id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 38
232
⌀ |
---|---|---|---|---|---|---|---|---|
GHSA-83hr-3993-2xh9
|
viewcart in Midicart accepts negative numbers in the Qty (quantity) field, which allows remote attackers to obtain a smaller total price for a shopping cart.
|
[] | null | null | null | null | null |
|
GHSA-86hf-q7fp-qm2r
|
Unspecified vulnerability in Oracle MySQL 5.6.27 and earlier and 5.7.9 allows remote authenticated users to affect availability via unknown vectors related to replication.
|
[] | null | null | null | null | null |
|
RHSA-2011:1341
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Code installation through holding down Enter (MFSA 2011-40) Mozilla: Miscellaneous memory safety hazards (MFSA 2011-36) Mozilla: Integer underflow when using JavaScript RegExp (MFSA 2011-37) Mozilla: XSS via plugins and shadowed window.location object (MFSA 2011-38) Mozilla: Defense against multiple Location headers due to CRLF Injection (MFSA 2011-39)
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::server"
] | null | null | null | null | null |
PYSEC-2023-61
| null |
In Django 3.2 before 3.2.19, 4.x before 4.1.9, and 4.2 before 4.2.1, it was possible to bypass validation when using one form field to upload multiple files. This multiple upload has never been supported by forms.FileField or forms.ImageField (only the last uploaded file was validated). However, Django's "Uploading multiple files" documentation suggested otherwise.
|
[] | null | null | null | null | null |
GHSA-p3rg-qhc4-m4jw
|
The SOAP interface in Cisco Hosted Collaboration Solution (HCS) allows remote attackers to obtain access to system-management tools via crafted Challenge SOAP calls, aka Bug ID CSCuc38114.
|
[] | null | null | null | null | null |
|
CVE-2017-15251
|
IrfanView version 4.44 (32bit) with PDF plugin version 4.43 allows attackers to execute arbitrary code or cause a denial of service via a crafted .pdf file, related to "Data from Faulting Address controls Code Flow starting at PDF!xmlParserInputRead+0x00000000000e7326."
|
[
"cpe:2.3:a:irfanview:irfanview:4.44:*:*:*:*:*:x86:*",
"cpe:2.3:a:irfanview:pdf:4.43:*:*:*:*:*:*:*"
] | null | null | 7.8 | 6.8 | null |
|
GHSA-9m37-gr52-8qh6
|
Multiple directory traversal vulnerabilities in the VideoWhisper Live Streaming Integration plugin before 4.29.5 for WordPress allow remote attackers to (1) read arbitrary files via a .. (dot dot) in the s parameter to ls/rtmp_login.php or (2) delete arbitrary files via a .. (dot dot) in the s parameter to ls/rtmp_logout.php.
|
[] | null | null | null | null | null |
|
GHSA-9hj9-gmjq-vgh8
|
Multiple cross-site scripting (XSS) vulnerabilities in ATutor LMS version 2.2.
|
[] | null | null | 5.4 | null | null |
|
GHSA-3pxp-6963-46r9
|
Command Injection in pdfinfojs
|
Versions of `pdfinfojs` before 0.4.1 are vulnerable to command injection. This is exploitable if an attacker can control the filename parameter that is passed into the `pdfinfojs` constructor.RecommendationUpdate to version 0.4.1 or later.
|
[] | null | 9.8 | null | null | null |
GHSA-75pc-rgg3-8xw2
|
** UNSUPPPORTED WHEN ASSIGNED **** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as problematic, was found in calesanz gibb-modul-151. This affects the function bearbeiten/login. The manipulation leads to open redirect. It is possible to initiate the attack remotely. The name of the patch is 88a517dc19443081210c804b655e72770727540d. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-218379. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
|
[] | null | 6.1 | null | null | null |
|
CVE-2021-22770
|
A CWE-200: Information Exposure vulnerability exists in Easergy T300 with firmware V2.7.1 and older that exposes sensitive information to an actor not explicitly authorized to have access to that information.
|
[
"cpe:2.3:o:schneider-electric:easergy_t300_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:easergy_t300:-:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4 | null |
|
GHSA-w7j2-r4x6-6frw
|
Aliases in the branch predictor may cause some AMD processors to predict the wrong branch type potentially leading to information disclosure.
|
[] | null | 6.5 | null | null | null |
|
CVE-2004-1421
|
Multiple PHP remote file inclusion vulnerabilities (1) step_one.php, (2) step_one_tables.php, (3) step_two_tables.php in WHM AutoPilot 2.4.6.5 and earlier allow remote attackers to execute arbitrary PHP code by modifying the server_inc parameter to reference a URL on a remote web server that contains the code.
|
[
"cpe:2.3:a:whm:whm_autopilot:2.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:whm:whm_autopilot:2.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:whm:whm_autopilot:2.4.6.5:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-3q6q-m779-9qvh
|
The EasyCart shopping cart application allows remote users to modify sensitive purchase information via hidden form fields.
|
[] | null | null | null | null | null |
|
CVE-2023-2311
|
Insufficient policy enforcement in File System API in Google Chrome prior to 112.0.5615.49 allowed a remote attacker to bypass filesystem restrictions via a crafted HTML page. (Chromium security severity: Medium)
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | null | null |
|
cisco-sa-fmcai-z5dQObVN
|
Cisco Firepower Management Center File Overwrite Vulnerability
|
A vulnerability in the web UI of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to overwrite files on the file system of an affected device.
