeNet | Advantech R-SeeNet is installed with a hidden root-level user that is not available in the users list. This hidden user has a password that cannot be changed by users. Advantech R-SeeNet allows low-level users to access and load the content of local files. | [] | null | null | 8.8 | null |
GHSA-38hh-g82x-9mpc | Windows Media Remote Code Execution Vulnerability | [] | null | 7.8 | null | null |
|
CVE-2021-30916 | A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 15.1 and iPadOS 15.1, macOS Monterey 12.0.1, iOS 14.8.1 and iPadOS 14.8.1, Security Update 2021-007 Catalina, macOS Big Sur 11.6.1. A malicious application may be able to execute arbitrary code with kernel privileges. | [
"cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:ipados:15.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:15.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-002:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-003:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-004:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-005:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-006:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:supplemental_update:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | 9.3 |
|
CVE-2023-28402 | Improper input validation in some Intel(R) BIOS Guard firmware may allow a privileged user to potentially enable escalation of privilege via local access. | [
"cpe:2.3:h:intel:whiskey_lake:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:alder_lake:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:tiger_lake:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:rocket_lake:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:ice_lake:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:comet_lake:-:*:*:*:client:*:*:*"
] | null | 7.2 | null | null |
|
GHSA-wr27-p9q7-3cvx | The MagicMotion Flamingo 2 application for Android stores data on an sdcard under com.vt.magicmotion/files/Pictures, whence it can be read by other applications. | [] | null | null | null | null |
|
GHSA-fwvv-qp3c-qpq6 | OTFCC commit 617837b was discovered to contain a heap buffer overflow via /release-x64/otfccdump+0x6b04de. | [] | null | 6.5 | null | null |
|
CVE-2021-35438 | phpIPAM 1.4.3 allows Reflected XSS via app/dashboard/widgets/ipcalc-result.php and app/tools/ip-calculator/result.php of the IP calculator. | [
"cpe:2.3:a:phpipam:phpipam:1.4.3:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 |
|
CVE-2025-27913 | Passbolt API before 5, if the server is misconfigured (with an incorrect installation process and disregarding of Health Check results), can send email messages with a domain name taken from an attacker-controlled HTTP Host header. | [] | 2.1 | null | null | null |
|
RHSA-2006:0577 | Red Hat Security Advisory: mutt security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
GHSA-2r5h-6r7v-5m7c | Symphony Vulnerable to PHP Code Injection via YAML Parsing | The `Yaml::parse` function in Symfony 2.0.x before 2.0.22 remote attackers to execute arbitrary PHP code via a PHP file, a different vulnerability than CVE-2013-1397. | [] | null | null | null | null |
GHSA-f78g-q7r4-9wcv | Division by 0 in `FractionalAvgPool` | ImpactAn attacker can cause a runtime division by zero error and denial of service in `tf.raw_ops.FractionalAvgPool`:This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/acc8ee69f5f46f92a3f1f11230f49c6ac266f10c/tensorflow/core/kernels/fractional_avg_pool_op.cc#L85-L89) computes a divisor quantity by dividing two user controlled values:The user controls the values of `input_size[i]` and `pooling_ratio_[i]` (via the `value.shape()` and `pooling_ratio` arguments). If the value in `input_size[i]` is smaller than the `pooling_ratio_[i]`, then the floor operation results in `output_size[i]` being 0. The `DCHECK_GT` line is a no-op outside of debug mode, so in released versions of TF this does not trigger.Later, these computed values [are used as arguments](https://github.com/tensorflow/tensorflow/blob/acc8ee69f5f46f92a3f1f11230f49c6ac266f10c/tensorflow/core/kernels/fractional_avg_pool_op.cc#L96-L99) to [`GeneratePoolingSequence`](https://github.com/tensorflow/tensorflow/blob/acc8ee69f5f46f92a3f1f11230f49c6ac266f10c/tensorflow/core/kernels/fractional_pool_common.cc#L100-L108). There, the first computation is a division in a modulo operation:Since `output_length` can be 0, this results in runtime crashing.PatchesWe have patched the issue in GitHub commit [548b5eaf23685d86f722233d8fbc21d0a4aecb96](https://github.com/tensorflow/tensorflow/commit/548b5eaf23685d86f722233d8fbc21d0a4aecb96).The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.For more informationPlease consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.AttributionThis vulnerability has been reported by Ying Wang and Yakun Zhang of Baidu X-Team. | [] | 2 | 2.5 | null | null |
GHSA-h47c-3xp5-g7fx | Cross-site request forgery (CSRF) vulnerability in hosting/admin_ac.php in ScriptsEz Mini Hosting Panel allows remote attackers to hijack the authentication of administrators for requests that alter administrative settings via a cp action. | [] | null | null | null | null |
|
GHSA-wr26-78p7-gpjj | The Data Camouflage (aka FairCom Standard Encryption) algorithm in FairCom c-treeACE does not ensure that a decryption key is needed for accessing database contents, which allows context-dependent attackers to read cleartext database records by copying a database to another system that has a certain default configuration. | [] | null | null | null | null |
|
GHSA-7p7j-x9w2-xpj5 | Advantech WebAccess 8.4.2 and 8.4.4 allows XSS via the username column of the bwRoot.asp page of WADashboard. | [] | null | null | null | null |
|
CVE-2024-36307 | A security agent link following vulnerability in Trend Micro Apex One and Apex One as a Service could allow a local attacker to disclose sensitive information about the agent on affected installations.
Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. | [
"cpe:2.3:a:trendmicro:apex_one:2019:*:*:*:*:*:*:*",
"cpe:2.3:a:trendmicro:apex_one:-:*:*:*:*:saas:*:*"
] | null | 4.7 | null | null |
|
CVE-2023-21649 | Buffer Copy Without Checking Size of Input (`Classic Buffer Overflow`) in WLAN | Memory corruption in WLAN while running doDriverCmd for an unspecific command. | [
"cpe:2.3:o:qualcomm:apq8096au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:aqt1000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9628_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6390_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6420_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6421_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6426_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6430_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6431_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6436_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6554a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6564a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6564au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6574_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6574a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6595_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca8337_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcc5100_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn9074_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs410_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs610_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa6145p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa6150p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8145p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8150p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8195p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd480_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd695_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd855_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd865_5g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd870_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sda429w_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx55m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdxr2_5g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm4375_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sw5100_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sw5100p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9341_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3610_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3660b_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3680b_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3991_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3998_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6850_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6851_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:apq8096au:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:aqt1000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9628:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9650:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6390:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6391:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6420:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6421:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6426:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6430:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6431:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6436:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6554a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6564a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6564au:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6574:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6574a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6584au:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6595:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6595au:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6696:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca8337:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcc5100:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn9074:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs410:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs610:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa6145p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa6150p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa6155p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8145p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8150p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8155p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8195p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd480:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd695:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd855:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd865_5g:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd870:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sda429w:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx55:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx55m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdxr2_5g:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm4375:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sw5100:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sw5100p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9341:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9375:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3610:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3660b:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3680b:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3950:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3980:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3988:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3991:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3998:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6850:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6851:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8810:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8815:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*"
] | null | 6.7 | null | null |
GHSA-699m-mcjm-9cw8 | actionpack vulnerable to Cross-site Scripting | Cross-site scripting (XSS) vulnerability in `actionpack/lib/action_view/helpers/translation_helper.rb` in the internationalization component in Ruby on Rails 3.x before 3.2.16 and 4.x before 4.0.2 allows remote attackers to inject arbitrary web script or HTML via a crafted string that triggers generation of a fallback string by the i18n gem. | [] | null | null | null | null |
GHSA-ffpc-23x7-9cwj | The Yougler Blogger Profile Page plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, v1.01. This is due to missing or incorrect nonce validation on the 'yougler-plugin.php' page. This makes it possible for unauthenticated attackers to update the plugin's settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | [] | null | 4.3 | null | null |
|
GHSA-wm3w-4jjh-w57r | IBM Rational Rhapsody Design Manager 5.0 through 5.0.2 and 6.0 through 6.0.5 and IBM Rational Software Architect Design Manager 5.0 through 5.0.2 and 6.0 through 6.0.1 are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 142558. | [] | null | null | 5.4 | null |
|
GHSA-qvg6-9fpw-3vw9 | LibTIFF version 4.0.7 is vulnerable to a heap-based buffer over-read in tif_lzw.c resulting in DoS or code execution via a crafted bmp image to tools/bmp2tiff. | [] | null | null | 8.8 | null |
|
CVE-2024-21663 | Remote code execution on ReconServer due to improper input sanitization on the prips command | Discord-Recon is a Discord bot created to automate bug bounty recon, automated scans and information gathering via a discord server. Discord-Recon is vulnerable to remote code execution. An attacker is able to execute shell commands in the server without having an admin role. This vulnerability has been fixed in version 0.0.8.
