id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-mwwf-c899-5fm2 | Stack-based buffer overflow in Baidu Spark Browser 26.5.9999.3511 allows remote attackers to cause a denial of service (application crash) via nested calls to the window.print JavaScript function. | [] | null | null | null | null |
|
CVE-2020-15498 | An issue was discovered on ASUS RT-AC1900P routers before 3.0.0.4.385_20253. The router accepts an arbitrary server certificate for a firmware update. The culprit is the --no-check-certificate option passed to wget tool used to download firmware update files. | [
"cpe:2.3:o:asus:rt-ac1900p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rt-ac1900p:-:*:*:*:*:*:*:*"
] | null | 5.9 | null | 4.3 |
|
GHSA-fgqw-mw64-jqm3 | SQL injection vulnerability in account.asp in Active Trade 2 allows remote attackers to execute arbitrary SQL commands via the (1) username parameter (aka Email field) or the (2) password parameter. NOTE: some of these details are obtained from third party information. | [] | null | null | null | null |
|
GHSA-j28r-mxrm-39f3 | This vulnerability exists in the CAP back office application due to improper authentication check at the API endpoint. An unauthenticated remote attacker with a valid login ID could exploit this vulnerability by manipulating API input parameters through API request URL/payload leading to unauthorized access to other user accounts. | [] | 8.2 | null | null | null |
|
GHSA-c5rj-rh78-4hrx | Invensys Wonderware InTouch HMI 2012 R2 and earlier allows remote attackers to read arbitrary files, send HTTP requests to intranet servers, or cause a denial of service (CPU and memory consumption) via an XML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue. | [] | null | null | null | null |
|
CVE-2022-25903 | Denial of Service (DoS) | The package opcua from 0.0.0 are vulnerable to Denial of Service (DoS) via the ExtensionObjects and Variants objects, when it allows unlimited nesting levels, which could result in a stack overflow even if the message size is less than the maximum allowed. | [
"cpe:2.3:a:opcua_project:opcua:*:*:*:*:*:rust:*:*"
] | null | 7.5 | null | null |
CVE-2021-20992 | Fibaro Home Center Unencrypted management interface | In Fibaro Home Center 2 and Lite devices in all versions provide a web based management interface over unencrypted HTTP protocol. Communication between the user and the device can be eavesdropped to hijack sessions, tokens and passwords. | [
"cpe:2.3:o:fibaro:home_center_2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fibaro:home_center_2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fibaro:home_center_lite_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fibaro:home_center_lite:-:*:*:*:*:*:*:*"
] | null | 8.1 | null | null |
CVE-2021-0490 | In memory management driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android SoCAndroid ID: A-183464868 | [
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | 7.2 |
|
CVE-2018-12713 | GIMP through 2.10.2 makes g_get_tmp_dir calls to establish temporary filenames, which may result in a filename that already exists, as demonstrated by the gimp_write_and_read_file function in app/tests/test-xcf.c. This might be leveraged by attackers to overwrite files or read file content that was intended to be private. | [
"cpe:2.3:a:gimp:gimp:*:*:*:*:*:*:*:*"
] | null | 9.1 | null | 6.4 |
|
GHSA-x8m6-m5rq-285x | In ngmm, there is a possible undefined behavior due to incorrect error handling. This could lead to remote denial of service with no additional execution privileges needed | [] | null | 5.9 | null | null |
|
CVE-2020-35519 | An out-of-bounds (OOB) memory access flaw was found in x25_bind in net/x25/af_x25.c in the Linux kernel version v5.12-rc5. A bounds check failure allows a local attacker with a user account on the system to gain access to out-of-bounds memory, leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:solidfire_baseboard_management_controller_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:solidfire_baseboard_management_controller:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h300e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h300e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h500e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h500e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h700e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h700e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | 6.8 |
|
CVE-2017-9576 | The "Middleton Community Bank Mobile Banking" by Middleton Community Bank app 3.0.0 -- aka middleton-community-bank-mobile-banking/id721843238 for iOS does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [
"cpe:2.3:a:mononabank:middleton_community_bank_mobile:3.0.0:*:*:*:*:iphone_os:*:*"
] | null | null | 5.9 | 4.3 |
|
CVE-2025-31009 | WordPress IndieBlocks <= 0.13.1 - Server Side Request Forgery (SSRF) Vulnerability | Server-Side Request Forgery (SSRF) vulnerability in Jan Boddez IndieBlocks allows Server Side Request Forgery. This issue affects IndieBlocks: from n/a through 0.13.1. | [] | null | 5.4 | null | null |
CVE-2017-15914 | Incorrect implementation of access controls allows remote users to override repository restrictions in Borg servers 1.1.x before 1.1.3. | [
"cpe:2.3:a:borgbackup:borg:*:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.5 |
|
RHSA-2018:3760 | Red Hat Security Advisory: ghostscript security update | ghostscript: /invalidaccess bypass after failed restore (699654) | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 7.3 | null |
CVE-2009-0808 | Multiple SQL injection vulnerabilities in SimpleCMMS before 0.1.0 allow remote attackers to execute arbitrary SQL commands via unspecified vectors. | [
"cpe:2.3:a:simple_cmms:simplecmms:0.1.0:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2024-0351 | SourceCodester Engineers Online Portal session fixiation | A vulnerability classified as problematic has been found in SourceCodester Engineers Online Portal 1.0. This affects an unknown part. The manipulation leads to session fixiation. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-250119. | [
