id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2015-5305 | Directory traversal vulnerability in Kubernetes, as used in Red Hat OpenShift Enterprise 3.0, allows attackers to write to arbitrary files via a crafted object type name, which is not properly handled before passing it to etcd. | [
"cpe:2.3:a:redhat:openshift:3.0:*:*:*:enterprise:*:*:*"
] | null | null | null | 6.4 |
|
CVE-2020-12043 | The Baxter Spectrum WBM (v17, v20D29, v20D30, v20D31, and v22D24) when configured for wireless networking the FTP service operating on the WBM remains operational until the WBM is rebooted. | [
"cpe:2.3:o:baxter:sigma_spectrum_infusion_system_firmware:8.0:*:*:*:*:*:*:*",
"cpe:2.3:h:baxter:sigma_spectrum_infusion_system:-:*:*:*:*:*:*:*",
"cpe:2.3:h:baxter:wireless_battery_module:17:*:*:*:*:*:*:*",
"cpe:2.3:h:baxter:wireless_battery_module:20d29:*:*:*:*:*:*:*",
"cpe:2.3:h:baxter:wireless_battery_module:20d30:*:*:*:*:*:*:*",
"cpe:2.3:h:baxter:wireless_battery_module:20d31:*:*:*:*:*:*:*",
"cpe:2.3:h:baxter:wireless_battery_module:22d24:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
|
CVE-2023-46624 | WordPress Parcel Pro Plugin <= 1.6.11 is vulnerable to Open Redirection | URL Redirection to Untrusted Site ('Open Redirect') vulnerability in Parcel Pro.This issue affects Parcel Pro: from n/a through 1.6.11.
| [
"cpe:2.3:a:parcelpro:parcel_pro:*:*:*:*:*:wordpress:*:*"
] | null | 4.7 | null | null |
GHSA-23cf-whmv-wf37 | In the Linux kernel, the following vulnerability has been resolved:Bluetooth: btnxpuart: Fix kernel panic during FW releaseThis fixes a kernel panic seen during release FW in a stress test
scenario where WLAN and BT FW download occurs simultaneously, and due to
a HW bug, chip sends out only 1 bootloader signatures.When driver receives the bootloader signature, it enters FW download
mode, but since no consequtive bootloader signatures seen, FW file is
not requested.After 60 seconds, when FW download times out, release_firmware causes a
kernel panic.[ 2601.949184] Unable to handle kernel paging request at virtual address 0000312e6f006573
[ 2601.992076] user pgtable: 4k pages, 48-bit VAs, pgdp=0000000111802000
[ 2601.992080] [0000312e6f006573] pgd=0000000000000000, p4d=0000000000000000
[ 2601.992087] Internal error: Oops: 0000000096000021 [#1] PREEMPT SMP
[ 2601.992091] Modules linked in: algif_hash algif_skcipher af_alg btnxpuart(O) pciexxx(O) mlan(O) overlay fsl_jr_uio caam_jr caamkeyblob_desc caamhash_desc caamalg_desc crypto_engine authenc libdes crct10dif_ce polyval_ce snd_soc_fsl_easrc snd_soc_fsl_asoc_card imx8_media_dev(C) snd_soc_fsl_micfil polyval_generic snd_soc_fsl_xcvr snd_soc_fsl_sai snd_soc_imx_audmux snd_soc_fsl_asrc snd_soc_imx_card snd_soc_imx_hdmi snd_soc_fsl_aud2htx snd_soc_fsl_utils imx_pcm_dma dw_hdmi_cec flexcan can_dev
[ 2602.001825] CPU: 2 PID: 20060 Comm: hciconfig Tainted: G C O 6.6.23-lts-next-06236-gb586a521770e #1
[ 2602.010182] Hardware name: NXP i.MX8MPlus EVK board (DT)
[ 2602.010185] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[ 2602.010191] pc : _raw_spin_lock+0x34/0x68
[ 2602.010201] lr : free_fw_priv+0x20/0xfc
[ 2602.020561] sp : ffff800089363b30
[ 2602.020563] x29: ffff800089363b30 x28: ffff0000d0eb5880 x27: 0000000000000000
[ 2602.020570] x26: 0000000000000000 x25: ffff0000d728b330 x24: 0000000000000000
[ 2602.020577] x23: ffff0000dc856f38
[ 2602.033797] x22: ffff800089363b70 x21: ffff0000dc856000
[ 2602.033802] x20: ff00312e6f006573 x19: ffff0000d0d9ea80 x18: 0000000000000000
[ 2602.033809] x17: 0000000000000000 x16: 0000000000000000 x15: 0000aaaad80dd480
[ 2602.083320] x14: 0000000000000000 x13: 00000000000001b9 x12: 0000000000000002
[ 2602.083326] x11: 0000000000000000 x10: 0000000000000a60 x9 : ffff800089363a30
[ 2602.083333] x8 : ffff0001793d75c0 x7 : ffff0000d6dbc400 x6 : 0000000000000000
[ 2602.083339] x5 : 00000000410fd030 x4 : 0000000000000000 x3 : 0000000000000001
[ 2602.083346] x2 : 0000000000000000 x1 : 0000000000000001 x0 : ff00312e6f006573
[ 2602.083354] Call trace:
[ 2602.083356] _raw_spin_lock+0x34/0x68
[ 2602.083364] release_firmware+0x48/0x6c
[ 2602.083370] nxp_setup+0x3c4/0x540 [btnxpuart]
[ 2602.083383] hci_dev_open_sync+0xf0/0xa34
[ 2602.083391] hci_dev_open+0xd8/0x178
[ 2602.083399] hci_sock_ioctl+0x3b0/0x590
[ 2602.083405] sock_do_ioctl+0x60/0x118
[ 2602.083413] sock_ioctl+0x2f4/0x374
[ 2602.091430] __arm64_sys_ioctl+0xac/0xf0
[ 2602.091437] invoke_syscall+0x48/0x110
[ 2602.091445] el0_svc_common.constprop.0+0xc0/0xe0
[ 2602.091452] do_el0_svc+0x1c/0x28
[ 2602.091457] el0_svc+0x40/0xe4
[ 2602.091465] el0t_64_sync_handler+0x120/0x12c
[ 2602.091470] el0t_64_sync+0x190/0x194 | [] | null | null | null | null |
|
GHSA-v87m-9fvr-2rrf | In BTA_HdRegisterApp of bta_hd_api.cc, there is a possible out-of-bound write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android-9. Android ID: A-113111784 | [] | null | null | 7.8 | null |
|
CVE-2024-0540 | Tenda W9 httpd formOfflineSet stack-based overflow | A vulnerability was found in Tenda W9 1.0.0.7(4456). It has been classified as critical. Affected is the function formOfflineSet of the component httpd. The manipulation of the argument ssidIndex leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-250710 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | [
"cpe:2.3:o:tenda:w9_firmware:1.0.0.7\\(4456\\):*:*:*:*:*:*:*",
"cpe:2.3:h:tenda:w9:-:*:*:*:*:*:*:*"
] | null | 6.3 | 6.3 | 6.5 |
CVE-2024-20655 | Microsoft Online Certificate Status Protocol (OCSP) Remote Code Execution Vulnerability | Microsoft Online Certificate Status Protocol (OCSP) Remote Code Execution Vulnerability | [
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022_23h2:-:*:*:*:*:*:*:*"
] | null | 6.6 | null | null |
GHSA-vpmw-77vm-4mjg | Cross-site Scripting in Cipi | Cipi 3.1.15 allows Add Server stored cross-site scripting via the /api/servers name field. | [] | null | 5.4 | null | null |
GHSA-6f6r-4rpp-w273 | IBM Cloud Pak System 2.3 and 2.3.0.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 159243. | [] | null | null | null | null |
|
CVE-2023-40595 | Remote Code Execution via Serialized Session Payload | In Splunk Enterprise versions lower than 8.2.12, 9.0.6, and 9.1.1, an attacker can execute a specially crafted query that they can then use to serialize untrusted data. The attacker can use the query to execute arbitrary code. | [
"cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:splunk:splunk:9.1.0:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:splunk:splunk_cloud_platform:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
CVE-2021-35084 | Possible out of bound read due to lack of length check of data length for a DIAG event in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music | [
"cpe:2.3:o:qualcomm:aqt1000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:aqt1000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ar8031_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ar8031:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ar8035:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:csra6620_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:csra6620:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:csra6640_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:csra6640:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:csrb31024_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:csrb31024:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6174a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6174a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6175a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6175a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6390_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6390:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6391:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6420_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6420:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6426_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6426:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6430_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6430:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6436_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6436:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6564au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6564au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6574_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6574:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6574a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6574a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6595au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6696:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca8081:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca8337_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca8337:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9377_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9377:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9379_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