id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2002-20002 | The Net::EasyTCP package before 0.15 for Perl always uses Perl's builtin rand(), which is not a strong random number generator, for cryptographic keys. | [] | null | 5.4 | null | null |
|
GHSA-q4r2-83hh-f65v | The wpDiscuz WordPress plugin before 7.3.4 does check for CSRF when adding, editing and deleting comments, which could allow attacker to make logged in users such as admin edit and delete arbitrary comment, or the user who made the comment to edit it via a CSRF attack. Attackers could also make logged in users post arbitrary comment. | [] | null | null | null | null |
|
RHSA-2020:3197 | Red Hat Security Advisory: Red Hat Process Automation Manager 7.8.0 Security Update | HTTP/2: flood using PING frames results in unbounded memory growth HTTP/2: flood using HEADERS frames results in unbounded memory growth HTTP/2: flood using SETTINGS frames results in unbounded memory growth HTTP/2: flood using empty frames results in excessive resource consumption apache-commons-beanutils: does not suppresses the class property in PropertyUtilsBean by default cxf: does not restrict the number of message attachments cxf: OpenId Connect token service does not properly validate the clientId libquartz: XXE attacks via job description netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers cxf: reflected XSS in the services listing page jackson-databind: lacks certain net.sf.ehcache blocking netty: HTTP request smuggling netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header keycloak: security issue on reset credential flow netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling jackson-databind: Lacks certain xbean-reflect/JNDI blocking jackson-databind: Serialization gadgets in shaded-hikari-config jackson-databind: Serialization gadgets in ibatis-sqlmap jackson-databind: Serialization gadgets in anteros-core jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution jackson-databind: Serialization gadgets in org.aoju.bus.proxy.provider.*.RmiProvider jackson-databind: Serialization gadgets in javax.swing.JEditorPane jackson-databind: Serialization gadgets in org.apache.activemq.jms.pool.XaPooledConnectionFactory jackson-databind: Serialization gadgets in org.apache.commons.proxy.provider.remoting.RmiProvider jackson-databind: Serialization gadgets in org.apache.openjpa.ee.WASRegistryManagedRuntime netty: compression/decompression codecs don't enforce limits on buffer allocation sizes jackson-databind: Serialization gadgets in org.springframework:spring-aop jackson-databind: Serialization gadgets in commons-jelly:commons-jelly jackson-databind: serialization in oadd.org.apache.xalan.lib.sql.JNDIConnectionPool jackson-databind: serialization in weblogic/oracle-aqjms jackson-databind: serialization in com.sun.org.apache.xalan.internal.lib.sql.JNDIConnectionPool | [
"cpe:/a:redhat:jboss_enterprise_bpms_platform:7.8"
] | null | 8.1 | 7.5 | null |
CVE-2018-3671 | Escalation of privilege in Intel Saffron admin application before 11.4 allows an authenticated user to access unauthorized information. | [
"cpe:2.3:a:intel:saffron_memorybase:*:*:*:*:*:*:*:*"
] | null | null | 5.7 | 2.7 |
|
CVE-2023-42104 | Ashlar-Vellum Cobalt AR File Parsing Use-After-Free Remote Code Execution Vulnerability | Ashlar-Vellum Cobalt AR File Parsing Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ashlar-Vellum Cobalt. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of AR files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process.
. Was ZDI-CAN-20630. | [
"cpe:2.3:a:ashlar:cobalt:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | null |
CVE-2022-37984 | Windows WLAN Service Elevation of Privilege Vulnerability | Windows WLAN Service Elevation of Privilege Vulnerability | [
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_11:22h2:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11:22h2:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
CVE-1999-1253 | Vulnerability in a kernel error handling routine in SCO OpenServer 5.0.2 and earlier, and SCO Internet FastStart 1.0, allows local users to gain root privileges. | [
"cpe:2.3:o:sco:internet_faststart:1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:sco:openserver:*:*:*:*:*:*:*:*",
"cpe:2.3:o:sco:openserver:5.0:*:*:*:*:*:*:*"
] | null | null | null | 7.2 |
|
GHSA-5682-crpr-8jqc | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Kharim Tomlinson WP Next Post Navi allows Stored XSS.This issue affects WP Next Post Navi: from n/a through 1.8.3. | [] | null | 5.9 | null | null |
|
CVE-2012-2416 | chan_sip.c in the SIP channel driver in Asterisk Open Source 1.8.x before 1.8.11.1 and 10.x before 10.3.1 and Asterisk Business Edition C.3.x before C.3.7.4, when the trustrpid option is enabled, allows remote authenticated users to cause a denial of service (daemon crash) by sending a SIP UPDATE message that triggers a connected-line update attempt without an associated channel. | [
"cpe:2.3:a:asterisk:open_source:1.6.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.0:rc4:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.0:rc5:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.0:rc6:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.0:rc7:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.0:rc8:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.1:rc1:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.3:rc2:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.6:rc1:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.6:rc2:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.7:rc1:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.7:rc2:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.7:rc3:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.8:rc1:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.9:rc1:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.9:rc2:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.9:rc3:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.10:rc1:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.10:rc2:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.11:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.11:rc1:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.11:rc2:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.12:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.12:rc1:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.13:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.14:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.14:rc1:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.15:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.15:rc1:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.15.1:