"cpe:2.3:a:engineers_online_portal_project:engineers_online_portal:1.0:*:*:*:*:*:*:*"
] | null | 3.1 | 3.1 | 2.6 |
GHSA-5q34-6fff-9mh4 | Multiple unspecified vulnerabilities in the parser implementation in Smarty before 3.0.0 RC3 have unknown impact and remote attack vectors. | [] | null | null | null | null |
|
CVE-2019-8394 | Zoho ManageEngine ServiceDesk Plus (SDP) before 10.0 build 10012 allows remote attackers to upload arbitrary files via login page customization. | [
"cpe:2.3:a:zohocorp:manageengine_servicedesk_plus:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | 4 |
|
CVE-2017-9048 | libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a stack-based buffer overflow. The function xmlSnprintfElementContent in valid.c is supposed to recursively dump the element content definition into a char buffer 'buf' of size 'size'. At the end of the routine, the function may strcat two more characters without checking whether the current strlen(buf) + 2 < size. This vulnerability causes programs that use libxml2, such as PHP, to crash. | [
"cpe:2.3:a:xmlsoft:libxml2:2.9.4:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
RHBA-2019:0802 | Red Hat Bug Fix Advisory: Red Hat Virtualization Manager (ovirt-engine) 4.2.8 | ovirt-engine: Missing permissions check in web ui allows a user with basic privileges to delete disks | [
"cpe:/a:redhat:rhev_manager:4.2"
] | null | null | 6.5 | null |
CVE-2006-0229 | Unquoted Windows search path vulnerability in Wehntrust might allow local users to gain privileges via a malicious "program.exe" file in the C: folder, which is run when Wehntrust creates the autostart key. | [
"cpe:2.3:a:wehnus:wehntrust:*:*:*:*:*:*:*:*"
] | null | null | null | 2.1 |
|
GHSA-j6qq-7xp7-c5p5 | When opening a website using the `firefox://` protocol handler, SameSite cookies were not properly respected. This vulnerability affects Firefox < 123. | [] | null | 8.3 | null | null |
|
GHSA-w4fp-j2mm-3rrv | Cisco Catalyst 2900XL switch allows a remote attacker to create a denial of service via an empty UDP packet sent to port 161 (SNMP) when SNMP is disabled. | [] | null | null | null | null |
|
GHSA-m434-h92c-mh87 | Cross-site scripting (XSS) vulnerability in a_login.php in Vizra allows remote attackers to inject arbitrary web script or HTML via the message parameter. | [] | null | null | null | null |
|
RHSA-2019:0349 | Red Hat Security Advisory: .NET Core on Red Hat Enterprise Linux security update for February 2019 | dotnet: Domain-spoofing attack in System.Uri | [
"cpe:/a:redhat:rhel_dotnet:1.0::el7",
"cpe:/a:redhat:rhel_dotnet:1.1::el7",
"cpe:/a:redhat:rhel_dotnet:2.1::el7",
"cpe:/a:redhat:rhel_dotnet:2.2::el7"
] | null | null | 7.5 | null |
GHSA-ppg3-7pr3-2m73 | A stored web content injection vulnerability (WCI, a.k.a XSS) is present in MODX Revolution CMS version 2.5.6 and earlier. An authenticated user with permissions to edit users can save malicious JavaScript as a User Group name and potentially take control over victims' accounts. This can lead to an escalation of privileges providing complete administrative control over the CMS. | [] | null | null | 5.4 | null |
|
GHSA-vfmw-qwch-35g6 | Pexip Infinity before 24.1 has Improper Input Validation, leading to temporary denial of service via SIP. | [] | null | null | null | null |
|
GHSA-fxcr-gvcw-hmqm | Magento Open Source allows Cross-Site Scripting (XSS) | Adobe Commerce versions 2.4.4-p2 (and earlier) and 2.4.5-p1 (and earlier) are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a high-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | [] | 1.1 | 4.8 | null | null |
GHSA-9qwm-7466-pm49 | In hal_fd_init of hal_fd.cc, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-146144463 | [] | null | null | null | null |
|
GHSA-vhw6-m4x9-prxq | CSS Paint API in Blink in Google Chrome prior to 67.0.3396.62 allowed a remote attacker to leak cross-origin data via a crafted HTML page. | [] | null | null | 6.5 | null |
|
GHSA-wgpm-4xgr-4mhp | ext/fts3/fts3.c in SQLite before 3.32.0 has a use-after-free in fts3EvalNextRow, related to the snippet feature. | [] | null | 7 | null | null |
|
GHSA-gp5f-6cr8-73qf | A vulnerability has been found in itsourcecode Tailoring Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file /expadd.php. The manipulation of the argument expcat leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. | [] | 5.3 | 6.3 | null | null |
|
GHSA-622q-q6gx-fq67 | Cross-site scripting (XSS) vulnerability in the Webform module 5.x before 5.x-2.8 and 6.x before 6.x-2.8, a module for Drupal, allows remote authenticated users, with webform creation privileges, to inject arbitrary web script or HTML via a field label. | [] | null | null | null | null |
|
GHSA-x8p2-4582-wcx4 | An elevation of privilege vulnerability in the MediaTek driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10. Android ID: A-28332719. | [] | null | null | 7 | null |
|
RHSA-2018:2328 | Red Hat Security Advisory: rhvm-setup-plugins security, bug fix, and enhancement update | hw: cpu: speculative store bypass | [
"cpe:/a:redhat:rhev_manager:4.2"
] | null | null | 5.6 | null |
GHSA-6x8r-c56m-hh3p | HejHome GKW-IC052 IP Camera contained a hard-coded credentials vulnerability. This issue allows remote attackers to operate the IP Camera.(reboot, factory reset, snapshot etc..) | [] | null | null | null | null |
|
CVE-2024-4122 | Tenda W15E setDebugCfg formSetDebugCfg stack-based overflow | A vulnerability classified as critical was found in Tenda W15E 15.11.0.14. Affected by this vulnerability is the function formSetDebugCfg of the file /goform/setDebugCfg. The manipulation of the argument enable/level/module leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-261865 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | [
"cpe:2.3:h:tenda:w15e:-:*:*:*:*:*:*:*"
] | null | 8.8 | 8.8 | 9 |
CVE-2023-52090 | A security agent link following vulnerability in Trend Micro Apex One could allow a local attacker to escalate privileges on affected installations.
Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. | [
"cpe:2.3:a:trendmicro:apex_one:*:*:*:*:saas:*:*:*",
"cpe:2.3:a:trendmicro:apex_one:2019:-:*:*:*:*:*:*"
] | null | 7.8 | null | null |
|
GHSA-prfc-3378-63wr | Cross-site scripting (XSS) vulnerability in DiscusWare Discus Freeware 3.10.5 and Professional 3.10.4 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors in a URL, which is not properly sanitized from the resulting error message. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | [] | null | null | null | null |
|
GHSA-q9vj-3p9c-6gcv | Agentflow BPM file download function has a path traversal vulnerability. An unauthenticated remote attacker can exploit this vulnerability to bypass authentication and download arbitrary system files. | [] | null | 7.5 | null | null |
|
CVE-2013-0726 | Stack-based buffer overflow in the ERM_convert_to_correct_webpath function in ermapper_u.dll in ERDAS ER Viewer before 13.00.0001 allows remote attackers to execute arbitrary code via a crafted pathname in an ERS file. | [
"cpe:2.3:a:hexagon:erdas_er_viewer:*:*:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
GHSA-8vvc-hmjh-w8jg | An improper authentication vulnerability exists in WSO2 Identity Server 7.0.0 due to an implementation flaw that allows app-native authentication to be bypassed when an invalid object is passed.Exploitation of this vulnerability could enable malicious actors to circumvent the client verification mechanism, compromising the integrity of the authentication process. | [] | null | 5.8 | null | null |
|
GHSA-wgjf-mpjv-hj87 | Ipswitch MOVEit File Transfer (formerly DMZ) 8.1 and earlier, when configured to support file view on download, allows remote authenticated users to conduct cross-site scripting (XSS) attacks by uploading HTML files. | [] | null | null | 5.4 | null |
|
CVE-2019-3610 | True Key Browser Extension 3.1.9219.0 update fixes Sensitive Data Exposure vulnerability | Data Leakage Attacks vulnerability in Microsoft Windows client in McAfee True Key (TK) 3.1.9211.0 and earlier allows local users to expose confidential data via specially crafted malware. | [
"cpe:2.3:a:mcafee:true_key:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | null | 5.6 | null |
GHSA-3626-jqw2-jv39 | In telecom service, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed | [] | null | 7.8 | null | null |
|
RHSA-2022:1285 | Red Hat Security Advisory: firefox security update | Mozilla: Use-after-free in NSSToken objects Mozilla: Use-after-free after VR Process destruction Mozilla: Denial of Service via complex regular expressions Mozilla: Out of bounds write due to unexpected WebAuthN Extensions Mozilla: Use-after-free in DocumentL10n::TranslateDocument Mozilla: Incorrect AliasSet used in JIT Codegen Mozilla: iframe contents could be rendered outside the border Mozilla: Memory safety bugs fixed in Firefox 99 and Firefox ESR 91.8 | [
"cpe:/a:redhat:rhel_eus:8.4::appstream"
] | null | 8.8 | 6.1 | null |
GHSA-446h-6m77-5x8g | The set_default_speeds function in backend/backend.c in NVidia NVClock before 0.8b2 allows local users to overwrite arbitrary files via a symlink attack on the /tmp/nvclock temporary file. | [] | null | null | null | null |
|
GHSA-6xmg-694r-qxfg | An elevation of privilege vulnerability exists in the way that the Windows kernel image handles objects in memory.An attacker who successfully exploited the vulnerability could execute code with elevated permissions.To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application.The security update addresses the vulnerability by ensuring the Windows kernel image properly handles objects in memory., aka 'Windows Image Elevation of Privilege Vulnerability'. | [] | null | 7.8 | null | null |
|
CVE-2024-1437 | WordPress Adsmonetizer Plugin <= 3.1.2 is vulnerable to Cross Site Scripting (XSS) | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in José Fernandez Adsmonetizer allows Reflected XSS.This issue affects Adsmonetizer: from n/a through 3.1.2.