9379:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcm4290_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcm4290:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcm6125_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcm6125:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn7605_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn7605:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn7606_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn7606:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs405_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs405:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs410_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs410:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs4290_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs4290:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs605_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs605:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs610_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs610:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs6125_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs6125:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qrb5165_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qrb5165:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qrb5165m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qrb5165m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qrb5165n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qrb5165n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa415m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa415m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa515m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa515m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa6155p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8155p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8195p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8195p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_8_gen1_5g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm8475:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd460_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd460:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd480_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd480:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd662_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd662:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd680_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd680:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd690_5g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd690_5g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd695_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd695:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd750g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd750g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd765_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd765:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd765g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd765g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd768g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd768g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd778g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd778g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd780g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd780g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd855_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd855:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd865_5g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd865_5g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd870_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd870:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd888_5g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd888_5g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx12_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx12:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx55:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx55m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx55m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx65_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx65:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdxr2_5g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdxr2_5g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm7250p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm7250p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm7325p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm7325p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9335_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9335:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9341_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9341:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9360_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9360:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9375:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3950:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3980:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3988:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3990_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3990:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3991_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3991:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3998_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3998:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3999_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3999:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6740_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6740:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6750_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6750:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6850_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6850:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6851_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6851:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6855_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6855:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6856_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6856:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn7850_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn7850:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn7851_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn7851:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8810:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8815:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
|
CVE-2017-17898 | Dolibarr ERP/CRM version 6.0.4 does not block direct requests to *.tpl.php files, which allows remote attackers to obtain sensitive information. | [
"cpe:2.3:a:dolibarr:dolibarr_erp\\/crm:6.0.4:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
CVE-2021-39089 | IBM Cloud Pak for Security information disclosure | IBM Cloud Pak for Security (CP4S) 1.10.0.0 through 1.10.6.0 could allow an authenticated user to obtain sensitive information from a specially crafted HTTP request. IBM X-Force ID: 216387. | [
"cpe:2.3:a:ibm:cloud_pak_for_security:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"
] | null | 4.3 | null | null |
CVE-2024-28107 | phpMyFAQ SQL injections at insertentry & saveentry | phpMyFAQ is an open source FAQ web application for PHP 8.1+ and MySQL, PostgreSQL and other databases. A SQL injection vulnerability has been discovered in the `insertentry` & `saveentry` when modifying records due to improper escaping of the email address. This allows any authenticated user with the rights to add/edit FAQ news to exploit this vulnerability to exfiltrate data, take over accounts and in some cases, even achieve RCE. This vulnerability is fixed in 3.2.6. | [
"cpe:2.3:a:thorsten:phpmyfaq:*:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyfaq:phpmyfaq:3.2.5:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
CVE-2006-6612 | PHP remote file inclusion vulnerability in basic.inc.php in PhpMyCms 0.3 allows remote attackers to execute arbitrary PHP code via a URL in the basepath_start parameter. | [
"cpe:2.3:a:phpmycms:phpmycms:0.3:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-h9qg-478x-rpf8 | Adobe Dimension versions 3.4.7 (and earlier) is affected by an Improper Input Validation vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [] | null | 7.8 | null | null |
|
CVE-2002-1228 | Unknown vulnerability in NFS on Solaris 2.5.1 through Solaris 9 allows an NFS client to cause a denial of service by killing the lockd daemon. | [
