id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
RHSA-2003:405 | Red Hat Security Advisory: : Updated apache packages fix minor security vulnerability | security flaw | [
"cpe:/o:redhat:linux:7.1",
"cpe:/o:redhat:linux:7.2",
"cpe:/o:redhat:linux:7.3"
] | null | null | null | null |
GHSA-pp3c-36rx-j2jw | The Enter Addons – Ultimate Template Builder for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Animation Title widget's img tag in all versions up to, and including, 2.1.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor access and higher, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] | null | 6.4 | null | null |
|
GHSA-7mrm-5p33-96rq | Huawei eSpace Desktop before V100R001C03 allows local users to cause a denial of service (program exit) via a crafted QES file. | [] | null | null | null | null |
|
CVE-2024-5681 | CWE-20: Improper Input Validation vulnerability exists that could cause local denial-of-service,
privilege escalation, and potentially kernel execution when a malicious actor with local user
access crafts a script/program using an IOCTL call in the Foxboro.sys driver. | [
"cpe:2.3:a:schneider_electric:ecostruxure_foxboro_dcs_core_control_services:9.8:*:*:*:*:*:*:*",
"cpe:2.3:a:schneider-electric:ecostruxure_foxboro_dcs_control_core_services:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
|
GHSA-x7rm-w2h5-52qj | An unprivileged user could use the functionality of the NS WooCommerce Watermark WordPress plugin through 2.11.3 to load images that hide malware for example from passing malicious domains to hide their trace, by making them pass through the vulnerable domain. | [] | null | 7.5 | null | null |
|
CVE-2020-7274 | ENS elevated permissions vulnerability | Privilege escalation vulnerability in McTray.exe in McAfee Endpoint Security (ENS) for Windows Prior to 10.7.0 April 2020 Update allows local users to spawn unrelated processes with elevated privileges via the system administrator granting McTray.exe elevated privileges (by default it runs with the current user's privileges). | [
"cpe:2.3:a:mcafee:endpoint_security:10.5.0:*:*:*:*:windows:*:*",
"cpe:2.3:a:mcafee:endpoint_security:10.5.1:*:*:*:*:windows:*:*",
"cpe:2.3:a:mcafee:endpoint_security:10.5.2:*:*:*:*:windows:*:*",
"cpe:2.3:a:mcafee:endpoint_security:10.5.3:*:*:*:*:windows:*:*",
"cpe:2.3:a:mcafee:endpoint_security:10.5.4:*:*:*:*:windows:*:*",
"cpe:2.3:a:mcafee:endpoint_security:10.5.5:*:*:*:*:windows:*:*",
"cpe:2.3:a:mcafee:endpoint_security:10.6.0:*:*:*:*:windows:*:*"
] | null | 6.6 | null | null |
CVE-2004-2181 | Multiple SQL injection vulnerabilities in WowBB Forum 1.61 allow remote attackers to execute arbitrary SQL commands via the (1) sort_by or (2) page parameters to view_user.php, or the (3) forum_id parameter to view_topic.php. NOTE: the sort_by vector was later reported to be present in WowBB 1.65. | [
"cpe:2.3:a:wowbb:wowbb_web_forum:1.61:*:*:*:*:*:*:*",
"cpe:2.3:a:wowbb:wowbb_web_forum:1.65:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
RHSA-2016:0188 | Red Hat Security Advisory: sos security and bug fix update | sos: Usage of predictable temporary files allows privilege escalation | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
GHSA-36xm-4j44-qpm8 | On Insteon Hub 2245-222 devices with firmware version 1012, specially crafted replies received from the PubNub service can cause buffer overflows on a global section overwriting arbitrary data. An attacker should impersonate PubNub and answer an HTTPS GET request to trigger this vulnerability. A strcpy overflows the buffer insteon_pubnub.channel_ak, which has a size of 16 bytes. An attacker can send an arbitrarily long "ak" parameter in order to exploit this vulnerability. | [] | null | null | 8.8 | null |
|
CVE-2007-2957 | Integer overflow in McAfee E-Business Server before 8.5.3 for Solaris, and before 8.1.2 for Linux, HP-UX, and AIX, allows remote attackers to execute arbitrary code via a large length value in an authentication packet, which results in a heap-based buffer overflow. | [
"cpe:2.3:a:mcafee:e-business_server:*:*:aix:*:*:*:*:*",
"cpe:2.3:a:mcafee:e-business_server:*:*:hpux:*:*:*:*:*",
"cpe:2.3:a:mcafee:e-business_server:*:*:linux:*:*:*:*:*",
"cpe:2.3:a:mcafee:e-business_server:*:*:solaris:*:*:*:*:*"
] | null | null | null | 9.3 |
|
CVE-2024-4798 | SourceCodester Online Computer and Laptop Store manage_brand.php sql injection | A vulnerability, which was classified as critical, has been found in SourceCodester Online Computer and Laptop Store 1.0. Affected by this issue is some unknown functionality of the file /admin/maintenance/manage_brand.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-263918 is the identifier assigned to this vulnerability. | [] | 5.3 | 6.3 | 6.3 | 6.5 |
CVE-2018-13097 | An issue was discovered in fs/f2fs/super.c in the Linux kernel through 4.17.3. There is an out-of-bounds read or a divide-by-zero error for an incorrect user_block_count in a corrupted f2fs image, leading to a denial of service (BUG). | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | null | 5.5 | 4.3 |
|