| [
"cpe:2.3:a:demon1a:discord-recon:*:*:*:*:*:discord:*:*",
"cpe:2.3:a:demon1a:discord-recon:0.0.8:beta:*:*:*:discord:*:*"
] | null | 10 | null | null |
GHSA-qh4m-mqcp-x24m | A privacy issue was addressed by moving sensitive data to a more secure location. This issue is fixed in iOS 18 and iPadOS 18, watchOS 11, macOS Sequoia 15. An app may be able to access user-sensitive data. | [] | null | 5.5 | null | null |
|
GHSA-gmxm-pr58-v5jc | Jenkins Azure Key Vault Plugin does not properly mask credentials | Multiple Jenkins plugins do not properly mask (i.e., replace with asterisks) credentials printed in the build log from Pipeline steps like sh and bat, when both of the following conditions are met:The credentials are printed in build steps executing on an agent (typically inside a node block).Push mode for durable task logging is enabled. This is a hidden option in Pipeline: Nodes and Processes that can be enabled through the Java system property org.jenkinsci.plugins.workflow.steps.durable_task.DurableTaskStep.USE_WATCHING. It is also automatically enabled by some plugins, e.g., OpenTelemetry and Pipeline Logging over CloudWatch.The following plugins are affected by this vulnerability:Kubernetes 3909.v1f2c633e8590 and earlier (SECURITY-3079 / CVE-2023-30513)Azure Key Vault 187.va_cd5fecd198a_ and earlier (SECURITY-3051 / CVE-2023-30514)Thycotic DevOps Secrets Vault 1.0.0 (SECURITY-3078 / CVE-2023-30515)The following plugins have been updated to properly mask credentials in the build log when push mode for durable task logging is enabled:Kubernetes 3910.ve59cec5e33ea_ (SECURITY-3079 / CVE-2023-30513)Azure Key Vault 188.vf46b_7fa_846a_1 (SECURITY-3051 / CVE-2023-30514)As of publication of this advisory, there is no fix available for the following plugin:Thycotic DevOps Secrets Vault 1.0.0 (SECURITY-3078 / CVE-2023-30515) | [] | null | 4.3 | null | null |
CVE-2008-2859 | Unspecified vulnerability in the IMAP service in NetWin SurgeMail before 3.9g2 allows remote attackers to cause a denial of service (daemon crash) via unknown vectors related to an "imap command." | [
"cpe:2.3:a:netwin:surgemail:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netwin:surgemail:3.8a:*:*:*:*:*:*:*",
"cpe:2.3:a:netwin:surgemail:3.8b:*:*:*:*:*:*:*",
"cpe:2.3:a:netwin:surgemail:3.8d:*:*:*:*:*:*:*",
"cpe:2.3:a:netwin:surgemail:3.8f:*:*:*:*:*:*:*",
"cpe:2.3:a:netwin:surgemail:3.8f2:*:*:*:*:*:*:*",
"cpe:2.3:a:netwin:surgemail:3.8f3:*:*:*:*:*:*:*",
"cpe:2.3:a:netwin:surgemail:3.8i:*:*:*:*:*:*:*",
"cpe:2.3:a:netwin:surgemail:3.8i2:*:*:*:*:*:*:*",
"cpe:2.3:a:netwin:surgemail:3.8i3:*:*:*:*:*:*:*",
"cpe:2.3:a:netwin:surgemail:3.8k:*:*:*:*:*:*:*",
"cpe:2.3:a:netwin:surgemail:3.8k2:*:*:*:*:*:*:*",
"cpe:2.3:a:netwin:surgemail:3.8k3:*:*:*:*:*:*:*",
"cpe:2.3:a:netwin:surgemail:3.8k4:*:*:*:*:*:*:*",
"cpe:2.3:a:netwin:surgemail:3.8m:*:*:*:*:*:*:*",
"cpe:2.3:a:netwin:surgemail:3.8o:*:*:*:*:*:*:*",
"cpe:2.3:a:netwin:surgemail:3.8q:*:*:*:*:*:*:*",
"cpe:2.3:a:netwin:surgemail:3.8s:*:*:*:*:*:*:*",
"cpe:2.3:a:netwin:surgemail:3.8u:*:*:*:*:*:*:*",
"cpe:2.3:a:netwin:surgemail:3.9a:*:*:*:*:*:*:*",
"cpe:2.3:a:netwin:surgemail:3.9c:*:*:*:*:*:*:*",
"cpe:2.3:a:netwin:surgemail:3.9e:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-233h-59m2-qqf2 | ChakraCore Remote Code Execution Vulnerability | A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0968. | [] | null | 7.5 | null | null |
GHSA-293h-f2f3-6fqq | Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Exeebit phpinfo() WP.This issue affects phpinfo() WP: from n/a through 5.0. | [] | null | 5.3 | null | null |
|
GHSA-r69p-rc7c-rr2m | A vulnerability was found in the way RemoteMessageChannel, introduced in jboss-remoting versions 3.3.10, reads from an empty buffer. An attacker could use this flaw to cause denial of service via high CPU caused by an infinite loop. | [] | null | null | 7.5 | null |
|
CVE-2015-9224 | In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Automobile, Snapdragon Mobile, Snapdragon Wear, and Small Cell SoC FSM9055, MDM9206, MDM9607, MDM9615, MDM9625, MDM9635M, MDM9640, MDM9645, MDM9650, MDM9655, MSM8909W, SD 210/SD 212/SD 205, SD 400, SD 410/12, SD 425, SD 430, SD 450, SD 600, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 800, SD 808, SD 810, SD 820, SD 820A, SD 835, SD 845, SD 850, and SDX20, lack of input Validation in QURTK_write() can cause potential buffer overflow. | [
