id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 38
232
⌀ |
---|---|---|---|---|---|---|---|---|
CVE-2000-0231
|
Linux kreatecd trusts a user-supplied path that is used to find the cdrecord program, allowing local users to gain root privileges.
|
[
"cpe:2.3:o:halloween:halloween_linux:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:6.2:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:6.3:*:*:*:*:*:*:*"
] | null | null | null | 7.2 | null |
|
GHSA-4f7c-7x79-wr4p
|
Successful exploitation of the vulnerability could allow an unauthenticated attacker to conduct brute force guessing and account takeover as the session cookies are predictable, potentially allowing the attackers to gain root, admin or user access and reset passwords.
|
[] | null | 5 | null | null | null |
|
GHSA-8c79-f43g-55mx
|
Tenda M3 V1.0.0.12(4856) was discovered to contain a Command Execution vulnerability via the function TendaTelnet.
|
[] | null | 9.8 | null | null | null |
|
CVE-2024-1758
|
The SuperFaktura WooCommerce plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 1.40.3 via the wc_sf_url_check function. This makes it possible for authenticated attackers, with subscriber-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.
|
[] | null | 5.4 | null | null | null |
|
CVE-2011-5167
|
Heap-based buffer overflow in the SetDevNames method of the Tidestone Formula One ActiveX control (TTF16.ocx) 6.3.5 Build 1 in Oracle Hyperion Strategic Finance 12.x and possibly earlier allows remote attackers to execute arbitrary code via a long string to the DriverName parameter.
|
[
"cpe:2.3:a:oracle:hyperion_strategic_finance:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:hyperion_strategic_finance:11.1.2.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tidestone:formula_one_activex_control:6.3.5.1:*:*:*:*:*:*:*"
] | null | null | null | 9.3 | null |
|
CVE-2023-22960
|
Lexmark products through 2023-01-10 have Improper Control of Interaction Frequency.
|
[
"cpe:2.3:o:lexmark:b2236_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:b2236:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:b2338_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:b2338:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:b2442_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:b2442:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:b2546_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:b2546:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:b2650_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:b2650:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:b2865_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:b2865:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:b3340_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:b3340:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:b3442_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:b3442:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:c2240_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:c2240:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:c2325_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:c2325:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:c2326_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:c2326:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:c2425_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:c2425:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:c2535_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:c2535:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:c3224_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:c3224:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:c3326_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:c3326:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:c3426_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:c3426:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:c4150_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:c4150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:c6160_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:c6160:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:c9235_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:c9235:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:cs331_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:cs331:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:cs421_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:cs421:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:cs431_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:cs431:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:cs439_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:cs439:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:cs521_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:cs521:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:cs622_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:cs622:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:cs720_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:cs720:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:cs725_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:cs725:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:cs727_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:cs727:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:cs728_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:cs728:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:cs820_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:cs820:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:cs827_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:cs827:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:cs921_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:cs921:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:cs923_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:cs923:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:cs927_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:cs927:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:cx331_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:cx331:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:cx421_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:cx421:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:cx431_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:cx431:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:cx522_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:cx522:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:cx622_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:cx622:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:cx625_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:cx625:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:cx725_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:cx725:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:cx727_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:cx727:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:cx820_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:cx820:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:cx825_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:cx825:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:cx860_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:cx860:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:cx920_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:cx920:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:cx921_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:cx921:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:cx922_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:cx922:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:cx923_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:cx923:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:cx924_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:cx924:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:cx944_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:cx944:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:m1242_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:m1242:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:m1246_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:m1246:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:m1342_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:m1342:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:m3250_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:m3250:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:m5255_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:m5255:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:m5270_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:m5270:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:mb2236_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mb2236:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:mb2338_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mb2338:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:mb2442_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mb2442:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:mb2546_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mb2546:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:mb2650_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mb2650:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:mb2770_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mb2770:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:mb3442_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mb3442:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:mc2325_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mc2325:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:mc2425_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mc2425:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:mc2535_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mc2535:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:mc2640_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mc2640:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:mc3224_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mc3224:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:mc3326_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mc3326:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:mc3426_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mc3426:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:ms321_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms321:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:ms331_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms331:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:ms421_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms421:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:ms431_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms431:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:ms521_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms521:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:ms621_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms621:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:ms622_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms622:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:ms725_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms725:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:ms821_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms821:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:ms822_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms822:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:ms823_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms823:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:ms825_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms825:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:ms826_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms826:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:mx321_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mx321:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:mx331_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mx331:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:mx421_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mx421:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:mx431_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mx431:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:mx432_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mx432:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:mx521_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mx521:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:mx522_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mx522:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:mx622_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mx622:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:mx721_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mx721:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:mx722_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mx722:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:mx822_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mx822:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:mx826_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mx826:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:mx931_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mx931:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:xc2235_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xc2235:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:xc2326_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xc2326:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:xc4140_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xc4140:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:xc4143_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xc4143:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:xc4150_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xc4150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:xc4153_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xc4153:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:xc4240_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xc4240:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:xc4342_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xc4342:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:xc4352_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xc4352:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:xc6152_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xc6152:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:xc6153_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xc6153:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:xc8155_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xc8155:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:xc8160_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xc8160:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:xc8163_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xc8163:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:xc9225_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xc9225:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:xc9235_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xc9235:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:xc9245_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xc9245:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:xc9255_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xc9255:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:xc9265_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xc9265:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:xc9335_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xc9335:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:xc9445_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xc9445:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:xc9455_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xc9455:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:xc9465_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xc9465:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:xm1242_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xm1242:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:xm1246_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xm1246:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:xm1342_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xm1342:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:xm3142_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xm3142:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:xm3250_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xm3250:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:xm5365_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xm5365:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:xm7355_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xm7355:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:xm7370_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xm7370:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
|
GHSA-gj5q-rq38-2gcg
|
The NSAPI plugins for TGA and the Java Servlet proxy in HP-UX VVOS 10.24 and 11.04 allows an attacker to cause a denial of service (high CPU utilization).