The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by uploading a crafted file to the web UI on an affected device. A successful exploit could allow the attacker to overwrite files on the file system of the affected device.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
|
[] | null | null | 6.8 | null | null |
GHSA-fjhg-96cp-6fcw
|
Kimai (Authenticated) SSTI to RCE by Uploading a Malicious Twig File
|
DescriptionThe laters version of Kimai is found to be vulnerable to a critical Server-Side Template Injection (SSTI) which can be escalated to Remote Code Execution (RCE). The vulnerability arises when a malicious user uploads a specially crafted Twig file, exploiting the software's PDF and HTML rendering functionalities.Snippet of Vulnerable Code:The vulnerability is triggered when the software attempts to render invoices, allowing the attacker to execute arbitrary code on the server.In below, you can find the docker-compose file was used for this testing:Steps to Reproduce (Manually):
1- Upload a malicious Twig file to the server containing the following payload ```{{['id>/tmp/pwned']|map('system')|join}}```
2- Trigger the SSTI vulnerability by downloading the invoices.
3- The malicious code gets executed, leading to RCE.
4- /tmp/pwned file will be created on the target systemI've also attached an automated script to ease up the process of reproducing:Proof of Conceptwhich can be executed as such:this will download the rendered file which will contain the results of the RCE:ImpactRemote Code Execution
|
[] | null | 7.2 | null | null | null |
CVE-2004-2345
|
Unknown multiple vulnerabilities in Oracle9i Database Server 9.0.1.4, 9.0.1.5, 9.2.0.3, and 9.2.0.4 allow local users with the ability to invoke SQL to cause a denial of service or obtain sensitive information.
|
[
"cpe:2.3:a:oracle:database_server:9.0.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_server:9.0.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_server:9.2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_server:9.2.0.4:*:*:*:*:*:*:*"
] | null | null | null | 6.5 | null |
|
CVE-2019-15995
|
Cisco DNA Spaces: Connector SQL Injection Vulnerability
|
A vulnerability in the web UI of Cisco DNA Spaces: Connector could allow an authenticated, remote attacker to execute arbitrary SQL queries. The vulnerability exists because the web UI does not properly validate user-supplied input. An attacker could exploit this vulnerability by entering malicious SQL statements in an affected field in the web UI. A successful exploit could allow the attacker to remove the SQL database, which would require the reinstallation of the Connector VM.
|
[
"cpe:2.3:a:cisco:dna_spaces\\:_connector:*:*:*:*:*:*:*:*"
] | null | null | 6.5 | null | null |
GHSA-3mwx-pjvv-8hjh
|
Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier version, 2017.011.30138 and earlier version, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution .
|
[] | null | null | null | null | null |
|
GHSA-vhfw-j3c3-cmgg
|
Multiple WAGO devices in multiple versions may allow an authenticated remote attacker with high privileges to DoS the device by sending a specifically crafted packet to the CODESYS V2 runtime.
|
[] | null | 4.9 | null | null | null |
|
CVE-2019-0232
|
When running on Windows with enableCmdLineArguments enabled, the CGI Servlet in Apache Tomcat 9.0.0.M1 to 9.0.17, 8.5.0 to 8.5.39 and 7.0.0 to 7.0.93 is vulnerable to Remote Code Execution due to a bug in the way the JRE passes command line arguments to Windows. The CGI Servlet is disabled by default. The CGI option enableCmdLineArguments is disable by default in Tomcat 9.0.x (and will be disabled by default in all versions in response to this vulnerability). For a detailed explanation of the JRE behaviour, see Markus Wulftange's blog (https://codewhitesec.blogspot.com/2016/02/java-and-command-line-injections-in-windows.html) and this archived MSDN blog (https://web.archive.org/web/20161228144344/https://blogs.msdn.microsoft.com/twistylittlepassagesallalike/2011/04/23/everyone-quotes-command-line-arguments-the-wrong-way/).
|
[
"cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone1:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone10:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone11:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone12:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone13:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone14:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone15:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone16:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone17:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone18:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone19:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone2:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone20:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone21:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone22:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone23:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone24:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone25:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone26:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone3:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone4:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone5:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone6:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone7:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone8:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone9:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | null | 8.1 | 9.3 | null |
|
CVE-2023-45141
|
CSRF Token Validation Vulnerability in fiber
|
Fiber is an express inspired web framework written in Go. A Cross-Site Request Forgery (CSRF) vulnerability has been identified in the application, which allows an attacker to obtain tokens and forge malicious requests on behalf of a user. This can lead to unauthorized actions being taken on the user's behalf, potentially compromising the security and integrity of the application. The vulnerability is caused by improper validation and enforcement of CSRF tokens within the application. This vulnerability has been addressed in version 2.50.0 and users are advised to upgrade. Users should take additional security measures like captchas or Two-Factor Authentication (2FA) and set Session cookies with SameSite=Lax or SameSite=Secure, and the Secure and HttpOnly attributes.
|
[
"cpe:2.3:a:gofiber:fiber:*:*:*:*:*:go:*:*"
] | null | 8.6 | null | null | null |
GHSA-3938-2cj5-r45m
|
Directory Traversal vulnerability in Kihron ServerRPExposer v.1.0.2 and before allows a remote attacker to execute arbitrary code via the loadServerPack in ServerResourcePackProviderMixin.java.