"cpe:2.3:o:qualcomm:mdm9206_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9206:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9607_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9607:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9615_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9615:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9625_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9625:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9635m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9635m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9640_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9640:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9645_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9645:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9650:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9655_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9655:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8909w_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8909w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_210_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_210:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_212_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_212:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_205_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_205:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_400_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_400:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_410_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_410:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_412_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_412:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_425_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_425:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_430_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_430:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_450_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_450:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_615_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_615:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_616_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_616:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_415_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_415:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_617_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_617:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_625_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_625:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_650_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_650:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_652_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_652:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_800_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_800:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_808_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_808:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_810_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_810:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_820_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_820:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_835_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_835:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_845_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_845:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx20_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx20:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_850_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_850:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:fsm9055_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:fsm9055:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_600_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_600:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_820a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_820a:-:*:*:*:*:*:*:*"
] | null | null | 9.8 | 10 |
|
GHSA-cwp3-9497-rjgj | The tx Smart (aka com.wooriwm.txsmart) application 7.05 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [] | null | null | null | null |
|
GHSA-q3c6-7v99-vxjx | In getCredentialManagerPolicy of DevicePolicyManagerService.java, there is a possible method for users to select credential managers without permission due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | [] | null | 7.8 | null | null |
|
GHSA-h94c-3966-p96m | Cross-zone scripting vulnerability in Sleipnir 2.49 and earlier, and Portable Sleipnir 2.45 and earlier, allows remote attackers to bypass Web content zone restrictions via certain script contained in RSS data. NOTE: some of these details are obtained from third party information. | [] | null | null | null | null |
|
GHSA-972m-28wj-hr23 | DMMFX Trade for Android 1.5.0 and earlier, DMMFX DEMO Trade for Android 1.5.0 and earlier, and GAITAMEJAPAN FX Trade for Android 1.4.0 and earlier do not verify SSL certificates. | [] | null | null | 5.9 | null |
|
GHSA-xgv8-vx7r-x752 | An out-of-bounds read flaw was found in the parse_module function in bfd/vms-alpha.c in Binutils. | [] | null | 6.3 | null | null |
|
GHSA-9q47-75mf-qmf9 | setup.cgi on NETGEAR R6020 1.0.0.48 devices allows an admin to execute arbitrary shell commands via shell metacharacters in the ntp_server field. | [] | null | null | null | null |
|
CVE-2024-27142 | Pre-authenticated XXE injection | Toshiba printers use XML communication for the API endpoint provided by the printer. For the endpoint, XML parsing library is used and it is vulnerable to a time-based blind XML External Entity (XXE) vulnerability. An attacker can DoS the printers. An attacker can exploit the XXE to retrieve information. As for the affected products/models/versions, see the reference URL. | [] | null | 5.9 | null | null |
CVE-2001-0408 | vim (aka gvim) processes VIM control codes that are embedded in a file, which could allow attackers to execute arbitrary commands when another user opens a file containing malicious VIM control codes. | [
"cpe:2.3:a:vim_development_group:vim:5.7:*:*:*:*:*:*:*"
] | null | null | null | 5.1 |
|
GHSA-6p3r-79mc-w88g | Unspecified vulnerability in the HotSpot Server component in Oracle Java SE and Java for Business 6 Update 18, 5.0, Update, and 23 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. | [] | null | null | null | null |
|
RHSA-2023:3705 | Red Hat Security Advisory: kpatch-patch security update | kernel: use-after-free vulnerability in the perf_group_detach function of the Linux Kernel Performance Events kernel: netfilter: use-after-free in nf_tables when processing batch requests can lead to privilege escalation | [
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 7.8 | null | null |
GHSA-2rg6-3m8g-8x9g | CiscoWorks Common Management Foundation (CMF) 2.1 and earlier allows the guest user to obtain restricted information and possibly gain administrative privileges by changing the "guest" user to the Admin user on the Modify or delete users pages. | [] | null | null | null | null |
|
CVE-2014-0155 | The ioapic_deliver function in virt/kvm/ioapic.c in the Linux kernel through 3.14.1 does not properly validate the kvm_irq_delivery_to_apic return value, which allows guest OS users to cause a denial of service (host OS crash) via a crafted entry in the redirection table of an I/O APIC. NOTE: the affected code was moved to the ioapic_service function before the vulnerability was announced. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | null | null | 5.5 |
|
GHSA-5q2v-rq3q-xc6m | PHP remote file inclusion vulnerability in index.php in Segue CMS 1.8.4 and earlier, when register_globals is disabled, allows remote attackers to execute arbitrary PHP code via a URL in the themesdir parameter, a different vector than CVE-2006-5497. NOTE: this issue was disputed, but the dispute was retracted after additional analysis. | [] | null | null | null | null |
|
cisco-sa-httpsrvr-dos-yOZThut | Cisco IOS XE Software HTTP Server Telephony Services Denial of Service Vulnerability | A vulnerability in the HTTP Server feature of Cisco IOS XE Software when the Telephony Service feature is enabled could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.
This vulnerability is due to a null pointer dereference when accessing specific URLs. An attacker could exploit this vulnerability by sending crafted HTTP traffic to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, causing a DoS condition on the affected device.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is part of the September 2024 release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: September 2024 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication ["https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75169"]. | [] | null | 8.6 | null | null |