GHSA-fx33-6hh8-pm47 | A vulnerability has been identified in QMS Automotive (All versions < V12.39). The affected application returns inconsistent error messages in response to invalid user credentials during login session. This allows an attacker to enumerate usernames, and identify valid usernames. | [] | null | 4 | null | null |
|
CVE-2024-33221 | An issue in the component AsusBSItf.sys of ASUSTeK Computer Inc ASUS BIOS Flash Driver v3.2.12.0 allows attackers to escalate privileges and execute arbitrary code via sending crafted IOCTL requests. | [
"cpe:2.3:a:asus:bios_flash_driver:3.2.12.0:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
|
CVE-2019-10051 | An issue was discovered in Suricata 4.1.3. If the function filetracker_newchunk encounters an unsafe "Some(sfcm) => { ft.new_chunk }" item, then the program enters an smb/files.rs error condition and crashes. | [
"cpe:2.3:a:suricata-ids:suricata:4.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:suricata-ids:suricata:4.1.4:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
CVE-2017-12123 | An exploitable clear text transmission of password vulnerability exists in the web server and telnet functionality of Moxa EDR-810 V4.1 build 17030317. An attacker can look at network traffic to get the admin password for the device. The attacker can then use the credentials to login as admin. | [
"cpe:2.3:o:moxa:edr-810_firmware:4.1:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:edr-810:-:*:*:*:*:*:*:*"
] | null | null | 5.7 | null |
|
CVE-2024-35770 | WordPress Vimeography plugin <= 2.4.1 - Cross Site Request Forgery (CSRF) vulnerability | Cross-Site Request Forgery (CSRF) vulnerability in Dave Kiss Vimeography: Vimeo Video Gallery WordPress Plugin.This issue affects Vimeography: Vimeo Video Gallery WordPress Plugin: from n/a through 2.4.1. | [
"cpe:2.3:a:davekiss:vimeography:*:*:*:*:*:wordpress:*:*"
] | null | 4.3 | null | null |
CVE-2023-32697 | Sqlite-jdbc vulnerable to remote code execution when JDBC url is attacker controlled | SQLite JDBC is a library for accessing and creating SQLite database files in Java. Sqlite-jdbc addresses a remote code execution vulnerability via JDBC URL. This issue impacting versions 3.6.14.1 through 3.41.2.1 and has been fixed in version 3.41.2.2.
| [
"cpe:2.3:a:sqlite_jdbc_project:sqlite_jdbc:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
GHSA-3r74-v83p-f4f4 | Trufflehog vulnerable to Blind SSRF in some Detectors | Impact_What kind of vulnerability is it? Who is impacted?_This vulnerability allows a malicious actor to craft data in a way that, when scanned by specific detectors, could trigger the detector to make an unauthorized request to an endpoint chosen by the attacker. For an exploit to be effective, the target endpoint must be an unauthenticated GET endpoint that produces side effects. The victim must scan the maliciously crafted data and have such an endpoint targeted for the exploit to succeed.Patches_Has the problem been patched? What versions should users upgrade to?_The vulnerability has been resolved in TruffleHog v3.81.9 and later versions. Users should upgrade to this or a more recent version to mitigate the issue._Special thanks to Karan Bamal, Security Researcher at Sentinel One for this discovery_ | [] | 2.1 | 3.4 | null | null |
GHSA-pcwq-7wrw-r8jv | Cross-site Scripting in intelliants/subrion | Multilple Cross Site Scripting (XSS) vulnerability exists in Intelliants Subrion CMS v4.2.1 in the Configuration panel. | [] | null | 6.1 | null | null |
GHSA-3r4j-q266-j9h3 | A vulnerability in the web-based management interface of Cisco Secure Firewall Management Center (FMC) Software could allow an authenticated, remote attacker to conduct SQL injection attacks on an affected system.This vulnerability exists because the web-based management interface does not validate user input adequately. An attacker could exploit this vulnerability by authenticating to the application as an Administrator and sending crafted SQL queries to an affected system. A successful exploit could allow the attacker to obtain unauthorized data from the database and make changes to the system. To exploit this vulnerability, an attacker would need Administrator-level privileges. | [] | null | 6.5 | null | null |
|
GHSA-pwp5-q92q-2hmm | A vulnerability, which was classified as problematic, was found in LinuxOSsk Shakal-NG up to 1.3.3. Affected is an unknown function of the file comments/views.py. The manipulation of the argument next leads to open redirect. It is possible to launch the attack remotely. The name of the patch is ebd1c2cba59cbac198bf2fd5a10565994d4f02cb. It is recommended to apply a patch to fix this issue. | [] | 5.3 | 4.3 | null | null |
|
CVE-2024-27063 | leds: trigger: netdev: Fix kernel panic on interface rename trig notify | In the Linux kernel, the following vulnerability has been resolved:
leds: trigger: netdev: Fix kernel panic on interface rename trig notify
Commit d5e01266e7f5 ("leds: trigger: netdev: add additional specific link
speed mode") in the various changes, reworked the way to set the LINKUP
mode in commit cee4bd16c319 ("leds: trigger: netdev: Recheck
NETDEV_LED_MODE_LINKUP on dev rename") and moved it to a generic function.