|
[] | null | 8.8 | null | null | null |
|
GHSA-wr95-679j-87v9
|
An issue was discovered in Ruby through 2.6.7, 2.7.x through 2.7.3, and 3.x through 3.0.1. A malicious FTP server can use the PASV response to trick Net::FTP into connecting back to a given IP address and port. This potentially makes curl extract information about services that are otherwise private and not disclosed (e.g., the attacker can conduct port scans and service banner extractions).
|
[] | null | 5.8 | null | null | null |
|
CVE-2021-21796
|
An exploitable use-after-free vulnerability exists in the JavaScript implementation of Nitro Pro PDF. A specially crafted document can cause an object containing the path to a document to be destroyed and then later reused, resulting in a use-after-free vulnerability, which can lead to code execution under the context of the application. An attacker can convince a user to open a document to trigger this vulnerability.
|
[
"cpe:2.3:a:gonitro:nitro_pro:13.31.0.605:*:*:*:*:*:*:*",
"cpe:2.3:a:gonitro:nitro_pro:13.33.2.645:*:*:*:*:*:*:*"
] | null | null | 8.8 | null | null |
|
CVE-2016-3737
|
The server in Red Hat JBoss Operations Network (JON) before 3.3.6 allows remote attackers to execute arbitrary code via a crafted HTTP request, related to message deserialization.
|
[
"cpe:2.3:a:redhat:jboss_operations_network:*:*:*:*:*:*:*:*"
] | null | null | 9.8 | 9 | null |
|
CVE-2023-28277
|
Windows DNS Server Information Disclosure Vulnerability
|
Windows DNS Server Information Disclosure Vulnerability
|
[
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*"
] | null | 4.9 | null | null | null |
CVE-2011-3195
|
shared/inc/sql/lists.php in Domain Technologie Control (DTC) before 0.34.1 allows remote authenticated users to execute arbitrary commands via shell metacharacters in mailing list tunable options.
|
[
"cpe:2.3:a:gplhost:domain_technologie_control:*:*:*:*:*:*:*:*",
"cpe:2.3:a:gplhost:domain_technologie_control:0.24.6:*:*:*:*:*:*:*",
"cpe:2.3:a:gplhost:domain_technologie_control:0.25.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gplhost:domain_technologie_control:0.25.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gplhost:domain_technologie_control:0.25.3:*:*:*:*:*:*:*",
"cpe:2.3:a:gplhost:domain_technologie_control:0.26.7:*:*:*:*:*:*:*",
"cpe:2.3:a:gplhost:domain_technologie_control:0.26.8:*:*:*:*:*:*:*",
"cpe:2.3:a:gplhost:domain_technologie_control:0.26.9:*:*:*:*:*:*:*",
"cpe:2.3:a:gplhost:domain_technologie_control:0.27.3:*:*:*:*:*:*:*",
"cpe:2.3:a:gplhost:domain_technologie_control:0.28.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gplhost:domain_technologie_control:0.28.3:*:*:*:*:*:*:*",
"cpe:2.3:a:gplhost:domain_technologie_control:0.28.4:*:*:*:*:*:*:*",
"cpe:2.3:a:gplhost:domain_technologie_control:0.28.6:*:*:*:*:*:*:*",
"cpe:2.3:a:gplhost:domain_technologie_control:0.28.9:*:*:*:*:*:*:*",
"cpe:2.3:a:gplhost:domain_technologie_control:0.28.10:*:*:*:*:*:*:*",
"cpe:2.3:a:gplhost:domain_technologie_control:0.29.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gplhost:domain_technologie_control:0.29.6:*:*:*:*:*:*:*",
"cpe:2.3:a:gplhost:domain_technologie_control:0.29.8:*:*:*:*:*:*:*",
"cpe:2.3:a:gplhost:domain_technologie_control:0.29.10:*:*:*:*:*:*:*",
"cpe:2.3:a:gplhost:domain_technologie_control:0.29.14:*:*:*:*:*:*:*",
"cpe:2.3:a:gplhost:domain_technologie_control:0.29.15:*:*:*:*:*:*:*",
"cpe:2.3:a:gplhost:domain_technologie_control:0.29.16:*:*:*:*:*:*:*",
"cpe:2.3:a:gplhost:domain_technologie_control:0.29.17:*:*:*:*:*:*:*",
"cpe:2.3:a:gplhost:domain_technologie_control:0.30.6:*:*:*:*:*:*:*",
"cpe:2.3:a:gplhost:domain_technologie_control:0.30.8:*:*:*:*:*:*:*",
"cpe:2.3:a:gplhost:domain_technologie_control:0.30.10:*:*:*:*:*:*:*",
"cpe:2.3:a:gplhost:domain_technologie_control:0.30.18:*:*:*:*:*:*:*",
"cpe:2.3:a:gplhost:domain_technologie_control:0.30.20:*:*:*:*:*:*:*",
"cpe:2.3:a:gplhost:domain_technologie_control:0.32.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gplhost:domain_technologie_control:0.32.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gplhost:domain_technologie_control:0.32.3:*:*:*:*:*:*:*",
"cpe:2.3:a:gplhost:domain_technologie_control:0.32.4:*:*:*:*:*:*:*",
"cpe:2.3:a:gplhost:domain_technologie_control:0.32.5:*:*:*:*:*:*:*",
"cpe:2.3:a:gplhost:domain_technologie_control:0.32.6:*:*:*:*:*:*:*",
"cpe:2.3:a:gplhost:domain_technologie_control:0.32.7:*:*:*:*:*:*:*"
] | null | null | null | 6.5 | null |
|
CVE-2022-43014
|
OpenCATS v0.9.6 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the joborderID parameter.