|
[] | null | null | null | null | null |
|
CVE-2023-21157
|
In encode of wlandata.cpp, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-263783137References: N/A
|
[
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] | null | 6.7 | null | null | null |
|
CVE-2022-21763
|
In telecom service, there is a possible information disclosure due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07044717; Issue ID: ALPS07044708.
|
[
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6795:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*"
] | null | 5.5 | null | 2.1 | null |
|
CVE-2025-2349
|
IROAD Dash Cam FX2 Password Hash passwd weak password hash
|
A vulnerability was found in IROAD Dash Cam FX2 up to 20250308. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /etc/passwd of the component Password Hash Handler. The manipulation leads to password hash with insufficient computational effort. Access to the local network is required for this attack. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used.
|
[] | 2.3 | 3.1 | 3.1 | 1.8 | null |
CVE-2024-22590
|
The TLS engine in Kwik commit 745fd4e2 does not track the current state of the connection. This vulnerability can allow Client Hello messages to be overwritten at any time, including after a connection has been established.
|
[
"cpe:2.3:a:ptrd:kwik:*:*:*:*:*:*:*:*"
] | null | 9.1 | null | null | null |
|
CVE-2007-4631
|
The DataLoader::doStart function in dataloader.cpp in QGit 1.5.6 and other versions up to 2pre1 allows local users to overwrite arbitrary files and execute arbitrary code via a symlink attack on temporary files with predictable filenames.
|
[
"cpe:2.3:a:qgit:qgit:1.5.6_2pre1:*:*:*:*:*:*:*"
] | null | null | null | 6.9 | null |
|
GHSA-735v-r5c6-6249
|
A vulnerability classified as problematic has been found in TP-Link TL-SG108E 1.0.0 Build 20201208 Rel. 40304. Affected is an unknown function of the file /usr_account_set.cgi of the component HTTP GET Request Handler. The manipulation of the argument username/password leads to use of get request method with sensitive query strings. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 1.0.0 Build 20250124 Rel. 54920(Beta) is able to address this issue. It is recommended to upgrade the affected component. The vendor was contacted early. They reacted very professional and provided a pre-fix version for their customers.
|
[] | 6.3 | 3.7 | null | null | null |
|
CVE-2019-7170
|
A stored-self XSS exists in Croogo through v3.0.5, allowing an attacker to execute HTML or JavaScript code in a vulnerable Title field to /admin/taxonomy/vocabularies.
|
[
"cpe:2.3:a:croogo:croogo:*:*:*:*:*:*:*:*"
] | null | null | 4.8 | 3.5 | null |
|
CVE-2023-28356
|
A vulnerability has been identified where a maliciously crafted message containing a specific chain of characters can cause the chat to enter a hot loop on one of the processes, consuming ~120% CPU and rendering the service unresponsive.
|
[
"cpe:2.3:a:rocket.chat:rocket.chat:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
|
CVE-2019-3994
|
ELOG 3.1.4-57bea22 and below is affected by a denial of service vulnerability due to a use after free. A remote unauthenticated attacker can crash the ELOG server by sending multiple HTTP POST requests which causes the ELOG function retrieve_url() to use a freed variable.
|
[
"cpe:2.3:a:elog_project:elog:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null |
|
CVE-2014-8147
|
The resolveImplicitLevels function in common/ubidi.c in the Unicode Bidirectional Algorithm implementation in ICU4C in International Components for Unicode (ICU) before 55.1 uses an integer data type that is inconsistent with a header file, which allows remote attackers to cause a denial of service (incorrect malloc followed by invalid free) or possibly execute arbitrary code via crafted text.
|
[
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*",
"cpe:2.3:a:icu-project:international_components_for_unicode:*:*:*:*:*:c\\/c\\+\\+:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2002-1820
|
register.php in Ultimate PHP Board (UPB) 1.0 and 1.0b uses an administrative account Admin with a capital "A," but allows a remote attacker to impersonate the administrator by registering an account name of admin with a lower case "a."
|
[
"cpe:2.3:a:ultimate_php_board_project:ultimate_php_board:1.0:-:*:*:*:*:*:*",
"cpe:2.3:a:ultimate_php_board_project:ultimate_php_board:1.0:beta:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 | null |
|
CVE-2018-5447
|
An Improper Input Validation issue was discovered in Nari PCS-9611 relay. An improper input validation vulnerability has been identified that affects a service within the software that may allow a remote attacker to arbitrarily read/access system resources and affect the availability of the system.
|
[
"cpe:2.3:o:nrec:pcs-9611_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nrec:pcs-9611:-:*:*:*:*:*:*:*"
] | null | null | 9.8 | 10 | null |
|
GHSA-g2c5-92x6-44rw
|
In dumpExtractors of IMediaExtractor.cp, there is a possible disclosure of recently accessed media files due to a permissions bypass. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android-7.0 Android-7.1.1 Android-7.1.2 Android-8.0 Android-8.1. Android ID: A-114770654.
|
[] | null | null | 5.5 | null | null |
|
CVE-2023-2704
|
The BP Social Connect plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 1.5. This is due to insufficient verification on the user being supplied during a Facebook login through the plugin. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the email.
|
[
"cpe:2.3:a:vibethemes:bp_social_connect:*:*:*:*:*:wordpress:*:*"
] | null | 9.8 | null | null | null |
|
GHSA-cgr8-m7vv-pjv9
|
Hesabim.asp in ASPSitem 2.0 and earlier allows remote attackers to read private messages of other users via a modified id parameter.
|
[] | null | null | null | null | null |
|
CVE-2017-17881
|
In ImageMagick 7.0.7-12 Q16, a memory leak vulnerability was found in the function ReadMATImage in coders/mat.c, which allows attackers to cause a denial of service via a crafted MAT image file.
|
[
"cpe:2.3:a:imagemagick:imagemagick:7.0.7-12:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"
] | null | null | 6.5 | 4.3 | null |
|
GHSA-2w84-rx82-9hcw
|
In libxaac there is a possible out of bounds read due to a missing bounds check. This could lead to information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-112553431
|
[] | null | null | null | null | null |
|
GHSA-pgq2-52j2-j4xx
|
In the Linux kernel, the following vulnerability has been resolved:netdevsim: use cond_resched() in nsim_dev_trap_report_work()I am still seeing many syzbot reports hinting that syzbot
might fool nsim_dev_trap_report_work() with hundreds of ports [1]Lets use cond_resched(), and system_unbound_wq
instead of implicit system_wq.[1]
INFO: task syz-executor:20633 blocked for more than 143 seconds.