This changed the logic where, in the previous implementation the dev
from the trigger event was used to check if the carrier was ok, but in
the new implementation with the generic function, the dev in
trigger_data is used instead.
This is problematic and cause a possible kernel panic due to the fact
that the dev in the trigger_data still reference the old one as the
new one (passed from the trigger event) still has to be hold and saved
in the trigger_data struct (done in the NETDEV_REGISTER case).
On calling of get_device_state(), an invalid net_dev is used and this
cause a kernel panic.
To handle this correctly, move the call to get_device_state() after the
new net_dev is correctly set in trigger_data (in the NETDEV_REGISTER
case) and correctly parse the new dev. | [] | null | null | null | null |
GHSA-w6mg-w7vr-r7q7 | MixSense DJ Studio 1.0.0.1 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a long string in an .mp3 playlist file. | [] | null | null | null | null |
|
GHSA-8p7c-f2cf-jq8m | Pulse Secure Desktop Client 5.3 up to and including R6.0 build 1769 on Windows has Insecure Permissions. | [] | null | null | 5.5 | null |
|
RHSA-2023:5922 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4 security update | HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.4"
] | null | 7.5 | null | null |
GHSA-6m9c-h626-jp3r | Pi-hole 4.4 allows a user able to write to /etc/pihole/dns-servers.conf to escalate privileges through command injection (shell metacharacters after an IP address). | [] | null | null | null | null |
|
GHSA-m5ph-57mx-hhc9 | WriteOnePNGImage in coders/png.c in GraphicsMagick 1.3.26 has a heap-based buffer over-read via a crafted file. | [] | null | null | 8.8 | null |
|
GHSA-6m53-cf6f-2mg3 | SQL injection vulnerability in userlogin.jsp in Daffodil CRM 1.5 allows remote attackers to execute arbitrary SQL commands via unspecified parameters in a login action. | [] | null | null | null | null |
|
CVE-2014-8734 | The Organic Groups Menu (aka OG Menu) module before 7.x-2.2 for Drupal allows remote authenticated users with the "access administration pages" permission to change module settings via unspecified vectors. | [
"cpe:2.3:a:drupal:organic_groups_menu:*:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:organic_groups_menu:7.x-2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:organic_groups_menu:7.x-2.x-dev:*:*:*:*:*:*:*"
] | null | null | null | 3.5 |
|
CVE-2017-3451 | Vulnerability in the Oracle Retail Open Commerce Platform component of Oracle Retail Applications (subcomponent: Web). Supported versions that are affected are 4.0, 5.0, 5.1, 5.3, 6.0,6.1, 15.0 and 16.0. Easily "exploitable" vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Retail Open Commerce Platform. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Retail Open Commerce Platform, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Retail Open Commerce Platform accessible data as well as unauthorized read access to a subset of Oracle Retail Open Commerce Platform accessible data. CVSS 3.0 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N). | [
"cpe:2.3:a:oracle:retail_open_commerce_platform_cloud_service:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:retail_open_commerce_platform_cloud_service:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:retail_open_commerce_platform_cloud_service:5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:retail_open_commerce_platform_cloud_service:5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:retail_open_commerce_platform_cloud_service:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:retail_open_commerce_platform_cloud_service:6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:retail_open_commerce_platform_cloud_service:15.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:retail_open_commerce_platform_cloud_service:16.0:*:*:*:*:*:*:*"
] | null | null | 5.4 | 4.9 |
|
CVE-2016-4198 | Adobe Reader and Acrobat before 11.0.17, Acrobat and Acrobat Reader DC Classic before 15.006.30198, and Acrobat and Acrobat Reader DC Continuous before 15.017.20050 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4191, CVE-2016-4192, CVE-2016-4193, CVE-2016-4194, CVE-2016-4195, CVE-2016-4196, CVE-2016-4197, CVE-2016-4199, CVE-2016-4200, CVE-2016-4201, CVE-2016-4202, CVE-2016-4203, CVE-2016-4204, CVE-2016-4205, CVE-2016-4206, CVE-2016-4207, CVE-2016-4208, CVE-2016-4211, CVE-2016-4212, CVE-2016-4213, CVE-2016-4214, CVE-2016-4250, CVE-2016-4251, CVE-2016-4252, and CVE-2016-4254. | [
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:reader:*:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.8 |
|
CVE-2024-8250 | Expired Pointer Dereference in Wireshark | NTLMSSP dissector crash in Wireshark 4.2.0 to 4.0.6 and 4.0.0 to 4.0.16 allows denial of service via packet injection or crafted capture file | [
"cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
GHSA-4x4x-4vj8-5xpf | Unspecified vulnerability in Oracle Sun Solaris 10 and 11 allows local users to affect confidentiality via vectors related to RPC Utility. | [] | null | null | null | null |
|
CVE-2002-1739 | Alt-N Technologies Mdaemon 5.0 through 5.0.6 uses a weak encryption algorithm to store user passwords, which allows local users to crack passwords. | [
"cpe:2.3:a:mdaemon:mdaemon:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | 2.1 |
|
GHSA-3rx9-3f42-rqvh | Use-after-free vulnerability in the HTMLScriptElement::didMoveToNewDocument function in core/html/HTMLScriptElement.cpp in the DOM implementation in Blink, as used in Google Chrome before 40.0.2214.91, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving movement of a SCRIPT element across documents. | [] | null | null | null | null |
|
