id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2019-19849 | An issue was discovered in TYPO3 before 8.7.30, 9.x before 9.5.12, and 10.x before 10.2.2. It has been discovered that the classes QueryGenerator and QueryView are vulnerable to insecure deserialization. One exploitable scenario requires having the system extension ext:lowlevel (Backend Module: DB Check) installed, with a valid backend user who has administrator privileges. The other exploitable scenario requires having the system extension ext:sys_action installed, with a valid backend user who has limited privileges. | [
"cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*"
] | null | null | 8.8 | null |
|
CVE-2024-27684 | A Cross-site scripting (XSS) vulnerability in dlapn.cgi, dldongle.cgi, dlcfg.cgi, fwup.cgi and seama.cgi in D-Link GORTAC750_A1_FW_v101b03 allows remote attackers to inject arbitrary web script or HTML via the url parameter. | [
"cpe:2.3:o:dlink:gortac750_a1_firmware:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | null |
|
CVE-2019-11845 | An HTML Injection vulnerability has been discovered on the RICOH SP 4510DN via the /web/entry/en/address/adrsSetUserWizard.cgi entryNameIn parameter. | [
"cpe:2.3:o:ricoh:sp_4510dn_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:sp_4510dn:-:*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 |
|
CVE-2016-0296 | IBM Tivoli Endpoint Manager - Mobile Device Management (MDM) stores potentially sensitive information in log files that could be available to a local user. | [
"cpe:2.3:a:ibm:bigfix_platform:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:bigfix_platform:9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:bigfix_platform:9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:bigfix_platform:9.5:*:*:*:*:*:*:*"
] | null | null | 3.3 | 2.1 |
|
CVE-2023-50205 | D-Link G416 awsfile chmod Command Injection Remote Code Execution Vulnerability | D-Link G416 awsfile chmod Command Injection Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link G416 routers. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the HTTP service listening on TCP port 80. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-21298. | [
"cpe:2.3:a:dlink:g416_firmware:1.08b02:*:*:*:*:*:*:*"
] | null | null | 8.8 | null |
GHSA-xr3p-gm2p-7rx5 | The Support Board WordPress plugin before 3.3.4 does not escape multiple POST parameters (such as status_code, department, user_id, conversation_id, conversation_status_code, and recipient_id) before using them in SQL statements, leading to SQL injections which are exploitable by unauthenticated users. | [] | null | null | null | null |
|
CVE-2014-0203 | The __do_follow_link function in fs/namei.c in the Linux kernel before 2.6.33 does not properly handle the last pathname component during use of certain filesystems, which allows local users to cause a denial of service (incorrect free operations and system crash) via an open system call. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:linux:5:-:*:*:*:*:*:*",
"cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*"
] | null | 5.5 | null | 4.9 |
|
CVE-2022-1326 | Form - Contact Form <= 1.2.0 - Admin+ Stored Cross-Site Scripting | The Form - Contact Form WordPress plugin through 1.2.0 does not sanitize and escape Custom text fields, which could allow high-privileged users such as admin to perform Cross-Site Scripting attacks even when unfiltered_html is disallowed | [
"cpe:2.3:a:form_-_contact_form_project:form_-_contact_form:*:*:*:*:*:wordpress:*:*"
] | null | 4.8 | null | 3.5 |
CVE-2023-20784 | In keyinstall, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07826989; Issue ID: ALPS07826989. | [
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*"
] | null | 6.7 | null | null |
|
CVE-2014-9942 | In Boot in all Android releases from CAF using the Linux kernel, a Use of Uninitialized Variable vulnerability could potentially exist. | [
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] | null | null | 7.8 | 9.3 |
|
CVE-2024-48918 | Lack of Input Validation in RDS Light - Potential for Injection Attacks and Memory Tampering | RDS Light is a simplified version of the Reflective Dialogue System (RDS), a self-reflecting AI framework. Versions prior to 1.1.0 contain a vulnerability that involves a lack of input validation within the RDS AI framework, specifically within the user input handling code in the main module (`main.py`). This leaves the framework open to injection attacks and potential memory tampering. Any user or external actor providing input to the system could exploit this vulnerability to inject malicious commands, corrupt stored data, or affect API calls. This is particularly critical for users employing RDS AI in production environments where it interacts with sensitive systems, performs dynamic memory caching, or retrieves user-specific data for analysis. Impacted areas include developers using the RDS AI system as a backend for AI-driven applications and systems running RDS AI that may be exposed to untrusted environments or receive unverified user inputs. The vulnerability has been patched in version 1.1.0 of the RDS AI framework. All user inputs are now sanitized and validated against a set of rules designed to mitigate malicious content. Users should upgrade to version 1.1.0 or higher and ensure all dependencies are updated to their latest versions. For users unable to upgrade to the patched version, a workaround can be implemented. The user implementing the workaround should implement custom validation checks for user inputs to filter out unsafe characters and patterns (e.g., SQL injection attempts, script injections) and limit or remove features that allow user input until the system can be patched. | [
"cpe:2.3:a:rdsai:rdslight:*:*:*:*:*:*:*:*"
] | 8.1 | null | null | null |
