id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2014-8643 | Mozilla Firefox before 35.0 on Windows allows remote attackers to bypass the Gecko Media Plugin (GMP) sandbox protection mechanism by leveraging access to the GMP process, as demonstrated by the OpenH264 plugin's process. | [
"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*"
] | null | null | null | 7.1 |
|
GHSA-5mxp-qppg-qw97 | An information disclosure vulnerability in libavc in Mediaserver could enable a local malicious application to access data outside of its permission levels. This issue is rated as Moderate because it could be used to access data without permission. Product: Android. Versions: 6.0, 6.0.1, 7.0, 7.1.1. Android ID: A-33551775. | [] | null | null | 5.5 | null |
|
GHSA-r5qv-ggx3-m45h | Vulnerability in the Oracle Email Center product of Oracle E-Business Suite (component: Message Display). Supported versions that are affected are 12.1.1-12.1.3 and 12.2.3-12.2.9. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Email Center. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Email Center, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Email Center accessible data as well as unauthorized update, insert or delete access to some of Oracle Email Center accessible data. CVSS 3.1 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N). | [] | null | null | null | null |
|
CVE-2024-39886 | TONE store App version 3.4.2 and earlier contains an issue with unprotected primary channel. Since TONE store App communicates with TONE store website in cleartext, a man-in-the-middle attack may allow an attacker to obtain and/or alter communications of the affected App. | [] | null | 3.7 | null | null |
|
CVE-2012-5669 | The _bdf_parse_glyphs function in FreeType before 2.4.11 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to BDF fonts and an incorrect calculation that triggers an out-of-bounds read. | [
"cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.1.8:rc1:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:freetype:freetype:2.4.9:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-vmj5-7v67-82hg | Rejected reason: Not used | [] | null | null | null | null |
|
CVE-2015-6555 | Symantec Endpoint Protection Manager (SEPM) 12.1 before 12.1-RU6-MP3 allows remote attackers to execute arbitrary Java code by connecting to the console Java port. | [
"cpe:2.3:a:symantec:endpoint_protection_manager:*:ru6mp2:*:*:*:*:*:*"
] | null | null | null | 8.5 |
|
GHSA-v34c-74qj-4959 | Cisco IOS XR allows remote attackers to cause a denial of service (RSVP process reload) via a malformed RSVP packet, aka Bug ID CSCur69192. | [] | null | null | null | null |
|
GHSA-q2vq-xj2q-g729 | Information disclosure in WLAN HAL while handling command through WMI interfaces. | [] | null | 5.5 | null | null |
|
GHSA-23pc-48q7-q3fw | The "Forminator Contact Form, Poll & Quiz Builder" plugin before 1.6 for WordPress has SQL Injection via the wp-admin/admin.php?page=forminator-entries entry[] parameter if the attacker has the delete permission. | [] | null | null | 6.5 | null |
|
GHSA-jh62-xx57-p239 | Alpine Halo9 DecodeUTF7 Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Alpine Halo9 devices. An attacker must first obtain the ability to pair a malicious Bluetooth device with the target system in order to exploit this vulnerability.The specific flaw exists within the DecodeUTF7 function. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root.Was ZDI-CAN-23249 | [] | null | 8 | null | null |
|
GHSA-9cq3-fj2h-ggj5 | Vulnerability in remove function leads to arbitrary code execution via filePath parameters | Aaptjs is a node wraper for aapt. An issue was discovered in the remove function in shenzhim aaptjs 1.3.1, allows attackers to execute arbitrary code via the filePath parameters. | [] | null | 9.8 | null | null |
GHSA-94rj-cgwh-p385 | In Wireshark 3.0.0, the Rbm dissector could go into an infinite loop. This was addressed in epan/dissectors/file-rbm.c by handling unknown object types safely. | [] | null | null | 7.5 | null |
|
CVE-2022-30120 | XSS in /dashboard/blocks/stacks/view_details/ - old browsers only. When using an older browser with built-in XSS protection disabled, insufficient sanitation where built urls are outputted can be exploited for Concrete 8.5.7 and below as well as Concrete 9.0 through 9.0.2 to allow XSS. This cannot be exploited in modern-day web browsers due to an automatic input escape mechanism. Concrete CMS Security team ranked this vulnerability 3.1with CVSS v3.1 Vector AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N. Sanitation has been added where built urls are output. Credit to Credit to Bogdan Tiron from FORTBRIDGE (https://www.fortbridge.co.uk/ ) for reporting | [
"cpe:2.3:a:concretecms:concrete_cms:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 |
|
CVE-2020-11736 | fr-archive-libarchive.c in GNOME file-roller through 3.36.1 allows Directory Traversal during extraction because it lacks a check of whether a file's parent is a symlink to a directory outside of the intended extraction location. | [
"cpe:2.3:a:gnome:file-roller:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*"
] | null | 3.9 | null | 3.3 |
|