GHSA-5g4w-m5hx-7hw6 | Format string vulnerability in the logging function in Larson Network Print Server (LstNPS) 9.4.2 build 105 and earlier for Windows might allow remote attackers to execute arbitrary code via format string specifiers in a USEP command on TCP port 3114. | [] | null | null | null | null |
|
CVE-2012-5945 | Multiple buffer overflows in the Vsflex8l ActiveX control in IBM SPSS SamplePower 3.0 before FP1 allow remote attackers to execute arbitrary code via a long (1) ComboList or (2) ColComboList property value. | [
"cpe:2.3:a:ibm:spss_samplepower:3.0.0.0:*:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
CVE-2020-13852 | Artica Pandora FMS 7.44 allows arbitrary file upload (leading to remote command execution) via the File Manager feature. | [
"cpe:2.3:a:pandorafms:pandora_fms:7.44:*:*:*:*:*:*:*"
] | null | 7.2 | null | 9 |
|
GHSA-4q2c-288h-f42x | The WooCommerce - Social Login plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 2.7.5. This is due to the use of loose comparison of the activation code in the 'woo_slg_confirm_email_user' function. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the userID. This requires the email module to be enabled. | [] | null | 9.8 | null | null |
|
GHSA-6q76-4mmr-j6rw | Heap-based buffer overflow in the cddb_read_disc_data function in cddb.c in libcdaudio 0.99.12p2 allows remote CDDB servers to execute arbitrary code via long CDDB data. | [] | null | null | null | null |
|
CVE-2022-29063 | Java Deserialization via RMI Connection from the Solr plugin of Apache OFBiz | The Solr plugin of Apache OFBiz is configured by default to automatically make a RMI request on localhost, port 1099. In version 18.12.05 and earlier, by hosting a malicious RMI server on localhost, an attacker may exploit this behavior, at server start-up or on a server restart, in order to run arbitrary code. Upgrade to at least 18.12.06 or apply patches at https://issues.apache.org/jira/browse/OFBIZ-12646. | [
"cpe:2.3:a:apache:ofbiz:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
GHSA-2jw7-x2xj-fwh5 | Certain NETGEAR devices are affected by command injection by an authenticated user. This affects D6220 before 1.0.0.48, D6400 before 1.0.0.82, D7000v2 before 1.0.0.52, D8500 before 1.0.3.43, R6250 before 1.0.4.34, R6400 before 1.0.1.44, R6400v2 before 1.0.2.62, R7100LG before 1.0.0.48, R7300DST before 1.0.0.68, R7900 before 1.0.3.8, R7900P before 1.4.1.30, R8000 before 1.0.4.28, R8000P before 1.4.1.30, R8300 before 1.0.2.128, and R8500 before 1.0.2.128. | [] | null | null | null | null |
|
CVE-2006-5716 | Directory traversal vulnerability in aff_news.php in FreeNews 2.1 allows remote attackers to include local files via a .. (dot dot) sequence in the chemin parameter, when the aff_news parameter is not set to "1." | [
"cpe:2.3:a:freenews:freenews:2.1:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-m8qx-v3hf-6vmg | A vulnerability in the contacts feature of Cisco Webex Meetings could allow an authenticated, remote attacker with a legitimate user account to access sensitive information. The vulnerability is due to improper access restrictions on users who are added within user contacts. An attacker on one Webex Meetings site could exploit this vulnerability by sending specially crafted requests to the Webex Meetings site. A successful exploit could allow the attacker to view the details of users on another Webex site, including user names and email addresses. | [] | null | null | null | null |
|
RHSA-2018:2663 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 5.2 security update | RichFaces: Injection of arbitrary EL expressions allows remote code execution via org.richfaces.renderkit.html.Paint2DResource | [
"cpe:/a:redhat:jboss_enterprise_application_platform:5"
] | null | null | 9.8 | null |
GHSA-x694-7pqc-fwpj | Untrusted search path vulnerability in Sorax Reader 2.0.3129.70 allows local users to gain privileges via a Trojan horse dwmapi.dll file in the current working directory, as demonstrated by a directory that contains a .pdf file. NOTE: some of these details are obtained from third party information. | [] | null | null | null | null |
|
GHSA-2847-m46v-fqww | HTTP Server mod_ssl module running on HP-UX 11.04 with Virtualvault OS (VVOS) 4.5 through 4.6 closes the connection when the Apache server times out during an SSL request, which may allow attackers to cause a denial of service. | [] | null | null | null | null |
|
CVE-2017-7634 | Cross-site scripting (XSS) vulnerability in QNAP NAS application Media Streaming add-on version 421.1.0.2, 430.1.2.0, and earlier allows remote attackers to inject arbitrary web script or HTML. The injected code will only be triggered by a crafted link, not the normal page. | [
"cpe:2.3:a:qnap:media_streaming_add-on:*:*:*:*:*:*:*:*",
"cpe:2.3:o:qnap:qts:4.3.3:*:*:*:*:*:*:*",
"cpe:2.3:o:qnap:qts:*:*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 |
|
CVE-2025-29227 | In Linksys E5600 V1.1.0.26, the \usr\share\lua\runtime.lua file contains a command injection vulnerability in the runtime.pingTest function via the pt["pkgsize"] parameter. | [] | null | 6.3 | null | null |
|
GHSA-mccq-xq7h-7q89 | In wlan driver, there is a possible missing params check. This could lead to local denial of service in wlan services. | [] | null | 5.5 | null | null |
|
CVE-2023-38622 | Multiple integer overflow vulnerabilities exist in the VZT facgeometry parsing functionality of GTKWave 3.3.115. A specially crafted .vzt file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the integer overflow when allocating the `len` array. | [
"cpe:2.3:a:tonybybell:gtkwave:3.3.115:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
|
GHSA-wq43-mwf7-pm7c | Vulnerability in the Java SE product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 11.0.6 and 14. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE accessible data. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 7.5 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N). | [] | null | 7.5 | null | null |