CVE-2020-22885 | Buffer overflow vulnerability in mujs before 1.0.8 due to recursion in the GC scanning phase, allows remote attackers to cause a denial of service. | [
"cpe:2.3:a:artifex:mujs:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
GHSA-g66m-2gg5-929w | Authorization Bypass Through User-Controlled Key vulnerability in NetIQ (OpenText) Client Login Extension on Windows allows Privilege Escalation, Code Injection.This issueonlyaffects NetIQ Client Login Extension: 4.6. | [] | null | 7.1 | null | null |
|
GHSA-957p-6rqp-3h96 | The PayGreen Payment Gateway plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'message_id' parameter in all versions up to, and including, 1.0.26 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. | [] | null | 6.1 | null | null |
|
GHSA-jj42-mvx7-fq6m | SQL injection vulnerability in the JReservation (com_jreservation) component 1.0 and 1.5 for Joomla! allows remote attackers to execute arbitrary SQL commands via the pid parameter in a propertycpanel action to index.php. | [] | null | null | null | null |
|
GHSA-52xq-v6m6-c8pw | PHP remote file inclusion vulnerability in portfolio/commentaires/derniers_commentaires.php in Cyberfolio 7.12, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the rep parameter. | [] | null | null | null | null |
|
CVE-2018-0564 | Session fixation vulnerability in EC-CUBE (EC-CUBE 3.0.0, EC-CUBE 3.0.1, EC-CUBE 3.0.2, EC-CUBE 3.0.3, EC-CUBE 3..4, EC-CUBE 3.0.5, EC-CUBE 3.0.6, EC-CUBE 3.0.7, EC-CUBE 3.0.8, EC-CUBE 3.0.9, EC-CUBE 3.0.10, EC-CUBE 3.0.11, EC-CUBE 3.0.12, EC-CUBE 3.0.12-p1, EC-CUBE 3.0.13, EC-CUBE 3.0.14, EC-CUBE 3.0.15) allows remote attackers to perform arbitrary operations via unspecified vectors. | [
"cpe:2.3:a:lockon:ec-cube:*:*:*:*:*:*:*:*"
] | null | null | 8.1 | 5.8 |
|
CVE-2024-43765 | In multiple locations, there is a possible way to obtain access to a folder due to a tapjacking/overlay attack. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation. | [] | null | 7.8 | null | null |
|
GHSA-phpg-fwqq-j32w | Out-of-bounds Write in IpcTxPcscTransmitApdu of libsec-ril prior to SMR Aug-2023 Release 1 allows local attacker to execute arbitrary code. | [] | null | 6.7 | null | null |
|
CVE-2020-15613 | This vulnerability allows remote attackers to execute arbitrary code on affected installations of CentOS Web Panel cwp-e17.0.9.8.923. Authentication is not required to exploit this vulnerability. The specific flaw exists within ajax_admin_apis.php. When parsing the line parameter, the process does not properly validate a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-9739. | [
"cpe:2.3:a:control-webpanel:webpanel:0.9.8.923:*:*:*:*:*:*:*"
] | null | null | 9.8 | null |
|
RHSA-2008:0263 | Red Hat Security Advisory: Red Hat Network Proxy Server security update | jabberd SASL DoS httpd mod_status XSS mod_perl PerlRun denial of service httpd scoreboard lack of PID protection httpd: mod_imagemap XSS apache mod_status cross-site scripting | [
"cpe:/a:redhat:network_proxy:5.0::el4"
] | null | null | null | null |
CVE-2017-18350 | bitcoind and Bitcoin-Qt prior to 0.15.1 have a stack-based buffer overflow if an attacker-controlled SOCKS proxy server is used. This results from an integer signedness error when the proxy server responds with an acknowledgement of an unexpected target domain name. | [
"cpe:2.3:a:bitcoin:bitcoin_core:*:*:*:*:*:*:*:*"
] | null | 5.9 | null | 4.3 |
|
GHSA-j4rg-vr7v-m3m8 | Adobe InDesign versions 16.4.2 (and earlier) and 17.3 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [] | null | 5.5 | null | null |
|
RHSA-2015:2665 | Red Hat Security Advisory: chromium-browser security update | chromium-browser: Fixes from internal audits and fuzzing chromium-browser: Use-After-free in MidiHost | [
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
CVE-2021-33570 | Postbird 0.8.4 allows stored XSS via the onerror attribute of an IMG element in any PostgreSQL database table. This can result in reading local files via vectors involving XMLHttpRequest and open of a file:/// URL, or discovering PostgreSQL passwords via vectors involving Window.localStorage and savedConnections. | [
"cpe:2.3:a:postbird_project:postbird:0.8.4:*:*:*:*:*:*:*"
] | null | 5.4 | null | 3.5 |
|
GHSA-jgxc-8mwq-9xqw | Clojure classes can be used to craft a serialized object that runs arbitrary code on deserialization | In Clojure before 1.9.0, classes can be used to construct a serialized object that executes arbitrary code upon deserialization. This is relevant if a server deserializes untrusted objects. | [] | null | 9.8 | null | null |
CVE-2022-37028 | ISAMS 22.2.3.2 is prone to stored Cross-site Scripting (XSS) attack on the title field for groups, allowing an attacker to store a JavaScript payload that will be executed when another user uses the application. | [
"cpe:2.3:a:iris:isams:22.2.3.2:*:*:*:*:*:*:*"
] | null | 5.4 | null | null |
|
CVE-2020-13427 | Victor CMS 1.0 has Persistent XSS in admin/users.php?source=add_user via the user_name, user_firstname, or user_lastname parameter. | [
"cpe:2.3:a:victorcms_project:victorcms:1.0:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 |
|
CVE-2018-2982 | Vulnerability in the Oracle FLEXCUBE Universal Banking component of Oracle Financial Services Applications (subcomponent: Infrastructure). Supported versions that are affected are 11.3.0, 11.4.0, 12.0.1, 12.0.2, 12.0.3, 12.1.0, 12.2.0, 12.3.0, 12.4.0, 14.0.0 and 14.1.0. Difficult to exploit vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle FLEXCUBE Universal Banking. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle FLEXCUBE Universal Banking accessible data. CVSS 3.0 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N). | [