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.16:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.16:rc1:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.16.1:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.16.2:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.17:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.17:rc1:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.17:rc2:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.17:rc3:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.17.1:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.17.2:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.17.3:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.18:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.18:rc1:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.18.1:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.18.2:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.19:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.19:rc1:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.20:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.21:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.22:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.2.23:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.0:beta5:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.0:rc4:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.0:rc5:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.1:rc1:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.2:rc1:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.3:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.3:rc1:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.3:rc2:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.3:rc3:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.4:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.4:rc1:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.4:rc2:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.4:rc3:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.5:rc1:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.6.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.6.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.6.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.7.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.7.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.8.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.8.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.8.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.8.0:rc4:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.8.0:rc5:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.9.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.9.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.9.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.10.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.10.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.10.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.10.0:rc4:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.11.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.8.11.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:10.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:10.0.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:10.0.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:10.0.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:10.0.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:10.0.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:10.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:10.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:10.1.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:10.1.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:10.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:10.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:10.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:10.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:10.2.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:10.2.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:10.2.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:10.2.0:rc4:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:10.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:10.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:10.3.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:10.3.0:rc3:*:*:*:*:*:*"
] | null | null | null | 6.5 |
|
GHSA-gjvm-4fgg-6qpr | Safari 1.2.2 does not properly prevent a frame in one domain from injecting content into a frame that belongs to another domain, which facilitates web site spoofing and other attacks, aka the frame injection vulnerability. | [] | null | null | null | null |
|
GHSA-x8v9-7r66-c92w | The Web GUI configuration panel of Hirsch (formerly Identiv and Viscount) Enterphone MESH through 2024 ships with default credentials (username freedom, password viscount). The administrator is not prompted to change these credentials on initial configuration, and changing the credentials requires many steps. Attackers can use the credentials over the Internet via mesh.webadmin.MESHAdminServlet to gain access to dozens of Canadian and U.S. apartment buildings and obtain building residents' PII. NOTE: the Supplier's perspective is that the "vulnerable systems are not following manufacturers' recommendations to change the default password." | [] | 10 | null | null | null |
|
CVE-2025-25875 | A vulnerability was found in ITSourcecode Simple ChatBox up to 1.0. This vulnerability affects unknown code of the file /message.php. The attack can use SQL injection to obtain sensitive data. | [] | null | 6.4 | null | null |
|
CVE-2005-1896 | Directory traversal vulnerability in thumb.php in FlatNuke 2.5.3 allows remote attackers to read arbitrary images or obtain the installation path via the image parameter. | [
"cpe:2.3:a:flatnuke:flatnuke:2.5.3:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2006-1549 | PHP 4.4.2 and 5.1.2 allows local users to cause a crash (segmentation fault) by defining and executing a recursive function. NOTE: it has been reported by a reliable third party that some later versions are also affected. | [
"cpe:2.3:a:php:php:4.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.1.2:*:*:*:*:*:*:*"
] | null | null | null | 2.1 |
|
GHSA-8mqf-8jm6-frp9 | There is SQL injection vulnerability in Esri ArcGIS Insights Desktop for Mac and Windows version 2022.1 that may allow a local, authorized attacker to execute arbitrary SQL commands against the back-end database. The effort required to generate the crafted input required to exploit this issue is complex and requires significant effort before a successful attack can be expected. | [] | null | 7 | null | null |