Not tainted 6.12.0-rc2-syzkaller-00205-g1d227fcc7222 #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:syz-executor state:D stack:25856 pid:20633 tgid:20633 ppid:1 flags:0x00004006
...
NMI backtrace for cpu 1
CPU: 1 UID: 0 PID: 16760 Comm: kworker/1:0 Not tainted 6.12.0-rc2-syzkaller-00205-g1d227fcc7222 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
Workqueue: events nsim_dev_trap_report_work
RIP: 0010:__sanitizer_cov_trace_pc+0x0/0x70 kernel/kcov.c:210
Code: 89 fb e8 23 00 00 00 48 8b 3d 04 fb 9c 0c 48 89 de 5b e9 c3 c7 5d 00 0f 1f 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 <f3> 0f 1e fa 48 8b 04 24 65 48 8b 0c 25 c0 d7 03 00 65 8b 15 60 f0
RSP: 0018:ffffc90000a187e8 EFLAGS: 00000246
RAX: 0000000000000100 RBX: ffffc90000a188e0 RCX: ffff888027d3bc00
RDX: ffff888027d3bc00 RSI: 0000000000000000 RDI: 0000000000000000
RBP: ffff88804a2e6000 R08: ffffffff8a4bc495 R09: ffffffff89da3577
R10: 0000000000000004 R11: ffffffff8a4bc2b0 R12: dffffc0000000000
R13: ffff88806573b503 R14: dffffc0000000000 R15: ffff8880663cca00
FS: 0000000000000000(0000) GS:ffff8880b8700000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fc90a747f98 CR3: 000000000e734000 CR4: 00000000003526f0
DR0: 0000000000000000 DR1: 000000000000002b DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
Call Trace:
<NMI>
</NMI>
<TASK>
__local_bh_enable_ip+0x1bb/0x200 kernel/softirq.c:382
spin_unlock_bh include/linux/spinlock.h:396 [inline]
nsim_dev_trap_report drivers/net/netdevsim/dev.c:820 [inline]
nsim_dev_trap_report_work+0x75d/0xaa0 drivers/net/netdevsim/dev.c:850
process_one_work kernel/workqueue.c:3229 [inline]
process_scheduled_works+0xa63/0x1850 kernel/workqueue.c:3310
worker_thread+0x870/0xd30 kernel/workqueue.c:3391
kthread+0x2f0/0x390 kernel/kthread.c:389
ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
</TASK>
|
[] | null | 7.8 | null | null | null |
|
GHSA-f989-3fp9-q3r2
|
Magento Open Source allows Incorrect Authorization
|
Adobe Commerce versions 2.4.6 (and earlier), 2.4.5-p2 (and earlier) and 2.4.4-p3 (and earlier) are affected by an Incorrect Authorization vulnerability that could result in a security feature bypass. A privileged attacker could leverage this vulnerability to modify a minor functionality of another user's data. Exploitation of this issue does not require user interaction.
|
[] | 6.9 | 4.3 | null | null | null |
GHSA-2g9g-vv6r-x6cj
|
Missing Authorization vulnerability in fifu.App Featured Image from URL allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Featured Image from URL: from n/a through 4.8.1.
|
[] | null | 5.3 | null | null | null |
|
GHSA-v254-7f59-gpqj
|
A Regular Expression Denial of Service vulnerability in GitLab CE/EE affecting all versions from 1.0.2 prior to 14.10.5, 15.0 prior to 15.0.4, and 15.1 prior to 15.1.1 allows an attacker to make a GitLab instance inaccessible via specially crafted web server response headers
|
[] | null | 5.3 | null | null | null |
|
CVE-2011-0911
|
Cross-site scripting (XSS) vulnerability in the Users module in Zikula before 1.2.5 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. NOTE: it is possible that this overlaps CVE-2011-0535.
|
[
"cpe:2.3:a:zikula:zikula_application_framework:*:*:*:*:*:*:*:*",
"cpe:2.3:a:zikula:zikula_application_framework:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:zikula:zikula_application_framework:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:zikula:zikula_application_framework:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:zikula:zikula_application_framework:1.2.3:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-6qmj-48p6-crf2
|
IBM Tivoli Netcool/OMNIbus_GUI and IBM Jazz for Service Management 1.1.3.10 is vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.
|
[] | null | null | null | null | null |
|
GHSA-qcjw-3m37-53c6
|
A Local File Inclusion vulnerability in a Trend Micro Apex Central widget in versions below 8.0.6955 could allow an attacker to include arbitrary files to execute as PHP code and lead to remote code execution on affected installations.
|
[] | null | 7.5 | null | null | null |
|
GHSA-mhmv-7727-5cc5
|
Improper handling of insufficient permission in Telephony prior to SMR Aug-2024 Release 1 allows local attackers to configure default Message application.
|
[] | null | 4 | null | null | null |
|
GHSA-x37v-98f9-mj32
|
phpMyAdmin SQL injection in Designer feature
|
An issue was discovered in phpMyAdmin before 4.9.0.1. A vulnerability was reported where a specially crafted database name can be used to trigger an SQL injection attack through the designer feature.