"cpe:2.3:a:oracle:flexcube_universal_banking:11.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:flexcube_universal_banking:11.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:flexcube_universal_banking:12.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:flexcube_universal_banking:12.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:flexcube_universal_banking:12.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:flexcube_universal_banking:12.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:flexcube_universal_banking:12.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:flexcube_universal_banking:12.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:flexcube_universal_banking:12.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:flexcube_universal_banking:14.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:flexcube_universal_banking:14.1.0:*:*:*:*:*:*:*"
] | null | null | 5.3 | 3.5 |
|
CVE-2023-0789 | Command Injection in thorsten/phpmyfaq | Command Injection in GitHub repository thorsten/phpmyfaq prior to 3.1.11.
| [
"cpe:2.3:a:phpmyfaq:phpmyfaq:*:*:*:*:*:*:*:*"
] | null | 8.1 | null | null |
CVE-2025-3591 | ZHENFENG13/code-projects My-Blog-layui edit cross site scripting | A vulnerability was found in ZHENFENG13/code-projects My-Blog-layui 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file /admin/v1/blog/edit. The manipulation leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Multiple parameters might be affected. The vendor was contacted early about this disclosure but did not respond in any way. | [] | 5.1 | 3.5 | 3.5 | 4 |
CVE-2014-1573 | Bugzilla 2.x through 4.0.x before 4.0.15, 4.1.x and 4.2.x before 4.2.11, 4.3.x and 4.4.x before 4.4.6, and 4.5.x before 4.5.6 does not ensure that a scalar context is used for certain CGI parameters, which allows remote attackers to conduct cross-site scripting (XSS) attacks by sending three values for a single parameter name. | [
"cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.14.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.14.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.14.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.14.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.14.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.16:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.16:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.16.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.16.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.16.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.16.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.16.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.16.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.16.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.16.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.16.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.16.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.16.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.16_rc2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.17.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.17.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.17.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.17.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.17.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.17.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.17.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.18:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.18:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.18:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.18:rc3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.18.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.18.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.18.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.18.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.18.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.18.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.18.6\\+:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.18.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.18.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.18.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.19:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.19.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.19.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.19.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.20:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.20:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.20:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.20.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.20.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.20.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.20.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.20.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.20.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.20.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.21:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.21.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.21.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.21.2:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.22:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.22:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.22.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.22.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.22.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.22.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.22.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.22.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.22.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.23:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.23.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.23.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.23.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.23.