|
CVE-2016-7992 | The Classical IP over ATM parser in tcpdump before 4.9.0 has a buffer overflow in print-cip.c:cip_if_print(). | [
"cpe:2.3:a:tcpdump:tcpdump:*:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 |
|
GHSA-95vp-x967-m83g | BigTree CMS 4.2.23 allows remote authenticated users, if possessing privileges to set hooks, to execute arbitrary code via /core/admin/auto-modules/forms/process.php. | [] | null | null | 7.5 | null |
|
CVE-2006-6840 | Unspecified vulnerability in phpBB before 2.0.22 has unknown impact and remote attack vectors related to a "negative start parameter." | [
"cpe:2.3:a:phpbb_group:phpbb:1.2.4_rc3:*:*:*:*:*:*:*",
"cpe:2.3:a:phpbb_group:phpbb:2.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:phpbb_group:phpbb:2.0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:phpbb_group:phpbb:2.0.21:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
GHSA-qf2h-hc49-w9p5 | The User Profile Service (aka ProfSvc) in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges by conducting a junction attack to load another user's UsrClass.dat registry hive, aka MSRC ID 20674 or "Microsoft User Profile Service Elevation of Privilege Vulnerability." | [] | null | null | null | null |
|
CVE-2009-2454 | Cross-site scripting (XSS) vulnerability in Citrix Web Interface 4.6, 5.0, and 5.0.1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | [
"cpe:2.3:a:citrix:web_interface:4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:citrix:web_interface:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:citrix:web_interface:5.0.1:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-gh2c-6m38-c78j | PyWBEM TOCTOU vulnerability in certificate validation | PyWBEM 0.7 and earlier does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate. | [] | 6.3 | null | null | null |
CVE-2020-0903 | A cross-site-scripting (XSS) vulnerability exists when Microsoft Exchange Server does not properly sanitize a specially crafted web request to an affected Exchange server, aka 'Microsoft Exchange Server Spoofing Vulnerability'. | [
"cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_14:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_15:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_4:*:*:*:*:*:*"
] | null | 5.4 | null | 3.5 |
|
CVE-2024-54349 | WordPress Plain Post plugin <= 1.0.3 - Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in mashiurz.com Plain Post allows Stored XSS.This issue affects Plain Post: from n/a through 1.0.3. | [] | null | 6.5 | null | null |
CVE-2020-7939 | SQL Injection in DTML or in connection objects in Plone 4.0 through 5.2.1 allows users to perform unwanted SQL queries. (This is a problem in Zope.) | [
"cpe:2.3:a:plone:plone:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.5 |
|
RHSA-2021:4153 | Red Hat Security Advisory: dnsmasq security and bug fix update | dnsmasq: fixed outgoing port used when --server is used with an interface name | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 4 | null | null |
CVE-2002-1582 | compose.cgi in Mailreader.com 2.3.30 and 2.3.31, when using Sendmail as the Mail Transfer Agent, allows remote attackers to execute arbitrary commands via shell metacharacters in the RealEmail configuration variable, which is used to call Sendmail in network.cgi. | [
"cpe:2.3:a:mailreader.com:mailreader.com:2.3.30:*:*:*:*:*:*:*",
"cpe:2.3:a:mailreader.com:mailreader.com:2.3.31:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
RHSA-2024:3299 | Red Hat Security Advisory: libxml2 security update | libxml2: use-after-free in XMLReader | [
"cpe:/a:redhat:rhel_eus:8.6::appstream",
"cpe:/o:redhat:rhel_eus:8.6::baseos"
] | null | 7.5 | null | null |
CVE-2023-44143 | WordPress Bamboo Columns Plugin <= 1.6.1 is vulnerable to Cross Site Scripting (XSS) | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Bamboo Mcr Bamboo Columns allows Stored XSS.This issue affects Bamboo Columns: from n/a through 1.6.1.
| [
"cpe:2.3:a:bamboo_mcr:bamboo_columns:*:*:*:*:*:wordpress:*:*"
] | null | 6.5 | null | null |
GHSA-j3h2-4rr5-87p6 | A vulnerability in the Incoming Goods Suite allows a user with unprivileged access to the underlying system (e.g. local or via SSH) a privilege escalation to the administrative level due to the usage of component vendor Docker images running with root permissions. Exploiting this misconfiguration leads to the fact that an attacker can gain administrative control. over the whole system. | [] | null | 8.8 | null | null |
|
CVE-2019-5039 | An exploitable command execution vulnerability exists in the ASN1 certificate writing functionality of Openweave-core version 4.0.2. A specially crafted weave certificate can trigger a heap-based buffer overflow, resulting in code execution. An attacker can craft a weave certificate to trigger this vulnerability. | [
"cpe:2.3:a:openweave:openweave-core:4.0.2:*:*:*:*:*:*:*"
] | null | null | 7.5 | null |
|
CVE-2021-38624 | Windows Key Storage Provider Security Feature Bypass Vulnerability | Windows Key Storage Provider Security Feature Bypass Vulnerability | [
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2237:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2237:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2237:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2237:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1854:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1854:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.18363.1854:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1288:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1288:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1288:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.288:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.19041.1288:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2004:10.0.19041.1288:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_20h2:10.0.19042.1288:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_20h2:10.0.19042.1288:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_20h2:10.0.19042.1288:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_21h2:10.0.22000.258:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_11_21h2:10.0.22000.258:*:*:*:*:*:arm64:*"
] | null | 6.5 | null | null |
GHSA-5749-cg34-r2wm | Buffer overflow in dtaction command gives root access. | [] | null | null | null | null |
|
GHSA-g95v-3pj6-j433 | Ant Media Server does not properly authorize non-administrative API calls | Ant Media Server Community Edition in a default configuration is vulnerable to an improper HTTP header based authorization, leading to a possible use of non-administrative API calls reserved only for authorized users.
