id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 36
232
⌀ |
---|---|---|---|---|---|---|---|---|
CVE-2024-0120
|
NVIDIA GPU Display Driver for Windows contains a vulnerability in the user mode layer, where an unprivileged regular user can cause an out-of-bounds read. A successful exploit of this vulnerability might lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering.
|
[
"cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:windows:*:*",
"cpe:2.3:a:nvidia:virtual_gpu:*:*:*:*:*:*:*:*",
"cpe:2.3:a:nvidia:cloud_gaming_guest:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
|
RHSA-2018:0475
|
Red Hat Security Advisory: Red Hat OpenShift Container Platform security update
|
kubernetes: Volume security can be sidestepped with innocent emptyDir and subpath kubernetes: Malicious containers can delete any file from the node
|
[
"cpe:/a:redhat:openshift:3.3::el7",
"cpe:/a:redhat:openshift:3.4::el7",
"cpe:/a:redhat:openshift:3.5::el7",
"cpe:/a:redhat:openshift:3.6::el7",
"cpe:/a:redhat:openshift:3.7::el7"
] | null | null | 7.1 | null | null |
CVE-2011-2485
|
The gdk_pixbuf__gif_image_load function in gdk-pixbuf/io-gif.c in gdk-pixbuf before 2.23.5 does not properly handle certain return values, which allows remote attackers to cause a denial of service (memory consumption) via a crafted GIF image file.
|
[
"cpe:2.3:a:gnome:gdk-pixbuf:*:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:gdk-pixbuf:2.22.1:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-fx83-p5c7-qq9h
|
Buffer overflow in the FTP client in the Debian GNU/Linux netstd package.
|
[] | null | null | null | null | null |
|
CVE-2017-11435
|
The Humax Wi-Fi Router model HG100R-* 2.0.6 is prone to an authentication bypass vulnerability via specially crafted requests to the management console. The bug is exploitable remotely when the router is configured to expose the management console. The router is not validating the session token while returning answers for some methods in url '/api'. An attacker can use this vulnerability to retrieve sensitive information such as private/public IP addresses, SSID names, and passwords.
|
[
"cpe:2.3:o:humaxdigital:hg100r_firmware:2.0.6:*:*:*:*:*:*:*",
"cpe:2.3:h:humaxdigital:hg100r:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 | null |
|
GHSA-2f74-23cq-pjc6
|
An arbitrary file download vulnerability in jeecg v3.8 allows attackers to access sensitive files via modification of the "localPath" variable.
|
[] | null | null | null | null | null |
|
GHSA-25qq-8gc4-fhg4
|
In multiple locations, there is a possible failure to persist permissions settings due to resource exhaustion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
|
[] | null | 7.8 | null | null | null |
|
GHSA-h6rm-g8pm-g772
|
An issue in the box_col_len function in openlink virtuoso-opensource v7.2.11 allows attackers to cause a Denial of Service (DoS) after running a SELECT statement.
|
[] | null | 7.5 | null | null | null |
|
ICSA-21-208-03
|
Geutebrück G-Cam E2 and G-Code
|
The affected product allows unauthenticated remote access to sensitive files due to default user authentication settings.CVE-2021-33543 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). The affected product is vulnerable to command injection, which may allow an attacker to remotely execute arbitrary code.CVE-2021-33544 has been assigned to this vulnerability. A CVSS v3 base score of 7.2 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H). The affected product is vulnerable to a stack-based buffer overflow condition in the counter parameter which may allow an attacker to remotely execute arbitrary code.CVE-2021-33545 has been assigned to this vulnerability. A CVSS v3 base score of 7.2 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H). The affected product is vulnerable to a stack-based buffer overflow condition in the name parameter, which may allow an attacker to remotely execute arbitrary code.CVE-2021-33546 has been assigned to this vulnerability. A CVSS v3 base score of 7.2 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H). The affected product is vulnerable to a stack-based buffer overflow condition in the profile parameter which may allow an attacker to remotely execute arbitrary code.CVE-2021-33547 has been assigned to this vulnerability. A CVSS v3 base score of 7.2 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H). The affected product is vulnerable to command injection, which may allow an attacker to remotely execute arbitrary code.CVE-2021-33548 has been assigned to this vulnerability. A CVSS v3 base score of 7.2 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H). The affected product is vulnerable to a stack-based buffer overflow condition in the action parameter, which may allow an attacker to remotely execute arbitrary code.CVE-2021-33549 has been assigned to this vulnerability. A CVSS v3 base score of 7.2 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H). The affected product is vulnerable to command injection, which may allow an attacker to remotely execute arbitrary code.CVE-2021-33550 has been assigned to this vulnerability. A CVSS v3 base score of 7.2 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H). The affected product is vulnerable to command injection, which may allow an attacker to remotely execute arbitrary code.CVE-2021-33551 has been assigned to this vulnerability. A CVSS v3 base score of 7.2 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H). The affected product is vulnerable to command injection, which may allow an attacker to remotely execute arbitrary code.CVE-2021-33552 has been assigned to this vulnerability. A CVSS v3 base score of 7.2 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H). The affected product is vulnerable to command injection, which may allow an attacker to remotely execute arbitrary code.CVE-2021-33553 has been assigned to this vulnerability. A CVSS v3 base score of 7.2 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H). The affected product is vulnerable to command injection, which may allow an attacker to remotely execute arbitrary code.CVE-2021-33554 has been assigned to this vulnerability. A CVSS v3 base score of 7.2 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H).
|
[] | null | null | 7.2 | null | null |
CVE-2015-8280
|
Web Viewer 1.0.0.193 on Samsung SRN-1670D devices allows remote attackers to discover credentials by reading detailed error messages.
|
[
"cpe:2.3:a:samsung:web_viewer:*:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 | null |
|
CVE-2023-0258
|
SourceCodester Online Food Ordering System Category List cross site scripting
|
A vulnerability was found in SourceCodester Online Food Ordering System 2.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the component Category List Handler. The manipulation of the argument Reason with the input "><script>prompt(1)</script> leads to cross site scripting. The attack may be launched remotely. VDB-218186 is the identifier assigned to this vulnerability.
