id
stringlengths 12
47
| title
stringlengths 0
256
β | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
β | cvss_v3_1
float64 0
10
β | cvss_v3_0
float64 0
10
β | cvss_v2_0
float64 0
10
β | patch_commit_url
stringlengths 36
232
β |
---|---|---|---|---|---|---|---|---|
CVE-2023-1733
|
A denial of service condition exists in the Prometheus server bundled with GitLab affecting all versions from 11.10 to 15.8.5, 15.9 to 15.9.4 and 15.10 to 15.10.1.
|
[
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:15.10.0:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:15.10.0:*:*:*:enterprise:*:*:*"
] | null | 5.8 | null | null | null |
|
CVE-2004-0401
|
Unknown vulnerability in libtasn1 0.1.x before 0.1.2, and 0.2.x before 0.2.7, related to the DER parsing functions.
|
[
"cpe:2.3:a:free_software_foundation_inc.:libtasn1:0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:free_software_foundation_inc.:libtasn1:0.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:free_software_foundation_inc.:libtasn1:0.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:free_software_foundation_inc.:libtasn1:0.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:free_software_foundation_inc.:libtasn1:0.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:free_software_foundation_inc.:libtasn1:0.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:free_software_foundation_inc.:libtasn1:0.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:free_software_foundation_inc.:libtasn1:0.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:free_software_foundation_inc.:libtasn1:0.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:free_software_foundation_inc.:libtasn1:0.2.6:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
GHSA-273x-mxvr-9vx2
|
IBM Cognos Analytics Mobile Server 11.1.7, 11.2.4, and 12.0.0 is vulnerable to Denial of Service due to due to weak or absence of rate limiting. By making unlimited http requests, it is possible for a single user to exhaust server resources over a period of time making service unavailable for other legitimate users. IBM X-Force ID: 230510.
|
[] | null | 6.5 | null | null | null |
|
CVE-2025-30031
|
A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'UpdateUsers' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with "NT AUTHORITY\NetworkService" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on. (ZDI-CAN-25922)
|
[] | 8.7 | 8.8 | null | null | null |
|
GHSA-673h-vxq8-f3wr
|
Voice Builder Prior to commit c145d4604df67e6fc625992412eef0bf9a85e26b and f6660e6d8f0d1d931359d591dbdec580fef36d36 is affected by: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection'). The impact is: Remote code execution with the same privileges as the servers. The component is: Two web servers in the projects expose three vulnerable endpoints that can be accessed remotely. The endpoints are defined at: - /tts: https://github.com/google/voice-builder/blob/3a449a3e8d5100ff323161c89b897f6d5ccdb6f9/merlin_model_server/api.js#L34 - /alignment: https://github.com/google/voice-builder/blob/3a449a3e8d5100ff323161c89b897f6d5ccdb6f9/festival_model_server/api.js#L28 - /tts: https://github.com/google/voice-builder/blob/3a449a3e8d5100ff323161c89b897f6d5ccdb6f9/festival_model_server/api.js#L65. The attack vector is: Attacker sends a GET request to the vulnerable endpoint with a specially formatted query parameter. The fixed version is: After commit f6660e6d8f0d1d931359d591dbdec580fef36d36.
|
[] | null | null | 9.8 | null | null |
|
CVE-2024-56726
|
octeontx2-pf: handle otx2_mbox_get_rsp errors in cn10k.c
|
In the Linux kernel, the following vulnerability has been resolved:
octeontx2-pf: handle otx2_mbox_get_rsp errors in cn10k.c
Add error pointer check after calling otx2_mbox_get_rsp().
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
GHSA-39qg-c7hm-9wwf
|
protocols/jabber/auth.c in libpurple in Pidgin 2.6.0, and possibly other versions, does not follow the "require TLS/SSL" preference when connecting to older Jabber servers that do not follow the XMPP specification, which causes libpurple to connect to the server without the expected encryption and allows remote attackers to sniff sessions.
|
[] | null | null | null | null | null |
|
CVE-2023-52197
|
WordPress Ads Invalid Click Protection Plugin <= 1.0 is vulnerable to Cross Site Scripting (XSS)
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Impactpixel Ads Invalid Click Protection allows Stored XSS.This issue affects Ads Invalid Click Protection: from n/a through 1.0.
|
[
"cpe:2.3:a:impactpixel:ads_invalid_click_protection:*:*:*:*:*:wordpress:*:*"
] | null | 5.9 | null | null | null |
CVE-2025-30703
|
Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.0-8.0.41, 8.4.0-8.4.4 and 9.0.0-9.2.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 2.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N).
|
[] | null | 2.7 | null | null | null |
|
GHSA-7v4x-r9g8-7qx7
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in CreativeMindsSolutions CM Header and Footer allows Stored XSS. This issue affects CM Header and Footer: from n/a through 1.2.4.
|
[] | null | 6.5 | null | null | null |
|
GHSA-mfph-vgxc-xpx2
|
A command injection vulerability found in quick game engine allows arbitrary remote code in quick app. Allows remote attacke0rs to gain arbitrary code execution in quick game engine
|
[] | null | 9.8 | null | null | null |
|
CVE-2022-46498
|
Hospital Management System 1.0 was discovered to contain a SQL injection vulnerability via the doc_number parameter at his_admin_view_single_employee.php.
|
[
"cpe:2.3:a:codeastro:hospital_management_system:1.0:*:*:*:*:*:*:*"
] | null | 2.7 | null | null | null |
|
CVE-2020-14856
|
Vulnerability in the Oracle Trade Management product of Oracle E-Business Suite (component: User Interface). Supported versions that are affected are 12.1.1 - 12.1.3 and 12.2.3 - 12.2.10. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Trade Management. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Trade Management, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Trade Management accessible data as well as unauthorized update, insert or delete access to some of Oracle Trade Management accessible data. CVSS 3.1 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N).