|
[
"cpe:2.3:a:opencats:opencats:0.9.6:*:*:*:*:*:*:*"
] | null | 6.1 | null | null | null |
|
GHSA-cm34-7g79-wv3w
|
A vulnerability classified as critical was found in SourceCodester Simple Book Catalog App 1.0. Affected by this vulnerability is an unknown functionality of the file delete_book.php. The manipulation of the argument delete leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-239257 was assigned to this vulnerability.
|
[] | null | null | 6.3 | null | null |
|
CVE-2024-10209
|
Incorrect Permission Assignment in APROL file system
|
An Incorrect Permission Assignment for Critical Resource vulnerability in the file system used in B&R APROL <4.4-01 may allow an authenticated local attacker to read and alter the configuration of another engineering or runtime user.
|
[] | 8.5 | null | null | null | null |
CVE-2022-20280
|
In MMSProvider, there is a possible read of protected data due to improper input validationSQL injection. This could lead to local information disclosure of sms/mms data with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-204117261
|
[
"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*"
] | null | 3.3 | null | null | null |
|
GHSA-85r2-29qv-9cmr
|
SQL injection vulnerability in the Clan Users List (pb_clanlist) extension 0.0.1 for TYPO3 allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
|
[] | null | null | null | null | null |
|
GHSA-hw75-9xrf-7fg8
|
In Bluetooth driver, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00412257; Issue ID: MSV-3292.
|
[] | null | 9.8 | null | null | null |
|
RHBA-2020:3441
|
Red Hat Bug Fix Advisory: OpenShift Container Platform 4.4.18 packages update
|
jenkins: Stored XSS vulnerability in job build time trend jenkins: Stored XSS vulnerability in upstream cause jenkins: Stored XSS vulnerability in 'keep forever' badge icons jenkins: Stored XSS vulnerability in console links
|
[
"cpe:/a:redhat:openshift:4.4::el7",
"cpe:/a:redhat:openshift:4.4::el8"
] | null | 8 | null | null | null |
GHSA-f87f-4hc3-c786
|
Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK & Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
|
[] | null | null | null | null | null |
|
CVE-2016-0614
|
Unspecified vulnerability in the Oracle BI Publisher component in Oracle Fusion Middleware 11.1.1.7.0, 11.1.1.9.0, and 12.2.1.0.0 allows remote authenticated users to affect confidentiality via unknown vectors.
|
[
"cpe:2.3:a:oracle:business_intelligence_publisher:11.1.1.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:business_intelligence_publisher:11.1.1.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:business_intelligence_publisher:12.2.1.0.0:*:*:*:*:*:*:*"
] | null | null | null | 4 | null |
|
GHSA-3rm5-w47c-292r
|
In pfkey_dump of af_key.c, there is a possible out-of-bounds read due to a missing bounds check. This could lead to local information disclosure in the kernel with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-110373476
|
[] | null | null | null | null | null |
|
CVE-2005-0639
|
Multiple vulnerabilities in xli before 1.17 may allow remote attackers to execute arbitrary code via "buffer management errors" from certain image properties, some of which may be related to integer overflows in PPM files.
|
[
"cpe:2.3:a:xli:xli:1.14:*:*:*:*:*:*:*",
"cpe:2.3:a:xli:xli:1.15:*:*:*:*:*:*:*",
"cpe:2.3:a:xli:xli:1.16:*:*:*:*:*:*:*",
"cpe:2.3:a:xli:xli:1.17:*:*:*:*:*:*:*",
"cpe:2.3:o:altlinux:alt_linux:2.3:*:compact:*:*:*:*:*",
"cpe:2.3:o:altlinux:alt_linux:2.3:*:junior:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:4.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:5.2:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:5.3:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:6.1:alpha:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:6.2:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:6.3:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:6.3:*:ppc:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:6.3:alpha:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:6.4:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:6.4:*:i386:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:6.4:*:ppc:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:6.4:alpha:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:7.0:*:i386:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:7.0:*:ppc:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:7.0:*:sparc:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:7.0:alpha:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:7.1:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:7.1:*:spa:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:7.1:*:sparc:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:7.1:*:x86:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:7.1:alpha:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:7.2:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:7.2:*:i386:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:7.3:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:7.3:*:i386:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:7.3:*:ppc:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:7.3:*:sparc:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:8.0:*:i386:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:9.1:*:x86_64:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:9.2:*:x86_64:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:9.3:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-gqc6-93mr-cx6v
|
The SSL provider component in Microsoft Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, Windows Server 2012, and Windows RT does not properly handle encrypted packets, which allows man-in-the-middle attackers to conduct SSLv2 downgrade attacks against (1) SSLv3 sessions or (2) TLS sessions by intercepting handshakes and injecting content, aka "Microsoft SSL Version 3 and TLS Protocol Security Feature Bypass Vulnerability."
|
[] | null | null | null | null | null |
|
GHSA-qjvf-2fhp-q8rx
|
vim is vulnerable to Heap-based Buffer Overflow
|
[] | null | 7.8 | null | null | null |
|
CVE-2019-1054
|
Microsoft Edge Security Feature Bypass Vulnerability
|
A security feature bypass vulnerability exists in Edge that allows for bypassing Mark of the Web Tagging (MOTW). Failing to set the MOTW means that a large number of Microsoft security technologies are bypassed.