|
[
"cpe:2.3:a:online_food_ordering_system_project:online_food_ordering_system:2.0:*:*:*:*:*:*:*"
] | null | 2.4 | 2.4 | 3.3 | null |
GHSA-qf4p-jmcc-vw8h
|
Multiple stack-based buffer overflows in http.c in OpenConnect before 4.08 allow remote VPN gateways to cause a denial of service (application crash) via a long (1) hostname, (2) path, or (3) cookie list in a response.
|
[] | null | null | null | null | null |
|
GHSA-crrq-vr9j-fxxh
|
Protected fields exposed via LiveQuery
|
ImpactParse Server LiveQuery does not remove protected fields in classes, passing them to the client.PatchesThe LiveQueryController now removes protected fields from the client response.WorkaroundsUse `Parse.Cloud.afterLiveQueryEvent` to manually remove protected fields.Referenceshttps://github.com/parse-community/parse-server/security/advisories/GHSA-crrq-vr9j-fxxhhttps://github.com/parse-community/parse-serverFor more informationIf you have any questions or comments about this advisory:For questions or comments about this vulnerability visit our [community forum](http://community.parseplatform.org/) or [community chat](http://chat.parseplatform.org/)Report other vulnerabilities at [report.parseplatform.org](https://report.parseplatform.org/)
|
[] | null | 8.2 | null | null | null |
GHSA-qwqw-pj6q-q5rj
|
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier and JavaFX 2.2.7 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to JavaFX, a different vulnerability than CVE-2013-0402, CVE-2013-2427, and CVE-2013-2428.
|
[] | null | null | null | null | null |
|
GHSA-j8fx-r46g-pr83
|
Adobe ColdFusion versions Update 14 (and earlier) and Update 4 (and earlier) are affected by an Improper Restriction of XML External Entity Reference ('XXE') vulnerability that could result in arbitrary file system read. Exploitation of this issue does not require user interaction.
|
[] | null | 7.5 | null | null | null |
|
CVE-2020-11623
|
An issue was discovered in AvertX Auto focus Night Vision HD Indoor/Outdoor IP Dome Camera HD838 and Night Vision HD Indoor/Outdoor Mini IP Bullet Camera HD438. An attacker with physical access to the UART interface could access additional diagnostic and configuration functionalities as well as the camera's bootloader. Successful exploitation could compromise confidentiality, integrity, and availability of the affected system. It could even render the device inoperable.
|
[
"cpe:2.3:o:avertx:hd838_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:avertx:hd838:-:*:*:*:*:*:*:*",
"cpe:2.3:o:avertx:hd438_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:avertx:hd438:-:*:*:*:*:*:*:*"
] | null | 6.8 | null | 7.2 | null |
|
GHSA-q33g-frvq-p7gc
|
SQL injection vulnerability in blog.asp in ParsBlogger (Pb) allows remote attackers to execute arbitrary SQL commands via the wr parameter.
|
[] | null | null | null | null | null |
|
CVE-2024-27917
|
Shopware's session is persistent in Cache for 404 pages
|
Shopware is an open commerce platform based on Symfony Framework and Vue. The Symfony Session Handler pops the Session Cookie and assigns it to the Response. Since Shopware 6.5.8.0, the 404 pages are cached to improve the performance of 404 pages. So the cached Response which contains a Session Cookie when the Browser accessing the 404 page, has no cookies yet. The Symfony Session Handler is in use, when no explicit Session configuration has been done. When Redis is in use for Sessions using the PHP Redis extension, this exploiting code is not used. Shopware version 6.5.8.7 contains a patch for this issue. As a workaround, use Redis for Sessions, as this does not trigger the exploit code.
|
[
"cpe:2.3:a:shopware:shopware:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
GHSA-237f-7hfc-5r9q
|
Themify Portfolio Post WordPress plugin before 1.2.1 does not validate and escapes some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as a contributor to perform Stored Cross-Site Scripting attacks, which could be used against high privileged users such as admin.
|
[] | null | 5.4 | null | null | null |
|
RHSA-2014:0500
|
Red Hat Security Advisory: struts security update
|
1: Class Loader manipulation via request parameters
|
[
"cpe:/a:redhat:network_satellite:5.4::el6",
"cpe:/a:redhat:network_satellite:5.5::el6",
"cpe:/a:redhat:network_satellite:5.6::el6"
] | null | null | null | null | null |
CVE-2019-0105
|
Insufficient file permissions checking in install routine for Intel(R) Data Center Manager SDK before version 5.0.2 may allow authenticated user to potentially enable escalation of privilege via local access.
|
[
"cpe:2.3:a:intel:data_center_manager:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | 4.6 | null |
|
PYSEC-2021-840
| null |
A dependency confusion vulnerability was reported in the Antilles open-source software prior to version 1.0.1 that could allow for remote code execution during installation due to a package listed in requirements.txt not existing in the public package index (PyPi). MITRE classifies this weakness as an Uncontrolled Search Path Element (CWE-427) in which a private package dependency may be replaced by an unauthorized package of the same name published to a well-known public repository such as PyPi. The configuration has been updated to only install components built by Antilles, removing all other public package indexes. Additionally, the antilles-tools dependency has been published to PyPi.
|
[] | null | null | null | null | null |
CVE-2024-30351
|
Foxit PDF Reader AcroForm Use-After-Free Remote Code Execution Vulnerability
|
Foxit PDF Reader AcroForm Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the handling of Doc objects in AcroForms. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-22799.