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.0_rc1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.2:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.2:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.4:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.4.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.4.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.4.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.4.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.4.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.6:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.6.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.6.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.6.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.6.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.6.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.6.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.6.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.2:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.2:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.4:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.4:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.5.5:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2021-27491 | Ypsomed mylife Cloud, mylife Mobile Application:Ypsomed mylife Cloud,All versions prior to 1.7.2,Ypsomed mylife App,All versions prior to 1.7.5,The Ypsomed mylife Cloud discloses password hashes during the registration process. | [
"cpe:2.3:a:ypsomed:mylife:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ypsomed:mylife_cloud:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
CVE-2025-21581 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.0-8.0.41, 8.4.0-8.4.4 and 9.0.0-9.2.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | [] | null | 4.9 | null | null |
|
CVE-2014-4998 | test/tc_database.rb in the lean-ruport gem 0.3.8 for Ruby places the mysql user password on the mysqldump command line, which allows local users to obtain sensitive information by listing the process. | [
"cpe:2.3:a:lean-ruport_project:lean-ruport:0.3.8:*:*:*:*:ruby:*:*"
] | null | null | 7.8 | 2.1 |
|
RHSA-2020:4401 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3 security update | jackson-databind: FasterXML DOMDeserializer insecure entity expansion is vulnerable to XML external entity (XXE) | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el6",
"cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el7",
"cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el8"
] | null | 7.5 | null | null |
CVE-2019-7287 | A memory corruption issue was addressed with improved input validation. This issue is fixed in iOS 12.1.4. An application may be able to execute arbitrary code with kernel privileges. | [
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | 9.3 |
|
GHSA-4qf6-pw5g-fjgf | A vulnerability, which was classified as critical, has been found in Tenda i21 1.0.0.14(4656). Affected by this issue is the function formQosManageDouble_user. The manipulation of the argument ssidIndex leads to stack-based buffer overflow. The attack may be launched remotely. The identifier of this vulnerability is VDB-262136. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | [] | null | 8.8 | null | null |
|
GHSA-65w6-c8qp-c68q | Multiple buffer overflows in the client in Toribash 2.71 and earlier allow remote attackers to (1) execute arbitrary code via a long game command in a replay (.rpl) file and (2) cause a denial of service (application crash) via a long SAY command that omits a required LF character; and allow remote Toribash servers to execute arbitrary code via (3) a long game command and (4) a long SAY command that omits a required LF character. | [] | null | null | null | null |
|
CVE-2019-6178 | An information leakage vulnerability in Iomega and LenovoEMC NAS products could allow disclosure of some device details such as Share names through the device API when Personal Cloud is enabled. This does not allow read, write, delete, or any other access to the underlying file systems and their contents. | [
"cpe:2.3:o:lenovo:px12-350r_firmware:4.0.24.34808:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:px12-350r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ix12-300r_firmware:4.0.24.34808:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ix12-300r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:home_media_network_hard_drive_firmware:3.2.16.30221:*:*:*:cloud:*:*:*",
"cpe:2.3:h:lenovo:home_media_network_hard_drive:-:*:*:*:cloud:*:*:*",
"cpe:2.3:o:lenovo:storecenter_ix2-200_firmware:3.2.16.30221:*:*:*:cloud:*:*:*",
"cpe:2.3:h:lenovo:storecenter_ix2-200:-:*:*:*:cloud:*:*:*",
"cpe:2.3:o:lenovo:storecenter_ix4-200d_firmware:3.2.16.30221:*:*:*:cloud:*:*:*",
"cpe:2.3:h:lenovo:storecenter_ix4-200d:-:*:*:*:cloud:*:*:*",
"cpe:2.3:o:lenovo:storecenter_ix2-200_firmware:2.1.50.30227:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:storecenter_ix2-200:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:storecenter_ix4-200d_firmware:2.1.50.30227:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:storecenter_ix4-200d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:storecenter_ix4-200rl_firmware:2.1.50.30227:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:storecenter_ix4-200rl:-:*:*:*:*:*:*:*"
] | null | null | 5.3 | null |
|
GHSA-26m7-x2xv-cj76 | Possible denial of service scenario due to improper input validation of received NAS OTA message in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile | [] | null | null | null | null |
|
GHSA-hx78-272p-mqqh | Authorization Bypass in graphql-shield | Versions of `graphql-shield` prior to 6.0.6 are vulnerable to an Authorization Bypass. The rule caching option `no_cache` relies on keys generated by cryptographically insecure functions, which may cause rules to be incorrectly cached. This allows attackers to access information they should not have access to in case of a key collision.RecommendationUpgrade to version 6.0.6 or later. | [] | null | null | null | null |