"cpe:2.3:o:sun:solaris:2.5.1:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:7.0:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:8.0:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:9.0:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-8mm6-wmpp-mmm3 | Duplicate Advisory: Gogs allows argument injection during the tagging of a new release | Duplicate AdvisoryThis advisory has been withdrawn because it is a duplicate of GHSA-m27m-h5gj-wwmg. This link is maintained to preserve external references.Original DescriptionGogs through 0.13.0 allows argument injection during the tagging of a new release. This vulnerability is still unfixed as of the time of this advisory being published. | [] | 8.2 | 7.7 | null | null |
CVE-2010-2140 | SQL injection vulnerability in itemdetail.php in Multishop CMS allows remote attackers to execute arbitrary SQL commands via the itemid parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | [
"cpe:2.3:a:multishopcms:multishop_cms:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
RHSA-2018:1644 | Red Hat Security Advisory: qemu-kvm-rhev security update | hw: cpu: speculative store bypass QEMU: i386: multiboot OOB access while loading kernel image QEMU: cirrus: OOB access when updating VGA display | [
"cpe:/a:redhat:openstack:10::el7"
] | null | null | 5.5 | null |
RHSA-2005:864 | Red Hat Security Advisory: udev security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
GHSA-wf9j-wrqc-3h9g | Zikula before 1.3.1 uses the rand and srand PHP functions for random number generation, which makes it easier for remote attackers to defeat protection mechanisms based on randomization by predicting a return value, as demonstrated by the authid protection mechanism. | [] | null | null | null | null |
|
GHSA-3w93-xggv-pqrq | IBM Jazz Foundation (IBM Rational Engineering Lifecycle Manager 5.0 through 6.0.6) is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 152740. | [] | null | null | 5.4 | null |
|
GHSA-44m4-9cjp-j587 | IBX-1392: Image filenames sanitization | ezsystems/ezpublish-kernel versions 7.5.* before 7.5.26 are vulnerable to certain injection attacks and unauthorized access to some image files. | [] | null | null | null | null |
CVE-2006-4800 | Multiple buffer overflows in libavcodec in ffmpeg before 0.4.9_p20060530 allow remote attackers to cause a denial of service or possibly execute arbitrary code via multiple unspecified vectors in (1) dtsdec.c, (2) vorbis.c, (3) rm.c, (4) sierravmd.c, (5) smacker.c, (6) tta.c, (7) 4xm.c, (8) alac.c, (9) cook.c, (10) shorten.c, (11) smacker.c, (12) snow.c, and (13) tta.c. NOTE: it is likely that this is a different vulnerability than CVE-2005-4048 and CVE-2006-2802. | [
"cpe:2.3:a:ffmpeg:ffmpeg:0.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.4.9:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2017-10811 | Buffalo WCR-1166DS devices with firmware 1.30 and earlier allow an attacker to execute arbitrary OS commands via unspecified vectors. | [
"cpe:2.3:o:buffalo:wcr-1166ds_firmware:1.30:*:*:*:*:*:*:*",
"cpe:2.3:h:buffalo:wcr-1166ds:-:*:*:*:*:*:*:*"
] | null | null | 6.8 | 7.7 |
|
RHSA-2005:435 | Red Hat Security Advisory: mozilla security update | security flaw security flaw security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
CVE-2022-22115 | Teedy - Stored Cross-Site Scripting (XSS) in Tag Name | In Teedy, versions v1.5 through v1.9 are vulnerable to Stored Cross-Site Scripting (XSS) in the name of a created Tag. Since the Tag name is not being sanitized properly in the edit tag page, a low privileged attacker can store malicious scripts in the name of the Tag. In the worst case, the victim who inadvertently triggers the attack is a highly privileged administrator. The injected scripts can extract the Session ID, which can lead to full Account Takeover of the administrator, and privileges escalation. | [
"cpe:2.3:a:sismics:teedy:*:*:*:*:*:*:*:*"
] | null | 9 | null | null |
GHSA-r7c8-q64w-gv6f | A time-of-check to time-of-use (TOCTOU) race condition vulnerability in the Palo Alto Networks PAN-OS web interface enables an authenticated administrator with permission to upload plugins to execute arbitrary code with root user privileges. This issue impacts: PAN-OS 8.1 versions earlier than PAN-OS 8.1.20; PAN-OS 9.0 versions earlier than PAN-OS 9.0.14; PAN-OS 9.1 versions earlier than PAN-OS 9.1.11; PAN-OS 10.0 versions earlier than PAN-OS 10.0.7; PAN-OS 10.1 versions earlier than PAN-OS 10.1.2. This issue does not affect Prisma Access. | [] | null | null | null | null |
|
GHSA-g2mc-w2j3-ppg6 | Acrobat Reader DC versions versions 2020.013.20074 (and earlier), 2020.001.30018 (and earlier) and 2017.011.30188 (and earlier) are affected by an Out-of-bounds Read vulnerability. An unauthenticated attacker could leverage this vulnerability to locally elevate privileges in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [] | null | null | null | null |
|
CVE-2015-8771 | The generate_smb_nt_hash function in include/functions.inc in GOsa allows remote attackers to execute arbitrary commands via a crafted password. | [
"cpe:2.3:a:gosa_project:gosa_plugin:*:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 |
|
GHSA-jmqj-768c-pw4r | operations/attestation/AttestationTask.kt in the Tangem SDK before 5.18.3 for Android has a logic flow in offline wallet attestation (genuineness check) that causes verification results to be disregarded during the first scan of a card. Exploitation may not have been possible. | [] | null | 3.2 | null | null |
|
CVE-2024-11534 | IrfanView DXF File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability | IrfanView DXF File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of DXF files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24617. | [
"cpe:2.3:a:irfanview:irfanview:-:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:4.67:*:*:*:*:*:x64:*",
"cpe:2.3:a:irfanview:irfanview:4.67:*:*:*:*:*:x86:*"
] | null | null | 7.8 | null |
CVE-2021-25142 | The Baseboard Management Controller (BMC) firmware in HPE Apollo 70 System prior to version 3.0.14.0 has a local buffer overflow in libifc.so webstartflash function. | [
"cpe:2.3:o:hpe:baseboard_management_controller:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:apollo_70_system:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | 7.2 |
|
ICSMA-18-277-02 | Change Healthcare PeerVue Web Server | This vulnerability results from improper error handling in HTTP-based communications with the server, which could allow an attacker to obtain technical information.CVE-2018-10624 has been assigned to this vulnerability. A CVSS v3 base score of 4.3 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N). | [] | null | null | 4.3 | null |
RHSA-2017:0565 | Red Hat Security Advisory: ocaml security update | ocaml: sizes arguments are sign-extended from 32 to 64 bits | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
CVE-2024-11479 | Authenticated HTML Injection in Issuetrak Ticket Comment Function | A HTML Injection vulnerability was identified in Issuetrak version 17.1 that could be triggered by an authenticated user. HTML markup could be added to comments of tickets, which when submitted will render in the
emails sent to all users on that ticket. | [] | 5.1 | null | null | null |
CVE-2018-20376 | An issue was discovered in Tiny C Compiler (aka TinyCC or TCC) 0.9.27. Compiling a crafted source file leads to an 8 byte out of bounds write in the asm_parse_directive function in tccasm.c. | [
"cpe:2.3:a:tinycc:tinycc:0.9.27:*:*:*:*:*:*:*"
] | null | null | 5.5 | 4.3 |
|
GHSA-gcxq-976r-wv2c | Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable buffer overflow / underflow vulnerability in the RegExp class related to bookmarking in searches. Successful exploitation could lead to arbitrary code execution. | [] | null | null | 9.8 | null |
|
CVE-2006-6245 | Multiple SQL injection vulnerabilities in Photo Organizer (PO) 2.32b and earlier allow remote attackers to execute arbitrary SQL commands via unspecified vectors. | [
"cpe:2.3:a:photo_organizer:photo_organizer:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-gmq2-8cvc-6vr5 | Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2023-21796. | [] | null | 8.3 | null | null |
|
GHSA-7f39-34rh-fghp | Type Confusion in V8 in Google Chrome prior to 122.0.6261.94 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) | [] | null | 8.8 | null | null |
|
GHSA-gqw7-f3qg-cwgq | Buffer overflow in Netscape Enterprise Server and FastTrask Server allows remote attackers to gain privileges via a long HTTP GET request. | [] | null | null | null | null |
|
CVE-2016-6322 | Red Hat QuickStart Cloud Installer (QCI) uses world-readable permissions for /etc/qci/answers, which allows local users to obtain the root password for the deployed system by reading the file. | [
"cpe:2.3:a:redhat:quickstart_cloud_installer:-:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:-:*:*:*:*:*:*:*"
] | null | null | 8.4 | 7.2 |
|
GHSA-wr2x-hp98-m8g3 | Dell PowerScale OneFS contains an Unsynchronized Access to Shared Data in a Multithreaded Context in SMB CA handling. An authenticated user of SMB on a cluster with CA could potentially exploit this vulnerability, leading to a denial of service over SMB. | [] | null | 6.5 | null | null |
|