CVE-2025-23010 | An Improper Link Resolution Before File Access ('Link Following') vulnerability in SonicWall NetExtender Windows (32 and 64 bit) client which allows an attacker to manipulate file paths. | [] | null | 7.2 | null | null |
|
CVE-2020-10048 | A vulnerability has been identified in SIMATIC PCS 7 (All versions), SIMATIC WinCC (All versions < V7.5 SP2). Due to an insecure password verification process, an attacker could bypass the password protection set on protected files, thus being granted access to the protected content, circumventing authentication. | [
"cpe:2.3:a:siemens:simatic_pcs_7:*:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simatic_wincc:*:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simatic_wincc:7.5:sp1:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simatic_wincc:7.5:sp1_update1:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simatic_wincc:7.5:sp1_update2:*:*:*:*:*:*"
] | null | 5.5 | null | 2.1 |
|
RHSA-2021:0931 | Red Hat Security Advisory: openvswitch2.11 and ovn2.11 security update | lldpd: buffer overflow in the lldp_decode function in daemon/protocols/lldp.c dpdk: librte_vhost Integer overflow in vhost_user_set_log_base() dpdk: librte_vhost Integer truncation in vhost_user_check_and_alloc_queue_pair() dpdk: librte_vhost Missing inputs validation in Vhost-crypto | [
"cpe:/a:redhat:openstack:13::el7"
] | null | 5.1 | null | null |
CVE-2020-2112 | Jenkins Git Parameter Plugin 0.9.11 and earlier does not escape the parameter name shown on the UI, resulting in a stored cross-site scripting vulnerability exploitable by users with Job/Configure permission. | [
"cpe:2.3:a:jenkins:git_parameter:*:*:*:*:*:jenkins:*:*"
] | null | 5.4 | null | 3.5 |
|
CVE-2024-25592 | WordPress Broken Link Checker plugin <= 2.2.3 - Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WPMU DEV Broken Link Checker allows Stored XSS.This issue affects Broken Link Checker: from n/a through 2.2.3.
| [] | null | 5.9 | null | null |
GHSA-hh2g-39pc-2575 | Use after free in WebRTC in Google Chrome on Windows prior to 110.0.5481.177 allowed a remote attacker who convinced the user to engage in specific UI interactions to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) | [] | null | 8.8 | null | null |
|
CVE-2021-43484 | A Remote Code Execution (RCE) vulnerability exists in Simple Client Management System 1.0 in create.php due to the failure to validate the extension of the file being sent in a request. | [
"cpe:2.3:a:simple_client_management_system_project:simple_client_management_system:1.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
|
GHSA-j9c9-whc9-xw8p | Pexip Infinity before 27.3 allows remote attackers to trigger a software abort, and possibly enumerate usernames, via One Touch Join. | [] | null | 8.2 | null | null |
|
RHSA-2021:1983 | Red Hat Security Advisory: idm:DL1 security update | slapi-nis: NULL dereference (DoS) with specially crafted Binding DN | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
GHSA-x525-3wpj-gc6f | In Responsive Filemanager < 9.12.0, an attacker can bypass upload restrictions resulting in RCE. | [] | null | 9.8 | null | null |
|
CVE-2023-3232 | Zhong Bang CRMEB Image Upload app_auth deserialization | A vulnerability was found in Zhong Bang CRMEB up to 4.6.0 and classified as critical. This issue affects some unknown processing of the file /api/wechat/app_auth of the component Image Upload. The manipulation leads to deserialization. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-231503. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | [
"cpe:2.3:a:crmeb:crmeb:*:*:*:*:*:*:*:*"
] | null | 6.3 | 6.3 | 5.8 |
CVE-2018-0267 | A vulnerability in the web framework of Cisco Unified Communications Manager could allow an authenticated, local attacker to view sensitive data that should be restricted. This could include LDAP credentials. The vulnerability is due to insufficient protection of database tables over the web interface. An attacker could exploit this vulnerability by browsing to a specific URL. An exploit could allow the attacker to view sensitive information that should have been restricted. Cisco Bug IDs: CSCvf22116. | [
"cpe:2.3:a:cisco:unified_communications_manager:10.5\\(2.10000.5\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:11.0\\(1.10000.10\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:11.5\\(1.10000.6\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:12.0\\(1.10000.10\\):*:*:*:*:*:*:*"
] | null | 6.5 | null | 2.1 |
|
GHSA-48w5-c2rf-fc9x | Multiple vulnerabilities in Cisco SD-WAN products could allow an authenticated attacker to perform command injection attacks against an affected device, which could allow the attacker to take certain actions with root privileges on the device. For more information about these vulnerabilities, see the Details section of this advisory. | [] | null | 7.8 | null | null |
|
GHSA-c6f6-vj36-33pw | A rule file in module-assistant before 0.9.10 causes a temporary file to be created insecurely, which allows local users to conduct unauthorized operations. | [] | null | null | null | null |
|
GHSA-pgrg-w473-pm52 | Insufficient validation of the IOCTL (Input Output Control) input buffer in AMD Ryzen™ Master may allow a privileged attacker to provide a null value potentially resulting in a Windows crash leading to denial of service. | [] | null | 4.4 | null | null |