GHSA-hgfv-gvcw-686v | A content security policy (CSP) "frame-ancestors" directive containing origins with paths allows for comparisons against those paths instead of the origin. This results in a cross-origin information leak of this path information. This vulnerability affects Firefox < 55. | [] | null | null | 5.3 | null |
|
GHSA-9wpc-chhp-343g | Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Console). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). | [] | null | 9.8 | null | null |
|
GHSA-wp7x-2348-v58r | A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Sonoma 14.1, macOS Monterey 12.7.1, macOS Ventura 13.6.1. An app may be able to access sensitive user data. | [] | null | 5.5 | null | null |
|
GHSA-r29c-p472-3p96 | The Simple Link Directory WordPress plugin before 7.7.2 does not validate and escape the post_id parameter before using it in a SQL statement via the qcopd_upvote_action AJAX action (available to unauthenticated and authenticated users), leading to an unauthenticated SQL Injection | [] | null | 9.8 | null | null |
|
CVE-2007-4145 | Heap-based buffer overflow in the BlueSkychat (BlueSkyCat) ActiveX control (V2.V2Ctrl.1) in v2.ocx 8.1.2.0 and earlier allows remote attackers to execute arbitrary code via a long string in the second argument to the ConnecttoServer method. | [
"cpe:2.3:a:bluesky:blueskychat:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
ICSA-23-103-12 | Siemens Polarion ALM | The application contains a XML External Entity Injection (XXE) vulnerability. This could allow an attacker to view files on the application server filesystem. | [] | null | 5.9 | null | null |
GHSA-7gf3-pjh4-q42g | Stored Cross Site Scripting (XSS) vulnerability in EGavilan Media CRUD Operation with PHP, MySQL, Bootstrap, and Dompdf via First Name or Last Name parameter in the 'Add New Record Feature'. | [] | null | null | null | null |
|
GHSA-9695-x59r-82q9 | Comtrend VR-3033 DE11-416SSG-C01_R02.A2pvI042j1.d26m devices have Multiple Authenticated Command Injection vulnerabilities via the ping and traceroute diagnostic pages, as demonstrated by shell metacharacters in the pingIpAddress parameter to ping.cgi. | [] | null | null | null | null |
|
GHSA-89v8-28p6-p87r | NETGEAR R7000 1.0.11.116 devices have a heap-based Buffer Overflow that is exploitable from the local network without authentication. The vulnerability exists within the handling of an HTTP request. An attacker can leverage this to execute code as root. The problem is that a user-provided length value is trusted during a backup.cgi file upload. The attacker must add a \n before the Content-Length header. | [] | null | null | null | null |
|
CVE-2025-33093 | IBM Sterling Partner Engagement Manager information disclosure | IBM Sterling Partner Engagement Manager 6.1.0, 6.2.0, 6.2.2 JWT secret is stored in public Helm Charts and is not stored as a Kubernetes secret. | [
"cpe:2.3:a:ibm:sterling_partner_engagement_manager:6.1.2:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:sterling_partner_engagement_manager:6.1.2:*:*:*:essentials:*:*:*",
"cpe:2.3:a:ibm:sterling_partner_engagement_manager:6.2.0:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:sterling_partner_engagement_manager:6.2.0:*:*:*:essentials:*:*:*",
"cpe:2.3:a:ibm:sterling_partner_engagement_manager:6.2.2:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:sterling_partner_engagement_manager:6.2.2:*:*:*:essentials:*:*:*"
] | null | 7.5 | null | null |
GHSA-v5rr-h4vj-55pr | Secure Boot Security Feature Bypass Vulnerability | [] | null | 8.4 | null | null |
|
CVE-2014-5183 | SQL injection vulnerability in includes/mode-edit.php in the Simple Retail Menus (simple-retail-menus) plugin before 4.1 for WordPress allows remote authenticated editors to execute arbitrary SQL commands via the targetmenu parameter in an edit action to wp-admin/admin.php. | [
"cpe:2.3:a:simple_retail_menus_plugin_project:simple-retail-menus:*:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:simple_retail_menus_plugin_project:simple-retail-menus:4.0:*:*:*:*:wordpress:*:*"
] | null | null | null | 6.5 |
|
GHSA-wcq2-3c5g-rrqx | Server hostname translation to IP address manipulation which could lead to an attacker performing remote code execution or causing a failure.See Honeywell Security Notification for recommendations on upgrading and versioning. | [] | null | 8.1 | null | null |
|
GHSA-xgfc-f3gp-3mp4 | SQL injection vulnerability in plugins/users/index.php in Galatolo WebManager 1.3a and earlier allows remote attackers to execute arbitrary SQL commands via the id parameter. | [] | null | null | null | null |
|
GHSA-5jq2-gw2c-fg5h | An issue was discovered in the CheckUser extension for MediaWiki through 1.39.x. Various components of this extension can expose information on the performer of edits and logged actions. This information should not allow public viewing: it is supposed to be viewable only by users with checkuser access. | [] | null | 5.3 | null | null |
|
GHSA-gc92-c7f7-rpp9 | Unclassified NewsBoard 1.6.3 stores sensitive information under the web root with insufficient access control, which allows remote attackers to obtain (1) the board log via a direct request for logs/board-YYYY-MM-DD.log, (2) the mail and private message (PM) log via a direct request for logs/email-YY-MM-DD-HH-MM-SS.log, (3) the SQL error message log via a direct request for logs/error-YY-MM.log, and (4) the IP log via a direct request for logs/ip.log. | [] | null | null | null | null |
|