CVE-2017-16709 | Crestron Airmedia AM-100 devices with firmware before 1.6.0 and AM-101 devices with firmware before 2.7.0 allows remote authenticated administrators to execute arbitrary code via unspecified vectors. | [
"cpe:2.3:o:crestron:airmedia_am-100_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:crestron:airmedia_am-100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:crestron:airmedia_am-101_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:crestron:airmedia_am-101:-:*:*:*:*:*:*:*"
] | null | null | 7.2 | 6.5 |
|
CVE-2021-42755 | An integer overflow / wraparound vulnerability [CWE-190] in FortiSwitch 7.0.2 and below, 6.4.9 and below, 6.2.x, 6.0.x; FortiRecorder 6.4.2 and below, 6.0.10 and below; FortiOS 7.0.2 and below, 6.4.8 and below, 6.2.10 and below, 6.0.x; FortiProxy 7.0.0, 2.0.6 and below, 1.2.x, 1.1.x, 1.0.x; FortiVoiceEnterprise 6.4.3 and below, 6.0.10 and below dhcpd daemon may allow an unauthenticated and network adjacent attacker to crash the dhcpd deamon, resulting in potential denial of service. | [
"cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortiproxy:7.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortivoice:5.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortivoice:5.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortivoice:5.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortivoice:5.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortivoice:5.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortivoice:5.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortivoice:5.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortivoice:5.3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortivoice:5.3.8:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortivoice:5.3.10:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortivoice:5.3.11:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortivoice:5.3.12:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortivoice:5.3.13:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortivoice:5.3.14:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortivoice:5.3.15:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortivoice:5.3.16:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortivoice:5.3.17:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortivoice:5.3.18:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortivoice:5.3.19:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortivoice:5.3.20:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortivoice:5.3.21:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortivoice:5.3.22:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortivoice:5.3.23:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortivoice:5.3.24:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortivoice:5.3.25:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortivoice:5.3.26:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortivoice:6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortivoice:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortivoice:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortivoice:6.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortivoice:6.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortivoice:6.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortivoice:6.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortivoice:6.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortivoice:6.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortivoice:6.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortivoice:6.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortivoice:6.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortivoice:6.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortivoice:6.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortivoice:6.4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:5.4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:5.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:5.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:5.4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:5.4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:5.4.5:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:5.4.6:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:5.4.7:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:5.4.8:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:5.4.9:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:5.4.10:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:5.4.11:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:5.4.12:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:5.4.13:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:5.6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:5.6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:5.6.2:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:5.6.3:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:5.6.4:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:5.6.5:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:5.6.6:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:5.6.7:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:5.6.8:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:5.6.9:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:5.6.10:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:5.6.11:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:5.6.12:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:5.6.13:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:5.6.14:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:6.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:6.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:6.0.5:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:6.0.6:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:6.0.7:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:6.0.8:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:6.0.9:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:6.0.10:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:6.0.11:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:6.0.12:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:6.0.13:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:6.0.14:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:6.2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:6.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:6.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:6.2.3:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:6.2.4:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:6.2.5:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:6.2.6:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:6.2.7:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:6.2.8:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:6.2.9:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:6.2.10:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:6.4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:6.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:6.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:6.4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:6.4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:6.4.5:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:6.4.6:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:6.4.7:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:7.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortirecorder_firmware:6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortirecorder_firmware:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortirecorder_firmware:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortirecorder_firmware:6.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortirecorder_firmware:6.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortirecorder_firmware:6.0.5:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortirecorder_firmware:6.0.6:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortirecorder_firmware:6.0.7:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortirecorder_firmware:6.0.8:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortirecorder_firmware:6.0.9:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortirecorder_firmware:6.0.10:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortirecorder_firmware:6.4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortirecorder_firmware:6.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortirecorder_firmware:6.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortiswitch:*:*:*:*:*:*:*:*"
] | null | 4.3 | null | null |
|
GHSA-mpmc-v776-vcmf | A certain Red Hat build script for nfs-utils before 1.0.9-35z.el5_2 on Red Hat Enterprise Linux (RHEL) 5 omits TCP wrappers support, which might allow remote attackers to bypass intended access restrictions. | [] | null | null | null | null |
|
CVE-2020-29504 |
Dell BSAFE Crypto-C Micro Edition, versions before 4.1.5, and Dell BSAFE Micro Edition Suite, versions before 4.5.2, contain a Missing Required Cryptographic Step Vulnerability.