|
[
"cpe:2.3:a:oracle:trade_management:*:*:*:*:*:*:*:*"
] | null | 8.2 | null | null | null |
|
GHSA-9fr5-v73g-93j2
|
SQL injection vulnerability in block_forum_topic_new.php in ViArt Shop Free 2.5.5, and possibly other distributions including Light, Standard, and Enterprise, might allow remote attackers to execute arbitrary SQL commands via unknown vectors, probably involving the forum_id parameter.
|
[] | null | null | null | null | null |
|
GHSA-cq9c-6m4q-fv48
|
MP4NameFirstMatches in mp4util.cpp in MP4v2 2.0.0 mishandles substrings of atom names, leading to use of an inappropriate data type for associated atoms. The resulting type confusion can cause out-of-bounds memory access.
|
[] | null | null | 9.8 | null | null |
|
CVE-2018-12699
|
finish_stab in stabs.c in GNU Binutils 2.30 allows attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact, as demonstrated by an out-of-bounds write of 8 bytes. This can occur during execution of objdump.
|
[
"cpe:2.3:a:gnu:binutils:2.30:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04.4:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 | null |
|
GHSA-wv8p-qvw7-q865
|
The Page Builder Gutenberg Blocks WordPress plugin before 3.1.7 does not validate and escape some of its block options before outputting them back in a page/post where the block is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks
|
[] | null | 5.4 | null | null | null |
|
CVE-2007-5327
|
Stack-based buffer overflow in the RPC interface for the Message Engine (mediasvr.exe) in CA BrightStor ARCServe BackUp v9.01 through R11.5, and Enterprise Backup r10.5, allows remote attackers to execute arbitrary code via a long argument in the 0x10d opnum.
|
[
"cpe:2.3:a:broadcom:brightstor_arcserve_backup:9.01:*:*:*:*:*:*:*",
"cpe:2.3:a:broadcom:brightstor_arcserve_backup:10.5:*:*:*:*:*:*:*",
"cpe:2.3:a:broadcom:brightstor_arcserve_backup:11:*:*:*:*:*:*:*",
"cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.1:*:*:*:*:*:*:*",
"cpe:2.3:a:broadcom:brightstor_arcserve_backup:11.5:*:*:*:*:*:*:*",
"cpe:2.3:a:broadcom:brightstor_enterprise_backup:10.5:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
CVE-2021-38203
|
btrfs in the Linux kernel before 5.13.4 allows attackers to cause a denial of service (deadlock) via processes that trigger allocation of new system chunks during times when there is a shortage of free space in the system space_info.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:hci_bootstrap_os:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:hci_storage_node:-:*:*:*:*:*:*:*"
] | null | 5.5 | null | 2.1 | null |
|
CVE-2023-26350
|
ZDI-CAN-19510: Adobe Dimension USD File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability
|
Adobe Dimension versions 3.4.7 (and earlier) is affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[
"cpe:2.3:a:adobe:dimension:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
CVE-2010-3407
|
Stack-based buffer overflow in the MailCheck821Address function in nnotes.dll in the nrouter.exe service in the server in IBM Lotus Domino 8.0.x before 8.0.2 FP5 and 8.5.x before 8.5.1 FP2 allows remote attackers to execute arbitrary code via a long e-mail address in an ORGANIZER:mailto header in an iCalendar calendar-invitation e-mail message, aka SPR NRBY7ZPJ9V.
|
[
"cpe:2.3:a:ibm:lotus_domino:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_domino:8.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_domino:8.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_domino:8.0.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_domino:8.0.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_domino:8.0.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_domino:8.0.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_domino:8.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_domino:8.5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_domino:8.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_domino:8.5.1.1:*:*:*:*:*:*:*"
] | null | null | null | 9.3 | null |
|
GHSA-942g-54w2-gqpf
|
The Infiniti Roadside Assistance (aka com.ccas.rsa.common.infiniti) application 1.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
|
[] | null | null | null | null | null |
|
GHSA-8rhq-v947-5f3j
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Michel - xiligroup dev xili-language allows Reflected XSS. This issue affects xili-language: from n/a through 2.21.2.
|
[] | null | 7.1 | null | null | null |
|
GHSA-7px2-3c2p-q4v4
|
flatnest Prototype Pollution vulnerability
|
All versions of the package flatnest are vulnerable to Prototype Pollution via the `nest()` function in `flatnest/nest.js` file.
|
[] | null | 7.3 | null | null | null |
CVE-2018-6537
|
A buffer overflow vulnerability in the control protocol of Flexense SyncBreeze Enterprise v10.4.18 allows remote attackers to execute arbitrary code by sending a crafted packet to TCP port 9121.
|
[
"cpe:2.3:a:flexense:syncbreeze:10.4.18:*:*:*:enterprise:*:*:*"
] | null | null | 9.8 | 7.5 | null |
|
GHSA-rjj7-hjcm-jmqm
|
PHP Scripts Mall Entrepreneur Job Portal Script 3.0.1 allows remote attackers to cause a denial of service (outage of profile editing) via crafted JavaScript code in the KeySkills field.
|
[] | null | null | 6.5 | null | null |
|
RHSA-2012:0037
|
Red Hat Security Advisory: mod_cluster-native security update
|
mod_cluster: malicious worker nodes can register on any vhost
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:5::el4",
"cpe:/a:redhat:jboss_enterprise_application_platform:5::el5",
"cpe:/a:redhat:jboss_enterprise_application_platform:5::el6"
] | null | null | null | null | null |
CVE-2023-47144
|
IBM Tivoli Application Dependency Discovery Manager cross-site scripting
|
IBM Tivoli Application Dependency Discovery Manager 7.3.0.0 through 7.3.0.10 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 270271.
|
[
"cpe:2.3:a:ibm:tivoli_application_dependency_discovery_manager:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | null | null |
CVE-2015-1093
|
FontParser in Apple iOS before 8.3 and Apple OS X before 10.10.3 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted font file.