| [] | null | 7.1 | null | null |
CVE-2023-0538 | Campaign URL Builder < 1.8.2 - Contributor+ Stored XSS | The Campaign URL Builder WordPress plugin before 1.8.2 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks | [
"cpe:2.3:a:campaign_url_builder_project:campaign_url_builder:*:*:*:*:*:wordpress:*:*"
] | null | 5.4 | null | null |
GHSA-h47p-j8f8-w9wx | An issue was discovered in Hitachi Vantara Pentaho through 9.1 and Pentaho Business Intelligence Server through 7.x. The Security Model has different layers of Access Control. One of these layers is the applicationContext security, which is defined in the applicationContext-spring-security.xml file. The default configuration allows an unauthenticated user with no previous knowledge of the platform settings to extract pieces of information without possessing valid credentials. | [] | null | 7.5 | null | null |
|
CVE-2019-16393 | SPIP before 3.1.11 and 3.2 before 3.2.5 mishandles redirect URLs in ecrire/inc/headers.php with a %0D, %0A, or %20 character. | [
"cpe:2.3:a:spip:spip:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
] | null | 6.1 | null | 5.8 |
|
GHSA-97cg-4h65-jxxg | Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code by leveraging an unspecified "type confusion," a different vulnerability than CVE-2016-4223 and CVE-2016-4225. | [] | null | null | 8.8 | null |
|
GHSA-5p4c-rp79-gv64 | Multiple cross-site request forgery (CSRF) vulnerabilities in the manage_users handler in admin/index.php in Falt4 CMS (aka Falt4 Extreme) RC4 allow remote attackers to hijack the authentication of administrators for requests that change passwords via the (1) edit and (2) edit_now actions. | [] | null | null | null | null |
|
GHSA-vp43-mc38-mmg5 | Improper Input Validation vulnerability in Hillstone Networks Hillstone Networks Web Application Firewall on 5.5R6 allows Command Injection.This issue affects Hillstone Networks Web Application Firewall: from 5.5R6-2.6.7 through 5.5R6-2.8.13. | [] | null | 9.8 | null | null |
|
CVE-2014-4470 | WebKit, as used in Apple Safari before 6.2.1, 7.x before 7.1.1, and 8.x before 8.0.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2014-12-2-1. | [
"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:7.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:7.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:7.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:7.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:7.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:8.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
GHSA-q499-5p9h-r886 | A sustained sequence of different types of normal transit traffic can trigger a high CPU consumption denial of service condition in the Junos OS register and schedule software interrupt handler subsystem when a specific command is issued to the device. This affects one or more threads and conversely one or more running processes running on the system. Once this occurs, the high CPU event(s) affects either or both the forwarding and control plane. As a result of this condition the device can become inaccessible in either or both the control and forwarding plane and stops forwarding traffic until the device is rebooted. The issue will reoccur after reboot upon receiving further transit traffic. Score: 5.7 MEDIUM (CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) For network designs utilizing layer 3 forwarding agents or other ARP through layer 3 technologies, the score is slightly higher. Score: 6.5 MEDIUM (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) If the following entry exists in the RE message logs then this may indicate the issue is present. This entry may or may not appear when this issue occurs. /kernel: Expensive timeout(9) function: Affected releases are Juniper Networks Junos OS: 12.1X46 versions prior to 12.1X46-D50; 12.3X48 versions prior to 12.3X48-D30; 12.3R versions prior to 12.3R12-S7; 14.1 versions prior to 14.1R8-S4, 14.1R9; 14.1X53 versions prior to 14.1X53-D30, 14.1X53-D34; 14.2 versions prior to 14.2R8; 15.1 versions prior to 15.1F6, 15.1R3; 15.1X49 versions prior to 15.1X49-D40; 15.1X53 versions prior to 15.1X53-D31, 15.1X53-D33, 15.1X53-D60. No other Juniper Networks products or platforms are affected by this issue. | [] | null | null | 6.5 | null |
|
CVE-2022-47933 | Brave Browser before 1.42.51 allowed a remote attacker to cause a denial of service via a crafted HTML file that references the IPFS scheme. This vulnerability is caused by an uncaught exception in the function ipfs::OnBeforeURLRequest_IPFSRedirectWork() in ipfs_redirect_network_delegate_helper.cc. | [
"cpe:2.3:a:brave:brave:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | null |
|
GHSA-9wv3-p38x-5wqv | The URL Shortener | Conversion Tracking | AB Testing | WooCommerce WordPress plugin through 9.0.2 does not have CSRF checks in some bulk actions, which could allow attackers to make logged in admins perform unwanted actions, such as deleting customers via CSRF attacks | [] | null | 4.3 | null | null |
|
CVE-2024-6494 | WordPress File Upload < 4.24.8 - Unauthenticated Stored XSS | The WordPress File Upload WordPress plugin before 4.24.8 does not properly sanitize and escape certain parameters, which could allow unauthenticated users to execute stored cross-site scripting (XSS) attacks. | [
"cpe:2.3:a:wordpress_file_upload_project:wordpress_file_upload:*:-:-:*:-:wordpress:*:*"
] | null | 6.1 | null | null |
ICSA-22-090-01 | Schneider Electric SCADAPack Workbench | An improper restriction of XML external entity reference vulnerability exists that could result in information disclosure when opening a malicious solution file provided by an attacker with SCADAPack Workbench. This could be exploited to pass data from local files to a remote system controlled by an attacker.CVE-2022-0221 has been assigned to this vulnerability. A CVSS v3 base score of 5.5 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N). | [] | null | null | 5.5 | null |
CVE-2023-48341 | In video decoder, there is a possible out of bounds read due to improper input validation. This could lead to local denial of service with no additional execution privileges needed | [
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc7731e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc9832e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t310:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
|
CVE-2009-2511 | Integer overflow in the CryptoAPI component in Microsoft Windows 2000 SP4, Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista Gold, SP1, and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 allows man-in-the-middle attackers to spoof arbitrary SSL servers and other entities via an X.509 certificate that has a malformed ASN.1 Object Identifier (OID) and was issued by a legitimate Certification Authority, aka "Integer Overflow in X.509 Object Identifiers Vulnerability." | [
"cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:*:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:*:x32:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:*:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:r2:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:r2:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x32:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:*:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp2:professional_x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2022-36862 | A heap-based overflow vulnerability in HWR::EngineCJK::Impl::Construct() in libSDKRecognitionText.spensdk.samsung.so library prior to SMR Sep-2022 Release 1 allows attacker to cause memory access fault. | [