| [
"cpe:2.3:a:dell:bsafe_crypto-c-micro-edition:*:*:*:*:*:*:*:*",
"cpe:2.3:a:dell:bsafe_micro-edition-suite:*:*:*:*:*:*:*:*"
] | null | 7.4 | null | null |
|
GHSA-ph8q-v7mf-3mfr | The KDE kscd program does not drop privileges when executing a program specified in a user's SHELL environmental variable, which allows the user to gain privileges by specifying an alternate program to execute. | [] | null | null | null | null |
|
CVE-2017-8225 | On Wireless IP Camera (P2P) WIFICAM devices, access to .ini files (containing credentials) is not correctly checked. An attacker can bypass authentication by providing an empty loginuse parameter and an empty loginpas parameter in the URI. | [
"cpe:2.3:o:wificam:wireless_ip_camera_\\(p2p\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:wificam:wireless_ip_camera_\\(p2p\\):-:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 |
|
CVE-2009-3002 | The Linux kernel before 2.6.31-rc7 does not initialize certain data structures within getname functions, which allows local users to read the contents of some kernel memory locations by calling getsockname on (1) an AF_APPLETALK socket, related to the atalk_getname function in net/appletalk/ddp.c; (2) an AF_IRDA socket, related to the irda_getname function in net/irda/af_irda.c; (3) an AF_ECONET socket, related to the econet_getname function in net/econet/af_econet.c; (4) an AF_NETROM socket, related to the nr_getname function in net/netrom/af_netrom.c; (5) an AF_ROSE socket, related to the rose_getname function in net/rose/af_rose.c; or (6) a raw CAN socket, related to the raw_getname function in net/can/raw.c. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.31:-:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.31:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.31:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.31:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.31:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.31:rc5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.31:rc6:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*"
] | null | null | null | 4.9 |
|
GHSA-q449-7g73-x9hf | In Mini-XML (aka mxml) v2.12, there is stack-based buffer overflow in the scan_file function in mxmldoc.c. | [] | null | null | 5.5 | null |
|
CVE-2010-1754 | Passcode Lock in Apple iOS before 4 on the iPhone and iPod touch does not properly handle alert-based unlocks in conjunction with subsequent Remote Lock operations through MobileMe, which allows physically proximate attackers to bypass intended passcode requirements via unspecified vectors. | [
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:h:apple:ipod_touch:-:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:-:*:*:*:*:*:*:*"
] | null | null | null | 6.9 |
|
CVE-2025-24082 | Microsoft Excel Remote Code Execution Vulnerability | Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally. | [] | null | 7.8 | null | null |
CVE-2021-33161 | Improper input validation in some Intel(R) Ethernet Adapters and Intel(R) Ethernet Controller I225 Manageability firmware may allow a privileged user to potentially enable escalation of privilege via local access. | [
"cpe:2.3:o:intel:ethernet_controller_i225_manageability_firmware:*:*:*:*:*:*:*:*"
] | null | 7.2 | null | null |
|
GHSA-x28w-hvwc-mp75 | Static Code Injection in Microweber | Microweber is a new generation CMS with drag and drop. Prior to version 1.3, Microweber is vulnerable to static code injection. | [] | null | null | 7.7 | null |
RHSA-2024:4527 | Red Hat Security Advisory: ghostscript security update | ghostscript: OPVP device arbitrary code execution via custom Driver library | [
"cpe:/a:redhat:rhel_eus:8.8::appstream",
"cpe:/a:redhat:rhel_eus:8.8::crb"
] | null | 8.8 | null | null |
GHSA-wxjg-p59j-6c92 | Command injection in github.com/google/fscrypt | The bash_completion script for fscrypt allows injection of commands via crafted mountpoint paths, allowing privilege escalation under a specific set of circumstances. A local user who has control over mountpoint paths could potentially escalate their privileges if they create a malicious mountpoint path and if the system administrator happens to be using the fscrypt bash completion script to complete mountpoint paths. We recommend upgrading to version 0.3.3 or above | [] | null | 5 | null | null |
RHSA-2023:2653 | Red Hat Security Advisory: webkit2gtk3 security update | webkitgtk: Regression of CVE-2023-28205 fixes in the Red Hat Enterprise Linux | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 8.8 | null | null |
CVE-2020-8105 | Command Execution due to unsanitized input | OS Command Injection vulnerability in the wirelessConnect handler of Abode iota All-In-One Security Kit allows an attacker to inject commands and gain root access. This issue affects: Abode iota All-In-One Security Kit versions prior to 1.0.2.23_6.9V_dev_t2_homekit_RF_2.0.19_s2_kvsABODE oz. | [
"cpe:2.3:o:goabode:iota_all-in-one_security_kit_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:goabode:iota_all-in-one_security_kit:-:*:*:*:*:*:*:*"
] | null | 9.6 | null | null |
RHSA-2017:3093 | Red Hat Security Advisory: python-django security update | python-django: Open redirect and possible XSS attack via user-supplied numeric redirect URLs | [
"cpe:/a:redhat:openstack:11::el7"
] | null | null | 6.1 | null |
GHSA-jqgm-p37c-mhv7 | In all Qualcomm products with Android releases from CAF using the Linux kernel, in some memory allocation and free functions, a race condition can potentially occur leading to a Use After Free condition. | [] | null | null | 7 | null |
|
CVE-2021-42969 | Certain Anaconda3 2021.05 are affected by OS command injection. When a user installs Anaconda, an attacker can create a new file and write something in usercustomize.py. When the user opens the terminal or activates Anaconda, the command will be executed. | [
"cpe:2.3:a:anaconda:anaconda3:2021.05:*:*:*:*:*:*:*"
] | null | 8.8 | null | 9.3 |
|
CVE-2024-28200 | N-central Authentication Bypass | The N-central server is vulnerable to an authentication bypass of the user interface. This vulnerability is present in all deployments of N-central prior to 2024.2.