GHSA-qpcr-mxc8-rjf5 | A vulnerability classified as problematic has been found in Linux Kernel. This affects the function rtl8188f_spur_calibration of the file drivers/net/wireless/realtek/rtl8xxxu/rtl8xxxu_8188f.c of the component Wireless. The manipulation of the argument hw_ctrl_s1/sw_ctrl_s1 leads to use of uninitialized variable. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211959. | [] | null | 5.5 | null | null |
|
CVE-2022-44429 | In wlan driver, there is a possible missing bounds check. This could lead to local denial of service in wlan services. | [
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc7731e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc9832e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t310:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
|
CVE-2025-33070 | Windows Netlogon Elevation of Privilege Vulnerability | Use of uninitialized resource in Windows Netlogon allows an unauthorized attacker to elevate privileges over a network. | [] | null | 8.1 | null | null |
RHSA-2015:0623 | Red Hat Security Advisory: docker security, bug fix, and enhancement update | docker: Path traversal during processing of absolute symlinks docker: Escalation of privileges during decompression of LZMA archives | [
"cpe:/a:redhat:rhel_extras_other:7"
] | null | null | null | null |
CVE-2024-13343 | WooCommerce Customers Manager <= 31.3 - Missing Authorization to Authenticated (Subscriber+) Privilege Escalation | The WooCommerce Customers Manager plugin for WordPress is vulnerable to Privilege Escalation due to a missing capability check on the ajax_assign_new_roles() function in all versions up to, and including, 31.3. This makes it possible for authenticated attackers, with Subscriber-level access and above, to elevate their privileges to that of an administrator. | [] | null | 8.8 | null | null |
CVE-2015-9412 | The Royal-Slider plugin before 3.2.7 for WordPress has XSS via the rstype parameter. | [
"cpe:2.3:a:royal-slider_project:royal-slider:*:*:*:*:*:wordpress:*:*"
] | null | 6.1 | null | 4.3 |
|
CVE-2011-3721 | concrete 5.4.0.5, 5.4.1, and 5.4.1.1 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by tools/spellchecker_service.php and certain other files. | [
"cpe:2.3:a:concrete5:concrete:5.4.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:concrete5:concrete:5.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:concrete5:concrete:5.4.1.1:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2025-45865 | TOTOLINK A3002R v4.0.0-B20230531.1404 was discovered to contain a buffer overflow via the dnsaddr parameter in the formDhcpv6s interface. | [] | null | 9.8 | null | null |
|
CVE-2019-5268 | Some Huawei home routers have an input validation vulnerability. Due to input parameter is not correctly verified, an attacker can exploit this vulnerability by sending special constructed packets to obtain files in the device and upload files to some directories. | [
"cpe:2.3:o:huawei:cd10-10_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:cd10-10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:cd16-10_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:cd16-10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:cd17-10_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:cd17-10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:cd18-10_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:cd18-10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:hirouter-cd15-10_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:hirouter-cd15-10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:hirouter-cd20-10_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:hirouter-cd20-10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:hirouter-cd21-16_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:hirouter-cd21-16:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:hirouter-cd30-10_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:hirouter-cd30-10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:hirouter-cd30-11_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:hirouter-cd30-11:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:hirouter-h1-10_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:hirouter-h1-10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:tc5200-10_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:tc5200-10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ws5100-10_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ws5100-10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ws5102-10_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ws5102-10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ws5106-10_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ws5106-10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ws5108-10_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ws5108-10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ws5200-10_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ws5200-10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ws5200-11_firmware:9.0.3.11:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ws5200-11_firmware:10.0.2.3:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ws5200-11:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ws5280-10_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ws5280-10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ws5280-11_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ws5280-11:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ws6500-10_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ws6500-10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ws6500-11_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ws6500-11:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ws826-10_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ws826-10:-:*:*:*:*:*:*:*"
] | null | 8.1 | null | 4.8 |
|
CVE-2011-3692 | NetSaro Enterprise Messenger Server 2.0 stores cleartext console credentials in configuration.xml, which allows local users to obtain sensitive information by reading this file and performing a base64 decoding step. | [