|
GHSA-968p-4wvh-cqc8 | Babel has inefficient RegExp complexity in generated code with .replace when transpiling named capturing groups | ImpactWhen using Babel to compile [regular expression named capturing groups](https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference/Regular_expressions/Named_capturing_group), Babel will generate a polyfill for the `.replace` method that has quadratic complexity on some specific replacement pattern strings (i.e. the second argument passed to `.replace`).Your generated code is vulnerable if _all_ the following conditions are true:You use Babel to compile [regular expression named capturing groups](https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference/Regular_expressions/Named_capturing_group)You use the `.replace` method on a regular expression that contains named capturing groups**Your code uses untrusted strings as the second argument of `.replace`**If you are using `@babel/preset-env` with the [`targets`](https://babeljs.io/docs/options#targets) option, the transform that injects the vulnerable code is automatically enabled if:you use [_duplicated_ named capturing groups](https://github.com/tc39/proposal-duplicate-named-capturing-groups), and target any browser older than Chrome/Edge 126, Opera 112, Firefox 129, Safari 17.4, or Node.js 23you use any [named capturing groups](https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference/Regular_expressions/Named_capturing_group), and target any browser older than Chrome 64, Opera 71, Edge 79, Firefox 78, Safari 11.1, or Node.js 10You can verify what transforms `@babel/preset-env` is using by enabling the [`debug` option](https://babeljs.io/docs/babel-preset-env#debug).PatchesThis problem has been fixed in `@babel/helpers` and `@babel/runtime` 7.26.10 and 8.0.0-alpha.17, please upgrade. It's likely that you do not directly depend on `@babel/helpers`, and instead you depend on `@babel/core` (which itself depends on `@babel/helpers`). Upgrading to `@babel/core` 7.26.10 is not required, but it guarantees that you are on a new enough `@babel/helpers` version.Please note that just updating your Babel dependencies is not enough: you will also need to re-compile your code.WorkaroundsIf you are passing user-provided strings as the second argument of `.replace` on regular expressions that contain named capturing groups, validate the input and make sure it does not contain the substring `$<` if it's then not followed by `>` (possibly with other characters in between).ReferencesThis vulnerability was reported and fixed in https://github.com/babel/babel/pull/17173. | [] | null | 6.2 | null | null |
CVE-2013-1910 | yum does not properly handle bad metadata, which allows an attacker to cause a denial of service and possibly have other unspecified impact via a Trojan horse file in the metadata of a remote repository. | [
"cpe:2.3:a:baseurl:yum:3.4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
|
GHSA-2c44-c825-pqp7 | ** UNSUPPPORTED WHEN ASSIGNED ** ** UNSUPPORTED WHEN ASSIGNED ** Out-of-bounds Write vulnerability in Hitachi EH-VIEW (Designer) allows local attackers to potentially execute arbitray code on affected EH-VIEW installations. User interaction is required to exploit the vulnerabilities in that the user must open a malicious file. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. | [] | null | 7.8 | null | null |
|
GHSA-852r-9m3w-pq97 | Buffer overflow in the png_decompress_chunk function in pngrutil.c in libpng before 1.2.12 allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via unspecified vectors related to "chunk error processing," possibly involving the "chunk_name". | [] | null | null | null | null |
|
CVE-2021-29548 | Division by 0 in `QuantizedBatchNormWithGlobalNormalization` | TensorFlow is an end-to-end open source platform for machine learning. An attacker can cause a runtime division by zero error and denial of service in `tf.raw_ops.QuantizedBatchNormWithGlobalNormalization`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/55a97caa9e99c7f37a0bbbeb414dc55553d3ae7f/tensorflow/core/kernels/quantized_batch_norm_op.cc) does not validate all constraints specified in the op's contract(https://www.tensorflow.org/api_docs/python/tf/raw_ops/QuantizedBatchNormWithGlobalNormalization). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. | [
"cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*"
] | null | 2.5 | null | null |
GHSA-v4xx-crpm-hh5w | A vulnerability in the web framework of Cisco Firepower Management Center could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web interface. Affected Products: Cisco Firepower Management Center Releases 5.4.1.x and prior. More Information: CSCuy88951. Known Affected Releases: 5.4.1.6. | [] | null | null | 5.4 | null |
|
CVE-2024-45672 | IBM Security Verify Bridge data manipulation | IBM Security Verify Bridge 1.0.0 through 1.0.15 could allow a local privileged user to overwrite files due to excessive privileges granted to the agent. which could also cause a denial of service. | [] | null | 6 | null | null |
GHSA-pmmp-33fg-6g8f | Azure Guest Configuration and Azure Arc-enabled servers Elevation of Privilege Vulnerability. | [] | null | 7.8 | null | null |
|