This vulnerability was discovered through internal N-central source code review and N-able has not observed any exploitation in the wild. | [
"cpe:2.3:a:n-able:n-central:-:*:*:*:*:*:*:*",
"cpe:2.3:a:n-able:n-central:*:*:*:*:*:*:*:*"
] | null | 9.1 | null | null |
CVE-2013-4286 | Apache Tomcat before 6.0.39, 7.x before 7.0.47, and 8.x before 8.0.0-RC3, when an HTTP connector or AJP connector is used, does not properly handle certain inconsistent HTTP request headers, which allows remote attackers to trigger incorrect identification of a request's length and conduct request-smuggling attacks via (1) multiple Content-Length headers or (2) a Content-Length header and a "Transfer-Encoding: chunked" header. NOTE: this vulnerability exists because of an incomplete fix for CVE-2005-2090. | [
"cpe:2.3:a:apache:tomcat:7.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.2:beta:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.4:beta:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.21:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.22:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.23:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.24:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.25:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.26:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.27:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.28:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.29:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.30:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.31:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.32:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.33:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.34:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.35:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.36:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.37:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.38:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.39:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.40:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.41:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.42:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.43:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.44:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.45:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.46:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.0.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.0.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:3.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:3.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:3.2.2:beta2:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:3.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:3.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:3.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:3.3.1a:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:3.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:4:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:4.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:4.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:4.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:4.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:4.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:4.1.3:beta:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:4.1.9:beta:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:4.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:4.1.12:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:4.1.15:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:4.1.24:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:4.1.28:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:4.1.29:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:4.1.31:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:4.1.36:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.0.21:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.0.22:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.0.23:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.0.24:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.0.25:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.0.26:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.0.27:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.0.28:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.0.29:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.0.30:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.5.8:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.5.9:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.5.10:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.5.11:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.5.12:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.5.13:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.5.14:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.5.15:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.5.16:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.5.17:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.5.18:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.5.19:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.5.20:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.5.21:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.5.22:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.5.23:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.5.24:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.5.25:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.5.26:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.5.27:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.5.28:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.5.29:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.5.30:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.5.31:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.5.32:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.5.33:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.5.34:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.5.35:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.0:alpha:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.1:alpha:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.2:alpha:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.2:beta:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.24:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.26:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.27:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.28:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.29:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.30:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.31:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.32:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.33:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.35:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.36:*:*:*:*:*:*:*"
] | null | null | null | 5.8 |
|
CVE-2021-31590 | PwnDoc all versions until 0.4.0 (2021-08-23) has incorrect JSON Webtoken handling, leading to incorrect access control. With a valid JSON Webtoken that is used for authentication and authorization, a user can keep his admin privileges even if he is downgraded to the "user" privilege. Even after a user's account is deleted, the user can still access the administration panel (and add or delete users) and has complete access to the system. | [
"cpe:2.3:a:pwndoc_project:pwndoc:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | 9 |