|
[] | null | null | 9.8 | null | null |
GHSA-5pc7-7874-mmf8
|
Progress Sitefinity 9.1 has XSS via the Content Management Template Configuration (aka Templateconfiguration), as demonstrated by the src attribute of an IMG element. This is fixed in 10.1.
|
[] | null | null | 5.4 | null | null |
|
RHSA-2010:0544
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla crashes with evidence of memory corruption Mozilla remote code execution with use-after-free in nsTreeSelection Mozilla Dangling pointer vulnerability in nsTreeContentView Mozilla Dangling pointer vulnerability in nsPluginArray Content-Disposition: attachment ignored if Content-Type: multipart also present Mozilla Freed object reuse across plugin instances Mozilla Integer Overflow in XSLT Node Sorting Mozilla Crashes with evidence of memory corruption Mozilla miscellaneous memory safety hazards Mozilla Plugin parameter EnsureCachedAttrParamArrays remote code execution vulnerability Mozilla nsTreeSelection dangling pointer remote code execution vulnerability Mozilla Cross-origin data leakage from script filename in error messages
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null | null |
GHSA-rgw4-gxj6-8ffh
|
The Memory Usage, Memory Limit, PHP and Server Memory Health Check and Fix Plugin WordPress plugin before 2.46 does not have proper authorisation and CSRF in an AJAX action, allowing any authenticated users, such as subscriber to call it and install and activate arbitrary plugins from wordpress.org
|
[] | null | 6.5 | null | null | null |
|
CVE-2016-6352
|
The OneLine32 function in io-ico.c in gdk-pixbuf before 2.35.3 allows remote attackers to cause a denial of service (out-of-bounds write and crash) via crafted dimensions in an ICO file.
|
[
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:a:gnome:gdk-pixbuf:*:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 | null |
|
CVE-2021-34202
|
There are multiple out-of-bounds vulnerabilities in some processes of D-Link AC2600(DIR-2640) 1.01B04. Ordinary permissions can be elevated to administrator permissions, resulting in local arbitrary code execution. An attacker can combine other vulnerabilities to further achieve the purpose of remote code execution.
|
[
"cpe:2.3:o:dlink:dir-2640-us_firmware:1.01b04:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dir-2640-us:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | 7.2 | null |
|
CVE-2025-46906
|
Adobe Experience Manager | Cross-site Scripting (Stored XSS) (CWE-79)
|
Adobe Experience Manager versions 6.5.22 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
|
[] | null | 5.4 | null | null | null |
GHSA-259w-8hf6-59c2
|
OCI image importer memory exhaustion in github.com/containerd/containerd
|
ImpactWhen importing an OCI image, there was no limit on the number of bytes read for certain files. A maliciously crafted image with a large file where a limit was not applied could cause a denial of service.PatchesThis bug has been fixed in containerd 1.6.18 and 1.5.18. Users should update to these versions to resolve the issue.WorkaroundsEnsure that only trusted images are used and that only trusted users have permissions to import images.CreditsThe containerd project would like to thank [David Korczynski](https://github.com/DavidKorczynski) and [Adam Korczynski](https://github.com/AdamKorcz) of ADA Logics for responsibly disclosing this issue in accordance with the [containerd security policy](https://github.com/containerd/project/blob/main/SECURITY.md) during a security fuzzing audit sponsored by CNCF.For more informationIf you have any questions or comments about this advisory:Open an issue in [containerd](https://github.com/containerd/containerd/issues/new/choose)Email us at [[email protected]](mailto:[email protected])To report a security issue in containerd:[Report a new vulnerability](https://github.com/containerd/containerd/security/advisories/new)Email us at [[email protected]](mailto:[email protected])
|
[] | null | 5.5 | null | null | null |
GHSA-hf42-4hj4-cx44
|
Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS - Web Services). Supported versions that are affected are 12.1.3.0 and 12.2.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle WebLogic Server accessible data. CVSS 3.0 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
|
[] | null | null | 7.5 | null | null |
|
GHSA-cw3c-gjjq-m9c4
|
Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.3.5 and 8.3.7 allows remote attackers to affect confidentiality, integrity, and availability, related to Outside In Image Export SDK, a different vulnerability than CVE-2012-0555, CVE-2012-0556, and CVE-2012-0557.
|
[] | null | null | null | null | null |
|
CVE-2025-30724
|
Vulnerability in the Oracle BI Publisher product of Oracle Analytics (component: XML Services). Supported versions that are affected are 7.6.0.0.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle BI Publisher. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle BI Publisher accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
|
[] | null | 7.5 | null | null | null |
|
CVE-2024-7570
|
Improper certificate validation in Ivanti ITSM on-prem and Neurons for ITSM Versions 2023.4 and earlier allows a remote attacker in a MITM position to craft a token that would allow access to ITSM as any user.
|
[
"cpe:2.3:a:ivanti:neurons_for_itsm:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:neurons_for_itsm:2023.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:neurons_for_itsm:2023.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:neurons_for_itsm:2023.4:*:*:*:*:*:*:*"
] | null | 8.3 | null | null | null |
|
CVE-2024-11301
|
Improper Enforcement of Unique Constraint in lunary-ai/lunary
|
In lunary-ai/lunary before version 1.6.3, the application allows the creation of evaluators without enforcing a unique constraint on the combination of projectId and slug. This allows an attacker to overwrite existing data by submitting a POST request with the same slug as an existing evaluator. The lack of database constraints or application-layer validation to prevent duplicates exposes the application to data integrity issues. This vulnerability can result in corrupted data and potentially malicious actions, impairing the system's functionality.
|
[] | null | null | 6.5 | null | null |
GHSA-hwrw-j4pc-89pr
|
Knowage Suite 7.3 is vulnerable to Stored Client-Side Template Injection in '/knowage/restful-services/signup/update' via the 'name' parameter.