|
[
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
GHSA-756q-cg5p-5457
|
The Remote Application Server in Parallels RAS before 19.2.23975 does not segment virtualized applications from the server, which allows a remote attacker to achieve remote code execution via standard kiosk breakout techniques.
|
[] | null | 10 | null | null | null |
|
CVE-2022-25456
|
Tenda AC6 v15.03.05.09_multi was discovered to contain a stack overflow via the security_5g parameter in the WifiBasicSet function.
|
[
"cpe:2.3:o:tenda:ac6_firmware:15.03.05.09:*:*:*:*:*:*:*",
"cpe:2.3:h:tenda:ac6:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | 10 | null |
|
CVE-2017-14624
|
ImageMagick 7.0.7-0 Q16 has a NULL Pointer Dereference vulnerability in the function PostscriptDelegateMessage in coders/ps.c.
|
[
"cpe:2.3:a:imagemagick:imagemagick:7.0.7-0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"
] | null | null | 9.8 | 7.5 | null |
|
CVE-2003-1378
|
Microsoft Outlook Express 6.0 and Outlook 2000, with the security zone set to Internet Zone, allows remote attackers to execute arbitrary programs via an HTML email with the CODEBASE parameter set to the program, a vulnerability similar to CAN-2002-0077.
|
[
"cpe:2.3:a:microsoft:outlook:2000:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:outlook:2000:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:outlook:2000:sr1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:outlook_express:6.0:*:*:*:*:*:*:*"
] | null | null | null | 8.8 | null |
|
GHSA-mr66-9pqw-7r8h
|
GNUBOARD5 5.3.1.9 has XSS that allows remote attackers to inject arbitrary web script or HTML via the "mobile board title contents" parameter, aka the adm/board_form_update.php bo_mobile_subject parameter.
|
[] | null | null | 6.1 | null | null |
|
GHSA-2c88-v3f4-r6jr
|
An out-of-bounds read was addressed with improved input validation. This issue is fixed in macOS Catalina 10.15.6. A local user may be able to cause unexpected system termination or read kernel memory.
|
[] | null | null | null | null | null |
|
CVE-2011-1769
|
SystemTap 1.4 and earlier, when unprivileged (aka stapusr) mode is enabled, allows local users to cause a denial of service (divide-by-zero error and OOPS) via a crafted ELF program with DWARF expressions that are not properly handled by a stap script that performs context variable access.
|
[
"cpe:2.3:a:systemtap:systemtap:*:*:*:*:*:*:*:*",
"cpe:2.3:a:systemtap:systemtap:0.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:systemtap:systemtap:0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:systemtap:systemtap:0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:systemtap:systemtap:0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:systemtap:systemtap:0.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:systemtap:systemtap:0.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:systemtap:systemtap:0.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:systemtap:systemtap:0.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:systemtap:systemtap:0.5.8:*:*:*:*:*:*:*",
"cpe:2.3:a:systemtap:systemtap:0.5.9:*:*:*:*:*:*:*",
"cpe:2.3:a:systemtap:systemtap:0.5.10:*:*:*:*:*:*:*",
"cpe:2.3:a:systemtap:systemtap:0.5.12:*:*:*:*:*:*:*",
"cpe:2.3:a:systemtap:systemtap:0.5.13:*:*:*:*:*:*:*",
"cpe:2.3:a:systemtap:systemtap:0.5.14:*:*:*:*:*:*:*",
"cpe:2.3:a:systemtap:systemtap:0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:systemtap:systemtap:0.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:systemtap:systemtap:0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:systemtap:systemtap:0.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:systemtap:systemtap:0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:systemtap:systemtap:0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:systemtap:systemtap:0.9.5:*:*:*:*:*:*:*",
"cpe:2.3:a:systemtap:systemtap:0.9.7:*:*:*:*:*:*:*",
"cpe:2.3:a:systemtap:systemtap:0.9.8:*:*:*:*:*:*:*",
"cpe:2.3:a:systemtap:systemtap:0.9.9:*:*:*:*:*:*:*",
"cpe:2.3:a:systemtap:systemtap:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:systemtap:systemtap:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:systemtap:systemtap:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:systemtap:systemtap:1.3:*:*:*:*:*:*:*"
] | null | null | null | 1.2 | null |
|
CVE-2017-10614
|
Junos OS: A remote unauthenticated attacker can consume large amounts of CPU and/or memory through telnetd
|
A vulnerability in telnetd service on Junos OS allows a remote attacker to cause a limited memory and/or CPU consumption denial of service attack. This issue was found during internal product security testing. Affected releases are Juniper Networks Junos OS 12.1X46 prior to 12.1X46-D45; 12.3X48 prior to 12.3X48-D30; 14.1 prior to 14.1R4-S9, 14.1R8; 14.2 prior to 14.2R6; 15.1 prior to 15.1F5, 15.1R3; 15.1X49 prior to 15.1X49-D40; 15.1X53 prior to 15.1X53-D232, 15.1X53-D47.
|
[
"cpe:2.3:o:juniper:junos:12.1x46:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.1x46:d10:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.1x46:d15:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.1x46:d20:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.1x46:d25:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.1x46:d30:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.1x46:d35:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.1x46:d40:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3x48:d10:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3x48:d15:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3x48:d25:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1:r4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1:r8:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.2:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.2:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.2:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.2:r4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.2:r5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f2-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f2-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x49:d10:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x49:d20:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x49:d30:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x49:d35:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x53:d20:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x53:d21:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x53:d210:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x53:d25:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x53:d30:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x53:d32:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x53:d33:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x53:d34:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x53:d60:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x53:d61:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x53:d62:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x53:d63:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x53:d70:*:*:*:*:*:*"
] | null | null | 5.3 | null | null |
CVE-2023-47674
|
Missing authentication for critical function vulnerability in First Corporation's DVRs allows a remote unauthenticated attacker to rewrite or obtain the configuration information of the affected device. Note that updates are provided only for Late model of CFR-4EABC, CFR-4EAB, CFR-8EAB, CFR-16EAB, MD-404AB, and MD-808AB. As for the other products, apply the workaround.