|
CVE-2022-32173 | OrchardCore - HTML Injection | In OrchardCore rc1-11259 to v1.2.2 vulnerable to HTML injection, allow an authenticated user with an editor security role to inject a persistent HTML modal dialog component into the dashboard that will affect admin users. | [
"cpe:2.3:a:orchardcore:orchardcore:*:*:*:*:*:*:*:*"
] | null | 5.4 | null | null |
GHSA-576c-3j53-r9jj | Gradio vulnerable to SSRF in the path parameter of /queue/join | Impact**What kind of vulnerability is it? Who is impacted?**This vulnerability relates to **Server-Side Request Forgery (SSRF)** in the `/queue/join` endpoint. Gradio’s `async_save_url_to_cache` function allows attackers to force the Gradio server to send HTTP requests to user-controlled URLs. This could enable attackers to target internal servers or services within a local network and possibly exfiltrate data or cause unwanted internal requests. Additionally, the content from these URLs is stored locally, making it easier for attackers to upload potentially malicious files to the server. This impacts users deploying Gradio servers that use components like the Video component which involve URL fetching.PatchesYes, please upgrade to `gradio>=5` to address this issue.Workarounds**Is there a way for users to fix or remediate the vulnerability without upgrading?**As a workaround, users can disable or heavily restrict URL-based inputs in their Gradio applications to trusted domains only. Additionally, implementing stricter URL validation (such as allowinglist-based validation) and ensuring that local or internal network addresses cannot be requested via the `/queue/join` endpoint can help mitigate the risk of SSRF attacks. | [] | 6.9 | 7.2 | null | null |
GHSA-q8v9-gg98-chwq | The Cisco Linksys WVC54GCA wireless video camera with firmware 1.00R22 and 1.00R24 stores passwords and wireless-network keys in cleartext in (1) pass_wd.htm and (2) Wsecurity.htm, which allows remote attackers to obtain sensitive information by reading the HTML source code. | [] | null | null | null | null |
|
CVE-2024-50945 | An improper access control vulnerability exists in SimplCommerce at commit 230310c8d7a0408569b292c5a805c459d47a1d8f, allowing users to submit reviews without verifying if they have purchased the product. | [] | null | 7.5 | null | null |
|
GHSA-hv7g-wx35-xj49 | Directory traversal vulnerability in the cgit_parse_readme function in ui-summary.c in cgit before 0.9.2, when a readme file is set to a filesystem path, allows remote attackers to read arbitrary files via a .. (dot dot) in the url parameter. | [] | null | null | null | null |
|
GHSA-w8vc-2hqr-p73g | A specially-crafted HTTP request can lead to SQL injection. An attacker can make authenticated HTTP requests to trigger this vulnerability at ‘company_filter’ parameter with the administrative account or through cross-site request forgery. | [] | null | 8.8 | null | null |
|
GHSA-5f79-7fff-m8qc | This vulnerability allows local attackers to escalate privileges on vulnerable installations of Samsung Notes Fixed in version 2.0.02.31. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the handling of ZIP files. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to escalate privileges to resources normally protected from the application. Was ZDI-CAN-5358. | [] | null | null | 7 | null |
|
GHSA-m4f9-32gh-9xh6 | ASUS Download Master has a buffer overflow vulnerability. An unauthenticated remote attacker with administrative privileges can exploit this vulnerability to execute arbitrary system commands on the device. | [] | null | 7.2 | null | null |
|
CVE-2019-2734 | Vulnerability in the Core RDBMS component of Oracle Database Server. Supported versions that are affected are 12.2.0.1, 18c and 19c. Easily exploitable vulnerability allows low privileged attacker having Create Session, Execute on DBMS_ADVISOR privilege with network access via OracleNet to compromise Core RDBMS. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Core RDBMS accessible data. CVSS 3.0 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N). | [
"cpe:2.3:a:oracle:database_server:12.2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_server:18c:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_server:19c:*:*:*:*:*:*:*"
] | null | 4.3 | null | 4 |
|
RHSA-2024:1250 | Red Hat Security Advisory: kernel security and bug fix update | kernel: memcg does not limit the number of POSIX file locks allowing memory exhaustion kernel: nfp: use-after-free in area_cache_get() kernel: vmwgfx: NULL pointer dereference in vmw_cmd_dx_define_query hw: Intel: Gather Data Sampling (GDS) side channel vulnerability kernel: use-after-free in smb2_is_status_io_timeout() kernel: bpf: Incorrect verifier pruning leads to unsafe code paths being incorrectly marked as safe kernel: NULL pointer dereference in can_rcv_filter kernel: Slab-out-of-bound read in compare_netdev_and_ip kernel: out-of-bounds access in relay_file_read kernel: UAF in nftables when nft_set_lookup_global triggered after handling named and anonymous sets in batch requests kernel: net/sched: cls_u32 component reference counter leak if tcf_change_indev() fails kernel: vmxnet3: NULL pointer dereference in vmxnet3_rq_cleanup() kernel: use after free in unix_stream_sendpage kernel: A heap out-of-bounds write when function perf_read_group is called and sibling_list is smaller than its child's sibling_list kernel: GSM multiplexing race condition leads to privilege escalation kernel: use-after-free in IPv4 IGMP kernel: refcount leak in ctnetlink_create_conntrack() kernel: fbcon: out-of-sync arrays in fbcon_mode_deleted due to wrong con2fb_map assignment kernel: use-after-free in l2cap_sock_release in net/bluetooth/l2cap_sock.c kernel: ktls overwrites readonly memory pages when using function splice with a ktls socket as destination kernel: sched/membarrier: reduce the ability to hammer on sys_membarrier | [
"cpe:/a:redhat:rhel_eus:9.0::appstream",
"cpe:/a:redhat:rhel_eus:9.0::crb",
"cpe:/o:redhat:rhel_eus:9.0::baseos"
] | null | 4.7 | null | null |
CVE-2010-4382 | Multiple heap-based buffer overflows in RealNetworks RealPlayer 11.0 through 11.1, RealPlayer SP 1.0 through 1.1.4, RealPlayer Enterprise 2.1.2, Linux RealPlayer 11.0.2.1744, and possibly HelixPlayer 1.0.6 and other versions, allow remote attackers to have an unspecified impact via a crafted RealMedia file. | [
"cpe:2.3:a:realnetworks:realplayer:11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:11.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:11.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:11.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:11.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:11.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:11.1:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer_sp:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer_sp:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer_sp:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer_sp:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer_sp:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer_sp:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer_sp:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer_sp:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer_sp:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:11.0.2.1744:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:2.1.2:*:enterprise:*:*:*:*:*"
] | null | null | null | 9.3 |
|
GHSA-h5xg-99x8-q54p | Stack-based buffer overflow in tftpserver.exe in HP Intelligent Management Center (IMC) 5.0 before E0101L02 allows remote attackers to execute arbitrary code via a long mode field. | [] | null | null | null | null |