|
[] | null | null | null | null | null |
|
CVE-2023-35024
|
IBM Cloud Pak for Business Automation cross-site scripting
|
IBM Cloud Pak for Business Automation 18.0.0, 18.0.1, 18.0.2, 19.0.1, 19.0.2, 19.0.3, 20.0.1, 20.0.2, 20.0.3, 21.0.1, 21.0.2, 21.0.3, 22.0.1, and 22.0.2 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 258349.
|
[
"cpe:2.3:a:ibm:cloud_pak_for_business_automation:18.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:cloud_pak_for_business_automation:18.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:cloud_pak_for_business_automation:18.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:cloud_pak_for_business_automation:19.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:cloud_pak_for_business_automation:19.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:cloud_pak_for_business_automation:19.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:cloud_pak_for_business_automation:20.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:cloud_pak_for_business_automation:20.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:cloud_pak_for_business_automation:20.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.1:-:*:*:*:*:*:*",
"cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.2:-:*:*:*:*:*:*",
"cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:-:*:*:*:*:*:*",
"cpe:2.3:a:ibm:cloud_pak_for_business_automation:22.0.1:-:*:*:*:*:*:*",
"cpe:2.3:a:ibm:cloud_pak_for_business_automation:22.0.2:-:*:*:*:*:*:*"
] | null | 4.6 | null | null | null |
RHBA-2007:0861
|
Red Hat Bug Fix Advisory: dlm-kernel bug fix update
|
security flaw
|
[
"cpe:/a:redhat:rhel_cluster:4"
] | null | null | null | null | null |
RHSA-2023:0469
|
Red Hat Security Advisory: Red Hat Integration Camel Extensions For Quarkus 2.13.2
|
jettison: parser crash by stackoverflow jettison: memory exhaustion via user-supplied XML or JSON data xstream: Xstream to serialise XML data was vulnerable to Denial of Service attacks woodstox-core: woodstox to serialise XML data was vulnerable to Denial of Service attacks xstream: Xstream to serialise XML data was vulnerable to Denial of Service attacks xstream: Xstream to serialise XML data was vulnerable to Denial of Service attacks xstream: Xstream to serialise XML data was vulnerable to Denial of Service attacks xstream: Xstream to serialise XML data was vulnerable to Denial of Service attacks jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS jackson-databind: use of deeply nested arrays apache-commons-text: variable interpolation RCE
|
[
"cpe:/a:redhat:camel_quarkus:2.13"
] | null | 9.8 | null | null | null |
cisco-sa-20180926-shell-access
|
Cisco IOS XE Software Shell Access Authentication Bypass Vulnerability
|
A vulnerability in the shell access request mechanism of Cisco IOS XE Software could allow an authenticated, local attacker to bypass authentication and gain unrestricted access to the root shell of an affected device.
The vulnerability exists because the affected software has insufficient authentication mechanisms for certain commands. An attacker could exploit this vulnerability by requesting access to the root shell of an affected device, after the shell access feature has been enabled. A successful exploit could allow the attacker to bypass authentication and gain unrestricted access to the root shell of the affected device.
There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180926-shell-access ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180926-shell-access"]
|
[] | null | null | 6.7 | null | null |
GHSA-5429-63wr-8cgm
|
Wangmarket v4.10 to v5.0 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /agency/AgencyUserController.java.
|
[] | null | 6.8 | null | null | null |
|
CVE-2011-4719
|
Multiple unspecified vulnerabilities in Google Chrome before 16.0.912.63 on the Acer AC700, Samsung Series 5, and Cr-48 Chromebook platforms have unknown impact and attack vectors.
|
[
"cpe:2.3:o:google:chrome_os:*:*:*:*:*:*:*:*",
"cpe:2.3:h:acer:ac700_chromebook:*:*:*:*:*:*:*:*",
"cpe:2.3:h:google:cr-48_chromebook:*:*:*:*:*:*:*:*",
"cpe:2.3:h:samsung:series_5_chromebook:*:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
GHSA-vwj2-v47j-h734
|
The Remove Schema plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.5. This is due to missing or incorrect nonce validation on the validate() function. This makes it possible for unauthenticated attackers to modify the plugins settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
|
[] | null | 4.3 | null | null | null |
|
CVE-2001-0566
|
Cisco Catalyst 2900XL switch allows a remote attacker to create a denial of service via an empty UDP packet sent to port 161 (SNMP) when SNMP is disabled.
|
[
"cpe:2.3:h:cisco:catalyst_2900:xl:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
CVE-2023-21361
|
In Bluetooth, there is a possibility of code-execution due to a use after free. This could lead to paired device escalation of privilege in the privileged Bluetooth process with no additional execution privileges needed. User interaction is not needed for exploitation.
|
[
"cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*"
] | null | 8.8 | null | null | null |
|
GHSA-jhpg-hx7g-8xfw
|
In audio, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS08241940; Issue ID: ALPS08241940.
|
[] | null | 7.8 | null | null | null |
|
CVE-2007-0902
|
Unspecified vulnerability in the "Show debugging information" feature in MoinMoin 1.5.7 allows remote attackers to obtain sensitive information. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
|
[
"cpe:2.3:a:moinmoin:moinmoin:1.5.7:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-33c7-f9jv-pmxj
|
Improper input validation vulnerability in XPLATFORM's execBrowser method can cause execute arbitrary commands. IF the second parameter value of the execBrowser function is ‘default’, the first parameter value could be passed to the ShellExecuteW API. The passed parameter is an arbitrary code to be executed. Remote attackers can use this vulnerability to execute arbitrary remote code.
|
[] | null | 8.8 | null | null | null |
|
GHSA-p3j3-7q7c-3g53
|
In the Linux kernel, the following vulnerability has been resolved:cfg80211: call cfg80211_stop_ap when switch from P2P_GO typeIf the userspace tools switch from NL80211_IFTYPE_P2P_GO to
NL80211_IFTYPE_ADHOC via send_msg(NL80211_CMD_SET_INTERFACE), it
does not call the cleanup cfg80211_stop_ap(), this leads to the
initialization of in-use data. For example, this path re-init the
sdata->assigned_chanctx_list while it is still an element of
assigned_vifs list, and makes that linked list corrupt.