All versions up to 2.9.0 (tested) and possibly newer ones are believed to be vulnerable as the vendor has not confirmed releasing a patch. | [] | 2.7 | 6.5 | null | null |
CVE-2002-1149 | The installation procedure for Invision Board suggests that users install the phpinfo.php program under the web root, which leaks sensitive information such as absolute pathnames, OS information, and PHP settings. | [
"cpe:2.3:a:invision_power_services:invision_board:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:invision_power_services:invision_board:1.0.1:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2023-37299 | Joplin before 2.11.5 allows XSS via an AREA element of an image map. | [
"cpe:2.3:a:joplin_project:joplin:*:*:*:*:*:-:*:*"
] | null | 6.1 | null | null |
|
CVE-2016-10574 | apk-parser3 is a module to extract Android Manifest info from an APK file. apk-parser3 versions before 0.1.3 download binary resources over HTTP, which leaves it vulnerable to MITM attacks. It may be possible to cause remote code execution (RCE) by swapping out the requested binary with an attacker controlled binary if the attacker is on the network or positioned in between the user and the remote server. | [
"cpe:2.3:a:apk-parser3_project:apk-parser3:*:*:*:*:*:node.js:*:*"
] | null | null | 8.1 | 9.3 |
|
RHSA-2017:1462 | Red Hat Security Advisory: python-django security update | python-django: Open redirect and possible XSS attack via user-supplied numeric redirect URLs | [
"cpe:/a:redhat:openstack:9::el7"
] | null | null | 6.1 | null |
GHSA-69c2-jhx4-3ffr | Microsoft SharePoint Server Elevation of Privilege Vulnerability | [] | null | 8.8 | null | null |
|
CVE-2019-14684 | A DLL hijacking vulnerability exists in Trend Micro Password Manager 5.0 in which, if exploited, would allow an attacker to load an arbitrary unsigned DLL into the signed service's process. This process is very similar, yet not identical to CVE-2019-14687. | [
"cpe:2.3:a:trendmicro:password_manager:5.0:*:*:*:*:*:*:*"
] | null | null | 7.8 | 9.3 |
|
CVE-2024-7450 | itsourcecode Placement Management System Image resume_upload.php unrestricted upload | A vulnerability has been found in itsourcecode Placement Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /resume_upload.php of the component Image Handler. The manipulation of the argument fileToUpload leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-273541 was assigned to this vulnerability. | [
"cpe:2.3:a:itsourcecode:placement_management_system:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:angeljudesuarez:placement_management_system:1.0:*:*:*:*:*:*:*"
] | 5.3 | 6.3 | 6.3 | 6 |
GHSA-wc2f-wm4f-6rjg | swftools v0.9.2 was discovered to contain a segmentation violation via the function s_font at swftools/src/swfc.c. | [] | null | 4.3 | null | null |
|
GHSA-ffh9-7fmg-mg2f | SQL injection vulnerability in the Facile Forms (com_facileforms) component for Joomla! and Mambo allows remote attackers to execute arbitrary SQL commands via the catid parameter to index.php. | [] | null | null | null | null |
|
GHSA-h9g6-h9ff-vp8g | Adobe Acrobat and Reader versions 2019.008.20081 and earlier, 2019.008.20080 and earlier, 2019.008.20081 and earlier, 2017.011.30106 and earlier version, 2017.011.30105 and earlier version, 2015.006.30457 and earlier, and 2015.006.30456 and earlier have a heap overflow vulnerability. Successful exploitation could lead to arbitrary code execution. | [] | null | null | 7.8 | null |
|
CVE-2012-6303 | Heap-based buffer overflow in the GetWavHeader function in generic/jkSoundFile.c in the Snack Sound Toolkit, as used in WaveSurfer 1.8.8p4, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large chunk size in a WAV file. | [
"cpe:2.3:a:kth:snack_sound_toolkit:2.2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:kth:wavesurfer:1.8.8:p4:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
CVE-2015-1931 | IBM Java Security Components in IBM SDK, Java Technology Edition 8 before SR1 FP10, 7 R1 before SR3 FP10, 7 before SR9 FP10, 6 R1 before SR8 FP7, 6 before SR16 FP7, and 5.0 before SR16 FP13 stores plaintext information in memory dumps, which allows local users to obtain sensitive information by reading a file. | [
"cpe:2.3:a:ibm:java_sdk:*:*:*:*:technology:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:ltss:-:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:-:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*",
"cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:7.1:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
|
GHSA-387h-m4cp-4mwp | SQL injection vulnerability in Sourcecodester Storage Unit Rental Management System v1 by oretnom23, allows attackers to execute arbitrary SQL commands via the username parameter to /storage/classes/Login.php. | [] | null | null | null | null |
|
GHSA-rpjh-2px8-r4m7 | An unauthenticated attacker can upload a malicious file to the server which when accessed by a victim can allow an attacker to completely compromise system. | [] | null | 9.6 | null | null |
|
GHSA-6835-h2qm-9c2f | Vulnerability in the Oracle FLEXCUBE Core Banking component of Oracle Financial Services Applications (subcomponent: Securities). Supported versions that are affected are 11.5.0, 11.6.0 and 11.7.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle FLEXCUBE Core Banking. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle FLEXCUBE Core Banking, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle FLEXCUBE Core Banking accessible data as well as unauthorized read access to a subset of Oracle FLEXCUBE Core Banking accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N). | [] | null | null | 6.1 | null |
|
GHSA-62jr-f896-9v4h | java/android/webkit/BrowserFrame.java in Android before 4.4 uses the addJavascriptInterface API in conjunction with creating an object of the SearchBoxImpl class, which allows attackers to execute arbitrary Java code by leveraging access to the searchBoxJavaBridge_ interface at certain Android API levels. | [] | null | null | null | null |
|
GHSA-6234-p2qx-767m | A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) could allow an unauthenticated, remote attacker to access potentially sensitive system usage information. The vulnerability is due to a lack of proper data protection mechanisms. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could allow an attacker to view sensitive system data. | [] | null | null | 5.3 | null |