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*"
] | null | 4.4 | null | null |
|
CVE-2007-2173 | Eval injection vulnerability in (1) courier-imapd.indirect and (2) courier-pop3d.indirect in Courier-IMAP before 4.0.6-r2, and 4.1.x before 4.1.2-r1, on Gentoo Linux allows remote attackers to execute arbitrary commands via the XMAILDIR variable, related to the LOGINRUN variable. | [
"cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*",
"cpe:2.3:a:double_precision_incorporated:courier-imap:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:double_precision_incorporated:courier-imap:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:double_precision_incorporated:courier-imap:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:double_precision_incorporated:courier-imap:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:double_precision_incorporated:courier-imap:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:double_precision_incorporated:courier-imap:4.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:double_precision_incorporated:courier-imap:4.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:double_precision_incorporated:courier-imap:4.1.1:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
GHSA-wj96-8h82-w3r4 | Multiple SQL injection vulnerabilities in index.php in sCssBoard 1.0, 1.1, 1.11, and 1.12 allow remote attackers to execute arbitrary SQL commands via (1) the f parameter in a showforum action, (2) the u parameter in a profile action, (3) the viewcat parameter, or (4) a combination of scb_uid and scb_ident cookie values. | [] | null | null | null | null |
|
CVE-2017-14927 | In Poppler 0.59.0, a NULL Pointer Dereference exists in the SplashOutputDev::type3D0() function in SplashOutputDev.cc via a crafted PDF document. | [
"cpe:2.3:a:freedesktop:poppler:0.59.0:*:*:*:*:*:*:*"
] | null | null | 5.5 | 4.3 |
|
CVE-2021-33847 | Improper buffer restrictions in firmware for some Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products before version 22.120 may allow an authenticated user to potentially enable escalation of privilege via local access. | [
"cpe:2.3:o:intel:wi-fi_6_ax411_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:wi-fi_6_ax411:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:wi-fi_6_ax211_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:wi-fi_6_ax211:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:wi-fi_6_ax210_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:wi-fi_6_ax210:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:wi-fi_6_ax201_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:wi-fi_6_ax201:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:wi-fi_6_ax200:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:wireless-ac_9560_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:wireless-ac_9560:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:wireless-ac_9462_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:wireless-ac_9462:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:wireless-ac_9461_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:wireless-ac_9461:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:wireless-ac_9260_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:wireless-ac_9260:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:dual_band_wireless-ac_8265_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:dual_band_wireless-ac_8265:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:dual_band_wireless-ac_8260_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:dual_band_wireless-ac_8260:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:dual_band_wireless-ac_3168_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:dual_band_wireless-ac_3168:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:wireless_7265_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:wireless_7265:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:dual_band_wireless-ac_3165_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:dual_band_wireless-ac_3165:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:killer_wi-fi_6e_ax1690_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:killer_wi-fi_6e_ax1690:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:killer_wi-fi_6e_ax1675_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:killer_wi-fi_6e_ax1675:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:killer_wi-fi_6_ax1650_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:killer_wi-fi_6_ax1650:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:killer_wireless-ac_1550_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:killer_wireless-ac_1550:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
|
GHSA-q6vx-vh72-2p68 | Realtek xPON RTL9601D SDK 1.9 stores passwords in plaintext which may allow attackers to possibly gain access to the device with root permissions via the build-in network monitoring tool and execute arbitrary commands. | [] | null | null | null | null |
|
GHSA-gj2v-jx3p-28mw | Toshiba printers use Sendmail to send emails to recipients. Sendmail is used with several insecure directories. A local attacker can inject a malicious Sendmail configuration file. As for the affected products/models/versions, see the reference URL. | [] | null | 7.4 | null | null |
|
CVE-2015-7385 | Cross-site scripting (XSS) vulnerability in Open-Xchange OX Guard before 2.0.0-rev11 allows remote attackers to inject arbitrary web script or HTML via the uid field in a PGP public key, which is not properly handled in "Guard PGP Settings." | [
"cpe:2.3:a:open-xchange:ox_guard:*:rev6:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2024-37377 | A heap-based buffer overflow in IPsec of Ivanti Connect Secure before version 22.7R2.3 allows a remote unauthenticated attacker to cause a denial of service. | [] | null | null | 7.5 | null |
|
GHSA-mm26-fwx4-9mg6 | Cross-Site Request Forgery (CSRF) vulnerability in Horea Radu Mesmerize allows Cross Site Request Forgery.This issue affects Mesmerize: from n/a through 1.6.120. | [] | null | 4.3 | null | null |
|
CVE-2022-27992 | Zoo Management System v1.0 was discovered to contain a SQL injection vulnerability at /public_html/animals via the class_id parameter. | [
"cpe:2.3:a:phpgurukul:zoo_management_system:1.0:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.5 |
|
CVE-2024-27231 | In tmu_get_tr_stats of tmu.c, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. | [] | null | 5.9 | null | null |
|
GHSA-wc3x-qj47-37mg | The private-key operations in ecc.c in wolfSSL before 4.4.0 do not use a constant-time modular inverse when mapping to affine coordinates, aka a "projective coordinates leak." | [] | null | 5.3 | null | null |
|
GHSA-vvf2-x5cg-wpgx | IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 5.2.6.5 is vulnerable to SQL injection. A remote attacker could send specially-crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-Force ID: 167880. | [] | null | null | null | null |
|
CVE-2021-3462 | A privilege escalation vulnerability in Lenovo Power Management Driver for Windows 10, prior to version 1.67.17.54, that could allow unauthorized access to the driver's device object. | [
"cpe:2.3:a:lenovo:power_management_driver:*:*:*:*:*:windows_10:*:*",