|
[] | null | 7.8 | null | null | null |
|
GHSA-7rc8-rqg8-27m3
|
In the Linux kernel, the following vulnerability has been resolved:bpf: Fix too early release of tcx_entryPedro Pinto and later independently also Hyunwoo Kim and Wongi Lee reported
an issue that the tcx_entry can be released too early leading to a use
after free (UAF) when an active old-style ingress or clsact qdisc with a
shared tc block is later replaced by another ingress or clsact instance.Essentially, the sequence to trigger the UAF (one example) can be as follows:A network namespace is createdAn ingress qdisc is created. This allocates a tcx_entry, and
&tcx_entry->miniq is stored in the qdisc's miniqp->p_miniq. At the
same time, a tcf block with index 1 is created.chain0 is attached to the tcf block. chain0 must be connected to
the block linked to the ingress qdisc to later reach the function
tcf_chain0_head_change_cb_del() which triggers the UAF.Create and graft a clsact qdisc. This causes the ingress qdisc
created in step 1 to be removed, thus freeing the previously linked
tcx_entry:rtnetlink_rcv_msg()
=> tc_modify_qdisc()
=> qdisc_create()
=> clsact_init() [a]
=> qdisc_graft()
=> qdisc_destroy()
=> __qdisc_destroy()
=> ingress_destroy() [b]
=> tcx_entry_free()
=> kfree_rcu() // tcx_entry freedFinally, the network namespace is closed. This registers the
cleanup_net worker, and during the process of releasing the
remaining clsact qdisc, it accesses the tcx_entry that was
already freed in step 4, causing the UAF to occur:cleanup_net()
=> ops_exit_list()
=> default_device_exit_batch()
=> unregister_netdevice_many()
=> unregister_netdevice_many_notify()
=> dev_shutdown()
=> qdisc_put()
=> clsact_destroy() [c]
=> tcf_block_put_ext()
=> tcf_chain0_head_change_cb_del()
=> tcf_chain_head_change_item()
=> clsact_chain_head_change()
=> mini_qdisc_pair_swap() // UAFThere are also other variants, the gist is to add an ingress (or clsact)
qdisc with a specific shared block, then to replace that qdisc, waiting
for the tcx_entry kfree_rcu() to be executed and subsequently accessing
the current active qdisc's miniq one way or another.The correct fix is to turn the miniq_active boolean into a counter. What
can be observed, at step 2 above, the counter transitions from 0->1, at
step [a] from 1->2 (in order for the miniq object to remain active during
the replacement), then in [b] from 2->1 and finally [c] 1->0 with the
eventual release. The reference counter in general ranges from [0,2] and
it does not need to be atomic since all access to the counter is protected
by the rtnl mutex. With this in place, there is no longer a UAF happening
and the tcx_entry is freed at the correct time.
|
[] | null | 5.5 | null | null | null |
|
GHSA-c4rx-vvj6-9gv8
|
All versions of the afffected TOYOPUC-PC10 Series,TOYOPUC-Plus Series,TOYOPUC-PC3J/PC2J Series, TOYOPUC-Nano Series products may not be able to properly process an ICMP flood, which may allow an attacker to deny Ethernet communications between affected devices.
|
[] | null | null | null | null | null |
|
RHSA-2002:259
|
Red Hat Security Advisory: sendmail security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw"
] | null | null | null | null | null |
GHSA-j66v-7j6v-hmmc
|
PHP remote file inclusion vulnerability in estateagent.php in the EstateAgent component (com_estateagent) for Mambo, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter.
|
[] | null | null | null | null | null |
|
GHSA-4cfw-gc9p-jwf4
|
Rejected reason: Not used
|
[] | null | null | null | null | null |
|
CVE-2006-3672
|
KDE Konqueror 3.5.1 and earlier allows remote attackers to cause a denial of service (application crash) by calling the replaceChild method on a DOM object, which triggers a null dereference, as demonstrated by calling document.replaceChild with a 0 (zero) argument.
|
[
"cpe:2.3:a:kde:konqueror:*:*:*:*:*:*:*:*",
"cpe:2.3:a:kde:konqueror:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:kde:konqueror:2.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:kde:konqueror:2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:kde:konqueror:2.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:kde:konqueror:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:kde:konqueror:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:kde:konqueror:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:kde:konqueror:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:kde:konqueror:3.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:kde:konqueror:3.0.5b:*:*:*:*:*:*:*",
"cpe:2.3:a:kde:konqueror:3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:kde:konqueror:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:kde:konqueror:3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:kde:konqueror:3.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:kde:konqueror:3.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:kde:konqueror:3.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:kde:konqueror:3.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:kde:konqueror:3.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:kde:konqueror:3.2.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:kde:konqueror:3.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:kde:konqueror:3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:kde:konqueror:3.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:kde:konqueror:3.3.2:*:*:*:*:*:*:*"
] | null | null | null | 2.6 | null |
|
PYSEC-2017-41
| null |
The XML-RPC server in supervisor before 3.0.1, 3.1.x before 3.1.4, 3.2.x before 3.2.4, and 3.3.x before 3.3.3 allows remote authenticated users to execute arbitrary commands via a crafted XML-RPC request, related to nested supervisord namespace lookups.
|
[] | null | null | null | null | null |
GHSA-44w6-h8x6-p8h9
|
It was found that subscription-manager's DBus interface before 1.19.4 let unprivileged user access the com.redhat.RHSM1.Facts.GetFacts and com.redhat.RHSM1.Config.Set methods. An unprivileged local attacker could use these methods to gain access to private information, or launch a privilege escalation attack.
|
[] | null | null | 7.8 | null | null |
|
CVE-2024-25438
|
A cross-site scripting (XSS) vulnerability in the Submission module of Pkp Ojs v3.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Input subject field under the Add Discussion function.