|
[
"cpe:2.3:a:foxit:pdf_reader:-:*:*:*:*:*:*:*",
"cpe:2.3:a:foxit:pdf_editor:11.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:foxit:pdf_editor:12.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:foxit:pdf_editor:13.0:*:*:*:*:*:*:*",
"cpe:2.3:a:foxit:pdf_editor:2023.0:*:*:*:*:*:*:*"
] | null | null | 7.8 | null | null |
CVE-2017-17806
|
The HMAC implementation (crypto/hmac.c) in the Linux kernel before 4.14.8 does not validate that the underlying cryptographic hash algorithm is unkeyed, allowing a local attacker able to use the AF_ALG-based hash interface (CONFIG_CRYPTO_USER_API_HASH) and the SHA-3 hash algorithm (CONFIG_CRYPTO_SHA3) to cause a kernel stack buffer overflow by executing a crafted sequence of system calls that encounter a missing SHA-3 initialization.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse_project:leap:42.3:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_desktop:12:sp2:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_desktop:12:sp3:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:11:extra:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:12:sp2:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:12:sp3:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_server_for_raspberry_pi:12:sp2:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*"
] | null | 7.8 | null | 7.2 | null |
|
CVE-2023-22016
|
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 6.1.46 and Prior to 7.0.10. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox. CVSS 3.1 Base Score 4.2 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H).
|
[
"cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*"
] | null | 4.2 | null | null | null |
|
GHSA-m2cc-r4gc-qq4v
|
IBM OpenPages with Watson 8.3 and 9.0 is vulnerable to cross-site scripting. This vulnerability allows an authenticated user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.
|
[] | null | 5.4 | null | null | null |
|
CVE-2020-24313
|
Etoile Web Design Ultimate Appointment Booking & Scheduling WordPress Plugin v1.1.9 and lower does not sanitize the value of the "Appointment_ID" GET parameter before echoing it back out inside an input tag. This results in a reflected XSS vulnerability that attackers can exploit with a specially crafted URL.
|
[
"cpe:2.3:a:etoilewebdesign:ultimate_appointment_booking_\\&_scheduling:*:*:*:*:*:wordpress:*:*"
] | null | 6.1 | null | 4.3 | null |
|
GHSA-r6wx-j8f2-9xr4
|
Multiple unspecified vulnerabilities in the IBM Proventia engine 4.9.0.0.44 20081231, as used in IBM Proventia Network Mail Security System, Network Mail Security System Virtual Appliance, Desktop Endpoint Security, Network Multi-Function Security (MFS), and possibly other products, allow remote attackers to bypass detection of malware via a modified (1) ZIP or (2) CAB archive, a related issue to CVE-2009-1240.
|
[] | null | null | null | null | null |
|
CVE-2017-20006
|
UnRAR 5.6.1.2 and 5.6.1.3 has a heap-based buffer overflow in Unpack::CopyString (called from Unpack::Unpack5 and CmdExtract::ExtractCurrentFile).
|
[
"cpe:2.3:a:rarlab:unrar:5.6.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:rarlab:unrar:5.6.1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | 6.8 | null |
|
GHSA-28cc-22jj-c7j2
|
Cross-site scripting (XSS) vulnerability in the login page in the Administrative Web Interface on Dell iDRAC6 monolithic devices with firmware before 1.96 and iDRAC7 devices with firmware before 1.46.45 allows remote attackers to inject arbitrary web script or HTML via the ErrorMsg parameter.
|
[] | null | null | null | null | null |
|
CVE-2025-54573
|
CVAT vulnerable to email verification bypass by use of basic authentication
|
CVAT is an open source interactive video and image annotation tool for computer vision. In versions 1.1.0 through 2.41.0, email verification was not enforced when using Basic HTTP Authentication. As a result, users could create accounts using fake email addresses and use the product as verified users. Additionally, the missing email verification check leaves the system open to bot signups and further usage. CVAT 2.42.0 and later versions contain a fix for the issue. CVAT Enterprise customers have a workaround available; those customers may disable registration to prevent this issue.
|
[] | null | 4.3 | null | null | null |
CVE-2017-17940
|
PHP Scripts Mall Single Theater Booking has XSS via the title parameter to admin/sitesettings.php.
|
[
"cpe:2.3:a:single_theater_booking_script_project:single_theater_booking_script:3.2.2:*:*:*:*:*:*:*"
] | null | null | 4.8 | 3.5 | null |
|
GHSA-xv69-hhpr-w3r5
|
Html-edit CMS 3.1.8 allows remote attackers to obtain sensitive information via a direct request to (1) pages.php and (2) menu.php in includes/core_files and (3) extensions/login/frontend/pages/antihacker.php, which reveals the installation path in an error message.
|
[] | null | null | null | null | null |
|
CVE-2006-2978
|
Mafia Moblog 0.6M1 and earlier allows remote attackers to obtain the installation path in an error message via a direct request to (1) big.php and (2) upgrade.php.
|
[
"cpe:2.3:a:mafia_moblog:mafia_moblog:*:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
CVE-2024-50078
|
Bluetooth: Call iso_exit() on module unload
|
In the Linux kernel, the following vulnerability has been resolved:
Bluetooth: Call iso_exit() on module unload
If iso_init() has been called, iso_exit() must be called on module
unload. Without that, the struct proto that iso_init() registered with
proto_register() becomes invalid, which could cause unpredictable
problems later. In my case, with CONFIG_LIST_HARDENED and
CONFIG_BUG_ON_DATA_CORRUPTION enabled, loading the module again usually
triggers this BUG():
list_add corruption. next->prev should be prev (ffffffffb5355fd0),
but was 0000000000000068. (next=ffffffffc0a010d0).
------------[ cut here ]------------
kernel BUG at lib/list_debug.c:29!
Oops: invalid opcode: 0000 [#1] PREEMPT SMP PTI
CPU: 1 PID: 4159 Comm: modprobe Not tainted 6.10.11-4+bt2-ao-desktop #1
RIP: 0010:__list_add_valid_or_report+0x61/0xa0
...
__list_add_valid_or_report+0x61/0xa0
proto_register+0x299/0x320
hci_sock_init+0x16/0xc0 [bluetooth]
bt_init+0x68/0xd0 [bluetooth]
__pfx_bt_init+0x10/0x10 [bluetooth]
do_one_initcall+0x80/0x2f0
do_init_module+0x8b/0x230
__do_sys_init_module+0x15f/0x190
do_syscall_64+0x68/0x110
...