|
CVE-2000-0594 | BitchX IRC client does not properly cleanse an untrusted format string, which allows remote attackers to cause a denial of service via an invite to a channel whose name includes special formatting characters. | [
"cpe:2.3:a:caldera:openlinux_desktop:2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:caldera:openlinux_ebuilder:2.3:*:*:*:*:*:*:*",
"cpe:2.3:o:caldera:openlinux_edesktop:2.4:*:*:*:*:*:*:*",
"cpe:2.3:o:caldera:openlinux_eserver:2.3:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:3.5:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:mandrakesoft:mandrake_linux:2007:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-355p-2w27-27ph | The dynamic initialization feature of the ClearPath MCP environment allows remote attackers to cause a denial of service (crash) via a TCP port scan using a tool such as nmap. | [] | null | null | null | null |
|
CVE-2024-29155 | Denial of service on Microchip RN4870 devices | On Microchip RN4870 devices, when more than one consecutive PairReqNoInputNoOutput request is
received, the device becomes incapable of completing the pairing
process. A third party can inject a second PairReqNoInputNoOutput request
just after a real one, causing the pair request to be blocked. | [] | null | 4.3 | null | null |
CVE-2024-1621 | uniFLOW Online device registration susceptible to compromise | The registration process of uniFLOW Online (NT-ware product) apps, prior to and including version 2024.1.0, can be compromised when email login is enabled on the tenant. Those tenants utilising email login in combination with Microsoft Safe Links or similar are impacted. This vulnerability may allow the attacker to register themselves against a genuine user in the system and allow malicious users with similar access and capabilities via the app to the existing genuine user. | [
"cpe:2.3:a:nt-ware:uniflow_online:*:*:*:*:*:*:*:*",
"cpe:2.3:a:nt-ware:uniflow_online:*:*:*:*:*:-:*:*",
"cpe:2.3:a:nt-ware:uniflow_online:-:*:*:*:*:chrome:*:*",
"cpe:2.3:a:nt-ware:uniflow_online_print_\\&_scan:-:*:*:*:*:andriod:*:*",
"cpe:2.3:a:nt-ware:uniflow_online_print_\\&_scan:-:*:*:*:*:iphone_os:*:*",
"cpe:2.3:a:nt-ware:uniflow_smartclient:-:*:*:*:*:macos:*:*",
"cpe:2.3:a:nt-ware:uniflow_smartclient:-:*:*:*:*:windows:*:*"
] | 8.3 | null | null | null |
GHSA-9q22-jrm2-6pm4 | SQL injection vulnerability in the blogwriter module 2.0 for Miniweb allows remote attackers to execute arbitrary SQL commands via the historymonth parameter to index.php. | [] | null | null | null | null |
|
GHSA-hjxr-p35p-924x | The mintToken function of a smart contract implementation for OllisCoin, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value. | [] | null | null | 7.5 | null |
|
GHSA-4rf6-pvq6-2g27 | Inappropriate implementation in CORS in Google Chrome prior to 113.0.5672.63 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: Medium) | [] | null | 4.3 | null | null |
|
CVE-2024-5871 | WooCommerce - Social Login <= 2.6.2 - Unauthenticated PHP Object Injection | The WooCommerce - Social Login plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 2.6.2 via deserialization of untrusted input from the 'woo_slg_verify' vulnerable parameter. This makes it possible for unauthenticated attackers to inject a PHP Object. No known POP chain is present in the vulnerable software. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code. | [
"cpe:2.3:a:wpweb:woocommerce_social_login:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
CVE-2023-41954 | WordPress ProfilePress plugin <= 4.13.1 - Unauthenticated Limited Privilege Escalation vulnerability | Improper Privilege Management vulnerability in ProfilePress Membership Team ProfilePress allows Privilege Escalation.This issue affects ProfilePress: from n/a through 4.13.1. | [] | null | 8.6 | null | null |
GHSA-h522-94xp-2xr6 | Magento 2 Community Edition Information Disclosure | An information leakage vulnerability exists in Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2. An authenticated user with administrator privileges may be able to view metadata of a trusted device used by another administrator via a crafted http request. | [] | null | null | 4.9 | null |
CVE-2025-3536 | Tutorials-Website Employee Management System delete-user.php improper authorization | A vulnerability was found in Tutorials-Website Employee Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /admin/delete-user.php. The manipulation of the argument ID leads to improper authorization. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | [] | 6.9 | 6.5 | 6.5 | 6.4 |
CVE-2021-29053 | Multiple SQL injection vulnerabilities in Liferay Portal 7.3.5 and Liferay DXP 7.3 before fix pack 1 allow remote authenticated users to execute arbitrary SQL commands via the classPKField parameter to (1) CommerceChannelRelFinder.countByC_C, or (2) CommerceChannelRelFinder.findByC_C. | [
"cpe:2.3:a:liferay:dxp:7.3:-:*:*:*:*:*:*",
"cpe:2.3:a:liferay:liferay_portal:7.3.5:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.5 |
|
GHSA-pcpg-w523-3fgg | Directory traversal vulnerability in index.php in My Simple Forum 3.0 and 4.1, when magic_quotes_gpc is disabled, allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the action parameter. | [] | null | null | null | null |
|
CVE-2012-4909 | Google Chrome before 18.0.1025308 on Android allows remote attackers to obtain cookie information via a crafted application. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2021-47298 | bpf, sockmap: Fix potential memory leak on unlikely error case | In the Linux kernel, the following vulnerability has been resolved:
bpf, sockmap: Fix potential memory leak on unlikely error case
If skb_linearize is needed and fails we could leak a msg on the error
handling. To fix ensure we kfree the msg block before returning error.