|
CVE-2024-21318 | Microsoft SharePoint Server Remote Code Execution Vulnerability | Microsoft SharePoint Server Remote Code Execution Vulnerability | [
"cpe:2.3:a:microsoft:sharepoint_server:-:*:*:*:subscription:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_server:2016:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_server:2019:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
GHSA-h327-5h5x-675h | Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Wikimedia Foundation Mediawiki - SocialProfile Extension allows Functionality Misuse.This issue affects Mediawiki - SocialProfile Extension: from 1.39.X before 1.39.11, from 1.41.X before 1.41.3, from 1.42.X before 1.42.2. | [] | null | 2.4 | null | null |
|
CVE-2023-43877 | Rite CMS 3.0 has Multiple Cross-Site scripting (XSS) vulnerabilities that allow attackers to execute arbitrary code via a payload crafted in the Home Page fields in the Administration menu. | [
"cpe:2.3:a:ritecms:ritecms:3.0:*:*:*:*:*:*:*"
] | null | 4.8 | null | null |
|
GHSA-3fh5-q6fg-w28q | Prototype pollution in Snowboard framework | ImpactThe Snowboard framework in affected versions is vulnerable to prototype pollution in the main Snowboard class as well as its plugin loader.PatchesThis issue has been patched in https://github.com/wintercms/winter/commit/2a13faf99972e84c9661258f16c4750fa99d29a1 (for 1.2) and https://github.com/wintercms/winter/commit/bce4b59584abf961e9400af3d7a4fd7638e26c7f (for 1.1) and is available with Winter v1.1.10 and v1.2.1.WorkaroundsIf you have not yet upgraded, or are using the 1.1 branch of Winter (1.1.8 or above), you can avoid this issue by following some common security practices for JavaScript, including implementing a [content security policy](https://developer.mozilla.org/en-US/docs/Web/HTTP/CSP) and auditing your scripts.The 1.0 branch of Winter is not affected, as it does not contain the Snowboard framework.For more informationIf you have any questions or comments about this advisory:Email us at [[email protected]](mailto:[email protected]) | [] | null | 8.1 | null | null |
GHSA-h4ch-2gpx-6992 | In Veritas NetBackup Appliance before 4.1.0.1 MR3, insecure permissions may allow an authenticated Admin to bypass shell restrictions and execute arbitrary operating system commands via SSH. | [] | null | 6.5 | null | null |
|
CVE-2002-1592 | The ap_log_rerror function in Apache 2.0 through 2.035, when a CGI application encounters an error, sends error messages to the client that include the full path for the server, which allows remote attackers to obtain sensitive information. | [
"cpe:2.3:a:apache:http_server:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:2.0.28:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:2.0.32:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:2.0.35:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2025-48012 | One Time Password - Moderately critical - Access bypass - SA-CONTRIB-2025-063 | Authentication Bypass by Capture-replay vulnerability in Drupal One Time Password allows Remote Services with Stolen Credentials.This issue affects One Time Password: from 0.0.0 before 1.3.0. | [] | null | 4.8 | null | null |
GHSA-gc9p-mgj9-4r5j | The Log WP_Mail WordPress plugin through 0.1 saves sent email in a publicly accessible directory using predictable filenames, allowing any unauthenticated visitor to obtain potentially sensitive information like generated passwords. | [] | null | 7.5 | null | null |
|
CVE-2013-6373 | The Exclusion plugin before 0.9 for Jenkins does not properly prevent access to resource locks, which allows remote authenticated users to list and release resources via unspecified vectors. | [
"cpe:2.3:a:jenkins-ci:exclusion:*:-:*:*:*:cloudbees_jenkins:*:*",
"cpe:2.3:a:jenkins-ci:exclusion:0.6:-:*:*:*:cloudbees_jenkins:*:*",
"cpe:2.3:a:jenkins-ci:exclusion:0.7:-:*:*:*:cloudbees_jenkins:*:*"
] | null | null | null | 5.5 |
|
CVE-2021-46542 | Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via mjs_print at src/mjs_builtin.c. This vulnerability can lead to a Denial of Service (DoS). | [
"cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*"
] | null | 5.5 | null | 4.3 |
|
GHSA-9jpv-w64v-mgr2 | Net-NTLM leak in Fireflow A32.20 and A32.50 allows an attacker to obtain victim’s domain credentials and Net-NTLM hash which can lead to relay domain attacks. | [] | null | 5.9 | null | null |
|
GHSA-c5w2-4jcq-rvf5 | Node.js 8.5.0 before 8.6.0 allows remote attackers to access unintended files, because a change to ".." handling was incompatible with the pathname validation used by unspecified community modules. | [] | null | null | 7.5 | null |
|
CVE-2023-3349 | Information exposure on IBERMATICA RPS | Information exposure vulnerability in IBERMATICA RPS 2019, which exploitation could allow an unauthenticated user to retrieve sensitive information, such as usernames, IP addresses or SQL queries sent to the application. By accessing the URL /RPS2019Service/status.html, the application enables the logging mechanism by generating the log file, which can be downloaded. | [
"cpe:2.3:a:ayesa:ibermatica_rps:2019:*:*:*:*:*:*:*"
] | null | 8.2 | null | null |
GHSA-w6gv-mqj3-wg3v | IBM DB2 for Linux, UNIX and Windows (includes DB2 Connect Server) 9.7, 10.1, 10.5, and 11.1 could allow a local unprivileged user to overwrite files on the system which could cause damage to the database. IBM X-Force ID: 149429. | [] | null | null | 5.5 | null |
|
GHSA-9vvm-hf5j-x32h | A stack-based buffer overflow exists in Juplink RX4-1500, a WiFi router, in versions 1.0.2 through 1.0.5. An authenticated attacker can exploit this vulnerability to achieve code execution as root. | [] | null | 9 | null | null |
|
GHSA-r2vj-r3m8-pv2g | Multiple integer overflows in the PDF functionality in Google Chrome before 20.0.1132.43 allow remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted document. | [] | null | null | null | null |
|
CVE-2018-10229 | A hardware vulnerability in GPU memory modules allows attackers to accelerate micro-architectural attacks through the use of the JavaScript WebGL API. | [
"cpe:2.3:a:google:chrome:-:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lg:nexus_5:-:*:*:*:*:*:*:*"
] | null | null | 4.8 | 5.8 |
|
GHSA-cfj9-6cq4-25vj | There's a flaw in libxml2's xmllint in versions before 2.9.11. An attacker who is able to submit a crafted file to be processed by xmllint could trigger a use-after-free. The greatest impact of this flaw is to confidentiality, integrity, and availability. | [] | null | null | null | null |
|
CVE-2008-3928 | test.sh in Honeyd 1.5c might allow local users to overwrite arbitrary files via a symlink attack on a temporary file. | [
"cpe:2.3:a:debian:honeyd_common:1.5:c_5:*:*:*:*:*:*"
] | null | null | null | 6.9 |
|
GHSA-f93c-x9q3-9rh9 | Cross-site scripting (XSS) vulnerability in the TV21 Talkshow (tv21_talkshow) extension 1.0.1 and earlier for TYPO3 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | [] | null | null | null | null |
|
CVE-2024-7808 | code-projects Job Portal logindbc.php sql injection | A vulnerability was found in code-projects Job Portal 1.0. It has been classified as critical. Affected is an unknown function of the file logindbc.php. The manipulation of the argument email leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. | [
"cpe:2.3:a:code-projects:job_portal:*:*:*:*:*:*:*:*",
"cpe:2.3:a:fabianros:job_portal:1.0:*:*:*:*:*:*:*"
] | 6.9 | 7.3 | 7.3 | 7.5 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.