|
[
"cpe:2.3:a:pkp:open_journal_systems:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | null | null |
|
CVE-2017-15573
|
In Redmine before 3.2.6 and 3.3.x before 3.3.3, XSS exists because markup is mishandled in wiki content.
|
[
"cpe:2.3:a:redmine:redmine:*:*:*:*:*:*:*:*",
"cpe:2.3:a:redmine:redmine:3.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redmine:redmine:3.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:redmine:redmine:3.3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 | null |
|
CVE-2024-50506
|
WordPress Marketing Automation by AZEXO plugin <= 1.27.80 - Privilege Escalation vulnerability
|
Incorrect Privilege Assignment vulnerability in Azexo Marketing Automation by AZEXO allows Privilege Escalation.This issue affects Marketing Automation by AZEXO: from n/a through 1.27.80.
|
[] | null | 8.8 | null | null | null |
CVE-2024-12469
|
WP BASE Booking of Appointments, Services and Events <= 4.9.1 - Reflected Cross-Site Scripting via status Parameter
|
The WP BASE Booking of Appointments, Services and Events plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘status’ parameter in all versions up to, and including, 4.9.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
|
[] | null | 6.1 | null | null | null |
GHSA-8wr8-fqcf-723v
|
In the Linux kernel, the following vulnerability has been resolved:drm/msm/hdmi: check return value after calling platform_get_resource_byname()It will cause null-ptr-deref if platform_get_resource_byname() returns NULL,
we need check the return value.Patchwork: https://patchwork.freedesktop.org/patch/482992/
|
[] | null | 5.5 | null | null | null |
|
CVE-2021-39271
|
OrbiTeam BSCW Classic before 7.4.3 allows authenticated remote code execution (RCE) during archive extraction via attacker-supplied Python code in the class attribute of a .bscw file. This is fixed in 5.0.12, 5.1.10, 5.2.4, 7.3.3, and 7.4.3.
|
[
"cpe:2.3:a:bscw:bscw_classic:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.5 | null |
|
CVE-2011-2259
|
Unspecified vulnerability in Oracle Solaris 8, 9, 10, and 11 Express allows local users to affect availability, related to UFS.
|
[
"cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.9:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.10:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.11:*:express:*:*:*:*:*"
] | null | null | null | 4.9 | null |
|
GHSA-qrwv-mr9p-g9x6
|
Cross-Site Request Forgery (CSRF) vulnerability in WP Swings Wallet System for WooCommerce.This issue affects Wallet System for WooCommerce: from n/a through 2.5.9.
|
[] | null | 5.4 | null | null | null |
|
CVE-2024-33575
|
WordPress User Meta plugin <= 3.0 - Sensitive Data Exposure vulnerability
|
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in User Meta user-meta.This issue affects User Meta: from n/a through 3.0.
|
[
"cpe:2.3:a:usermeta:user_meta_user_profile_builder_and_user_management:1.0.0:*:*:*:*:wordpress:*:*"
] | null | 5.3 | null | null | null |
GHSA-rgw9-2qv4-ghxq
|
The ShipStation.com plugin 1.1 and earlier for CS-Cart allows remote attackers to insert arbitrary information into the database (via action=shipnotify) because access to this endpoint is completely unchecked. The attacker must guess an order number.
|
[] | null | null | null | null | null |
|
CVE-2024-52511
|
Nextcloud Tables has an Authorization Bypass Through User-Controlled Key in Tables
|
Nextcloud Tables allows users to to create tables with individual columns. By directly specifying the ID of a table or view, a malicious user could blindly insert new rows into tables they have no access to. It is recommended that the Nextcloud Tables is upgraded to 0.8.0.
|
[] | null | 6.3 | null | null | null |
GHSA-47mv-437c-47mj
|
A type confusion vulnerability in Panasonic Control FPWIN Pro versions 7.6.0.3 and all previous versions may allow arbitrary code execution when opening specially crafted project files.
|
[] | null | 7.8 | null | null | null |
|
GHSA-fc3h-fgjq-4hqp
|
news.php in SimpNews 2.47.3 and earlier allows remote attackers to obtain sensitive information via an invalid lang parameter, which reveals the installation path in an error message.
|
[] | null | null | null | null | null |
|
CVE-2022-35059
|
OTFCC commit 617837b was discovered to contain a heap buffer overflow via /release-x64/otfccdump+0x6c0414.
|
[
"cpe:2.3:a:otfcc_project:otfcc:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | null | null |
|
GHSA-6357-ggmh-cwxm
|
Unspecified vulnerability in Sun Solaris 10 on SPARC sun4v systems, and OpenSolaris snv_47 through snv_85, allows local users to cause a denial of service (hang of UFS filesystem write) via unknown vectors related to the (1) ufs_getpage and (2) ufs_putapage routines, aka CR 6425723.
|
[] | null | null | null | null | null |
|
RHSA-2019:2476
|
Red Hat Security Advisory: kernel security update
|
kernel: Missing check in fs/inode.c:inode_init_owner() does not clear SGID bit on non-directories for non-members kernel: hw: Spectre SWAPGS gadget vulnerability
|
[
"cpe:/o:redhat:rhel_aus:6.6::server"
] | null | null | 5.9 | null | null |
RHSA-2024:7004
|
Red Hat Security Advisory: kernel security update
|
kernel: gpiolib: cdev: Fix use after free in lineinfo_changed_notify kernel: wifi: mac80211: Avoid address calculations via out of bounds array indexing kernel: ice: Fix improper extts handling
|
[
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/a:redhat:rhel_eus:9.2::crb",
"cpe:/o:redhat:rhel_eus:9.2::baseos"
] | null | 4.4 | null | null | null |
GHSA-9763-w6jg-gh3f
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in QuanticaLabs CSS3 Compare Pricing Tables for WordPress allows Reflected XSS. This issue affects CSS3 Compare Pricing Tables for WordPress: from n/a through 11.6.