Found during code review. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.14:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.14:rc2:*:*:*:*:*:*"
] | null | 5.5 | null | null |
GHSA-cg3w-xf55-wj9x | Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers could allow an authenticated, remote attacker to inject and execute arbitrary commands on the underlying operating system of an affected device. These vulnerabilities are due to insufficient validation of user-supplied input. An attacker could exploit these vulnerabilities by sending malicious input to an affected device. A successful exploit could allow the attacker to execute arbitrary commands as the root user on the underlying Linux operating system of the affected device. To exploit these vulnerabilities, an attacker would need to have valid Administrator credentials on the affected device. Cisco has not released software updates to address these vulnerabilities. | [] | null | 7.2 | null | null |
|
RHSA-2012:0102 | Red Hat Security Advisory: Red Hat Network Proxy spacewalk-backend security and bug fix update | Spacewalk: RHN user password disclosure upon failed system registration | [
"cpe:/a:redhat:network_proxy:5.4::el5",
"cpe:/a:redhat:network_proxy:5.4::el6"
] | null | null | null | null |
CVE-2021-37702 | Improper Neutralization of Formula Elements in a CSV File in pimcore/pimcore | Pimcore is an open source data & experience management platform. Prior to version 10.1.1, Data Object CSV import allows formular injection. The problem is patched in 10.1.1. Aside from upgrading, one may apply the patch manually as a workaround. | [
"cpe:2.3:a:pimcore:pimcore:*:*:*:*:*:*:*:*"
] | null | 8 | null | null |
GHSA-4rph-jf58-r356 | Adobe Reader and Acrobat 10.x before 10.1.14 and 11.x before 11.0.11 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2014-9161, CVE-2015-3046, CVE-2015-3049, CVE-2015-3051, CVE-2015-3052, CVE-2015-3056, CVE-2015-3057, CVE-2015-3070, and CVE-2015-3076. | [] | null | null | null | null |
|
GHSA-g89g-ww34-v9q4 | SugarCRM before 8.0.4 and 9.x before 9.0.2 allows SQL injection in the Contacts module by a Regular user. | [] | null | 8.8 | null | null |
|
GHSA-rccv-3qjv-c8h5 | The Gixaw Chat WordPress plugin through 1.0 does not have CSRF check in some places, and is missing sanitisation as well as escaping, which could allow attackers to make logged in admin add Stored XSS payloads via a CSRF attack. | [] | null | 6.1 | null | null |
|
GHSA-9gpq-82h8-hgx9 | glFusion CMS 1.7.9 is affected by an access control vulnerability via /public_html/users.php. | [] | null | 9.8 | null | null |
|
CVE-2003-0704 | KisMAC before 0.05d trusts user-supplied variables when chown'ing files or directories, which allows local users to gain privileges via the $DRIVER_KEXT environment variable in (1) viha_driver.sh, (2) macjack_load.sh, (3) airojack_load.sh, (4) setuid_enable.sh, (5) setuid_disable.sh, and using a "similar technique" for (6) viha_prep.sh and (7) viha_unprep.sh. | [
"cpe:2.3:a:kismac:kismac:0.05d:*:*:*:*:*:*:*"
] | null | null | null | 7.2 |
|
CVE-2021-42089 | An issue was discovered in Zammad before 4.1.1. The REST API discloses sensitive information. | [
"cpe:2.3:a:zammad:zammad:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
GHSA-7c29-m4q4-fgp6 | Race condition in the tty_ioctl function in drivers/tty/tty_io.c in the Linux kernel through 4.4.1 allows local users to obtain sensitive information from kernel memory or cause a denial of service (use-after-free and system crash) by making a TIOCGETD ioctl call during processing of a TIOCSETD ioctl call. | [] | null | null | 6.8 | null |
|
GHSA-5rwh-cqfm-wv9v | The BIOS in Intel NUC systems based on 6th Gen Intel Core processors prior to version KY0045 may allow may allow an attacker with physical access to the system to gain access to personal information. | [] | null | null | 3.9 | null |
|
CVE-2018-0429 | Stack-based buffer overflow in the Cisco Thor decoder before commit 18de8f9f0762c3a542b1122589edb8af859d9813 allows local users to cause a denial of service (segmentation fault) and execute arbitrary code via a crafted non-conformant Thor bitstream. | [
"cpe:2.3:a:cisco:thor_video_codec:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | 4.6 |
|
CVE-2024-43572 | Microsoft Management Console Remote Code Execution Vulnerability | Microsoft Management Console Remote Code Execution Vulnerability | [
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x32:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
CVE-2002-1755 | tinc 1.0pre3 and 1.0pre4 VPN does not authenticate forwarded packets, which allows remote attackers to inject data into user sessions without detection, and possibly control the data contents via cut-and-paste attacks on CBC. | [
"cpe:2.3:a:tinc:tinc:1.0pre3:*:*:*:*:*:*:*",
"cpe:2.3:a:tinc:tinc:1.0pre4:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