CVE-2009-3949 | cp/profile.php in VivaPrograms Infinity 2.0.5 and earlier does not require administrative authentication for the donewauthor action, which allows remote attackers to create administrative accounts via the name, password, and conf_password parameters. | [
"cpe:2.3:a:vivaprograms:infinity_script:*:*:*:*:*:*:*:*",
"cpe:2.3:a:vivaprograms:infinity_script:2.0.0:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-v3ph-2ff8-mh78 | This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the Form count property. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-6477. | [] | null | null | 8.8 | null |
|
CVE-2001-1556 | The log files in Apache web server contain information directly supplied by clients and does not filter or quote control characters, which could allow remote attackers to hide HTTP requests and spoof source IP addresses when logs are viewed with UNIX programs such as cat, tail, and grep. | [
"cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2023-24152 | A command injection vulnerability in the serverIp parameter in the function meshSlaveUpdate of TOTOLINK T8 V4.1.5cu allows attackers to execute arbitrary commands via a crafted MQTT packet. | [
"cpe:2.3:o:totolink:t8_firmware:v4.1.5cu:*:*:*:*:*:*:*",
"cpe:2.3:h:totolink:t8:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
CVE-2011-1776 | The is_gpt_valid function in fs/partitions/efi.c in the Linux kernel before 2.6.39 does not check the size of an Extensible Firmware Interface (EFI) GUID Partition Table (GPT) entry, which allows physically proximate attackers to cause a denial of service (heap-based buffer overflow and OOPS) or obtain sensitive information from kernel heap memory by connecting a crafted GPT storage device, a different vulnerability than CVE-2011-1577. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:5.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:5.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*"
] | null | 6.1 | null | 5.6 |
|
GHSA-v5g9-wqg7-v2q8 | A size-validation issue was discovered in opj_j2k_write_sot in lib/openjp2/j2k.c in OpenJPEG 2.2.0. The vulnerability causes an out-of-bounds write, which may lead to remote denial of service (heap-based buffer overflow affecting opj_write_bytes_LE in lib/openjp2/cio.c) or possibly remote code execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2017-14152. | [] | null | 8.8 | null | null |
|
GHSA-f4f8-xfww-r4hf | OS command injection occurring in versions of OpenEMR before 5.0.1.4 allows a remote authenticated attacker to execute arbitrary commands by making a crafted request to interface/fax/fax_dispatch.php after modifying the "hylafax_enscript" global variable in interface/super/edit_globals.php. | [] | null | null | 8.8 | null |
|
ICSMA-22-151-01 | BD Pyxis | Specific BD Pyxis products were installed with default credentials and may still operate with these credentials. There may be scenarios where BD Pyxis products are installed with the same default local operating system credentials or domain-joined server(s) credentials that may be shared across product types. Threat actors could exploit this vulnerability to gain privileged access to the underlying file system and exploit or gain access to ePHI or other sensitive information.CVE-2022-22767 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been assigned; the CVSS vector string is (AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). | [] | null | null | 8.8 | null |
GHSA-w5pm-jf53-p26g | This issue was addressed with improved entitlements. This issue affected versions prior to iOS 12.1.1. | [] | null | null | 3.3 | null |
|
CVE-2002-0257 | Cross-site scripting vulnerability in auction.pl of MakeBid Auction Deluxe 3.30 allows remote attackers to obtain information from other users via the form fields (1) TITLE, (2) DESCTIT, (3) DESC, (4) searchstring, (5) ALIAS, (6) EMAIL, (7) ADDRESS1, (8) ADDRESS2, (9) ADDRESS3, (10) PHONE1, (11) PHONE2, (12) PHONE3, or (13) PHONE4. | [
"cpe:2.3:a:apache:http_server:1.3.17:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:1.3.18:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:1.3.19:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:1.3.20:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:1.3.22:*:*:*:*:*:*:*",
"cpe:2.3:a:usanet_creations:makebid_auction_deluxe:3.30:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-6hr4-77vc-5v97 | An issue wan discovered in admin\controllers\database.php in HongCMS 3.0.0. There is a SQL Injection vulnerability via an admin/index.php/database/operate?dbaction=emptytable&tablename= URI. | [] | null | null | 7.2 | null |
|
CVE-2021-41805 | HashiCorp Consul Enterprise before 1.8.17, 1.9.x before 1.9.11, and 1.10.x before 1.10.4 has Incorrect Access Control. An ACL token (with the default operator:write permissions) in one namespace can be used for unintended privilege escalation in a different namespace. | [
"cpe:2.3:a:hashicorp:consul:*:*:*:*:enterprise:*:*:*"
] | null | 8.8 | null | 6.5 |
|
GHSA-mjc4-qpgx-fg5c | In memory management driver, there is a possible out of bounds write due to uninitialized data. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android SoCAndroid ID: A-185196175 | [] | null | 7.8 | null | null |
|
GHSA-pf37-jwfx-9v75 | SQL injection vulnerability in form.php in WebMember 1.0 allows remote authenticated users to execute arbitrary SQL commands via the formID parameter. | [] | null | null | null | null |