"cpe:2.3:h:lenovo:thinkpad_11e_gen_5:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_11e_yoga_gen_6:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_13_gen_2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_25:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_a275:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_a285:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_a475:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_a485:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_e14:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_e14_gen2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_e15:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_e15_gen2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_e470:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_e470c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_e475:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_e480:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_e490:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_e495:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_e570:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_e570c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_e575:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_e580:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_e590:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_e595:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_l13:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_l13_gen_1:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_l13_gen_2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_l13_yoga:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_l13_yoga_gen_1:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_l13_yoga_gen_2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_l14_gen_1:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_l14_gen_2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_l15_gen_1:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_l15_gen_2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_l380:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_l380_yoga:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_l390:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_l390_yoga:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_l470:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_l480:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_l490:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_l570:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_l580:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_l590:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_p1:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_p1_gen_2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_p1_gen_3:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_p14s_gen_1:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_p14s_gen_2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_p15_gen_1:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_p15s_gen_1:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_p15s_gen_2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_p15v_gen_1:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_p17_gen_1:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_p43s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_p51:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_p51s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_p52:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_p52s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_p53:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_p53s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_p71:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_p72:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_p73:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_r14:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_r14_gen_2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_r480:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_s1_gen_4:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_s2_gen_2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_s2_gen_5:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_s2_gen_6:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_s2_yoga_gen_5:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_s2_yoga_gen_6:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_s3_gen_2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_s5_gen_2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_t14_gen_1:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_t14_gen_2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_t14s_gen_1:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_t14s_gen_2i:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_t15_gen_1:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_t15_gen_2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_t15g_gen_1:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_t15p_gen_1:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_t470:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_t470p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_t470s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_t480:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_t480s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_t490:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_t490s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_t495:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_t570:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_t580:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_t590:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x1_carbon_gen_5:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x1_carbon_gen_6:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x1_carbon_gen_7:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x1_carbon_gen_8:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x1_carbon_gen_9:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x1_extreme:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x1_extreme_2nd:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x1_extreme_gen_3:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x1_nano_gen_1:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x1_tablet_gen_2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x1_tablet_gen_3:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x1_titanium_gen_1:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x1_yoga_gen_2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x1_yoga_gen_3:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x1_yoga_gen_4:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x1_yoga_gen_5:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x1_yoga_gen_6:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x12:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x13_gen_1:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x13_gen_2i:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x13_yoga_gen_1:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x13_yoga_gen_2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x270:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x280:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x380_yoga:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x390:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x390_yoga:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x395:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_yoga_11e_gen_5:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_yoga_370:-:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
|