|
[
"cpe:2.3:o:c-first:cfr-1004ea_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:c-first:cfr-1004ea:-:*:*:*:*:*:*:*",
"cpe:2.3:o:c-first:cfr-1008ea_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:c-first:cfr-1008ea:-:*:*:*:*:*:*:*",
"cpe:2.3:o:c-first:cfr-1016ea_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:c-first:cfr-1016ea:-:*:*:*:*:*:*:*",
"cpe:2.3:o:c-first:cfr-16eaa_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:c-first:cfr-16eaa:-:*:*:*:*:*:*:*",
"cpe:2.3:o:c-first:cfr-16eab_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:c-first:cfr-16eab:-:*:*:*:*:*:*:*",
"cpe:2.3:o:c-first:cfr-16eha_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:c-first:cfr-16eha:-:*:*:*:*:*:*:*",
"cpe:2.3:o:c-first:cfr-16ehd_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:c-first:cfr-16ehd:-:*:*:*:*:*:*:*",
"cpe:2.3:o:c-first:cfr-4eaa_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:c-first:cfr-4eaa:-:*:*:*:*:*:*:*",
"cpe:2.3:o:c-first:cfr-4eaam_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:c-first:cfr-4eaam:-:*:*:*:*:*:*:*",
"cpe:2.3:o:c-first:cfr-4eab_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:c-first:cfr-4eab:-:*:*:*:*:*:*:*",
"cpe:2.3:o:c-first:cfr-4eabc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:c-first:cfr-4eabc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:c-first:cfr-4eha_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:c-first:cfr-4eha:-:*:*:*:*:*:*:*",
"cpe:2.3:o:c-first:cfr-4ehd_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:c-first:cfr-4ehd:-:*:*:*:*:*:*:*",
"cpe:2.3:o:c-first:cfr-8eaa_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:c-first:cfr-8eaa:-:*:*:*:*:*:*:*",
"cpe:2.3:o:c-first:cfr-8eab_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:c-first:cfr-8eab:-:*:*:*:*:*:*:*",
"cpe:2.3:o:c-first:cfr-8eha_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:c-first:cfr-8eha:-:*:*:*:*:*:*:*",
"cpe:2.3:o:c-first:cfr-8ehd_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:c-first:cfr-8ehd:-:*:*:*:*:*:*:*",
"cpe:2.3:o:c-first:cfr-904e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:c-first:cfr-904e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:c-first:cfr-908e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:c-first:cfr-908e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:c-first:cfr-916e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:c-first:cfr-916e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:c-first:md-404aa_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:c-first:md-404aa:-:*:*:*:*:*:*:*",
"cpe:2.3:o:c-first:md-404ab_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:c-first:md-404ab:-:*:*:*:*:*:*:*",
"cpe:2.3:o:c-first:md-404ha_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:c-first:md-404ha:-:*:*:*:*:*:*:*",
"cpe:2.3:o:c-first:md-404hd_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:c-first:md-404hd:-:*:*:*:*:*:*:*",
"cpe:2.3:o:c-first:md-808aa_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:c-first:md-808aa:-:*:*:*:*:*:*:*",
"cpe:2.3:o:c-first:md-808ab_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:c-first:md-808ab:-:*:*:*:*:*:*:*",
"cpe:2.3:o:c-first:md-808ha_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:c-first:md-808ha:-:*:*:*:*:*:*:*",
"cpe:2.3:o:c-first:md-808hd_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:c-first:md-808hd:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
|
CVE-2024-3748
|
SP Project & Document Manager <= 4.71 - Data Update via IDOR
|
The SP Project & Document Manager WordPress plugin through 4.71 is missing validation in its upload function, allowing a user to manipulate the `user_id` to make it appear that a file was uploaded by another user
|
[
"cpe:2.3:a:smartypantsplugins:sp_project_\\&_document_manager:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | null | null |
CVE-2014-4767
|
IBM WebSphere Application Server (WAS) Liberty Profile 8.5.x before 8.5.5.3 does not properly use the Liberty Repository for feature installation, which allows remote authenticated users to execute arbitrary code via unspecified vectors.
|
[
"cpe:2.3:a:ibm:websphere_application_server:8.5.0.0:-:liberty_profile:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:8.5.0.1:-:liberty_profile:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:8.5.0.2:-:liberty_profile:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:8.5.5.0:-:liberty_profile:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:8.5.5.1:-:liberty_profile:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:8.5.5.2:-:liberty_profile:*:*:*:*:*"
] | null | null | null | 6.5 | null |
|
CVE-2025-21941
|
drm/amd/display: Fix null check for pipe_ctx->plane_state in resource_build_scaling_params
|
In the Linux kernel, the following vulnerability has been resolved:
drm/amd/display: Fix null check for pipe_ctx->plane_state in resource_build_scaling_params
Null pointer dereference issue could occur when pipe_ctx->plane_state
is null. The fix adds a check to ensure 'pipe_ctx->plane_state' is not
null before accessing. This prevents a null pointer dereference.
Found by code review.