|
GHSA-vf7p-j8x6-xvwp | Incorrect Authorization in Apache Solr | When using ConfigurableInternodeAuthHadoopPlugin for authentication, Apache Solr versions prior to 8.8.2 would forward/proxy distributed requests using server credentials instead of original client credentials. This would result in incorrect authorization resolution on the receiving hosts. | [] | null | 9.1 | null | null |
CVE-2024-48224 | Funadmin v5.0.2 has an arbitrary file read vulnerability in /curd/index/editfile. | [
"cpe:2.3:a:funadmin:funadmin:5.0.2:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
|
CVE-2004-1179 | The debstd script in debmake 3.6.x before 3.6.10 and 3.7.x before 3.7.7 allows local users to overwrite arbitrary files via a symlink attack on temporary directories. | [
"cpe:2.3:a:debian:debmake:*:*:*:*:*:*:*:*"
] | null | null | null | 2.1 |
|
CVE-2017-7941 | The ReadSGIImage function in sgi.c in ImageMagick 7.0.5-4 allows remote attackers to consume an amount of available memory via a crafted file. | [
"cpe:2.3:a:imagemagick:imagemagick:7.0.5-4:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] | null | null | 6.5 | 4.3 |
|
GHSA-3vw6-2x4m-gr8r | Equation Editor in Microsoft Office 2007, Microsoft Office 2010, Microsoft Office 2013, and Microsoft Office 2016 allows a remote code execution vulnerability due to the way objects are handled in memory, aka "Microsoft Office Remote Code Execution Vulnerability". | [] | null | null | 8.8 | null |
|
CVE-2015-3351 | Multiple cross-site request forgery (CSRF) vulnerabilities in the Log Watcher module before 6.x-1.2 for Drupal allow remote attackers to hijack the authentication of administrators for requests that (1) enable, (2) disable, or (3) delete a report via unspecified vectors. | [
"cpe:2.3:a:log_watcher_project:log_watcher:*:*:*:*:*:drupal:*:*"
] | null | null | null | 6.8 |
|
GHSA-w9pm-7cxw-vw6j | The product allows user input to control or influence paths or file
names that are used in filesystem operations, allowing the attacker to access or modify system files or other files that are
critical to the application. | [] | null | 9.9 | null | null |
|
CVE-2012-1427 | The TAR file parser in Quick Heal (aka Cat QuickHeal) 11.00, Norman Antivirus 6.06.12, and Sophos Anti-Virus 4.61.0 allows remote attackers to bypass malware detection via a POSIX TAR file with a \57\69\6E\5A\69\70 character sequence at a certain location. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations. | [
"cpe:2.3:a:cat:quick_heal:11.00:*:*:*:*:*:*:*",
"cpe:2.3:a:norman:norman_antivirus_\\&_antispyware:6.06.12:*:*:*:*:*:*:*",
"cpe:2.3:a:sophos:sophos_anti-virus:4.61.0:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2021-3177 | Python 3.x through 3.9.1 has a buffer overflow in PyCArg_repr in _ctypes/callproc.c, which may lead to remote code execution in certain Python applications that accept floating-point numbers as untrusted input, as demonstrated by a 1e300 argument to c_double.from_param. This occurs because sprintf is used unsafely. | [
"cpe:2.3:a:python:python:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*",
"cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:22.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_offline_mediation_controller:12.0.0.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_pricing_design_center:12.0.0.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
|
CVE-2023-22714 | WordPress Coming Soon by Supsystic Plugin <= 1.7.10 is vulnerable to Cross Site Request Forgery (CSRF) | Cross-Site Request Forgery (CSRF) vulnerability in Supsystic Coming Soon by Supsystic plugin <= 1.7.10 versions. | [
"cpe:2.3:a:supsystic:coming_soon:*:*:*:*:*:wordpress:*:*"
] | null | 4.3 | null | null |
GHSA-g5pm-xmgf-pjcq | Improper input validation in XmlCli feature for UEFI firmware for some Intel(R) processors may allow privileged user to potentially enable escalation of privilege via local access. | [] | 8.7 | 7.5 | null | null |
|
GHSA-vf45-6r45-mrvj | An out of bounds read was discovered in H5O_fill_new_decode and H5O_fill_old_decode in H5Ofill.c in the HDF HDF5 1.10.2 library. It could allow a remote denial of service or information disclosure attack. | [] | null | null | 8.1 | null |
|
GHSA-4gq5-gf4j-j5rc | SQL injection vulnerability in admin/delete.php in BilboBlog 0.2.1, when magic_quotes_gpc is disabled, allows remote authenticated administrators to execute arbitrary SQL commands via the num parameter. | [] | null | null | null | null |
|
CVE-2022-34155 | WordPress OAuth Single Sign On – SSO (OAuth Client) Plugin <= 6.23.3 is vulnerable to Broken Authentication | Improper Authentication vulnerability in miniOrange OAuth Single Sign On – SSO (OAuth Client) plugin allows Authentication Bypass.This issue affects OAuth Single Sign On – SSO (OAuth Client): from n/a through 6.23.3.
| [
"cpe:2.3:a:miniorange:oauth_single_sign_on:*:*:*:*:*:wordpress:*:*"
] | null | 8.8 | null | null |
GHSA-j8xg-fqg3-53r7 | word-wrap vulnerable to Regular Expression Denial of Service | All versions of the package word-wrap are vulnerable to Regular Expression Denial of Service (ReDoS) due to the usage of an insecure regular expression within the result variable. | [] | null | 5.3 | null | null |