|
[] | null | 7.1 | null | null | null |
|
GHSA-8fq7-9cwr-4376
|
XOOPS 2.5.0 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by modules/system/xoops_version.php and certain other files.
|
[] | null | null | null | null | null |
|
CVE-2023-48668
|
Dell PowerProtect DD, versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 on DDMC contain an OS command injection vulnerability in an admin operation. A local high privileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the managed system application's underlying OS with the privileges of the vulnerable application. Exploitation may lead to a system take over by an attacker on a managed system of DDMC.
|
[
"cpe:2.3:a:dell:powerprotect_data_domain_management_center:*:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:powerprotect_data_domain_management_center:*:*:*:*:lts2022:*:*:*",
"cpe:2.3:o:dell:powerprotect_data_domain_management_center:*:*:*:*:lts2023:*:*:*"
] | null | 8.2 | null | null | null |
|
GHSA-h348-95qg-22q3
|
Out of bounds memory read and access may lead to unexpected behavior in GNSS XTRA Parser in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in MDM9150, MDM9206, MDM9607, MDM9615, MDM9635M, MDM9640, MDM9650, MDM9655, MSM8909W, MSM8996AU, QCS605, Qualcomm 215, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 625, SD 632, SD 636, SD 650/52, SD 675, SD 712 / SD 710 / SD 670, SD 730, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SD 8CX, SDA660, SDM439, SDM630, SDM660, SDX20, Snapdragon_High_Med_2016, SXR1130
|
[] | null | null | 9.8 | null | null |
|
CVE-2020-7751
|
Prototype Pollution
|
pathval before version 1.1.1 is vulnerable to prototype pollution.
|
[
"cpe:2.3:a:chaijis:pathval:*:*:*:*:*:node.js:*:*"
] | null | 6 | null | null | null |
PYSEC-2021-548
| null |
TensorFlow is an end-to-end open source platform for machine learning. In affected versions the implementation of sparse reduction operations in TensorFlow can trigger accesses outside of bounds of heap allocated data. The [implementation](https://github.com/tensorflow/tensorflow/blob/a1bc56203f21a5a4995311825ffaba7a670d7747/tensorflow/core/kernels/sparse_reduce_op.cc#L217-L228) fails to validate that each reduction group does not overflow and that each corresponding index does not point to outside the bounds of the input tensor. We have patched the issue in GitHub commit 87158f43f05f2720a374f3e6d22a7aaa3a33f750. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
|
[] | null | null | null | null | null |
CVE-2024-25947
|
Dell iDRAC Service Module version 5.3.0.0 and prior, contain an Out of bound Read Vulnerability. A privileged local attacker could execute arbitrary code potentially resulting in a denial of service event.
|
[
"cpe:2.3:a:dell:emc_idrac_service_module:*:*:*:*:*:*:*:*"
] | null | 4.8 | null | null | null |
|
RHSA-2023:6274
|
Red Hat Security Advisory: OpenShift Container Platform 4.11.53 packages and security update
|
ovn: service monitor MAC flow is not rate limited
|
[
"cpe:/a:redhat:openshift:4.11::el8",
"cpe:/a:redhat:openshift_ironic:4.11::el8"
] | null | 5.3 | null | null | null |
GHSA-gxhg-qc42-w3x4
|
The Bulk Me Now! WordPress plugin through 2.0 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.
|
[] | null | 7.1 | null | null | null |
|
CVE-2023-36898
|
Tablet Windows User Interface Application Core Remote Code Execution Vulnerability
|
Tablet Windows User Interface Application Core Remote Code Execution Vulnerability
|
[
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*"
] | null | 7.8 | null | null | null |
CVE-2016-2965
|
IBM Sametime Meeting Server 8.5.2 and 9.0 is vulnerable to cross-site request forgery, caused by improper validation of user-supplied input. By persuading a user to visit a malicious link, a remote attacker could force the user to log out of Sametime. IBM X-Force ID: 113846.
|
[
"cpe:2.3:a:ibm:sametime:8.5.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:sametime:8.5.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:sametime:9.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:sametime:9.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:sametime:9.0.1:*:*:*:*:*:*:*"
] | null | null | 6.5 | 4.3 | null |
|
GHSA-pj36-9rxw-2h2x
|
In ImageMagick before 6.9.9-0 and 7.x before 7.0.6-1, the ReadOneMNGImage function in coders/png.c has an out-of-bounds read with the MNG CLIP chunk.
|
[] | null | 9.8 | null | null | null |
|
RHSA-2020:2306
|
Red Hat Security Advisory: OpenShift Container Platform 4.2.34 ose-openshift-apiserver-container security update
|
kubernetes: Use of unbounded 'client' label in apiserver_request_total allows for memory exhaustion
|
[
"cpe:/a:redhat:openshift:4.2::el7"
] | null | 4.3 | null | null | null |
GHSA-cwm9-q742-vjcx
|
If an attacker could control the contents of an iframe sandboxed with <code>allow-popups</code> but not <code>allow-scripts</code>, they were able to craft a link that, when clicked, would lead to JavaScript execution in violation of the sandbox. This vulnerability affects Firefox < 98, Firefox ESR < 91.7, and Thunderbird < 91.7.
|
[] | null | 9.6 | null | null | null |
|
GHSA-wpm6-3cwm-hmf2
|
A Remote Arbitrary Code Execution vulnerability in HPE Data Protector version prior to 8.17 and 9.09 was found.
|
[] | null | null | 7.5 | null | null |
|
CVE-2023-36549
|
A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiWLM version 8.6.0 through 8.6.5 and 8.5.0 through 8.5.4 allows attacker to execute unauthorized code or commands via specifically crafted http get request parameters.
|
[
"cpe:2.3:a:fortinet:fortiwlm:*:*:*:*:*:*:*:*"
] | null | 8.6 | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.