(cherry picked from commit 63e6a77ccf239337baa9b1e7787cde9fa0462092)
|
[] | null | 5.5 | null | null | null |
CVE-2021-33216
|
An issue was discovered in CommScope Ruckus IoT Controller 1.7.1.0 and earlier. An Undocumented Backdoor exists, allowing shell access via a developer account.
|
[
"cpe:2.3:a:commscope:ruckus_iot_controller:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 | null |
|
CVE-2021-22057
|
VMware Workspace ONE Access 21.08, 20.10.0.1, and 20.10 contain an authentication bypass vulnerability. A malicious actor, who has successfully provided first-factor authentication, may be able to obtain second-factor authentication provided by VMware Verify.
|
[
"cpe:2.3:a:vmware:workspace_one_access:20.10:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workspace_one_access:20.10.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workspace_one_access:21.08:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workspace_one_access:21.08.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.5 | null |
|
GHSA-r7qx-6g8x-6jwf
|
SQL injection vulnerability in bttlxeForum 2.0 beta 3 and earlier allows remote attackers to bypass authentication via the (1) username and (2) password fields, and possibly other fields.
|
[] | null | null | null | null | null |
|
GHSA-934w-c939-88hv
|
An elevation of privilege vulnerability in Qualcomm closed source components. Product: Android. Versions: Android kernel. Android ID: A-28823724.
|
[] | null | null | 9.8 | null | null |
|
RHSA-2022:0155
|
Red Hat Security Advisory: Red Hat Single Sign-On 7.5.1 security update
|
keycloak-server-spi-private: ECP SAML binding bypasses authentication flows Keycloak: Incorrect authorization allows unpriviledged users to create other users resteasy: Error message exposes endpoint class information xml-security: XPath Transform abuse allows for information disclosure
|
[
"cpe:/a:redhat:red_hat_single_sign_on:7"
] | null | 7.5 | null | null | null |
GHSA-qfrp-89jw-777c
|
Cisco Adaptive Security Appliance (ASA) software 7.2 and 8.2 before 8.2(5.58), 8.3 and 8.4 before 8.4(7.29), 8.5 through 8.7 before 8.7(1.17), 9.0 before 9.0(4.37), 9.1 before 9.1(6.4), 9.2 before 9.2(4), 9.3 before 9.3(3.1), and 9.4 before 9.4(1.1) allows remote attackers to cause a denial of service (device reload) via a crafted DNS response, aka Bug ID CSCut03495.
|
[] | null | null | null | null | null |
|
GHSA-9r9v-644h-2p8g
|
SAP Commerce (Backoffice) uses the deprecated X-FRAME-OPTIONS header to protect against clickjacking. While this protection remains effective now, it may not be the case in the future as browsers might discontinue support for this header in favor of the frame-ancestors CSP directive. Hence, clickjacking could become possible then, and lead to exposure and modification of sensitive information.
|
[] | null | 6.8 | null | null | null |
|
GHSA-4225-968q-h9xp
|
Argument injection vulnerability in IBM Lotus Notes 8.0.x before 8.0.2 FP6 and 8.5.x before 8.5.1 FP5 allows remote attackers to execute arbitrary code via a cai:// URL containing a --launcher.library option that specifies a UNC share pathname for a DLL file, aka SPR PRAD82YJW2.
|
[] | null | null | null | null | null |
|
CVE-2006-4986
|
Grayscale BandSite CMS allows remote attackers to obtain sensitive information via a direct request for (1) certain files in the includes/content directory, (2) includes/shows_preview.php, and (3) adminpanel/configform.php; and files in adminpanel/includes/ including (4) mailinglist/disphtmltbl.php, (5) mailinglist/dispxls.php, (6) mailinglist/sendshows.php, (7) previews/preview_bio.php, (8) previews/preview_genmerch.php, (9) previews/preview_fliers.php, (10) previews/preview_gbook.php, (11) previews/preview_interviews.php, (12) previews/preview_links.php, (13) previews/preview_lyrics.php, (14) previews/preview_membio.php, (15) previews/preview_merchphotos.php, (16) previews/preview_mp3s.php, (17) previews/preview_news.php, (18) previews/preview_photos.php, (19) previews/preview_releases.php, (20) previews/preview_relmerch.php, (21) previews/preview_relphotos.php, (22) previews/preview_reviews.php, (23) previews/preview_shows.php, (24) previews/preview_wearmerch.php, (25) change_forms/change_bio.php, (26) change_forms/change_fliers.php, (27) change_forms/change_gbook.php, (28) change_forms/change_gen_merch.php, (29) change_forms/change_interview.php, (30) change_forms/change_links.php, (31) change_forms/change_lyrics.php, (32) change_forms/change_members.php, (33) change_forms/change_merch.php, (34) change_forms/change_merch_pic.php, (35) change_forms/change_mp3s.php, (36) change_forms/change_news.php, (37) change_forms/change_photos.php, (38) change_forms/change_rel_merch.php, (39) change_forms/change_rel_pic.php, (40) change_forms/change_releases.php, (41) change_forms/change_reviews.php, (42) change_forms/change_shows.php, and (43) change_forms/change_wear_merch.php, which reveals the path in various error messages.
|
[
"cpe:2.3:a:grayscale:bandsite_cms:1.1:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-cr76-6p9f-9963
|
An issue in Horizon Business Services Inc. Caterease 16.0.1.1663 through 24.0.1.2405 and possibly later versions, allows a local attacker to perform an Authentication Bypass attack due to improperly implemented security checks for standard authentication mechanisms
|
[] | null | 7.8 | null | null | null |
|
RHSA-2015:1409
|
Red Hat Security Advisory: sudo security, bug fix, and enhancement update
|
sudo: unsafe handling of TZ environment variable
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null | null |
CVE-2022-28658
|
Apport argument parsing mishandles filename splitting on older kernels resulting in argument spoofing
|
[
"cpe:2.3:a:apport_project:apport:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:21.10:*:*:*:-:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:22.04:*:*:*:lts:*:*:*"
] | null | 5.5 | null | null | null |
|
GHSA-pc83-5vfx-xhg2
|
Cross-site scripting (XSS) vulnerability in Spidean PostWrap allows remote attackers to inject arbitrary HTML and web script via the page parameter.
|
[] | null | null | null | null | null |
|
GHSA-mxvg-x4fj-7g3v
|
A Buffer out-of-bound read vulnerability in Exif.cpp::ReadInt32 in FreeImage 3.18.0 allows attackers to cause a denial-of-service.