CVE-2017-0107 | Microsoft SharePoint Server fails to sanitize crafted web requests, allowing remote attackers to run cross-script in local security context, aka "Microsoft SharePoint XSS Vulnerability." | [
"cpe:2.3:a:microsoft:sharepoint_foundation:2013:sp1:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 |
|
GHSA-cwpg-2qv7-g34j | The CM Email Registration Blacklist and Whitelist WordPress plugin before 1.4.9 does not have CSRF check when adding or deleting an item from the blacklist or whitelist, which could allow attackers to make a logged in admin add or delete settings from the blacklist or whitelist menu via a CSRF attack | [] | null | 8.1 | null | null |
|
GHSA-8vcg-h82j-6975 | IBM MQ and IBM MQ Appliance 7.1, 7.5, 8.0, 9.0 LTS, 9.1 LTS, and 9.1 CD is vulnerable to a denial of service attack that would allow an authenticated user to crash the queue and require a restart due to an error processing error messages. IBM X-Force ID: 170967. | [] | null | null | null | null |
|
CVE-2023-25749 | Android applications with unpatched vulnerabilities can be launched from a browser using Intents, exposing users to these vulnerabilities. Firefox will now confirm with users that they want to launch an external application before doing so. <br>*This bug only affects Firefox for Android. Other versions of Firefox are unaffected.*. This vulnerability affects Firefox < 111. | [
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:android:*:*"
] | null | 4.3 | null | null |
|
GHSA-g6f6-787v-hqqp | Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information. | [] | null | 4.8 | null | null |
|
GHSA-f4v6-fqq8-p9x5 | The Themify Post Type Builder Search Addon WordPress plugin before 1.4.0 does not properly escape the current page URL before reusing it in a HTML attribute, leading to a reflected cross site scripting vulnerability. | [] | null | 6.1 | null | null |
|
GHSA-x34m-wh8g-2mpf | Failure to assign a new report ID to an imported guest may potentially result in an SEV-SNP guest VM being tricked into trusting a dishonest Migration Agent (MA). | [] | null | 5.5 | null | null |
|
GHSA-mg6c-gfh2-q76m | A cross-site-scripting (XSS) vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server, aka 'Microsoft Office SharePoint XSS Vulnerability'. | [] | null | 5.4 | null | null |
|
CVE-2022-22637 | A logic issue was addressed with improved state management. This issue is fixed in macOS Monterey 12.3, Safari 15.4, watchOS 8.5, iOS 15.4 and iPadOS 15.4, tvOS 15.4. A malicious website may cause unexpected cross-origin behavior. | [
"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
|
CVE-2022-32492 | Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by using an SMI to gain arbitrary code execution in SMRAM. | [
"cpe:2.3:o:dell:bios:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:precision_5820_tower:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:precision_7820_tower:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:precision_7920_tower:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
|
GHSA-g5wm-487r-4228 | AIX passwd allows local users to gain root access. | [] | null | null | null | null |
|
CVE-2014-3178 | Use-after-free vulnerability in core/dom/Node.cpp in Blink, as used in Google Chrome before 37.0.2062.120, allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging improper handling of render-tree inconsistencies. | [
"cpe:2.3:a:google:chrome:37.0.2062.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.3:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.4:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.5:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.6:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.7:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.8:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.9:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.10:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.11:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.12:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.13:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.14:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.15:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.16:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.17:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.18:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.19:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.20:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.21:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.22:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.23:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.24:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.25:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.26:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.27:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.28:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.29:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.30:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.31:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.32:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.33:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.34:