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
CVE-2014-7788
|
The Best Free Giveaways (aka com.wIphone5GiveAways) application 0.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
|
[
"cpe:2.3:a:best_free_giveaways_project:best_free_giveaways:0.1:*:*:*:*:android:*:*"
] | null | null | null | 5.4 | null |
|
CVE-2024-53760
|
WordPress Capitalize My Title WordPress plugin <= 0.5.3 - Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Capitalize My Title allows Stored XSS.This issue affects Capitalize My Title: from n/a through 0.5.3.
|
[] | null | 6.5 | null | null | null |
CVE-2015-3223
|
The ldb_wildcard_compare function in ldb_match.c in ldb before 1.1.24, as used in the AD LDAP server in Samba 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, mishandles certain zero values, which allows remote attackers to cause a denial of service (infinite loop) via crafted packets.
|
[
"cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.0.21:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.0.22:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.0.23:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.0.24:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.1.12:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.1.13:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.1.14:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.1.15:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.1.16:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.1.17:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.1.18:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.1.19:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.1.20:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.1.21:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.3.2:*:*:*:*:*:*:*"
] | null | null | 5.3 | 5 | null |
|
GHSA-mgfj-qcpq-xx99
|
A vulnerability was discovered in vdsm, version 4.19 through 4.30.3 and 4.30.5 through 4.30.8. The systemd_run function exposed to the vdsm system user could be abused to execute arbitrary commands as root.
|
[] | null | 6.7 | null | null | null |
|
CVE-2024-23624
|
D-Link DAP-1650 gena.cgi SUBSCRIBE Command Injection Vulnerability
|
A command injection vulnerability exists in the gena.cgi module of D-Link DAP-1650 devices. An unauthenticated attacker can exploit this vulnerability to gain command execution on the device as root.
|
[
"cpe:2.3:o:dlink:dap-1650_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dap-1650:-:*:*:*:*:*:*:*"
] | null | 9.6 | null | 8.3 | null |
CVE-2018-20410
|
WellinTech KingSCADA before 3.7.0.0.1 contains a stack-based buffer overflow. The vulnerability is triggered when sending a specially crafted packet to the AlarmServer (AEserver.exe) service listening on TCP port 12401.
|
[
"cpe:2.3:a:wellintech:kingscada:*:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 | null |
|
GHSA-cqp4-63c9-vpm9
|
AlienVault USM and OSSIM before 5.3.7 and NfSen before 1.3.8 allow local users to execute arbitrary commands in a privileged context via an NfSen socket, aka AlienVault ID ENG-104863.
|
[] | null | null | 8.4 | null | null |
|
GHSA-pp88-5vm8-r9cr
|
Episerver Ektron CMS before 9.0 SP3 Site CU 31, 9.1 before SP3 Site CU 45, or 9.2 before SP2 Site CU 22 allows remote attackers to call aspx pages via the "activateuser.aspx" page, even if a page is located under the /WorkArea/ path, which is forbidden (normally available exclusively for local admins).
|
[] | null | null | 9.8 | null | null |
|
GHSA-j324-jf2f-2wjh
|
An issue in the mp_box_copy component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
|
[] | null | 7.5 | null | null | null |
|
CVE-2018-7274
|
Yab Quarx through 2.4.3 is prone to multiple persistent cross-site scripting vulnerabilities: Blog (Title), FAQ (Question), Pages (Title), Widgets (Name), and Menus (Name).
|
[
"cpe:2.3:a:quarx_cms_project:quarx_cms:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 | null |
|
CVE-2016-9008
|
IBM UrbanCode Deploy could allow a malicious user to access the Agent Relay ActiveMQ Broker JMX interface and run plugins on the agent.
|
[
"cpe:2.3:a:ibm:urbancode_deploy:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.0.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.0.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.0.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.0.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.0.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.0.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.0.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.0.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.0.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.0.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.0.1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.0.1.12:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.0.1.13:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.0.1.14:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.1.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.1.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.1.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.1.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.1.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.1.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.2.2.1:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 | null |
|
GHSA-h8vr-6vfm-c62r
|
, aka 'Microsoft Exchange Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-17132, CVE-2020-17141, CVE-2020-17142, CVE-2020-17144.
|
[] | null | 6.6 | null | null | null |
|
CVE-2022-46423
|
An exploitable firmware modification vulnerability was discovered on the Netgear WNR2000v1 router. An attacker can conduct a MITM (Man-in-the-Middle) attack to modify the user-uploaded firmware image and bypass the CRC check, allowing attackers to execute arbitrary code or cause a Denial of Service (DoS). This affects v1.2.3.7 and earlier.
|
[
"cpe:2.3:o:netgear:wnr2000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wnr2000:1.0:*:*:*:*:*:*:*"
] | null | 8.1 | null | null | null |
|
GHSA-8fvc-4frw-3hwh
|
Multiple stack-based buffer overflows in the LookupTRM::lookup function in libtunepimp (TunePimp) 0.4.2 allow remote user-assisted attackers to cause a denial of service (application crash) and possibly execute code via a long (1) Album release date (MBE_ReleaseGetDate), (2) data, or (3) error strings.
|
[] | null | null | null | null | null |
|
GHSA-4279-qvh5-v435
|
Sahi Pro 8.0.0 has a script manager arena located at _s_/dyn/pro/DBReports with many different areas that are vulnerable to reflected XSS, by updating a script's Script Name, Suite Name, Base URL, Android, iOS, Scripts Run, Origin Machine, or Comment field. The sql parameter can be used to trigger reflected XSS.
|
[] | null | 6.1 | null | null | null |
|
CVE-2024-9426
|
Aqua SVG Sprite <= 3.0.14 - Authenticated (Author+) Stored Cross-Site Scripting via SVG File Upload
|
The Aqua SVG Sprite plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 3.0.14 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file.
|
[] | null | 6.4 | null | null | null |
GHSA-vvmg-r8xj-p43w
|
The Easy Social Feed Free and Pro WordPress plugins before 6.2.7 do not sanitise some of their parameters used via AJAX actions before outputting them back in the response, leading to Reflected Cross-Site Scripting issues
|
[] | null | 6.1 | null | null | null |
|
CVE-2017-11591
|
There is a Floating point exception in the Exiv2::ValueType function in Exiv2 0.26 that will lead to a remote denial of service attack via crafted input.