|
[] | null | 6.5 | null | null | null |
|
CVE-2007-5040
|
Ghost Security Suite alpha 1.200 does not properly validate certain parameters to System Service Descriptor Table (SSDT) function handlers, which allows local users to cause a denial of service (crash) and possibly gain privileges via the (1) NtCreateKey, (2) NtCreateThread, (3) NtDeleteValueKey, (4) NtQueryValueKey, (5) NtSetSystemInformation, and (6) NtSetValueKey kernel SSDT hooks.
|
[
"cpe:2.3:a:ghostsecurity:ghost_security_suite:alpha_1.200:*:*:*:*:*:*:*"
] | null | null | null | 2.1 | null |
|
CVE-2020-13133
|
Tufin SecureChange prior to R19.3 HF3 and R20-1 HF1 are vulnerable to stored XSS. The successful exploitation requires admin privileges (for storing the XSS payload itself), and can exploit (be triggered by) unauthenticated users. All TOS versions with SecureChange deployments prior to R19.3 HF3 and R20-1 HF1 are affected. Vulnerabilities were fixed in R19.3 HF3 and R20-1 HF1
|
[
"cpe:2.3:a:tufin:securechange:*:*:*:*:*:*:*:*",
"cpe:2.3:a:tufin:securechange:r19-3:-:*:*:*:*:*:*",
"cpe:2.3:a:tufin:securechange:r20-1:-:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 | null |
|
GHSA-xq28-w75v-29rr
|
A remote code execution vulnerability exists in Microsoft SharePoint when the software fails to check the source markup of an application package, aka 'Microsoft SharePoint Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1023, CVE-2020-1024.
|
[] | null | null | null | null | null |
|
CVE-2022-43650
|
This vulnerability allows remote attackers to disclose sensitive information on affected installations of RARLAB WinRAR 6.11.0.0. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of ZIP files. Crafted data in a ZIP file can trigger a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-19232.
|
[
"cpe:2.3:a:rarlab:winrar:6.11:*:*:*:*:*:*:*"
] | null | null | 2.5 | null | null |
|
CVE-2021-1167
|
Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers Management Interface Remote Command Execution and Denial of Service Vulnerabilities
|
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an authenticated, remote attacker to execute arbitrary code or cause an affected device to restart unexpectedly. The vulnerabilities are due to improper validation of user-supplied input in the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system or cause the device to reload, resulting in a denial of service (DoS) condition. To exploit these vulnerabilities, an attacker would need to have valid administrator credentials on the affected device. Cisco has not released software updates that address these vulnerabilities.
|
[
"cpe:2.3:o:cisco:rv110w_firmware:1.2.1.7:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv110w_firmware:1.2.2.8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv110w_firmware:1.3.1.7:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:rv110w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv130_vpn_router_firmware:1.2.2.8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv130_vpn_router_firmware:1.3.1.7:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:rv130_vpn_router:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv130w_firmware:1.2.2.8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv130w_firmware:1.3.1.7:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:rv130w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv215w_wireless-n_vpn_router_firmware:1.2.2.8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv215w_wireless-n_vpn_router_firmware:1.3.1.7:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:rv215w_wireless-n_vpn_router:-:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_extension_platform:1.0.3.55:*:*:*:*:*:*:*"
] | null | 7.2 | null | null | null |
GHSA-g3hr-qm5c-vgfh
|
Badminton Center Management System v1.0 is vulnerable to SQL Injection via /bcms/admin/courts/manage_court.php?id=.
|
[] | null | 9.8 | null | null | null |
|
CVE-2018-3279
|
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Roles). Supported versions that are affected are 8.0.12 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
|
[
"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 4.9 | null | 4 | null |
|
GHSA-rwmc-xpj5-264g
|
A vulnerability exists in Schneider Electric's Pelco Sarix Professional in all firmware versions prior to 3.29.67 which could allow a remote attacker to delete arbitrary system file due to lack of validation of the /login/bin/set_param to the file name with the value of 'system.delete.sd_file'
|
[] | null | 9.1 | null | null | null |
|
GHSA-9jg4-fxwc-3f69
|
Cross-Site Request Forgery (CSRF) vulnerability in Kelvin Ng Shortcode in Comment allows Stored XSS.This issue affects Shortcode in Comment: from n/a through 1.1.1.
|
[] | null | 7.1 | null | null | null |
|
GHSA-j2x2-7857-rm23
|
Couchbase Server 4.x and 5.x before 6.0.0 has Insecure Permissions for the projector and indexer REST endpoints (they allow unauthenticated access).
|
[] | null | null | null | null | null |
|
GHSA-3x6p-632c-9725
|
The SlotMachine (aka com.popoinnovation.SlotMachine) application 1.03 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
|
[] | null | null | null | null | null |
|
GHSA-r79p-j9j2-jx69
|
FastStone Image Viewer <= 7.5 is affected by a user mode write access violation at 0x00402d8a, triggered when a user opens or views a malformed CUR file that is mishandled by FSViewer.exe. Attackers could exploit this issue for a Denial of Service (DoS) or possibly to achieve code execution.
|
[] | null | null | null | null | null |
|
CVE-2016-8948
|
IBM Emptoris Sourcing 9.5.x through 10.1.x is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 118835.
|
[
"cpe:2.3:a:ibm:emptoris_sourcing:9.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:emptoris_sourcing:9.5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:emptoris_sourcing:9.5.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:emptoris_sourcing:9.5.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:emptoris_sourcing:9.5.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:emptoris_sourcing:10.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:emptoris_sourcing:10.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:emptoris_sourcing:10.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:emptoris_sourcing:10.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:emptoris_sourcing:10.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:emptoris_sourcing:10.1.1:*:*:*:*:*:*:*"
] | null | null | 5.4 | 3.5 | null |
|
GHSA-m9vr-hpjw-8h7q
|
SQL injection vulnerability in Invensys Wonderware Information Server (WIS) 4.0 SP1SP1, 4.5- Portal, and 5.0- Portal allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
|
[] | null | null | null | null | null |
|
GHSA-rf3p-79w2-25vp
|
lserver in SAP DB 7.3 and earlier uses the current working directory to find and execute the lserversrv program, which allows local users to gain privileges with a malicious lserversrv that is called from a directory that has a symlink to the lserver program.