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.35:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.36:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.37:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.39:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.43:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.44:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.45:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.46:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.47:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.48:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.49:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.50:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.51:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.52:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.53:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.54:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.55:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.56:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.57:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.58:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.59:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.60:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.61:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.62:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.63:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.64:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.65:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.66:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.67:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.68:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.69:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.70:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.71:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.72:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.73:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.74:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.75:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.76:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.77:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.78:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.80:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.81:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.89:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.90:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.91:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.92:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.93:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.94:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.95:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.96:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.97:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.99:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.100:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.113:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-wcqr-2wvg-p8mc | The Clock In Portal- Staff & Attendance Management WordPress plugin through 2.1 does not have CSRF check when deleting Staff members, which could allow attackers to make logged in admins delete arbitrary Staff via a CSRF attack | [] | null | 4.3 | null | null |
|
GHSA-99fr-5jwf-5mf5 | Faveo 5.0.1 allows remote attackers to obtain sensitive information via a modified user ID in an Insecure Direct Object Reference (IDOR) attack. | [] | null | 6.5 | null | null |
|
CVE-2012-2548 | Use-after-free vulnerability in Microsoft Internet Explorer 9 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Layout Use After Free Vulnerability." | [
"cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:9:beta1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:9:rc1:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
CVE-2009-1444 | PHP remote file inclusion vulnerability in indexk.php in WebPortal CMS 0.8-beta allows remote attackers to execute arbitrary PHP code via a URL in the lib_path parameter. | [
"cpe:2.3:a:webportal:webportal_cms:0.8_beta:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2025-21423 | Improper Validation of Array Index in Display | Memory corruption occurs when handling client calls to EnableTestMode through an Escape call. | [] | null | 7.8 | null | null |
CVE-2011-1886 | win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP3 does not properly validate the arguments to functions, which allows local users to read arbitrary data from kernel memory via a crafted application that triggers a NULL pointer dereference, aka "Win32k Incorrect Parameter Validation Allows Information Disclosure Vulnerability." | [
"cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*"
] | null | null | null | 2.1 |
|
CVE-2002-0382 | XChat IRC client allows remote attackers to execute arbitrary commands via a /dns command on a host whose DNS reverse lookup contains shell metacharacters. | [
"cpe:2.3:a:xchat:xchat:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-f9h4-h7gc-c283 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | [] | null | null | null | null |
|