|
[
"cpe:2.3:a:exiv2:exiv2:0.26:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null |
|
GHSA-gg6p-qwfj-xrx2
|
Microsoft Edge in Microsoft Windows 1703 allows an attacker to execute arbitrary code in the context of the current user, due to the way that Microsoft Edge accesses objects in memory, aka "Microsoft Edge Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8731, CVE-2017-8734, and CVE-2017-11766.
|
[] | null | null | 7.5 | null | null |
|
CVE-2023-5329
|
Field Logic DataCube4 Web API improper authentication
|
A vulnerability classified as problematic was found in Field Logic DataCube4 up to 20231001. This vulnerability affects unknown code of the file /api/ of the component Web API. The manipulation leads to improper authentication. The exploit has been disclosed to the public and may be used. VDB-241030 is the identifier assigned to this vulnerability.
|
[
"cpe:2.3:o:f-logic:datacube4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:f-logic:datacube4:-:*:*:*:*:*:*:*"
] | null | 4.3 | 4.3 | 3.3 | null |
CVE-2024-1006
|
Shanxi Diankeyun Technology NODERP Cookie common.php improper authentication
|
A vulnerability was found in Shanxi Diankeyun Technology NODERP up to 6.0.2 and classified as critical. This issue affects some unknown processing of the file application/index/common.php of the component Cookie Handler. The manipulation of the argument Nod_User_Id/Nod_User_Token leads to improper authentication. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-252275. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
|
[
"cpe:2.3:a:shanxi_tianneng_technology:noderp:*:*:*:*:*:*:*:*"
] | null | 7.3 | 7.3 | 7.5 | null |
GHSA-9qr6-r6j4-qfxh
|
Cross-Site Request Forgery (CSRF) vulnerability in realmag777 WPCS.This issue affects WPCS: from n/a through 1.2.0.1.
|
[] | null | 4.3 | null | null | null |
|
GHSA-xrwr-3m4h-cqcx
|
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 7.0.16. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H).
|
[] | null | 8.8 | null | null | null |
|
CVE-2002-1393
|
Multiple vulnerabilities in KDE 2 and KDE 3.x through 3.0.5 do not quote certain parameters that are inserted into a shell command, which could allow remote attackers to execute arbitrary commands via (1) URLs, (2) filenames, or (3) e-mail addresses.
|
[
"cpe:2.3:o:kde:kde:2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:kde:kde:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:kde:kde:2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:kde:kde:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:kde:kde:2.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:kde:kde:2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:kde:kde:2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:kde:kde:2.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:kde:kde:3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:kde:kde:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:kde:kde:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:kde:kde:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:kde:kde:3.0.3a:*:*:*:*:*:*:*",
"cpe:2.3:o:kde:kde:3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:kde:kde:3.0.5:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2020-36452
|
An issue was discovered in the array-tools crate before 0.3.2 for Rust. FixedCapacityDequeLike::clone() has a drop of uninitialized memory.
|
[
"cpe:2.3:a:array-tools_project:array-tools:*:*:*:*:*:rust:*:*"
] | null | 9.8 | null | 7.5 | null |
|
GHSA-wff4-qpc5-x39p
|
An elevation of privilege vulnerability exists when the Windows Storage Services improperly handle file operations, aka 'Windows Storage Services Elevation of Privilege Vulnerability'.
|
[] | null | 7.8 | null | null | null |
|
CVE-2021-31813
|
Zoho ManageEngine Applications Manager before 15130 is vulnerable to Stored XSS while importing malicious user details (e.g., a crafted user name) from AD.
|
[
"cpe:2.3:a:zohocorp:manageengine_applications_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_applications_manager:15.1:-:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_applications_manager:15.1:15100:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_applications_manager:15.1:15110:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_applications_manager:15.1:15120:*:*:*:*:*:*"
] | null | 5.4 | null | 3.5 | null |
|
CVE-2021-35090
|
Possible hypervisor memory corruption due to TOC TOU race condition when updating address mappings in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile
|
[
"cpe:2.3:o:qualcomm:aqt1000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:aqt1000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6390_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6390:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6391:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6420_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6420:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6421_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6421:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6426_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6426:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6430_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6430:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6431_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6431:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6436_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6436:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcm6490_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcm6490:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs6490_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs6490:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qrb5165_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qrb5165:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qrb5165m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qrb5165m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qrb5165n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qrb5165n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qsm8350_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qsm8350:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8540p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8540p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa9000p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa9000p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_8cx_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_8cx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_8cx_gen2_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_8cx_gen2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd690_5g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd690_5g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd750g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd750g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd765_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd765:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd765g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd765g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd768g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd768g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd778g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd778g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd780g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd780g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd865_5g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd865_5g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd870_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd870:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd888_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd888:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd888_5g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd888_5g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx55m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx55m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdxr2_5g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdxr2_5g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm7250p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm7250p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm7315_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm7315:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm7325p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm7325p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9340_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9340:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9341_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9341:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9375:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3988:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3991_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3991:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3998_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3998:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6740_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6740:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6750_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6750:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6850_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6850:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6851_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6851:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6855_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6855:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6856_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6856:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn7850_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn7850:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn7851_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn7851:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8810:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8815:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*"
] | null | 9.3 | null | null | null |
|
CVE-2018-25078
|
man-db before 2.8.5 on Gentoo allows local users (with access to the man user account) to gain root privileges because /usr/bin/mandb is executed by root but not owned by root. (Also, the owner can strip the setuid and setgid bits.)
|
[
"cpe:2.3:a:man-db_project:man-db:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
|
GHSA-g569-h99m-5m3g
|
Microsoft Excel 2007 SP3, Office Compatibility Pack SP3, and Excel Viewer allow remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Office Memory Corruption Vulnerability."
|
[] | null | null | null | null | null |
|
GHSA-4g69-39rh-x4q7
|
IBM Sterling File Gateway 2.2.0.0 through 6.1.1.0 could allow an authenticated user to intercept and replace a message sent by another user due to improper access controls. IBM X-Force ID: 195567.