|
[] | null | null | null | null | null |
|
CVE-2021-44481
|
An issue was discovered in YottaDB through r1.32 and V7.0-000. A lack of parameter validation in calls to memcpy in check_and_set_timeout in sr_unix/ztimeoutroutines.c allows attackers to attempt to read from a NULL pointer.
|
[
"cpe:2.3:a:fisglobal:gt.m:*:*:*:*:*:*:*:*",
"cpe:2.3:a:yottadb:yottadb:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null |
|
CVE-2012-0695
|
Multiple unspecified vulnerabilities in Google Chrome before 17.0.963.27 on the Acer AC700, Samsung Series 5, and Cr-48 Chromebook platforms have unknown impact and attack vectors.
|
[
"cpe:2.3:o:google:chrome_os:*:*:*:*:*:*:*:*",
"cpe:2.3:h:acer:ac700_chromebook:*:*:*:*:*:*:*:*",
"cpe:2.3:h:google:cr-48_chromebook:*:*:*:*:*:*:*:*",
"cpe:2.3:h:samsung:series_5_chromebook:*:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
RHSA-2022:1492
|
Red Hat Security Advisory: OpenJDK 8u332 Windows builds release and security update
|
OpenJDK: Unbounded memory allocation when compiling crafted XPath expressions (JAXP, 8270504) OpenJDK: Improper object-to-string conversion in AnnotationInvocationHandler (Libraries, 8277672) OpenJDK: Missing check for negative ObjectIdentifier (Libraries, 8275151) OpenJDK: Defective secure validation in Apache Santuario (Libraries, 8278008) OpenJDK: URI parsing inconsistencies (JNDI, 8278972)
|
[
"cpe:/a:redhat:openjdk:1.8::windows"
] | null | 5.3 | null | null | null |
GHSA-jj2f-7gqw-hpxj
|
Format string vulnerability in authcfg.cgi in Accoria Web Server (aka Rock Web Server) 1.4.7 allows remote attackers to have an unspecified impact via format string specifiers in the path (aka Password File) parameter.
|
[] | null | null | null | null | null |
|
GHSA-cx3c-h5q9-78vc
|
A NULL pointer dereference in setnmap() at cmds.c of GNU Inetutils v2.2.16-cf091 can lead to a segmentation fault or application crash.
|
[] | null | null | null | null | null |
|
CVE-2022-25758
|
Regular Expression Denial of Service (ReDoS)
|
All versions of package scss-tokenizer are vulnerable to Regular Expression Denial of Service (ReDoS) via the loadAnnotation() function, due to the usage of insecure regex.
|
[
"cpe:2.3:a:scss-tokenizer_project:scss-tokenizer:*:*:*:*:*:node.js:*:*"
] | null | 5.3 | null | null | null |
RHSA-2011:0300
|
Red Hat Security Advisory: Red Hat Network Satellite Server security update
|
Spacewalk: Session fixation flaw Spacewalk: Prone to brute force password guessing attacks
|
[
"cpe:/a:redhat:network_satellite:5.4::el5"
] | null | null | null | null | null |
GHSA-jrrc-8w3m-x99x
|
The management console on the Symantec Web Gateway (SWG) appliance before 5.2.2 allows remote authenticated users to execute arbitrary OS commands by injecting command strings into unspecified PHP scripts.
|
[] | null | null | null | null | null |
|
CVE-2025-7083
|
Belkin F9K1122 webs mp os command injection
|
A vulnerability was found in Belkin F9K1122 1.00.33. It has been classified as critical. This affects the function mp of the file /goform/mp of the component webs. The manipulation of the argument command leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
|
[] | 5.3 | 6.3 | 6.3 | 6.5 | null |
CVE-2018-5038
|
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have a Heap Overflow vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
|
[
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.8 | null |
|
GHSA-xq8g-h7mf-47qr
|
sample.sh in maildirsync 1.1 allows local users to append data to arbitrary files via a symlink attack on a /tmp/maildirsync-*.#####.log temporary file.
|
[] | null | null | null | null | null |
|
CVE-2024-10230
|
Type Confusion in V8 in Google Chrome prior to 130.0.6723.69 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | null | null |
|
GHSA-wh99-p93p-g825
|
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DDL). Supported versions that are affected are 8.0.36 and prior and 8.3.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
|
[] | null | 4.9 | null | null | null |
|
CVE-2024-36042
|
Silverpeas before 6.3.5 allows authentication bypass by omitting the Password field to AuthenticationServlet, often providing an unauthenticated user with superadmin access.
|
[
"cpe:2.3:a:silverpeas:silverpeas:0:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
|
CVE-2023-30018
|
Judging Management System v1.0 is vulnerable to SQL Injection. via /php-jms/review_se_result.php?mainevent_id=.
|
[
"cpe:2.3:a:judging_management_system_project:judging_management_system:1.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
|
CVE-2002-0572
|
FreeBSD 4.5 and earlier, and possibly other BSD-based operating systems, allows local users to write to or read from restricted files by closing the file descriptors 0 (standard input), 1 (standard output), or 2 (standard error), which may then be reused by a called setuid process that intended to perform I/O on normal files.