"cpe:2.3:a:netsaro:enterprise_messenger_server:2.0:*:*:*:*:*:*:*"
] | null | null | null | 1.9 |
|
GHSA-72h3-f956-8mcr | D-Link DIR-823G A1V1.0.2B05 was discovered to contain a buffer overflow via the AdminPassword parameter in the SetDeviceSettings function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input. | [] | null | 7.5 | null | null |
|
CVE-2007-5160 | Multiple PHP remote file inclusion vulnerabilities in Thierry Leriche Restaurant Management System (ReMaSys) 0.5 allow remote attackers to execute arbitrary PHP code via a URL in (1) the DIR_ROOT parameter to (a) global.php, or the (2) DIR_PAGE parameter to (b) template/fr/page.php or (c) page/fr/boxConnection.php. | [
"cpe:2.3:a:restaurant_management_system:restaurant_management_system:0.5:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
GHSA-q5vf-mfc5-jr8g | admin/administrator.php in Adult Script 1.6 and earlier sends a redirect to the web browser but does not exit, which allows remote attackers to bypass authentication and obtain administrative credentials via a direct request. NOTE: this can be leveraged for arbitrary code execution through a request to admin/videolinks_view.php. | [] | null | null | null | null |
|
GHSA-pr9q-v585-qv2w | Improper Privilege Management in Open Web Analytics | Open Web Analytics (OWA) before 1.7.4 allows an unauthenticated remote attacker to obtain sensitive user information, which can be used to gain admin privileges by leveraging cache hashes. This occurs because files generated with '<?php (instead of the intended "<?php sequence) aren't handled by the PHP interpreter. | [] | null | 9.8 | null | null |
GHSA-c3c7-9cj5-pr3c | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in CRM Perks CRM Perks Forms – WordPress Form Builder allows Stored XSS.This issue affects CRM Perks Forms – WordPress Form Builder: from n/a through 1.1.2. | [] | null | 5.9 | null | null |
|
CVE-2021-44415 | A denial of service vulnerability exists in the cgiserver.cgi JSON command parser functionality of reolink RLC-410W v3.0.0.136_20121102. A specially-crafted HTTP request can lead to a reboot. ModifyUser param is not object. An attacker can send an HTTP request to trigger this vulnerability. | [
"cpe:2.3:o:reolink:rlc-410w_firmware:3.0.0.136_20121102:*:*:*:*:*:*:*",
"cpe:2.3:h:reolink:rlc-410w:-:*:*:*:*:*:*:*"
] | null | null | 8.6 | null |
|
GHSA-x8fw-rvr9-2hx5 | In the Linux kernel, the following vulnerability has been resolved:ice: Don't process extts if PTP is disabledThe ice_ptp_extts_event() function can race with ice_ptp_release() and
result in a NULL pointer dereference which leads to a kernel panic.Panic occurs because the ice_ptp_extts_event() function calls
ptp_clock_event() with a NULL pointer. The ice driver has already
released the PTP clock by the time the interrupt for the next external
timestamp event occurs.To fix this, modify the ice_ptp_extts_event() function to check the
PTP state and bail early if PTP is not ready. | [] | null | 4.7 | null | null |
|
GHSA-r4pf-fm74-w9rw | Uniview NVR301-04S2-P4 is vulnerable to reflected cross-site scripting attack (XSS). An attacker could send a user a URL that if clicked on could execute malicious JavaScript in their browser. This vulnerability also requires authentication before it can be exploited, so the scope and severity is limited. Also, even if JavaScript is executed, no additional benefits are obtained. | [] | null | 5.4 | null | null |
|
CVE-2021-40998 | A remote arbitrary command execution vulnerability was discovered in Aruba ClearPass Policy Manager version(s): ClearPass Policy Manager 6.10.x prior to 6.10.2 - - ClearPass Policy Manager 6.9.x prior to 6.9.7-HF1 - - ClearPass Policy Manager 6.8.x prior to 6.8.9-HF1. Aruba has released patches for ClearPass Policy Manager that address this security vulnerability. | [
"cpe:2.3:a:arubanetworks:clearpass_policy_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:arubanetworks:clearpass_policy_manager:6.8.9:-:*:*:*:*:*:*",
"cpe:2.3:a:arubanetworks:clearpass_policy_manager:6.9.7:-:*:*:*:*:*:*"
] | null | 7.2 | null | 9 |
|
GHSA-4hqq-6fv5-q77v | Directory traversal vulnerability in upgrade.php in Piwigo before 2.3.4 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the language parameter. | [] | null | null | null | null |
|
CVE-2021-43555 | mySCADA myDESIGNER | mySCADA myDESIGNER Versions 8.20.0 and prior fails to properly validate contents of an imported project file, which may make the product vulnerable to a path traversal payload. This vulnerability may allow an attacker to plant files on the file system in arbitrary locations or overwrite existing files, resulting in remote code execution. | [
"cpe:2.3:a:myscada:mydesigner:*:*:*:*:*:*:*:*"
] | null | 7.3 | null | null |
CVE-2021-44217 | In Ericsson CodeChecker through 6.18.0, a Stored Cross-site scripting (XSS) vulnerability in the comments component of the reports viewer allows remote attackers to inject arbitrary web script or HTML via the POST JSON data of the /CodeCheckerService API. | [
"cpe:2.3:a:ericsson:codechecker:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 |
|
RHSA-2008:0300 | Red Hat Security Advisory: bind security, bug fix, and enhancement update | bind: /etc/rndc.key has 644 permissions by default libbind off-by-one buffer overflow | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2024:0716 | Red Hat Security Advisory: gimp security update | gimp: dds buffer overflow RCE gimp: PSD buffer overflow RCE gimp: psp integer overflow RCE gimp: psp off-by-one RCE | [
"cpe:/a:redhat:rhel_eus:9.0::appstream"
] | null | 7.8 | null | null |
CVE-2005-0525 | The php_next_marker function in image.c for PHP 4.2.2, 4.3.9, 4.3.10 and 5.0.3, as reachable by the getimagesize PHP function, allows remote attackers to cause a denial of service (infinite loop) via a JPEG image with an invalid marker value, which causes a negative length value to be passed to php_stream_seek. | [