|
[] | null | 6.5 | null | null | null |
|
CVE-2019-15739
|
An issue was discovered in GitLab Community and Enterprise Edition 8.1 through 12.2.1. Certain areas displaying Markdown were not properly sanitizing some XSS payloads.
|
[
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*"
] | null | 6.1 | null | 4.3 | null |
|
RHSA-2021:4669
|
Red Hat Security Advisory: devtoolset-11-gcc security update
|
environment: Unicode's bidirectional (BiDi) override characters can cause trojan source attacks
|
[
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 8.5 | null | null | null |
CVE-2021-22748
|
A CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability exists that could allow a remote code execution when a file is saved. Affected Product: C-Bus Toolkit (V1.15.9 and prior), C-Gate Server (V2.11.7 and prior)
|
[
"cpe:2.3:a:schneider-electric:c-bus_toolkit:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.5 | null |
|
GHSA-q7pf-9472-q6v6
|
Directory traversal vulnerability in index.php in OZJournals 2.1.1 allows remote attackers to read portions of arbitrary files via a .. (dot dot) in the id parameter in a printpreview action.
|
[] | null | null | null | null | null |
|
CVE-2004-0454
|
Buffer overflow in the msg function for rlpr daemon (rlprd) 2.04 allows local users to execute arbitrary code.
|
[
"cpe:2.3:a:rlpr:rlpr:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:rlpr:rlpr:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:rlpr:rlpr:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:rlpr:rlpr:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:rlpr:rlpr:2.0.4:*:*:*:*:*:*:*"
] | null | null | null | 7.2 | null |
|
ICSA-20-063-01
|
Emerson ValveLink
|
A vulnerability in the ValveLink software may allow a local, unprivileged, trusted insider to escalate privileges due to insecure configuration parameters.CVE-2020-6971 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).
|
[] | null | null | 7.8 | null | null |
GHSA-85r2-fvq8-6xw9
|
Buffer overflow in the C cli shell in Apache Zookeeper before 3.4.9 and 3.5.x before 3.5.3, when using the "cmd:" batch mode syntax, allows attackers to have unspecified impact via a long command string.
|
[] | null | null | 8.1 | null | null |
|
CVE-2010-4296
|
vmware-mount in VMware Workstation 7.x before 7.1.2 build 301548 on Linux, VMware Player 3.1.x before 3.1.2 build 301548 on Linux, VMware Server 2.0.2 on Linux, and VMware Fusion 3.1.x before 3.1.2 build 332101 does not properly load libraries, which allows host OS users to gain privileges via vectors involving shared object files.
|
[
"cpe:2.3:a:vmware:workstation:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workstation:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workstation:7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workstation:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workstation:7.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:player:3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:player:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:player:3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:server:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:fusion:3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:fusion:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:fusion:3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*"
] | null | null | null | 7.2 | null |
|
CVE-2020-1147
|
A remote code execution vulnerability exists in .NET Framework, Microsoft SharePoint, and Visual Studio when the software fails to check the source markup of XML file input, aka '.NET Framework, SharePoint Server, and Visual Studio Remote Code Execution Vulnerability'.
|
[
"cpe:2.3:a:microsoft:.net_core:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:.net_core:3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:.net_framework:2.0:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:.net_framework:3.0:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:.net_framework:3.5:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:.net_framework:4.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:.net_framework:4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:.net_framework:4.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:.net_framework:4.7.2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:.net_framework:4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:.net_framework:4.6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:.net_framework:4.8:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:.net_framework:3.5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:a:microsoft:.net_framework:4.5.2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_enterprise_server:2013:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_enterprise_server:2016:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_server:2010:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_server:2019:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:visual_studio_2017:*:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | 6.8 | null |
|
GHSA-gpq6-gjjq-8cjj
|
Unspecified vulnerability in the Oracle WebLogic Server component in Oracle Fusion Middleware 10.0.2.0, 10.3.6.0, 12.1.1.0, 12.1.2.0, and 12.1.3.0 allows remote authenticated users to affect integrity via vectors related to WLS Console.
|
[] | null | null | null | null | null |
|
GHSA-8389-46wh-fgf3
|
Apple Type Services (ATS) in Apple OS X before 10.10.4 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted font file, a different vulnerability than CVE-2015-3679, CVE-2015-3680, and CVE-2015-3681.
|
[] | null | null | null | null | null |
|
CVE-2017-14329
|
Extreme EXOS 16.x, 21.x, and 22.x allows administrators to obtain a root shell via vectors involving an exsh debug shell.
|
[
"cpe:2.3:o:extremenetworks:extremexos:15.7:*:*:*:*:*:*:*",
"cpe:2.3:o:extremenetworks:extremexos:16.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:extremenetworks:extremexos:16.1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:extremenetworks:extremexos:16.1.4:*:*:*:*:*:*:*",
"cpe:2.3:o:extremenetworks:extremexos:16.2:*:*:*:*:*:*:*",
"cpe:2.3:o:extremenetworks:extremexos:16.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:extremenetworks:extremexos:16.2.3:*:*:*:*:*:*:*",
"cpe:2.3:o:extremenetworks:extremexos:16.2.4:*:*:*:*:*:*:*",
"cpe:2.3:o:extremenetworks:extremexos:21.1:*:*:*:*:*:*:*",
"cpe:2.3:o:extremenetworks:extremexos:21.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:extremenetworks:extremexos:21.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:extremenetworks:extremexos:21.1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:extremenetworks:extremexos:21.1.4:*:*:*:*:*:*:*",
"cpe:2.3:o:extremenetworks:extremexos:22.1:*:*:*:*:*:*:*",
"cpe:2.3:o:extremenetworks:extremexos:22.2:*:*:*:*:*:*:*",
"cpe:2.3:o:extremenetworks:extremexos:22.3:*:*:*:*:*:*:*",
"cpe:2.3:o:extremenetworks:extremexos:22.4:*:*:*:*:*:*:*"
] | null | null | 6.7 | 7.2 | null |
|
GHSA-9xh2-rhpf-vx4p
|
The (1) dist or (2) distcheck rules in GNU Automake 1.11.1, 1.10.3, and release branches branch-1-4 through branch-1-9, when producing a distribution tarball for a package that uses Automake, assign insecure permissions (777) to directories in the build tree, which introduces a race condition that allows local users to modify the contents of package files, introduce Trojan horse programs, or conduct other attacks before the build is complete.