CVE-2022-0896 | Improper Neutralization of Special Elements Used in a Template Engine in microweber/microweber | Improper Neutralization of Special Elements Used in a Template Engine in GitHub repository microweber/microweber prior to 1.3. | [
"cpe:2.3:a:microweber:microweber:*:*:*:*:*:*:*:*"
] | null | null | 7.1 | null |
GHSA-pmg9-q8pq-2g6h | Heap-based buffer overflow in the encodeURI and decodeURI functions in the kjs JavaScript interpreter engine in KDE 3.2.0 through 3.5.0 allows remote attackers to execute arbitrary code via a crafted, UTF-8 encoded URI. | [] | null | null | null | null |
|
GHSA-vqjc-r797-frf8 | SQL injection vulnerability in global.php3 of AttilaPHP 3.0, and possibly earlier versions, allows remote attackers to bypass authentication via a modified cook_id parameter. | [] | null | null | null | null |
|
GHSA-rh56-v4f2-38m7 | DHCP Server Service Denial of Service Vulnerability | [] | null | 7.5 | null | null |
|
GHSA-8gf7-cp3h-9hx6 | Vulnerability in the Oracle FLEXCUBE Universal Banking component of Oracle Financial Services Applications (subcomponent: Infrastructure). Supported versions that are affected are 11.3.0, 11.4.0, 12.0.1, 12.0.2, 12.0.3, 12.1.0, 12.2.0 and 12.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle FLEXCUBE Universal Banking. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle FLEXCUBE Universal Banking, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle FLEXCUBE Universal Banking accessible data as well as unauthorized read access to a subset of Oracle FLEXCUBE Universal Banking accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N). | [] | null | null | 6.1 | null |
|
CVE-2018-17184 | A malicious user with enough administration entitlements can inject html-like elements containing JavaScript statements into Connector names, Report names, AnyTypeClass keys and Policy descriptions. When another user with enough administration entitlements edits one of the Entities above via Admin Console, the injected JavaScript code is executed. | [
"cpe:2.3:a:apache:syncope:*:*:*:*:*:*:*:*"
] | null | null | 5.4 | 3.5 |
|
CVE-2025-24264 | The issue was addressed with improved memory handling. This issue is fixed in visionOS 2.4, tvOS 18.4, iPadOS 17.7.6, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4, Safari 18.4. Processing maliciously crafted web content may lead to an unexpected Safari crash. | [] | null | 9.8 | null | null |
|
GHSA-8hm3-x962-r5c7 | A lack of rate limiting in the OTP validation component of Digitory Multi Channel Integrated POS v1.0 allows attackers to gain access to the ordering system and place an excessive amount of food orders. | [] | null | 9.1 | null | null |
|
CVE-2022-3197 | Use after free in PDF in Google Chrome prior to 105.0.5195.125 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: High) | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
|
CVE-2023-41734 | WordPress Insert Estimated Reading Time Plugin <= 1.2 is vulnerable to Cross Site Scripting (XSS) | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in nigauri Insert Estimated Reading Time plugin <= 1.2 versions. | [
"cpe:2.3:a:nigauri:insert_estimated_reading_time:*:*:*:*:*:wordpress:*:*"
] | null | 5.9 | null | null |
CVE-2017-14428 | D-Link DIR-850L REV. A (with firmware through FW114WWb07_h2ab_beta1) and REV. B (with firmware through FW208WWb02) devices have 0666 /var/run/hostapd* permissions. | [
"cpe:2.3:o:dlink:dir-850l_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dir-850l_firmware:fw114wwb07_h2ab:beta1:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dir-850l:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | 2.1 |
|
GHSA-gf8p-7594-m58r | In the Linux kernel, the following vulnerability has been resolved:ptr_ring: do not block hard interrupts in ptr_ring_resize_multiple()Jakub added a lockdep_assert_no_hardirq() check in __page_pool_put_page()
to increase test coverage.syzbot found a splat caused by hard irq blocking in
ptr_ring_resize_multiple() [1]As current users of ptr_ring_resize_multiple() do not require
hard irqs being masked, replace it to only block BH.Rename helpers to better reflect they are safe against BH only.ptr_ring_resize_multiple() to ptr_ring_resize_multiple_bh()skb_array_resize_multiple() to skb_array_resize_multiple_bh()[1]WARNING: CPU: 1 PID: 9150 at net/core/page_pool.c:709 __page_pool_put_page net/core/page_pool.c:709 [inline]
WARNING: CPU: 1 PID: 9150 at net/core/page_pool.c:709 page_pool_put_unrefed_netmem+0x157/0xa40 net/core/page_pool.c:780