|
CVE-2023-3608 | Ruijie BCR810W Tracert Page os command injection | A vulnerability was found in Ruijie BCR810W 2.5.10. It has been rated as critical. This issue affects some unknown processing of the component Tracert Page. The manipulation leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-233477 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | [
"cpe:2.3:o:ruijienetworks:bcr810w_firmware:2.5.10:*:*:*:*:*:*:*",
"cpe:2.3:h:ruijienetworks:bcr810w:-:*:*:*:*:*:*:*"
] | null | 4.7 | 4.7 | 5.8 |
CVE-2022-21125 | Incomplete cleanup of microarchitectural fill buffers on some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access. | [
"cpe:2.3:o:xen:xen:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
"cpe:2.3:a:intel:sgx_dcap:*:*:*:*:*:linux:*:*",
"cpe:2.3:a:intel:sgx_dcap:*:*:*:*:*:windows:*:*",
"cpe:2.3:a:intel:sgx_psw:*:*:*:*:*:windows:*:*",
"cpe:2.3:a:intel:sgx_psw:*:*:*:*:*:linux:*:*",
"cpe:2.3:a:intel:sgx_sdk:*:*:*:*:*:windows:*:*",
"cpe:2.3:a:intel:sgx_sdk:*:*:*:*:*:linux:*:*",
"cpe:2.3:o:vmware:esxi:7.0:-:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:7.0:beta:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:7.0:update_1:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:7.0:update_1a:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:7.0:update_1b:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:7.0:update_1c:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:7.0:update_1d:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:7.0:update_2:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:7.0:update_2a:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:7.0:update_2c:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:7.0:update_2d:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:7.0:update_3c:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:7.0:update_3d:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*"
] | null | 5.5 | null | 2.1 |
|
CVE-2009-3423 | login.php in Zenas PaoLink 1.0, when register_globals is enabled, allows remote attackers to bypass authentication and gain administrative access by setting the login_ok parameter to 1. | [
"cpe:2.3:a:zenas:paolink:1.0:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
GHSA-x8cf-frrm-7gfx | A denial-of-service issue was addressed with improved input validation. This issue is fixed in macOS Ventura 13.3. A remote user may be able to cause a denial-of-service. | [] | null | 6.5 | null | null |
|
CVE-2021-34982 | NETGEAR Multiple Routers httpd Stack-based Buffer Overflow Remote Code Execution Vulnerability | NETGEAR Multiple Routers httpd Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of multiple NETGEAR routers. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the httpd service, which listens on TCP port 80 by default. When parsing the strings file, the process does not properly validate the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root.
. Was ZDI-CAN-13709. | [
"cpe:2.3:o:netgear:multiple_router_firmware:1.0.11.116_10.0.100:*:*:*:*:*:*:*"
] | null | null | 8.8 | null |
GHSA-mj53-qmmq-r4f3 | The (1) proofserv, (2) xrdcp, (3) xrdpwdadmin, and (4) xrd scripts in ROOT 5.18/00 place a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory. | [] | null | null | null | null |
|
CVE-2017-8825 | A null dereference vulnerability has been found in the MIME handling component of LibEtPan before 1.8, as used in MailCore and MailCore 2. A crash can occur in low-level/imf/mailimf.c during a failed parse of a Cc header containing multiple e-mail addresses. | [
"cpe:2.3:a:libetpan_project:libetpan:*:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
CVE-2006-4567 | Mozilla Firefox before 1.5.0.7 and Thunderbird before 1.5.0.7 makes it easy for users to accept self-signed certificates for the auto-update mechanism, which might allow remote user-assisted attackers to use DNS spoofing to trick users into visiting a malicious site and accepting a malicious certificate for the Mozilla update site, which can then be used to install arbitrary code on the next update. | [
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*"
] | null | null | null | 2.6 |
|
GHSA-xg4p-hrwg-fqj6 | Cisco Wireless LAN Controller (WLC) devices with software 7.6.x, 8.0 before 8.0.121.0, and 8.1 before 8.1.131.0 allow remote attackers to change configuration settings via unspecified vectors, aka Bug ID CSCuw06153. | [] | null | null | 9.8 | null |
|
GHSA-qwpp-86xq-33j8 | Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network. | [] | null | 8.8 | null | null |
|
CVE-2017-13133 | In ImageMagick 7.0.6-8, the load_level function in coders/xcf.c lacks offset validation, which allows attackers to cause a denial of service (load_tile memory exhaustion) via a crafted file. | [
"cpe:2.3:a:imagemagick:imagemagick:7.0.6-8:*:*:*:*:*:*:*"
] | null | null | 6.5 | 7.1 |
|
CVE-2015-1399 | PHP remote file inclusion vulnerability in the fetchView function in the Mage_Core_Block_Template_Zend class in Magento Community Edition (CE) 1.9.1.0 and Enterprise Edition (EE) 1.14.1.0 allows remote administrators to execute arbitrary PHP code via a URL in unspecified vectors involving the setScriptPath function. NOTE: it is not clear whether this issue crosses privilege boundaries, since administrators might already have privileges to include arbitrary files. | [
"cpe:2.3:a:magento:magento:1.9.1.0:*:*:*:community:*:*:*",
"cpe:2.3:a:magento:magento:1.14.1.0:*:*:*:enterprise:*:*:*"
] | null | null | null | 6.5 |
|
CVE-2004-0358 | Cross-site scripting (XSS) vulnerability in VirtuaNews Admin Panel Pro 1.0.3 allows remote attackers to execute arbitrary script as other users via (1) the mainnews parameter in admin.php, (2) the expand parameter in admin.php, (3) the id parameter in admin.php, (4) the catid parameter in admin.php, or (5) an unnamed parameter during the newslogo_upload action in admin.php. | [
"cpe:2.3:a:virtuasystems:virtuanews_pro:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:virtuasystems:virtuanews_pro:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:virtuasystems:virtuanews_pro:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:virtuasystems:virtuanews_pro:1.0.3:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