In a web-based attack scenario, an attacker could host a malicious website that is designed to exploit the security feature bypass. Alternatively, in an email or instant message attack scenario, the attacker could send the targeted user a specially crafted .url file that is designed to exploit the bypass. Additionally, compromised websites or websites that accept or host user-provided content could contain specially crafted content to exploit the security feature bypass. However, in all cases an attacker would have no way to force a user to view attacker-controlled content. Instead, an attacker would have to convince a user to take action. For example, an attacker could entice a user to either click a link that directs the user to the attacker's site or send a malicious attachment.
The security update addresses the security feature bypass by correcting how Edge handles MOTW tagging.
|
[
"cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
] | null | 5 | null | null | null |
CVE-2024-22543
|
An issue was discovered in Linksys Router E1700 1.0.04 (build 3), allows authenticated attackers to escalate privileges via a crafted GET request to the /goform/* URI or via the ExportSettings function.
|
[
"cpe:2.3:o:linksys:e1700_firmware:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | null | null |
|
CVE-2020-26803
|
In Sentrifugo 3.2, users can upload an image under "Assets -> Add" tab. This "Upload Images" functionality is suffered from "Unrestricted File Upload" vulnerability so attacker can upload malicious files using this functionality and control the server.
|
[
"cpe:2.3:a:sapplica:sentrifugo:3.2:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.5 | null |
|
CVE-2021-35204
|
NETSCOUT Systems nGeniusONE 6.3.0 build 1196 allows Reflected Cross-Site Scripting (XSS) in the support endpoint.
|
[
"cpe:2.3:a:netscout:ngeniusone:6.3.0:*:*:*:*:*:*:*"
] | null | 5.4 | null | 3.5 | null |
|
CVE-2022-49284
|
coresight: syscfg: Fix memleak on registration failure in cscfg_create_device
|
In the Linux kernel, the following vulnerability has been resolved:
coresight: syscfg: Fix memleak on registration failure in cscfg_create_device
device_register() calls device_initialize(),
according to doc of device_initialize:
Use put_device() to give up your reference instead of freeing
* @dev directly once you have called this function.
To prevent potential memleak, use put_device() for error handling.
|
[] | null | 5.5 | null | null | null |
RHSA-2024:1530
|
Red Hat Security Advisory: expat security update
|
expat: parsing large tokens can trigger a denial of service expat: XML Entity Expansion
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 7.5 | null | null | null |
GHSA-2c6h-xvj7-f2xc
|
Win32k Elevation of Privilege Vulnerability
|
[] | null | 7.8 | null | null | null |
|
GHSA-7jcj-r6c3-fr3g
|
Adobe Photoshop versions 23.1.1 (and earlier) and 22.5.5 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[] | null | 5.5 | null | null | null |
|
GHSA-hh5m-fj6m-hwjp
|
Artifex MuPDF 1.11 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .xps file, related to "Data from Faulting Address controls Branch Selection starting at mupdf+0x000000000016aa61" on Windows. This occurs because xps_load_links_in_glyphs in xps/xps-link.c does not verify that an xps font could be loaded.
|
[] | null | null | 7.8 | null | null |
|
GHSA-893h-35v4-mxqx
|
Path Traversal in Ansible
|
A flaw was found in Ansible 2.7.17 and prior, 2.8.9 and prior, and 2.9.6 and prior when using the Extract-Zip function from the win_unzip module as the extracted file(s) are not checked if they belong to the destination folder. An attacker could take advantage of this flaw by crafting an archive anywhere in the file system, using a path traversal. This issue is fixed in 2.10.
|
[] | 8.5 | 7.8 | null | null | null |
GHSA-g33f-v493-6g94
|
Unspecified vulnerability in the Windows Advanced Local Procedure Call (ALPC) in the kernel in Microsoft Windows Vista allows local users to gain privileges via unspecified vectors involving "legacy reply paths."
|
[] | null | null | null | null | null |
|
CVE-2017-1000235
|
I, Librarian version <=4.6 & 4.7 is vulnerable to OS Command Injection in batchimport.php resulting the web server being fully compromised.
|
[
"cpe:2.3:a:i-librarian:i_librarian:*:*:*:*:*:*:*:*",
"cpe:2.3:a:i-librarian:i_librarian:4.7:*:*:*:*:*:*:*"
] | null | null | 9.8 | 10 | null |
|
GHSA-j2cw-6x2w-h9hg
|
IBM InfoSphere Information Server 11.3 and 11.5 allows remote authenticated DataStage users to bypass intended job-execution restrictions or obtain sensitive information via unspecified vectors.
|
[] | null | null | null | null | null |
|
CVE-2019-4250
|
IBM Jazz Foundation products (IBM Rational Collaborative Lifecycle Management 6.0 through 6.0.6.1) is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 159648.