Modules linked in:
CPU: 1 UID: 0 PID: 9150 Comm: syz.1.1052 Not tainted 6.11.0-rc3-syzkaller-00202-gf8669d7b5f5d #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024
RIP: 0010:__page_pool_put_page net/core/page_pool.c:709 [inline]
RIP: 0010:page_pool_put_unrefed_netmem+0x157/0xa40 net/core/page_pool.c:780
Code: 74 0e e8 7c aa fb f7 eb 43 e8 75 aa fb f7 eb 3c 65 8b 1d 38 a8 6a 76 31 ff 89 de e8 a3 ae fb f7 85 db 74 0b e8 5a aa fb f7 90 <0f> 0b 90 eb 1d 65 8b 1d 15 a8 6a 76 31 ff 89 de e8 84 ae fb f7 85
RSP: 0018:ffffc9000bda6b58 EFLAGS: 00010083
RAX: ffffffff8997e523 RBX: 0000000000000000 RCX: 0000000000040000
RDX: ffffc9000fbd0000 RSI: 0000000000001842 RDI: 0000000000001843
RBP: 0000000000000000 R08: ffffffff8997df2c R09: 1ffffd40003a000d
R10: dffffc0000000000 R11: fffff940003a000e R12: ffffea0001d00040
R13: ffff88802e8a4000 R14: dffffc0000000000 R15: 00000000ffffffff
FS: 00007fb7aaf716c0(0000) GS:ffff8880b9300000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fa15a0d4b72 CR3: 00000000561b0000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
<TASK>
tun_ptr_free drivers/net/tun.c:617 [inline]
__ptr_ring_swap_queue include/linux/ptr_ring.h:571 [inline]
ptr_ring_resize_multiple_noprof include/linux/ptr_ring.h:643 [inline]
tun_queue_resize drivers/net/tun.c:3694 [inline]
tun_device_event+0xaaf/0x1080 drivers/net/tun.c:3714
notifier_call_chain+0x19f/0x3e0 kernel/notifier.c:93
call_netdevice_notifiers_extack net/core/dev.c:2032 [inline]
call_netdevice_notifiers net/core/dev.c:2046 [inline]
dev_change_tx_queue_len+0x158/0x2a0 net/core/dev.c:9024
do_setlink+0xff6/0x41f0 net/core/rtnetlink.c:2923
rtnl_setlink+0x40d/0x5a0 net/core/rtnetlink.c:3201
rtnetlink_rcv_msg+0x73f/0xcf0 net/core/rtnetlink.c:6647
netlink_rcv_skb+0x1e3/0x430 net/netlink/af_netlink.c:2550 | [] | null | null | null | null |
|
GHSA-v98g-m79j-fq3q | Vulnerability in the Oracle iStore product of Oracle E-Business Suite (component: Shopping Cart). Supported versions that are affected are 12.1.1-12.1.3. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle iStore. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle iStore accessible data as well as unauthorized access to critical data or complete access to all Oracle iStore accessible data. CVSS 3.1 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N). | [] | null | null | null | null |
|
GHSA-wh7h-qh97-7vjv | The issue searching component in Jira before version 8.1.0 allows remote attackers to deny access to Jira service via denial of service vulnerability in issue search when ordering by "Epic Name". | [] | null | null | 6.5 | null |
|
GHSA-hrr3-r677-j752 | Microsoft Internet Explorer 6 through 9 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing a deleted object, aka "Body Element Remote Code Execution Vulnerability." | [] | null | null | null | null |
|
GHSA-w2wf-2p6x-gv2x | A null pointer vulnerability in Trend Micro Apex One and Worry-Free Business Security 10.0 SP1 could allow an attacker to crash the CGI program on affected installations. | [] | null | null | null | null |
|
CVE-2020-23371 | Cross-site scripting (XSS) vulnerability in static/admin/js/kindeditor/plugins/multiimage/images/swfupload.swf in noneCms v1.3.0 allows remote attackers to inject arbitrary web script or HTML via the movieName parameter. | [
"cpe:2.3:a:5none:nonecms:1.3.0:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 |
|
CVE-2015-1484 | Unquoted Windows search path vulnerability in the agent in Symantec Workspace Streaming (SWS) 6.1 before SP8 MP2 HF7 and 7.5 before SP1 HF4, when AppMgrService.exe is configured as a service, allows local users to gain privileges via a Trojan horse executable file in the %SYSTEMDRIVE% directory, as demonstrated by program.exe. | [
"cpe:2.3:a:symantec:workspace_streaming:6.1:sp8:*:*:*:*:*:*",
"cpe:2.3:a:symantec:workspace_streaming:7.5:sp1:*:*:*:*:*:*"
] | null | null | null | 6.9 |
|
GHSA-7cqj-6r5p-jp63 | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in neoslab Database Toolset allows Path Traversal. This issue affects Database Toolset: from n/a through 1.8.4. | [] | null | 8.6 | null | null |
|
GHSA-fj6q-h8w7-mx3g | An integer overflow was addressed with improved input validation. This issue is fixed in macOS Sequoia 15.4, tvOS 18.4, iPadOS 17.7.6, macOS Sonoma 14.7.5, iOS 18.4 and iPadOS 18.4, watchOS 11.4, visionOS 2.4. An attacker on the local network may be able to cause a denial-of-service. | [] | null | 5.5 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.