GHSA-2r2x-qvvf-3rjr | Two heap-based buffer overflow vulnerabilities exist in the TIFF parser functionality of Accusoft ImageGear 19.10. A specially-crafted file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger these vulnerabilities. Placeholder | [] | null | 8.8 | null | null |
|
GHSA-56r2-8xcx-j968 | Ricoh SP C250DN 1.06 devices have Incorrect Access Control (issue 2 of 2). | [] | null | 7.5 | null | null |
|
GHSA-cgh2-v9gr-9477 | An Insecure Direct Object Reference (IDOR) vulnerability in appointment-detail.php in Phpgurukul's Beauty Parlour Management System v1.1 allows unauthorized access to the Personally Identifiable Information (PII) of other customers. | [] | null | 7.5 | null | null |
|
RHSA-2022:6542 | Red Hat Security Advisory: php:7.4 security update | Archive_Tar: allows an unserialization attack because phar: is blocked but PHAR: is not blocked Archive_Tar: improper filename sanitization leads to file overwrites Archive_Tar: directory traversal due to inadequate checking of symbolic links | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
CVE-2024-30523 | WordPress Paid Memberships Pro – Mailchimp Add On plugin <= 2.3.4 - Sensitive Data Exposure vulnerability | Insertion of Sensitive Information into Log File vulnerability in Paid Memberships Pro Paid Memberships Pro – Mailchimp Add On pmpro-mailchimp.This issue affects Paid Memberships Pro – Mailchimp Add On: from n/a through 2.3.4.
| [] | null | 5.3 | null | null |
CVE-2016-3055 | IBM FileNet Workplace 4.0.2 before 4.0.2.14 LA012 allows remote authenticated users to read arbitrary files or cause a denial of service (memory consumption) via an XML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue. | [
"cpe:2.3:a:ibm:filenet_workplace:4.0.2:*:*:*:*:*:*:*"
] | null | null | 8.1 | 5.5 |
|
CVE-2013-4098 | ServerAdmin/ErrorViewer.jsp in DS3 Authentication Server allow remote attackers to inject arbitrary error-page text via the message parameter. | [
"cpe:2.3:h:ds3:authentication_server:-:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-jxm2-6gmh-4m8x | A cross-site request forgery (CSRF) vulnerability exists in the Web Application functionality of the LevelOne WBR-6012 R0.40e6. A specially crafted HTTP request can lead to unauthorized access. An attacker can stage a malicious web page to trigger this vulnerability. | [] | null | 8.8 | null | null |
|
CVE-2009-2986 | Multiple heap-based buffer overflows in Adobe Reader and Acrobat 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2 might allow attackers to execute arbitrary code via unspecified vectors. | [
"cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:7.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:7.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:7.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:7.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:7.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:7.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:7.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:7.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:7.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.1.2:*:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
GHSA-4363-x42f-xph6 | Malicious Package in hw-trnasport-u2f | All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.RecommendationAny computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | [] | null | 9.1 | null | null |
GHSA-vjf9-x4jm-p734 | The web server in the NEC MultiWriter 1700C allows remote attackers to modify the device configuration via unspecified vectors. | [] | null | null | null | null |
|
GHSA-5h3f-gwvv-fqhp | The SysInspector AntiStealth driver (esiasdrv.sys) 3.0.65535.0 in ESET System Analyzer Tool 1.1.1.0 allows local users to execute arbitrary code via a certain METHOD_NEITHER IOCTL request to \Device\esiasdrv that overwrites a pointer. | [] | null | null | null | null |
|
GHSA-jcfc-rpmc-pcm7 | glFusion CMS v1.7.9 is affected by an arbitrary user registration vulnerability in /public_html/users.php. An attacker can register with the mailbox of any user. When users want to register, they will find that the mailbox has been occupied. | [] | null | 5.3 | null | null |
|
GHSA-3w5r-4r6f-6xx4 | IBM Cloud Private 3.1.1 could alllow a local user with administrator privileges to intercept highly sensitive unencrypted data. IBM X-Force ID: 153317. | [] | null | null | 4.4 | null |
|
CVE-2015-2824 | Multiple SQL injection vulnerabilities in the Simple Ads Manager plugin before 2.7.97 for WordPress allow remote attackers to execute arbitrary SQL commands via a (1) hits[][] parameter in a sam_hits action to sam-ajax.php; the (2) cstr parameter in a load_posts action to sam-ajax-admin.php; the (3) searchTerm parameter in a load_combo_data action to sam-ajax-admin.php; or the (4) subscriber, (5) contributor, (6) author, (7) editor, (8) admin, or (9) sadmin parameter in a load_users action to sam-ajax-admin.php. | [
"cpe:2.3:a:simple_ads_manager_project:simple_ads_manager:2.5.94:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:simple_ads_manager_project:simple_ads_manager:2.5.96:*:*:*:*:wordpress:*:*"
] | null | null | null | 7.5 |
|
CVE-2017-12951 | The gig::DimensionRegion::CreateVelocityTable function in gig.cpp in libgig 4.0.0 allows remote attackers to cause a denial of service (stack-based buffer over-read and application crash) via a crafted gig file. | [
"cpe:2.3:a:libgig0:libgig:4.0.0:*:*:*:*:*:*:*"
] | null | null | 6.5 | 4.3 |
|
GHSA-5648-r6xq-fcf9 | An issue was discovered in the MensaMax (aka com.breustedt.mensamax) application 4.3 for Android. The use of a Hard-coded DES Cryptographic Key allows an attacker who decodes the application to decrypt transmitted data such as the login username and password. | [] | null | null | 7.5 | null |
|
CVE-2013-1742 | Multiple cross-site scripting (XSS) vulnerabilities in editflagtypes.cgi in Bugzilla 2.x, 3.x, and 4.0.x before 4.0.11; 4.1.x and 4.2.x before 4.2.7; and 4.3.x and 4.4.x before 4.4.1 allow remote attackers to inject arbitrary web script or HTML via the (1) id or (2) sortkey parameter. | [