ICSMA-22-244-01 | Contec Health CMS8000 | A threat actor with momentary access to the device can plug in a USB drive and perform a malicious firmware update, resulting in permanent changes to device functionality. No authentication or controls are in place to prevent a threat actor from maliciously modifying firmware and performing a drive-by attack to load the firmware on any CMS8000 device.CVE-2022-36385 has been assigned to this vulnerability. A CVSS v3 base score of 6.8 has been calculated; the CVSS vector string is (AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). The CMS800 device fails while attempting to parse malformed network data sent by a threat actor. A threat actor with network access can remotely issue a specially formatted UDP request that will cause the entire device to crash and require a physical reboot. A UDP broadcast request could be sent that causes a mass denial-of-service attack on all CME8000 devices connected to the same network.CVE-2022-38100 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). Multiple globally default credentials exist across all CMS8000 devices, that once exposed, allow a threat actor with momentary physical access to gain privileged access to any device. Privileged credential access enables the extraction of sensitive patient information or modification of device parameters.CVE-2022-38069 has been assigned to this vulnerability. A CVSS v3 base score of 4.3 has been calculated; the CVSS vector string is (AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L). Multiple binary application files on the CMS8000 device are compiled with 'not stripped' and 'debug_info' compilation settings. These compiler settings greatly decrease the level of effort for a threat actor to reverse engineer sensitive code and identify additional vulnerabilities.CVE-2022-38453 has been assigned to this vulnerability. A CVSS v3 base score of 3.0 has been calculated; the CVSS vector string is (AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N). The CMS8000 device does not properly control or sanitize the SSID name of a new Wi-Fi access point. A threat actor could create an SSID with a malicious name, including non-standard characters that, when the device attempts connecting to the malicious SSID, the device can be exploited to write arbitrary files or display incorrect information.CVE-2022-3027 has been assigned to this vulnerability. A CVSS v3 base score of 5.7 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H). | [] | null | null | 5.7 | null |
GHSA-rx9c-4x6j-xm83 | A remote authorization bypass vulnerability was discovered in Aruba ClearPass Policy Manager version(s): 6.10.4 and below, 6.9.9 and below, 6.8.9-HF2 and below, 6.7.x and below. Aruba has released updates to ClearPass Policy Manager that address this security vulnerability. | [] | null | 8.8 | null | null |
|
GHSA-4jpw-rjf3-3chj | An issue was discovered in Foxit PhantomPDF before 8.3.11. It has a NULL pointer dereference via FXSYS_wcslen in an Epub file. | [] | null | null | null | null |
|
GHSA-j4r2-c3hx-6f4x | Red Hat libvirt 0.2.0 through 0.8.2 creates iptables rules with improper mappings of privileged source ports, which allows guest OS users to bypass intended access restrictions by leveraging IP address and source-port values, as demonstrated by copying and deleting an NFS directory tree. | [] | null | null | null | null |
|
CVE-2016-4288 | A local privilege escalation vulnerability exists in BlueStacks App Player. The BlueStacks App Player installer creates a registry key with weak permissions that allows users to execute arbitrary programs with SYSTEM privileges. | [
"cpe:2.3:a:bluestacks:bluestacks:2.1.3.5650:*:*:*:*:*:*:*"
] | null | null | 8.4 | 7.2 |
|
GHSA-8rfp-whgr-r789 | libming 0.4.8 has a NULL pointer dereference in the strlenext function of the decompile.c file, a different vulnerability than CVE-2018-7874. | [] | null | null | 8.8 | null |
|
GHSA-4ww6-v8j9-4cf3 | TuziCMS 2.0.6 has index.php/manage/notice/do_add CSRF. | [] | null | 8.8 | null | null |
|
CVE-2015-4538 | The XML parser in EMC Atmos before 2.2.3.426 and 2.3.x before 2.3.1.0 allows remote authenticated users to read arbitrary files or cause a denial of service (CPU and memory consumption) via an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue. | [
"cpe:2.3:a:emc:atmos:2.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:atmos:2.3.0:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-hjj8-487v-3m8m | An improper authentication vulnerability in Bitdefender Endpoint Security Tools for Windows and Bitdefender Endpoint Security SDK allows an unprivileged local attacker to escalate privileges or tamper with the product's security settings. This issue affects: Bitdefender Endpoint Security Tools for Windows versions prior to 6.6.18.261. This issue affects: Bitdefender Endpoint Security Tools for Windows versions prior to 6.6.18.261. Bitdefender Endpoint Security SDK versions prior to 6.6.18.261. | [] | null | null | null | null |
|
CVE-2020-10750 | Sensitive information written to a log file vulnerability was found in jaegertracing/jaeger before version 1.18.1 when the Kafka data store is used. This flaw allows an attacker with access to the container's log file to discover the Kafka credentials. | [
"cpe:2.3:a:linuxfoundation:jaeger:*:*:*:*:*:*:*:*"
] | null | 7.1 | null | null |
|
GHSA-hw28-2wwc-xj8m | ActiveX Control in MyBuilder before 6.2.2019.814 allow an attacker to execute arbitrary command via the ShellOpen method. This can be leveraged for code execution | [] | null | 9.8 | null | null |
|
CVE-2016-7177 | epan/dissectors/packet-catapult-dct2000.c in the Catapult DCT2000 dissector in Wireshark 2.x before 2.0.6 does not restrict the number of channels, which allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted packet. | [
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:2.0.5:*:*:*:*:*:*:*"
] | null | null | 5.9 | 4.3 |
|
CVE-2020-10241 | An issue was discovered in Joomla! before 3.9.16. Missing token checks in the image actions of com_templates lead to CSRF. | [
"cpe:2.3:a:joomla:joomla\\!:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.8 |
|
CVE-2017-2304 | Juniper Networks QFX3500, QFX3600, QFX5100, QFX5200, EX4300 and EX4600 devices running Junos OS 14.1X53 prior to 14.1X53-D40, 15.1X53 prior to 15.1X53-D40, 15.1 prior to 15.1R2, do not pad Ethernet packets with zeros, and thus some packets can contain fragments of system memory or data from previous packets. This issue is also known as 'Etherleak' | [