GHSA-6w93-7hq8-m545 | Dell Wyse Management Suite versions prior to 1.4.1 contain a stored cross-site scripting vulnerability. A remote authenticated malicious user with low privileges could exploit this vulnerability to store malicious payload in the device heartbeat request. When victim users access the submitted data through their browsers, the malicious code gets executed by the web browser in the context of the vulnerable application. | [] | null | null | null | null |
|
GHSA-rr7w-f67q-fhr8 | The xntpd ntp (ntpd) daemon before 4.2.0b, when run with the -u option and using a string to specify the group, uses the group ID of the user instead of the group, which causes xntpd to run with different privileges than intended. | [] | null | null | null | null |
|
CVE-2020-35567 | An issue was discovered in MB CONNECT LINE mymbCONNECT24 and mbCONNECT24 through 2.6.2. The software uses a secure password for database access, but this password is shared across instances. | [
"cpe:2.3:a:mbconnectline:mbconnect24:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mbconnectline:mymbconnect24:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | 4.6 |
|
GHSA-98hm-c56g-vjqc | A proprietary protocol for iBoot devices is used for control and keepalive commands. The function compares the username and password; it also contains the configuration data for the user specified. If the user does not exist, then it sends a value for username and password, which allows successful authentication for a connection. | [] | null | 8.5 | null | null |
|
CVE-2000-0212 | InterAccess TelnetD Server 4.0 allows remote attackers to conduct a denial of service via malformed terminal client configuration information. | [
"cpe:2.3:a:pragma_systems:interaccess_telnetd_server:4.0:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2024-48813 | SQL injection vulnerability in employee-management-system-php-and-mysql-free-download.html taskmatic 1.0 allows a remote attacker to execute arbitrary code via the admin_id parameter of the /update-employee.php component. | [
"cpe:2.3:a:employee_management_system_project:employee_management_system:1.0:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
|
GHSA-75j6-jvxw-6f7f | Multiple directory traversal vulnerabilities in index.php in Mini CMS 1.0.1 allow remote attackers to include and execute arbitrary local files via a .. (dot dot) in the (1) page and (2) admin parameters. | [] | null | null | null | null |
|
GHSA-xfg2-wq46-mc4f | Cross-site scripting (XSS) vulnerability in Adobe Brackets before 1.7 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | [] | null | null | 6.1 | null |
|
GHSA-r7jx-h7qj-vxgc | Cross-site request forgery (CSRF) vulnerability in Smart Forms 2.6.15 and earlier allows remote attackers to hijack the authentication of administrators via a specially crafted page. | [] | null | null | 8.8 | null |
|
CVE-2017-7588 | On certain Brother devices, authorization is mishandled by including a valid AuthCookie cookie in the HTTP response to a failed login attempt. Affected models are: MFC-J6973CDW MFC-J4420DW MFC-8710DW MFC-J4620DW MFC-L8850CDW MFC-J3720 MFC-J6520DW MFC-L2740DW MFC-J5910DW MFC-J6920DW MFC-L2700DW MFC-9130CW MFC-9330CDW MFC-9340CDW MFC-J5620DW MFC-J6720DW MFC-L8600CDW MFC-L9550CDW MFC-L2720DW DCP-L2540DW DCP-L2520DW HL-3140CW HL-3170CDW HL-3180CDW HL-L8350CDW HL-L2380DW ADS-2500W ADS-1000W ADS-1500W. | [
"cpe:2.3:o:brother:mfc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:brother:mfc-8710dw:-:*:*:*:*:*:*:*",
"cpe:2.3:h:brother:mfc-9130cw:-:*:*:*:*:*:*:*",
"cpe:2.3:h:brother:mfc-9330cdw:-:*:*:*:*:*:*:*",
"cpe:2.3:h:brother:mfc-9340cdw:-:*:*:*:*:*:*:*",
"cpe:2.3:h:brother:mfc-j3720:-:*:*:*:*:*:*:*",
"cpe:2.3:h:brother:mfc-j4420dw:-:*:*:*:*:*:*:*",
"cpe:2.3:h:brother:mfc-j4620dw:-:*:*:*:*:*:*:*",
"cpe:2.3:h:brother:mfc-j5620dw:-:*:*:*:*:*:*:*",
"cpe:2.3:h:brother:mfc-j5910dw:-:*:*:*:*:*:*:*",
"cpe:2.3:h:brother:mfc-j6520dw:-:*:*:*:*:*:*:*",
"cpe:2.3:h:brother:mfc-j6720dw:-:*:*:*:*:*:*:*",
"cpe:2.3:h:brother:mfc-j6920dw:-:*:*:*:*:*:*:*",
"cpe:2.3:h:brother:mfc-j6973cdw:-:*:*:*:*:*:*:*",
"cpe:2.3:h:brother:mfc-l2700dw:-:*:*:*:*:*:*:*",
"cpe:2.3:h:brother:mfc-l2720dw:-:*:*:*:*:*:*:*",
"cpe:2.3:h:brother:mfc-l2740dw:-:*:*:*:*:*:*:*",
"cpe:2.3:h:brother:mfc-l8600cdw:-:*:*:*:*:*:*:*",
"cpe:2.3:h:brother:mfc-l8850cdw:-:*:*:*:*:*:*:*",
"cpe:2.3:h:brother:mfc-l9550cdw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:brother:dcp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:brother:dcp-l2520dw:-:*:*:*:*:*:*:*",
"cpe:2.3:h:brother:dcp-l2540dw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:brother:ads_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:brother:ads-1000w:-:*:*:*:*:*:*:*",
"cpe:2.3:h:brother:ads-1500w:-:*:*:*:*:*:*:*",
"cpe:2.3:h:brother:ads-2500w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:brother:hl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:brother:hl-3140cw:-:*:*:*:*:*:*:*",
"cpe:2.3:h:brother:hl-3170cdw:-:*:*:*:*:*:*:*",
"cpe:2.3:h:brother:hl-3180cdw:-:*:*:*:*:*:*:*",
"cpe:2.3:h:brother:hl-l2380dw:-:*:*:*:*:*:*:*",
"cpe:2.3:h:brother:hl-l8350cdw:-:*:*:*:*:*:*:*"
] | null | null | 9.8 | 10 |
|
CVE-2016-0970 | Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK & Compiler before 20.0.0.260 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0964, CVE-2016-0965, CVE-2016-0966, CVE-2016-0967, CVE-2016-0968, CVE-2016-0969, CVE-2016-0972, CVE-2016-0976, CVE-2016-0977, CVE-2016-0978, CVE-2016-0979, CVE-2016-0980, and CVE-2016-0981. | [
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player_desktop_runtime:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:esr:*:*:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:internet_explorer:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:chrome:*:*",
"cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:edge:*:*",
"cpe:2.3:a:adobe:air_desktop_runtime:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:-:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | 9.3 |
|
GHSA-99mv-7948-4cm3 | A buffer overflow issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13.4. An app may be able to execute arbitrary code with kernel privileges. | [] | null | 7.8 | null | null |
|
GHSA-2gvx-cpxc-42hj | Unrestricted file upload vulnerability in the fileUnzip->unzip method in Dotclear before 2.10.3 allows remote authenticated users with permissions to manage media items to execute arbitrary code by uploading a ZIP file containing a file with a crafted extension, as demonstrated by .php.txt or .php%20. | [] | null | null | 8.8 | null |
|
CVE-2020-0957 | An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0956, CVE-2020-0958. | [
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*"
] | null | 7.8 | null | 7.2 |
|
CVE-2006-6493 | Buffer overflow in the krbv4_ldap_auth function in servers/slapd/kerberos.c in OpenLDAP 2.4.3 and earlier, when OpenLDAP is compiled with the --enable-kbind (Kerberos KBIND) option, allows remote attackers to execute arbitrary code via an LDAP bind request using the LDAP_AUTH_KRBV41 authentication method and long credential data. | [