|
[] | null | null | null | null | null |
|
CVE-2011-3795
|
Podcast Generator 1.3 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by core/themes.php and certain other files.
|
[
"cpe:2.3:a:betella:podcast_generator:1.3:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
RHSA-2022:7273
|
Red Hat Security Advisory: Red Hat JBoss Web Server 5.7.0 release and security update
|
cxf: OAuth 2 authorization service vulnerable to DDos attacks CXF: Denial of service vulnerability in parsing JSON via JsonMapObjectReaderWriter Tomcat: Information disclosure tomcat: local privilege escalation vulnerability
|
[
"cpe:/a:redhat:jboss_enterprise_web_server:5.7"
] | null | 7 | null | null | null |
GHSA-8v9w-rjhh-f92v
|
The dissect_dcm_main function in epan/dissectors/packet-dcm.c in the DICOM dissector in Wireshark 1.2.x before 1.2.17 and 1.4.x before 1.4.7 allows remote attackers to cause a denial of service (infinite loop) via an invalid PDU length.
|
[] | null | null | null | null | null |
|
GHSA-6r86-2jm9-9mh4
|
File upload restriction bypass in Zenario CMS
|
Zenario CMS 9.2 allows an authenticated admin user to bypass the file upload restriction by creating a new 'File/MIME Types' using the '.phar' extension. Then an attacker can upload a malicious file, intercept the request and change the extension to '.phar' in order to run commands on the server.
|
[] | null | 7.2 | null | null | null |
CVE-2011-3112
|
Use-after-free vulnerability in the PDF functionality in Google Chrome before 19.0.1084.52 allows remote attackers to cause a denial of service or possibly have unspecified other impact via an invalid encrypted document.
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1028.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1029.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1030.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1031.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1032.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1033.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1034.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1035.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1036.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1036.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1036.3:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1036.4:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1036.6:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1036.7:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1037.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1038.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1039.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1040.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1041.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1042.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1043.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1044.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1045.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1046.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1047.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1048.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1049.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1049.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1049.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1049.3:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1050.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1051.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1052.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1053.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1054.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1055.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1055.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1055.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1055.3:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1056.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1056.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1057.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1057.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1057.3:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1058.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1058.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1059.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1060.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1060.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1061.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1061.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1062.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1062.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1063.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1063.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1064.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1065.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1066.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1067.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1068.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1068.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1069.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1070.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1071.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1072.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1073.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1074.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1075.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1076.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1076.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1077.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1077.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1077.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1077.3:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1078.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1079.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1080.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1081.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1081.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1082.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1082.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1083.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.3:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.4:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.5:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.6:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.7:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.8:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.9:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.10:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.11:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.12:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.13:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.14:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.15:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.16:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.17:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.18:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.19:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.20:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.21:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.22:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.23:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.24:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.25:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.26:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.27:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.28:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.29:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.30:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.31:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.32:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.33:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.35:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.36:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.37:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.38:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.39:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.40:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.41:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.42:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.43:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.44:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.45:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.46:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.47:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.48:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:19.0.1084.50:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-gx4q-m69p-mf52
|
The DVC from TRCore has a Path Traversal vulnerability and does not restrict the types of uploaded files. This allows unauthenticated remote attackers to upload arbitrary files to any directory, leading to arbitrary code execution by uploading webshells.
|
[] | null | 9.8 | null | null | null |
|
CVE-2020-13820
|
Extreme Management Center 8.4.1.24 allows unauthenticated reflected XSS via a parameter in a GET request.
|
[
"cpe:2.3:a:extremenetworks:extreme_management_center:8.4.1.24:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 | null |
|
CVE-2021-34122
|
The function bitstr_tell at bitstr.c in ffjpeg commit 4ab404e has a NULL pointer dereference.
|
[
"cpe:2.3:a:rockcarry:ffjpeg:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | 4.3 | null |
|
GHSA-f879-mjh4-rc2f
|
A security feature bypass vulnerability exists in Windows Scripting Host which could allow an attacker to bypass Device Guard, aka "Windows Security Feature Bypass Vulnerability." This affects Windows Server 2016, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-0958, CVE-2018-8129, CVE-2018-8132.
|
[] | null | null | 5.3 | null | null |
|
CVE-2008-5677
|
Unrestricted file upload vulnerability in Kwalbum 2.0.4, 2.0.2, and earlier, when PICS_PATH is located in the web root, allows remote authenticated users with upload capability to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file under items/, related to the ReplaceBadFilenameChars function in include/ItemAdder.php. NOTE: some of these details are obtained from third party information.