"cpe:2.3:a:php:php:4.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.9:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.10:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.3:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2005-3688 | Cross-site scripting (XSS) vulnerability in members.php in XMB 1.9.3 and earlier allows remote attackers to inject arbitrary web script or HTML via the "Your Current Mood" field in the registration page. | [
"cpe:2.3:a:xmb_forum:xmb:*:*:*:*:*:*:*:*",
"cpe:2.3:a:xmb_forum:xmb:1.8_sp1:*:*:*:*:*:*:*",
"cpe:2.3:a:xmb_forum:xmb:1.8_sp2:*:*:*:*:*:*:*",
"cpe:2.3:a:xmb_forum:xmb:1.8_sp3:*:*:*:*:*:*:*",
"cpe:2.3:a:xmb_forum:xmb:1.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:xmb_forum:xmb:1.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:xmb_forum:xmb:1.9_beta:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2024-0951 | Advanced Social Feeds Widget & Shortcode <= 1.7 - Admin+ Stored XSS | The Advanced Social Feeds Widget & Shortcode WordPress plugin through 1.7 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) | [] | null | 4.8 | null | null |
CVE-2002-0453 | The account lockout capability in Oblix NetPoint 5.2 and earlier only locks out users once for the specified lockout period, which makes it easier for remote attackers to conduct brute force password guessing by waiting until the lockout period ends, then guessing passwords without being locked out again. | [
"cpe:2.3:a:oblix:netpoint:5.2:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-rmf7-j7x8-47jw | A vulnerability was found in Topdata Inner Rep Plus WebServer 2.01. It has been rated as problematic. Affected by this issue is some unknown functionality of the file td.js.gz. The manipulation leads to risky cryptographic algorithm. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | [] | 5.1 | 2.7 | null | null |
|
GHSA-jg48-fx8x-vpx8 | Multiple unspecified vulnerabilities in web-app.net WebAPP have unknown impact and attack vectors, described as "[having] other [security] issues too, not as bad as letting users take over your admin account, but bad too." | [] | null | null | null | null |
|
GHSA-7pv4-f272-hv95 | The BGP daemon (bgpd) in Quagga 0.99.11 and earlier allows remote attackers to cause a denial of service (crash) via an AS path containing ASN elements whose string representation is longer than expected, which triggers an assert error. | [] | null | null | null | null |
|
GHSA-v65h-92x8-q66f | A vulnerability, which was classified as critical, was found in SourceCodester Sentiment Based Movie Rating System 1.0. Affected is an unknown function of the file /classes/Users.php?f=save_client of the component User Registration Handler. The manipulation of the argument email leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. | [] | 6.9 | 7.3 | null | null |
|
GHSA-6qqm-28cq-vrr5 | In SimUpdatePbEntry::encode of simdata.cpp, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-241388399References: N/A | [] | null | 6.7 | null | null |
|
CVE-2023-7164 | BackWPup < 4.0.4 - Unauthenticated Backup Download | The BackWPup WordPress plugin before 4.0.4 does not prevent Directory Listing in its temporary backup folder, allowing unauthenticated attackers to download backups of a site's database. | [
"cpe:2.3:a:inpsyde:backwpup:*:*:*:*:*:wordpress:*:*"
] | null | 7.5 | null | null |
GHSA-prf8-q9jr-xcfm | In bootloader there is fastboot command allowing user specified kernel command line arguments. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. | [] | null | 7.3 | null | null |
|
CVE-2021-44082 | textpattern 4.8.7 is vulnerable to Cross Site Scripting (XSS) via /textpattern/index.php,Body. A remote and unauthenticated attacker can use XSS to trigger remote code execution by uploading a webshell. To do so they must first steal the CSRF token before submitting a file upload request. | [
"cpe:2.3:a:textpattern:textpattern:4.8.7:*:*:*:*:*:*:*"
] | null | 8.3 | null | 5.1 |
|
RHSA-2022:7133 | Red Hat Security Advisory: 389-ds:1.4 security update | 389-ds-base: SIGSEGV in sync_repl | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 6.5 | null | null |
GHSA-p98w-wx76-q85h | Time Machine in Apple Mac OS X 10.5 through 10.5.4 uses weak permissions for Time Machine Backup log files, which allows local users to obtain sensitive information by reading these files. | [] | null | null | null | null |
|
CVE-2020-1863 | Huawei USG6000V with versions V500R001C20SPC300, V500R003C00SPC100, and V500R005C00SPC100 have an out-of-bounds read vulnerability. Due to a logical flaw in a JSON parsing routine, a remote, unauthenticated attacker could exploit this vulnerability to disrupt service in the affected products. | [
"cpe:2.3:o:huawei:usg6000v_firmware:v500r001c20spc300:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:usg6000v_firmware:v500r003c00spc100:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:usg6000v_firmware:v500r005c00spc100:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:usg6000v:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
CVE-2025-20667 | In Modem, there is a possible information disclosure due to incorrect error handling. This could lead to remote information disclosure, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01513293; Issue ID: MSV-2741. | [] | null | 7.5 | null | null |
|
CVE-2017-7459 | ntopng before 3.0 allows HTTP Response Splitting. | [
"cpe:2.3:a:ntop:ntopng:*:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
GHSA-j4p2-r9fg-h9c7 | In wlan firmware, there is possible system crash due to an integer overflow. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07664741; Issue ID: ALPS07664741. | [] | null | 7.5 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.