|
[
"cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_doors_next_generation:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_engineering_lifecycle_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_quality_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_rhapsody_design_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_software_architect_design_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_team_concert:*:*:*:*:*:*:*:*"
] | null | null | 5.4 | null | null |
|
GHSA-j5w5-24wj-99v2
|
Improper input validation vulnerability in GOT2000 series GT27 model all versions, GOT2000 series GT25 model all versions, GOT2000 series GT23 model all versions, GOT2000 series GT21 model all versions, GOT SIMPLE series GS21 model all versions, and GT SoftGOT2000 all versions allows an remote unauthenticated attacker to write a value that exceeds the configured input range limit by sending a malicious packet to rewrite the device value. As a result, the system operation may be affected, such as malfunction.
|
[] | null | null | null | null | null |
|
GHSA-g37v-jxpm-83fp
|
Windows Kernel Information Disclosure Vulnerability.
|
[] | null | 4.7 | null | null | null |
|
CVE-2006-1801
|
Cross-site scripting (XSS) vulnerability in planetsearchplus.php in planetSearch+ allows remote attackers to inject arbitrary web script or HTML via the search_exp parameter.
|
[
"cpe:2.3:a:planet_concept:planetsearch\\+:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-3h8h-469q-248f
|
Point Of Sales 1.0 allows SQL injection via the login screen, related to LoginForm1.vb.
|
[] | null | 9.8 | null | null | null |
|
GHSA-hm8p-5985-v4pm
|
Netgear XR300 v1.0.3.78 was discovered to contain a stack overflow via the ssid_an parameter in bridge_wireless_main.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request.
|
[] | null | 5.7 | null | null | null |
|
CVE-2017-9301
|
plugins\audio_filter\libmpgatofixed32_plugin.dll in VideoLAN VLC media player 2.2.4 allows remote attackers to cause a denial of service (invalid read and application crash) or possibly have unspecified other impact via a crafted file.
|
[
"cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | 6.8 | null |
|
GHSA-438g-ffmc-cm86
|
Use-after-free vulnerability in Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-1045, CVE-2016-1046, CVE-2016-1047, CVE-2016-1048, CVE-2016-1049, CVE-2016-1050, CVE-2016-1052, CVE-2016-1053, CVE-2016-1054, CVE-2016-1055, CVE-2016-1056, CVE-2016-1057, CVE-2016-1058, CVE-2016-1059, CVE-2016-1060, CVE-2016-1061, CVE-2016-1065, CVE-2016-1066, CVE-2016-1067, CVE-2016-1068, CVE-2016-1069, CVE-2016-1070, CVE-2016-1075, CVE-2016-1094, CVE-2016-1121, CVE-2016-1122, CVE-2016-4102, and CVE-2016-4107.
|
[] | null | null | 9.8 | null | null |
|
CVE-2020-5427
|
Possibility of SQL Injection in Spring Cloud Data Flow Task Execution Sorting Query
|
In Spring Cloud Data Flow, versions 2.6.x prior to 2.6.5, versions 2.5.x prior 2.5.4, an application is vulnerable to SQL injection when requesting task execution.
|
[
"cpe:2.3:a:vmware:spring_cloud_data_flow:*:*:*:*:*:*:*:*"
] | null | null | 5.7 | null | null |
CVE-2019-11045
|
DirectoryIterator class silently truncates after a null byte
|
In PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0, PHP DirectoryIterator class accepts filenames with embedded \0 byte and treats them as terminating at that byte. This could lead to security vulnerabilities, e.g. in applications checking paths that the code is allowed to access.
|
[
"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:7.4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
"cpe:2.3:a:tenable:securitycenter:*:*:*:*:*:*:*:*"
] | null | 3.7 | null | null | null |
CVE-2025-30447
|
The issue was resolved by sanitizing logging This issue is fixed in visionOS 2.4, macOS Ventura 13.7.5, tvOS 18.4, iPadOS 17.7.6, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to access sensitive user data.
|
[] | null | 5.5 | null | null | null |
|
CVE-2014-7840
|
The host_from_stream_offset function in arch_init.c in QEMU, when loading RAM during migration, allows remote attackers to execute arbitrary code via a crafted (1) offset or (2) length value in savevm data.
|
[
"cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:virtualization:3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2020-3788
|
Adobe Photoshop CC 2019 versions 20.0.8 and earlier, and Photoshop 2020 versions 21.1 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution.
|
[
"cpe:2.3:a:adobe:photoshop_2020:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:photoshop_cc:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 | null |
|
CVE-2019-1374
|
An information disclosure vulnerability exists in the way Windows Error Reporting (WER) handles objects in memory, aka 'Windows Error Reporting Information Disclosure Vulnerability'.
|
[
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
] | null | 5.5 | null | 4.3 | null |
|
GHSA-6xvq-x47h-8rxm
|
Mulatiple cross-site scripting (XSS) vulnerabilities in PD9 Software MegaBBS 2.2 allow remote attackers to inject arbitrary web script or HTML via the (1) toid parameter to send-private-message.asp and the (2) redirect parameter to admin/impersonate.asp. NOTE: vector 2 requires authentication.
|
[] | null | null | null | null | null |
|
GHSA-g8xq-wqfw-rpfm
|
EMC Documentum Content Server before 6.7 SP1 P26, 6.7 SP2 before P13, 7.0 before P13, and 7.1 before P02 allows remote authenticated users to bypass intended access restrictions and read metadata from certain folders via unspecified vectors.