"cpe:2.3:o:juniper:junos:14.1x53:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1x53:d10:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1x53:d15:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1x53:d16:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1x53:d25:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1x53:d26:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1x53:d27:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1x53:d30:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1x53:d35:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x53:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x53:d20:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x53:d21:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x53:d25:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x53:d30:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x53:d32:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x53:d33:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x53:d34:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex4300:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex4600:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:qfx3500:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:qfx3600:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:qfx5100:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:qfx5200:-:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
CVE-2024-20531 | Cisco Identity Services Engine XML External Entity Injection Vulnerability | A vulnerability in the API of Cisco ISE could allow an authenticated, remote attacker to read arbitrary files on the underlying operating system of an affected device and conduct a server-side request forgery (SSRF) attack through an affected device. To exploit this vulnerability, the attacker would need valid Super Admin credentials.
This vulnerability is due to improper handling of XML External Entity (XXE) entries when parsing XML input. An attacker could exploit this vulnerability by sending a crafted API request to an affected device. A successful exploit could allow the attacker to read arbitrary files on the underlying operating system or conduct an SSRF attack through the affected device. | [
"cpe:2.3:a:cisco:identity_services_engine:3.0.0:-:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch1:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch2:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch3:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch4:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch5:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch6:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch7:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch8:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.1.0:-:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch1:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch2:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch3:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch4:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch5:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch6:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch7:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch8:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch9:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.2.0:-:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch1:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch2:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch3:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch4:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch5:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch6:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.3.0:-:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.3.0:patch1:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.3.0:patch2:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.3.0:patch3:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.4.0:-:*:*:*:*:*:*"
] | null | 5.5 | null | null |
CVE-2018-18942 | In baserCMS before 4.1.4, lib\Baser\Model\ThemeConfig.php allows remote attackers to execute arbitrary PHP code via the admin/theme_configs/form data[ThemeConfig][logo] parameter. | [
"cpe:2.3:a:basercms:basercms:*:*:*:*:*:*:*:*"
] | null | null | 7.2 | 6.5 |
|
GHSA-mq8m-22xh-h584 | PHP remote file inclusion vulnerability in lang.php in CMS Made Simple 0.10 and earlier allows remote attackers to execute arbitrary PHP code via the nls[file][vx][vxsfx] parameter. | [] | null | null | null | null |
|
CVE-2016-6567 | SHDesigns' Resident Download Manager (as well as the Ethernet Download Manager) does not authenticate firmware downloads before executing code and deploying them to devices | SHDesigns' Resident Download Manager provides firmware update capabilities for Rabbit 2000/3000 CPU boards, which according to the reporter may be used in some industrial control and embedded applications. The Resident Download Manager does not verify that the firmware is authentic before executing code and deploying the firmware to devices. A remote attacker with the ability to send UDP traffic to the device may be able to execute arbitrary code on the device. According to SHDesigns' website, the Resident Download Manager and other Rabbit Tools have been discontinued since June 2011. | [
"cpe:2.3:a:shdesigns:resident_download_manager:-:*:*:*:*:*:*:*"
] | null | null | 9.8 | 10 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.