"cpe:2.3:a:mozilla:bugzilla:4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.14.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.14.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.14.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.14.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.14.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.16:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.16:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.16.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.16.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.16.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.16.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.16.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.16.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.16.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.16.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.16.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.16.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.16.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.17.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.17.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.17.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.17.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.17.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.17.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.17.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.18:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.18:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.18:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.18:rc3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.18.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.18.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.18.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.18.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.18.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.18.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.18.6\\+:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.18.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.18.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.18.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.19:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.19.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.19.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.19.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.20:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.20:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.20:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.20.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.20.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.20.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.20.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.20.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.20.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.20.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.21:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.21.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.21.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.21.2:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.22:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.22:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.22.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.22.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.22.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.22.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.22.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.22.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.22.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.23:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.23.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.23.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.23.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.23.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.4:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.4:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.2:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.2:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.4:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.4.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.4.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.4.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.4.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.4.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.6:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.6.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.6.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.6.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.6.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.6.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.6.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.6.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.2:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.2:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.2.5:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-j22w-7r9x-5g74 | Cross-Site Scripting (XSS) vulnerability in School Event Management System affecting version 1.0. An attacker could exploit this vulnerability by sending a specially crafted javascript payload to an authenticated user and partially take over their browser session via the 'eventdate' and 'events' parameters in 'port/event_print.php'. | [] | null | 7.1 | null | null |
|
CVE-2004-0139 | Unknown vulnerability in the bsd.a kernel networking for SGI IRIX 6.5.22 through 6.5.25, and possibly earlier versions, in which "t_unbind changes t_bind's behavior," has unknown impact and attack vectors. | [
"cpe:2.3:o:sgi:irix:6.5.22:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.23:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.24:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.25:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