|
[] | null | null | null | null | null |
|
CVE-2025-2954
|
mannaandpoem OpenManus File file_saver.py execute access control
|
A vulnerability, which was classified as problematic, was found in mannaandpoem OpenManus up to 2025.3.13. This affects the function execute of the file app/tool/file_saver.py of the component File Handler. The manipulation leads to improper access controls. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
|
[] | 4.8 | 3.3 | 3.3 | 1.7 | null |
GHSA-2f4q-xh8v-r37w
|
A vulnerability was found in TOTOLINK X15 1.0.0-B20230714.1105. It has been declared as critical. This vulnerability affects unknown code of the file /boafrm/formTmultiAP of the component HTTP POST Request Handler. The manipulation of the argument submit-url leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
|
[] | 7.4 | 8.8 | null | null | null |
|
CVE-2025-30771
|
WordPress WP Cassify <= 2.3.5 - Cross Site Scripting (XSS) Vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Alain-Aymerick FRANCOIS WP Cassify allows DOM-Based XSS. This issue affects WP Cassify: from n/a through 2.3.5.
|
[] | null | 6.5 | null | null | null |
GHSA-xmx6-ccgm-jqvf
|
EMC VPLEX before VPLEX GeoSynchrony 5.2 SP1 uses cleartext for storage of the LDAP/AD bind password, which allows local users to obtain sensitive information by reading the management-server configuration file.
|
[] | null | null | null | null | null |
|
CVE-2023-51978
|
In PHPGurukul Art Gallery Management System v1.1, "Update Artist Image" functionality of "imageid" parameter is vulnerable to SQL Injection.
|
[
"cpe:2.3:a:phpgurukul:art_gallery_management_system:1.1:*:*:*:*:*:*:*"
] | null | 6.5 | null | null | null |
|
CVE-2022-27472
|
SQL injection vulnerability in Topics Counting feature of Roothub 2.6.0 allows unauthorized attackers to execute arbitrary SQL commands via the "s" parameter remotely.
|
[
"cpe:2.3:a:roothub_project:roothub:2.6.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 | null |
|
GHSA-4wjr-89vg-3hx6
|
Path traversal in Ivanti CSA before version 5.0.5 allows a remote unauthenticated attacker to access restricted functionality.
|
[] | null | 5.3 | null | null | null |
|
GHSA-g42c-7fq9-xmqv
|
CA ARCserve Backup r12.0 through SP2, r12.5 before SP2, r15 through SP1, and r16 before SP1 on Windows allows remote attackers to cause a denial of service (service shutdown) via a crafted network request.
|
[] | null | null | null | null | null |
|
CVE-2020-0513
|
Out of bounds write for some Intel(R) Graphics Drivers before version 15.33.50.5129 may allow an authenticated user to potentially enable escalation of privilege via local access.
|
[
"cpe:2.3:a:intel:graphics_drivers:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | 4.6 | null |
|
CVE-2013-1190
|
The C-Series Rack Server component 1.4 in Cisco Unified Computing System (UCS) does not properly restrict inbound access to ports, which allows remote attackers to cause a denial of service (Integrated Management Controller reboot or hang) via crafted packets, as demonstrated by nmap, aka Bug ID CSCtx19850.
|
[
"cpe:2.3:h:cisco:unified_computing_system:-:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-966j-fc7p-8925
|
** DISPUTED ** The libfsntfs_security_descriptor_values_free function in libfsntfs_security_descriptor_values.c in libfsntfs through 2018-04-20 allows remote attackers to cause a denial of service (double-free) via a crafted ntfs file. NOTE: the vendor has disputed this as described in libyal/libfsntfs issue 8 on GitHub.
|
[] | null | null | 5.5 | null | null |
|
CVE-2024-6672
|
WhatsUp Gold getMonitorJoin SQL Injection Privilege Escalation Vulnerability
|
In WhatsUp Gold versions released before 2024.0.0, a SQL Injection vulnerability allows an authenticated low-privileged attacker to achieve privilege escalation by modifying a privileged user's password.
|
[
"cpe:2.3:a:progress:whatsupgold:*:*:*:*:*:*:*:*",
"cpe:2.3:a:progress:whatsup_gold:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | null | null |
GHSA-wqx4-cgqq-cpgw
|
The hard drives of the device are not encrypted using a full volume encryption feature such as BitLocker. This allows an attacker with physical access to the device to use an alternative operating system to interact with the hard drives, completely circumventing the Windows login. The attacker can read from and write to all files on the hard drives.
|
[] | null | 7.6 | null | null | null |
|
CVE-2022-43691
|
Concrete CMS (formerly concrete5) below 8.5.10 and between 9.0.0 and 9.1.2 inadvertently disclose server-side sensitive information (secrets in environment variables and server information) when Debug Mode is left on in production.
|
[
"cpe:2.3:a:concretecms:concrete_cms:*:*:*:*:*:*:*:*"
] | null | 5.3 | null | null | null |
|
CVE-2024-11230
|
Elementor Header & Footer Builder <= 1.6.46 - Authenticated (Contributor+) Stored Cross-Site Scripting via Page Title Widget
|
The Elementor Header & Footer Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘size’ parameter in all versions up to, and including, 1.6.46 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] | null | 6.4 | null | null | null |
GHSA-pghp-q23q-hhx5
|
When IIS is run with a default language of Chinese, Korean, or Japanese, it allows a remote attacker to view the source code of certain files, a.k.a. "Double Byte Code Page".