|
[
"cpe:2.3:o:freebsd:freebsd:4.4:releng:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:4.5:release:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:4.5:stable:*:*:*:*:*:*",
"cpe:2.3:o:openbsd:openbsd:2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:openbsd:openbsd:2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:openbsd:openbsd:2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:openbsd:openbsd:2.3:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:2.5.1:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:7.0:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:8.0:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*"
] | null | null | null | 7.2 | null |
|
CVE-2019-11014
|
The VStarCam vstc.vscam.client library and vstc.vscam shared object, as used in the Eye4 application (for Android, iOS, and Windows), do not prevent spoofing of the camera server. An attacker can create a fake camera server that listens for the client looking for a camera on the local network. When the camera responds to the client, it responds via the broadcast address, giving all information necessary to impersonate the camera. The attacker then floods the client with responses, causing the original camera to be denied service from the client, and thus causing the client to then communicate exclusively with the attacker's fake camera server. When connecting to the fake camera server, the client sends all details necessary to login to the camera (username and password).
|
[
"cpe:2.3:a:vstarcam:eye4:-:*:*:*:*:*:*:*"
] | null | null | 9.8 | 10 | null |
|
GHSA-864f-7xjm-2jp2
|
CNCF K3s Kubernetes kubelet configuration exposes credentials
|
CNCF K3s 1.32 before 1.32.4-rc1+k3s1 has a Kubernetes kubelet configuration change with the unintended consequence that, in some situations, ReadOnlyPort is set to 10255. For example, the default behavior of a K3s online installation might allow unauthenticated access to this port, exposing credentials.
|
[] | null | 6.8 | null | null | null |
CVE-2019-19219
|
BMC Control-M/Agent 7.0.00.000 allows Arbitrary File Download.
|
[
"cpe:2.3:a:bmcsoftware:control-m\\/agent:7.0.00.000:*:*:*:*:*:*:*"
] | null | 7.5 | null | 4.3 | null |
|
CVE-2006-0126
|
rxvt-unicode before 6.3, on certain platforms that use openpty and non-Unix pty devices such as Linux and most BSD platforms, does not maintain the intended permissions of tty devices, which allows local users to gain read and write access to the devices.
|
[
"cpe:2.3:a:rxvt-unicode:rxvt-unicode:*:*:*:*:*:*:*:*"
] | null | null | null | 4.6 | null |
|
CVE-2025-8620
|
GiveWP β Donation Plugin and Fundraising Platform <= 4.6.0 - Unauthenticated Donor Data Exposure
|
The GiveWP β Donation Plugin and Fundraising Platform plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 4.6.0. This makes it possible for unauthenticated attackers to extract donor names, emails, and donor id.
|
[] | null | 5.3 | null | null | null |
CVE-2014-3089
|
The RDS Java Client library in IBM Rational Directory Server (RDS) 5.1.1.x before 5.1.1.2 iFix004 and 5.2.x before 5.2.1 iFix003, and Rational Directory Administrator (RDA) 6.0 before iFix002, includes the cleartext root password, which allows local users to obtain sensitive information by reading a library file.
|
[
"cpe:2.3:a:ibm:rational_directory_administrator:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_directory_administrator:6.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_directory_server:5.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_directory_server:5.1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_directory_server:5.1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_directory_server:5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_directory_server:5.2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_directory_server:5.2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_directory_server:5.2.1:*:*:*:*:*:*:*"
] | null | null | null | 4.9 | null |
|
RHSA-2022:6702
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Out of bounds read when decoding H264 Mozilla: Content-Security-Policy base-uri bypass Mozilla: Incoherent instruction cache when building WASM on ARM64 Mozilla: Bypassing Secure Context restriction for cookies with __Host and __Secure prefix Mozilla: Bypassing FeaturePolicy restrictions on transient pages Mozilla: Data-race when parsing non-UTF-8 URLs in threads Mozilla: Memory safety bugs fixed in Firefox 105 and Firefox ESR 102.3
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | 7.5 | null | null |
GHSA-7ccr-wgh4-75wx
|
The trace_writeback_dirty_page implementation in include/trace/events/writeback.h in the Linux kernel before 4.4 improperly interacts with mm/migrate.c, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by triggering a certain page move.
|
[] | null | null | 7.8 | null | null |
|
CVE-2010-5014
|
SQL injection vulnerability in standings.php in Elite Gaming Ladders 3.5 allows remote attackers to execute arbitrary SQL commands via the ladder[id] parameter.
|
[
"cpe:2.3:a:eliteladders:elite_gaming_ladders:3.5:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-ghm8-6m3x-wv66
|
A memory leak in the rpmsg_eptdev_write_iter() function in drivers/rpmsg/rpmsg_char.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering copy_from_iter_full() failures, aka CID-bbe692e349e2.
|
[] | null | 7.5 | null | null | null |
|
CVE-2024-4172
|
idcCMS cross-site request forgery
|
A vulnerability classified as problematic was found in idcCMS 1.35. Affected by this vulnerability is an unknown functionality of the file /admin/admin_cl.php?mudi=revPwd. The manipulation leads to cross-site request forgery. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-261991.
|
[
"cpe:2.3:a:idccms_project:idccms:-:*:*:*:*:*:*:*"
] | null | 4.3 | 4.3 | 5 | null |
CVE-2023-52120
|
WordPress NEX-Forms β Ultimate Form Builder Plugin <= 8.5.2 is vulnerable to Cross Site Request Forgery (CSRF)
|
Cross-Site Request Forgery (CSRF) vulnerability in Basix NEX-Forms β Ultimate Form Builder β Contact forms and much more.This issue affects NEX-Forms β Ultimate Form Builder β Contact forms and much more: from n/a through 8.5.2.
|
[
"cpe:2.3:a:basixonline:nex-forms:*:*:*:*:*:wordpress:*:*"
] | null | 5.4 | null | null | null |
GHSA-fv74-95jw-rj33
|
In SWFTools 2013-04-09-1007 on Windows, png2swf allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted file, related to a "Read Access Violation starting at image00000000_00400000+0x000000000001b596."
|
[] | null | null | 8.8 | null | null |
|
GHSA-7q4r-r4hp-357v
|
The Aggregator Advanced Settings plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 1.2.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file.
|
[] | null | 6.4 | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.