CVE-2022-4563 | Freedom of the Press SecureDrop gpg-agent.conf symlink | A vulnerability was found in Freedom of the Press SecureDrop. It has been rated as critical. Affected by this issue is some unknown functionality of the file gpg-agent.conf. The manipulation leads to symlink following. Local access is required to approach this attack. The name of the patch is b0526a06f8ca713cce74b63e00d3730618d89691. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-215972. | [
"cpe:2.3:a:freedom:securedrop:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
GHSA-fgq9-ggr2-vg42 | Symantec Enterprise Firewall/VPN Appliances 100, 200, and 200R running firmware before 1.63 and Gateway Security 320, 360, and 360R running firmware before 622 uses a default read/write SNMP community string, which allows remote attackers to alter the firewall's configuration file. | [] | null | null | null | null |
|
GHSA-4pv5-f4x8-773m | An elevation of privilege vulnerability in the Motorola bootloader. Product: Android. Versions: Android kernel. Android ID: A-62345044. | [] | null | null | 9.8 | null |
|
GHSA-mgqg-9g67-qvcc | Integer signedness error in the ttioctl function in bsd/kern/tty.c in the xnu kernel in Apple Mac OS X 10.4 through 10.4.10 allows local users to cause a denial of service (system shutdown) or gain privileges via a crafted TIOCSETD ioctl request. | [] | null | null | null | null |
|
GHSA-x4mc-cqqx-f746 | In affected versions of Octopus Server it is possible for the OpenID client secret to be logged in clear text during the configuration of Octopus Server. | [] | null | 4.2 | null | null |
|
GHSA-vgv4-f4q4-76rv | Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083. | [] | null | 8.8 | null | null |
|
CVE-1999-0609 | An incorrect configuration of the SoftCart CGI program "SoftCart.exe" could disclose private information. | [
"cpe:2.3:a:mercantec:softcart:*:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2025-5970 | PHPGurukul Restaurant Table Booking System add-subadmin.php cross site scripting | A vulnerability was found in PHPGurukul Restaurant Table Booking System 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file /admin/add-subadmin.php. The manipulation of the argument fullname leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well. | [] | 4.8 | 2.4 | 2.4 | 3.3 |
GHSA-mrqf-9666-2wqm | Deserialization of Untrusted Data vulnerability in MagePeople Team Taxi Booking Manager for WooCommerce allows Object Injection. This issue affects Taxi Booking Manager for WooCommerce: from n/a through 1.1.8. | [] | null | 9.8 | null | null |
|
GHSA-jwjf-qcqc-qr75 | Cross-site scripting (XSS) vulnerability in OmegaMw7a.ASP in OMEGA (aka Omegasoft) INterneSErvicesLosungen (INSEL) allows remote attackers to inject arbitrary web script or HTML via the WCE parameter. | [] | null | null | null | null |
|
CVE-2022-48944 | sched: Fix yet more sched_fork() races | In the Linux kernel, the following vulnerability has been resolved:
sched: Fix yet more sched_fork() races
Where commit 4ef0c5c6b5ba ("kernel/sched: Fix sched_fork() access an
invalid sched_task_group") fixed a fork race vs cgroup, it opened up a
race vs syscalls by not placing the task on the runqueue before it
gets exposed through the pidhash.
Commit 13765de8148f ("sched/fair: Fix fault in reweight_entity") is
trying to fix a single instance of this, instead fix the whole class
of issues, effectively reverting this commit. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.10.80:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.14.19:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
CVE-2017-7896 | Trend Micro InterScan Messaging Security Virtual Appliance (IMSVA) 9.1 before CP 1644 has XSS. | [
"cpe:2.3:a:trendmicro:interscan_messaging_security_virtual_appliance:*:*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 |
|
GHSA-37rg-8pmj-2vcx | A vulnerability in the CLI of Cisco NX-OS System Software could allow an authenticated, local attacker to perform a command injection attack. The vulnerability is due to insufficient input validation of command arguments to the CLI parser. An attacker could exploit this vulnerability by injecting crafted command arguments into a vulnerable CLI command. An exploit could allow the attacker to execute arbitrary commands at the user's privilege level. On products that support multiple virtual device contexts (VDCs), this vulnerability could allow the attacker to execute commands at the user's privilege level outside the user's environment. This vulnerability affects the following products running Cisco NX-OS System Software: Multilayer Director Switches, Nexus 2000 Series Fabric Extenders, Nexus 3000 Series Switches, Nexus 5000 Series Switches, Nexus 5500 Platform Switches, Nexus 5600 Platform Switches, Nexus 6000 Series Switches, Nexus 7000 Series Switches, Nexus 7700 Series Switches, Nexus 9000 Series Fabric Switches in Application Centric Infrastructure (ACI) mode, Nexus 9000 Series Switches in standalone NX-OS mode, and Nexus 9500 R-Series Line Cards and Fabric Modules. Cisco Bug IDs: CSCve99925, CSCvf15164, CSCvf15167, CSCvf15170, CSCvf15173. | [] | null | null | 5.7 | null |
|
CVE-2008-5973 | SQL injection vulnerability in login.aspx in Active Web Mail 4.0 allows remote attackers to execute arbitrary SQL commands via the password parameter. | [
"cpe:2.3:a:activewebsoftwares:active_web_mail:4.0:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-gpxc-hjqg-f39p | Windows Server Service Tampering Vulnerability. | [] | null | 8.8 | null | null |
|
RHSA-2023:0759 | Red Hat Security Advisory: Red Hat Virtualization security and bug fix update | postgresql-jdbc: Information leak of prepared statement data due to insecure temporary file permissions | [
"cpe:/a:redhat:rhev_manager:4.4:el8",
"cpe:/o:redhat:rhev_hypervisor:4.4::el8"
] | null | 5.5 | null | null |
GHSA-h6qm-w442-h848 | A Server-Side Request Forgery (SSRF) vulnerability exists in the POST /worker_generate_stream API endpoint of the Controller API Server in lm-sys/fastchat, as of commit e208d5677c6837d590b81cb03847c0b9de100765. This vulnerability allows attackers to exploit the victim controller API server's credentials to perform unauthorized web actions or access unauthorized web resources by combining it with the POST /register_worker endpoint. | [] | null | null | 9.3 | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.