|
[] | null | null | null | null | null |
|
CVE-2009-2169
|
Insecure method vulnerability in the PDFVIEWER.PDFViewerCtrl.1 ActiveX control (pdfviewer.ocx) in Edraw PDF Viewer Component before 3.2.0.126 allows remote attackers to create and overwrite arbitrary files via a URL argument to the FtpConnect argument and a target filename argument to the FtpDownloadFile method. NOTE: this can be leveraged for code execution by writing to a Startup folder.
|
[
"cpe:2.3:a:edraw:pdf_viewer_component:*:*:*:*:*:*:*:*"
] | null | null | null | 9.3 | null |
|
CVE-2020-15643
|
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Marvell QConvergeConsole 5.5.0.64. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the saveAsText method of the GWTTestServiceImpl class. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-10549.
|
[
"cpe:2.3:a:marvell:qconvergeconsole:*:*:*:*:*:*:*:*"
] | null | null | 8.8 | null | null |
|
CVE-2023-30266
|
CLTPHP <=6.0 is vulnerable to Unrestricted Upload of File with Dangerous Type.
|
[
"cpe:2.3:a:cltphp:cltphp:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | null | null |
|
GHSA-25fg-m85m-j989
|
Multiple cross-site scripting (XSS) vulnerabilities in the registration form in Casinosoft Casino Script (Masvet) 3.2 allow remote attackers to inject arbitrary web script or HTML via the (1) name or (2) surname field.
|
[] | null | null | null | null | null |
|
CVE-2021-25342
|
Calling of non-existent provider in SMP sdk prior to version 3.0.9 allows unauthorized actions including denial of service attack by hijacking the provider.
|
[
"cpe:2.3:a:samsung:members:*:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:1.5:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:1.6:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:2.2:rev1:*:*:*:*:*:*",
"cpe:2.3:o:google:android:2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:2.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:2.2.3:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:2.3:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:2.3:rev1:*:*:*:*:*:*",
"cpe:2.3:o:google:android:2.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:2.3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:2.3.3:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:2.3.4:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:2.3.5:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:2.3.6:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:2.3.7:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:3.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:3.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:3.2.4:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:3.2.6:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*"
] | null | 4 | null | null | null |
|
CVE-2010-4296
|
vmware-mount in VMware Workstation 7.x before 7.1.2 build 301548 on Linux, VMware Player 3.1.x before 3.1.2 build 301548 on Linux, VMware Server 2.0.2 on Linux, and VMware Fusion 3.1.x before 3.1.2 build 332101 does not properly load libraries, which allows host OS users to gain privileges via vectors involving shared object files.
|
[
"cpe:2.3:a:vmware:workstation:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workstation:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workstation:7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workstation:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workstation:7.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:player:3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:player:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:player:3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:server:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:fusion:3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:fusion:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:fusion:3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*"
] | null | null | null | 7.2 | null |
|
CVE-2022-22823
|
build_model in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.
|
[
"cpe:2.3:a:libexpat_project:libexpat:*:*:*:*:*:*:*:*",
"cpe:2.3:a:tenable:nessus:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:sinema_remote_connect_server:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 | null |
|
GHSA-9xfx-mr98-wrr3
|
Illustrator versions 28.3, 27.9.2 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[] | null | 7.8 | null | null | null |
|
CVE-2012-3548
|
The dissect_drda function in epan/dissectors/packet-drda.c in Wireshark 1.6.x through 1.6.10 and 1.8.x through 1.8.2 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a small value for a certain length field in a capture file.
|
[
"cpe:2.3:a:wireshark:wireshark:1.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.6.7:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.6.8:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.6.9:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.6.10:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-gx9w-3cv3-7x4r
|
Due to insufficient escaping of the special characters in the "copy as cURL" feature, an attacker could trick a user into using this command, potentially leading to local code execution on the user's system.
*This bug only affects Firefox for Windows. Other versions of Firefox are unaffected.* This vulnerability affects Firefox ESR < 128.10, Firefox ESR < 115.23, and Thunderbird ESR < 128.10.
|
[] | null | 5.7 | null | null | null |
|
CVE-2018-13863
|
The MongoDB bson JavaScript module (also known as js-bson) versions 0.5.0 to 1.0.x before 1.0.5 is vulnerable to a Regular Expression Denial of Service (ReDoS) in lib/bson/decimal128.js. The flaw is triggered when the Decimal128.fromString() function is called to parse a long untrusted string.
|
[
"cpe:2.3:a:mongodb:js-bson:*:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 | null |
|
CVE-2023-6699
|
The WP Compress – Image Optimizer [All-In-One] plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 6.10.33 via the css parameter. This makes it possible for unauthenticated attackers to read the contents of arbitrary files on the server, which can contain sensitive information.
|
[
"cpe:2.3:a:wpcompress:wp_compress:*:*:*:*:*:wordpress:*:*"
] | null | 9.1 | null | null | null |
|
GHSA-wp7g-v2c4-7pw5
|
CodeAvalanche Articles stores sensitive information under the web root with insufficient access control, which allows remote attackers to download the database file containing the administrator password via a direct request for _private/CAArticles.mdb. NOTE: some of these details are obtained from third party information.
|
[] | null | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.