GHSA-9q4p-wv38-76g5 | Absolute directory traversal vulnerability in a certain ActiveX control in the VB To VSI Support Library (VBTOVSI.DLL) 1.0.0.0 in Microsoft Visual Studio 6.0 allows remote attackers to create or overwrite arbitrary files via a full pathname in the argument to the SaveAs method. NOTE: contents can be copied from local files via the Load method. | [] | null | null | null | null |
|
CVE-2019-1823 | Cisco Prime Infrastructure and Evolved Programmable Network Manager Remote Code Execution Vulnerabilities | A vulnerability in the web-based management interface of Cisco Prime Infrastructure (PI) and Cisco Evolved Programmable Network (EPN) Manager could allow an authenticated, remote attacker to execute code with root-level privileges on the underlying operating system. This vulnerability exist because the software improperly validates user-supplied input. An attacker could exploit this vulnerability by uploading a malicious file to the administrative web interface. A successful exploit could allow the attacker to execute code with root-level privileges on the underlying operating system. | [
"cpe:2.3:a:cisco:evolved_programmable_network_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:network_level_service:3.0\\(0.0.83b\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:prime_infrastructure:*:*:*:*:*:*:*:*"
] | null | null | 8.8 | null |
GHSA-7ppq-h9vg-8jm8 | When a user opens manipulated Radiance Picture (.hdr, hdr.x3d) files received from untrusted sources in SAP 3D Visual Enterprise Viewer, the application crashes and becomes temporarily unavailable to the user until restart of the application. | [] | null | 5.5 | null | null |
|
GHSA-8mq5-f87c-x4p2 | A logic issue was addressed with improved checks. This issue is fixed in visionOS 2.4, iOS 18.4 and iPadOS 18.4, tvOS 18.4, macOS Sequoia 15.4. Processing maliciously crafted web content may result in the disclosure of process memory. | [] | null | 6.5 | null | null |
|
GHSA-42qq-mf68-hprg | Cross-site scripting vulnerability in Movable Type Movable Type 7 r.5301 and earlier (Movable Type 7 Series), Movable Type Advanced 7 r.5301 and earlier (Movable Type Advanced 7 Series), Movable Type 6.8.7 and earlier (Movable Type 6 Series), Movable Type Advanced 6.8.7 and earlier (Movable Type Advanced 6 Series), Movable Type Premium 1.53 and earlier, and Movable Type Premium Advanced 1.53 and earlier allows a remote unauthenticated attacker to inject an arbitrary script. | [] | null | 6.1 | null | null |
|
GHSA-p83q-99rc-vfmv | Code injection in Duke | Duke v1.2 and below was discovered to contain a code injection vulnerability via the component no.priv.garshol.duke.server.CommonJTimer.init. | [] | null | 9.8 | null | null |
GHSA-xvr2-gxcm-5972 | Vulnerability in the Oracle One-to-One Fulfillment component of Oracle E-Business Suite (subcomponent: User Interface). Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5 and 12.2.6. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle One-to-One Fulfillment. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle One-to-One Fulfillment, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle One-to-One Fulfillment accessible data as well as unauthorized update, insert or delete access to some of Oracle One-to-One Fulfillment accessible data. CVSS v3.0 Base Score 8.2 (Confidentiality and Integrity impacts). | [] | null | null | 8.2 | null |
|
GHSA-c8qw-jpg3-vv7v | ** UNSUPPPORTED WHEN ASSIGNED ** ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as critical, was found in D-Link DAR-8000 up to 20151231. This affects an unknown part of the file /Tool/querysql.php. The manipulation leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-240249 was assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced. | [] | null | null | 6.3 | null |
|
GHSA-7frj-jj6h-vhfx | Cross-Site Request Forgery (CSRF) vulnerability in Oren Yomtov Mass Custom Fields Manager allows Reflected XSS.This issue affects Mass Custom Fields Manager: from n/a through 1.5. | [] | null | 7.1 | null | null |
|
GHSA-6fgh-mc9w-xhpv | In Pixel cellular firmware, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-239240808References: N/A | [] | null | 5.5 | null | null |
|
GHSA-cf5v-p8qx-329f | Use after free in Safe Browsing in Google Chrome prior to 98.0.4758.80 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. | [] | null | 9.6 | null | null |
|
RHSA-2022:4889 | Red Hat Security Advisory: thunderbird security update | Mozilla: Braille space character caused incorrect sender email to be shown for a digitally signed email Mozilla: Cross-Origin resource's length leaked Mozilla: Heap buffer overflow in WebGL Mozilla: Browser window spoof using fullscreen mode Mozilla: Register allocation problem in WASM on arm64 Mozilla: Uninitialized variable leads to invalid memory read Mozilla: Querying a WebAuthn token with a large number of allowCredential entries may have leaked cross-origin information Mozilla: Memory safety bugs fixed in Firefox 101 and Firefox ESR 91.10 | [
"cpe:/a:redhat:rhel_eus:8.4::appstream"
] | null | 9.8 | 6.1 | null |
CVE-2018-20909 | cPanel before 70.0.23 allows arbitrary file-chmod operations during legacy incremental backups (SEC-338). | [
"cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*"
] | null | null | 7.1 | 3.6 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.