"cpe:2.3:a:openldap:openldap:*:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:1.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:1.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:1.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:1.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:1.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:1.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:1.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:1.2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:1.2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:1.2.11:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:1.2.12:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:1.2.13:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.0.11_9:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.0.11_11:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.0.11_11s:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.0.21:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.0.22:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.0.23:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.0.24:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.0.25:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.0.26:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.0.27:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.1.12:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.1.13:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.1.14:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.1.15:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.1.16:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.1.17:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.1.18:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.1.19:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.1.20:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.1.21:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.1.22:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.1.23:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.1.24:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.1.25:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.1.26:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.1.27:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.1.28:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.1.29:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.1.30:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.1_.20:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.2.11:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.2.12:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.2.13:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.2.14:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.2.15:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.2.16:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.2.17:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.2.18:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.2.19:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.2.20:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.2.21:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.2.22:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.2.23:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.2.24:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.2.25:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.2.26:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.2.27:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.2.28_r2:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.3.27_2_2006-10-18:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.3.28_2_2006-10-22:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.3.28_2006-10-22:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.3.28_e1.0.0:*:*:*:*:*:*:*"
] | null | null | null | 5.1 |
|
RHSA-2019:3140 | Red Hat Security Advisory: Red Hat JBoss Data Virtualization 6.4.8 security update | thrift: Improper file path sanitization in t_go_generator.cc:format_go_output() of the go client library can allow an attacker to inject commands tika: Command injection in tika-server can allow remote attackers to execute arbitrary commands via crafted headers slf4j: Deserialisation vulnerability in EventData constructor can allow for arbitrary code execution jackson-databind: Potential information exfiltration with default typing, serialization gadget from MyBatis thrift: Improper Access Control grants access to files outside the webservers docroot path jackson-databind: improper polymorphic deserialization of types from Jodd-db library jackson-databind: improper polymorphic deserialization of types from Oracle JDBC driver jackson-databind: arbitrary code execution in slf4j-ext class jackson-databind: arbitrary code execution in blaze-ds-opt and blaze-ds-core classes jackson-databind: improper polymorphic deserialization in axis2-transport-jms class jackson-databind: improper polymorphic deserialization in openjpa class jackson-databind: improper polymorphic deserialization in jboss-common-core class zookeeper: Information disclosure in Apache ZooKeeper | [
"cpe:/a:redhat:jboss_data_virtualization:6.4"
] | null | null | 7.5 | null |
RHSA-2023:6194 | Red Hat Security Advisory: thunderbird security update | Mozilla: Queued up rendering could have allowed websites to clickjack Mozilla: Large WebGL draw could have led to a crash Mozilla: WebExtensions could open arbitrary URLs Mozilla: Improper object tracking during GC in the JavaScript engine could have led to a crash. Mozilla: Memory safety bugs fixed in Firefox 119, Firefox ESR 115.4, and Thunderbird 115.4 Mozilla: Address bar spoofing via bidirectional characters libvpx: crash related to VP9 encoding in libvpx | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
CVE-2024-11757 | WP GeoNames <= 1.9.0.1 - Authenticated (Contributor+) Stored Cross-Site Scripting | The WP GeoNames plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'wp-geonames' shortcode in all versions up to, and including, 1.9.0.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] | null | 6.4 | null | null |
CVE-2024-5194 | Arris VAP2500 assoc_table.php command injection | A vulnerability was found in Arris VAP2500 08.50. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /assoc_table.php. The manipulation of the argument id leads to command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-265831. | [
"cpe:2.3:o:arris:vap2500_firmware:*:*:*:*:*:*:*:*"
] | 5.1 | 4.7 | 4.7 | 5.8 |
GHSA-9fmx-fx6p-rcq8 | Internally used text extraction reports allow an attacker to inject code that can be executed by the application. An attacker could thereby control the behavior of the application. | [] | null | 9.8 | null | null |
|
CVE-2019-3870 | A vulnerability was found in Samba from version (including) 4.9 to versions before 4.9.6 and 4.10.2. During the creation of a new Samba AD DC, files are created in a private subdirectory of the install location. This directory is typically mode 0700, that is owner (root) only access. However in some upgraded installations it will have other permissions, such as 0755, because this was the default before Samba 4.8. Within this directory, files are created with mode 0666, which is world-writable, including a sample krb5.conf, and the list of DNS names and servicePrincipalName values to update. | [
"cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
"cpe:2.3:a:synology:directory_server:-:*:*:*:*:*:*:*",
"cpe:2.3:a:synology:diskstation_manager:5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:synology:diskstation_manager:6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:synology:diskstation_manager:6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:synology:router_manager:1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:synology:skynas_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:synology:skynas:-:*:*:*:*:*:*:*",
"cpe:2.3:o:synology:vs960hd_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:synology:vs960hd:-:*:*:*:*:*:*:*"
] | null | null | 6.1 | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.