|
[
"cpe:2.3:a:kwalbum:kwalbum:*:*:*:*:*:*:*:*",
"cpe:2.3:a:kwalbum:kwalbum:0.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:kwalbum:kwalbum:0.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:kwalbum:kwalbum:0.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:kwalbum:kwalbum:0.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:kwalbum:kwalbum:0.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:kwalbum:kwalbum:0.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:kwalbum:kwalbum:0.5.8:*:*:*:*:*:*:*",
"cpe:2.3:a:kwalbum:kwalbum:0.5.9:*:*:*:*:*:*:*",
"cpe:2.3:a:kwalbum:kwalbum:0.5.10:*:*:*:*:*:*:*",
"cpe:2.3:a:kwalbum:kwalbum:0.5.11:*:*:*:*:*:*:*",
"cpe:2.3:a:kwalbum:kwalbum:0.5.12:*:*:*:*:*:*:*",
"cpe:2.3:a:kwalbum:kwalbum:0.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:kwalbum:kwalbum:0.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:kwalbum:kwalbum:0.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:kwalbum:kwalbum:0.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:kwalbum:kwalbum:0.6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:kwalbum:kwalbum:0.6.7:*:*:*:*:*:*:*",
"cpe:2.3:a:kwalbum:kwalbum:0.6.8:*:*:*:*:*:*:*",
"cpe:2.3:a:kwalbum:kwalbum:0.6.9:*:*:*:*:*:*:*",
"cpe:2.3:a:kwalbum:kwalbum:0.6.10:*:*:*:*:*:*:*",
"cpe:2.3:a:kwalbum:kwalbum:0.6.11:*:*:*:*:*:*:*",
"cpe:2.3:a:kwalbum:kwalbum:0.6.12:*:*:*:*:*:*:*",
"cpe:2.3:a:kwalbum:kwalbum:0.6.13:*:*:*:*:*:*:*",
"cpe:2.3:a:kwalbum:kwalbum:0.6.14:*:*:*:*:*:*:*",
"cpe:2.3:a:kwalbum:kwalbum:0.6.15:*:*:*:*:*:*:*",
"cpe:2.3:a:kwalbum:kwalbum:0.6.16:*:*:*:*:*:*:*",
"cpe:2.3:a:kwalbum:kwalbum:0.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:kwalbum:kwalbum:0.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:kwalbum:kwalbum:0.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:kwalbum:kwalbum:0.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:kwalbum:kwalbum:0.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:kwalbum:kwalbum:0.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:kwalbum:kwalbum:0.9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:kwalbum:kwalbum:0.9.4:*:*:*:*:*:*:*",
"cpe:2.3:a:kwalbum:kwalbum:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:kwalbum:kwalbum:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:kwalbum:kwalbum:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:kwalbum:kwalbum:2.0.4:*:*:*:*:*:*:*"
] | null | null | null | 7.1 | null |
|
CVE-2020-3203
|
Cisco IOS XE Software Catalyst 9800 Series Wireless Controllers Denial of Service Vulnerability
|
A vulnerability in the locally significant certificate (LSC) provisioning feature of Cisco Catalyst 9800 Series Wireless Controllers that are running Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a memory leak that could lead to a denial of service (DoS) condition. The vulnerability is due to incorrect processing of certain public key infrastructure (PKI) packets. An attacker could exploit this vulnerability by sending crafted Secure Sockets Layer (SSL) packets to an affected device. A successful exploit could cause an affected device to continuously consume memory, which could result in a memory allocation failure that leads to a crash and causes a DoS condition.
|
[
"cpe:2.3:o:cisco:ios_xe:16.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.3.1a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.3.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.3.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.3.5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.3.5b:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.3.6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.3.7:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.3.8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.3.9:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.5.1a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.5.1b:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.5.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.5.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.7.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.7.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.7.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.8.1a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.8.1b:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.8.1c:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.8.1s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.8.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.8.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.10.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.10.1a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.10.1b:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.10.1e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.10.1s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.10.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.10.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.11.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.11.1a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.11.1b:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.11.1c:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.11.1s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.1a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.1c:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.1s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.2a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.8:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9800-40:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9800-80:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9800-cl:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9800-l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9800-l-c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9800-l-f:-:*:*:*:*:*:*:*"
] | null | null | 8.6 | null | null |
GHSA-jw5p-x8vx-v9xq
|
index.php?c=admin&a=index in SyGuestBook A5 Version 1.2 has stored XSS via a reply to a comment.
|
[] | null | null | 5.4 | null | null |
|
RHSA-2021:1306
|
Red Hat Security Advisory: java-11-openjdk security update
|
OpenJDK: Incomplete enforcement of JAR signing disabled algorithms (Libraries, 8249906)
|
[
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 5.3 | null | null | null |
CVE-2024-38114
|
Windows IP Routing Management Snapin Remote Code Execution Vulnerability
|
Windows IP Routing Management Snapin Remote Code Execution Vulnerability
|
[
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | null | null |
GHSA-j8j2-69r7-q88p
|
The WS Form LITE and Pro WordPress plugins before 1.8.176 do not sanitise and escape submitted form data, allowing unauthenticated attacker to submit XSS payloads which will get executed when a privileged user will view the related submission
|
[] | null | 6.1 | null | null | null |
|
GHSA-f8cr-fm37-g5fw
|
Adobe Reader and Acrobat 9.x before 9.5.2 and 10.x before 10.1.4 on Windows and Mac OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2051, CVE-2012-4147, CVE-2012-4148, CVE-2012-4150, CVE-2012-4151, CVE-2012-4152, CVE-2012-4153, CVE-2012-4154, CVE-2012-4155, CVE-2012-4156, CVE-2012-4157, CVE-2012-4158, CVE-2012-4159, and CVE-2012-4160.
|
[] | null | null | null | null | null |
|
PYSEC-2023-213
| null |
Inadequate encryption strength in mycli 1.27.0 allows attackers to view sensitive information via /mycli/config.py
|
[] | null | 7.5 | null | null | null |
CVE-2024-47221
|
CheckUser in ScadaServerEngine/MainLogic.cs in Rapid SCADA through 5.8.4 allows an empty password.
|
[
"cpe:2.3:a:rapidscada:rapid_scada:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
|
GHSA-c2qw-hpjg-mph4
|
The Microsoft (1) VBScript 5.7 and 5.8 and (2) JScript 5.7 and 5.8 engines, as used in Internet Explorer 8 through 11 and other products, allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted Filter arguments, aka "Scripting Engine Memory Corruption Vulnerability."
|
[] | null | null | null | null | null |
|
CVE-2004-1439
|
Buffer overflow in BlackJumboDog 3.x allows remote attackers to execute arbitrary code via long FTP commands such as (1) USER, (2) PASS, (3) RETR,(4) CWD, (5) XMKD, and (6) XRMD.
|
[
"cpe:2.3:a:sapporoworks:black_jumbodog:3.6.1:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2023-49693
|
NETGEAR ProSAFE Network Management System RCE via Unprotected Access to Java Debug Wire Protocol
|
NETGEAR ProSAFE Network Management System has Java Debug Wire Protocol (JDWP) listening on port 11611 and it is remotely accessible by unauthenticated users, allowing attackers to execute arbitrary code.
|
[
"cpe:2.3:a:netgear:prosafe_network_management_system:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.