id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 38
232
⌀ |
---|---|---|---|---|---|---|---|---|
CVE-2020-8581
|
Clustered Data ONTAP versions prior to 9.3P20 and 9.5 are susceptible to a vulnerability which could allow an authenticated but unauthorized attacker to overwrite arbitrary data when VMware vStorage support is enabled.
|
[
"cpe:2.3:a:netapp:clustered_data_ontap:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:clustered_data_ontap:9.3:-:*:*:*:*:*:*",
"cpe:2.3:a:netapp:clustered_data_ontap:9.3:p1:*:*:*:*:*:*",
"cpe:2.3:a:netapp:clustered_data_ontap:9.3:p10:*:*:*:*:*:*",
"cpe:2.3:a:netapp:clustered_data_ontap:9.3:p2:*:*:*:*:*:*",
"cpe:2.3:a:netapp:clustered_data_ontap:9.3:p3:*:*:*:*:*:*",
"cpe:2.3:a:netapp:clustered_data_ontap:9.3:p4:*:*:*:*:*:*",
"cpe:2.3:a:netapp:clustered_data_ontap:9.3:p5:*:*:*:*:*:*",
"cpe:2.3:a:netapp:clustered_data_ontap:9.3:p6:*:*:*:*:*:*",
"cpe:2.3:a:netapp:clustered_data_ontap:9.3:p7:*:*:*:*:*:*",
"cpe:2.3:a:netapp:clustered_data_ontap:9.3:p8:*:*:*:*:*:*",
"cpe:2.3:a:netapp:clustered_data_ontap:9.3:p9:*:*:*:*:*:*"
] | null | 6.5 | null | 3.5 | null |
|
GHSA-5xhx-vcx5-c6qf
|
Improper Validation of Consistency within input in software for Intel(R) PROSet/Wireless Wi-Fi and Killer(TM) Wi-Fi in Windows 10 and 11 may allow an unauthenticated user to potentially enable denial of service via adjacent access.
|
[] | null | 6.5 | null | null | null |
|
CVE-2008-6975
|
Multiple cross-site request forgery (CSRF) vulnerabilities in apply.cgi in DD-WRT 24 sp2 allow remote attackers to hijack the authentication of administrators for requests that (1) execute arbitrary commands via the ping_ip parameter; (2) change the administrative credentials via the http_username and http_passwd parameters; (3) enable remote administration via the remote_management parameter; or (4) configure port forwarding via certain from, to, ip, and pro parameters. NOTE: This issue reportedly exists because of a "weak ... anti-CSRF fix" implemented in 24 sp2.
|
[
"cpe:2.3:a:dd-wrt:dd-wrt:24:sp2:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
CVE-2013-5493
|
The diagnostic module in the firmware on Cisco Virtualization Experience Client 6000 devices allows local users to bypass intended access restrictions and execute arbitrary commands via unspecified vectors, aka Bug ID CSCug68407.
|
[
"cpe:2.3:h:cisco:virtualization_experience_client_6000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:virtualization_experience_client_6000_series_firmware:-:*:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
GHSA-v8rp-8x66-vj5p
|
mainfile.php in XOOPS 2.0.13.2 and earlier, when register_globals is enabled, allows remote attackers to overwrite variables such as $xoopsOption['nocommon'] and conduct directory traversal attacks or include PHP files via (1) xoopsConfig[language] to misc.php or (2) xoopsConfig[theme_set] to index.php, as demonstrated by injecting PHP sequences into a log file.
|
[] | null | null | null | null | null |
|
CVE-2023-21703
|
Azure Data Box Gateway Remote Code Execution Vulnerability
|
Azure Data Box Gateway Remote Code Execution Vulnerability
|
[
"cpe:2.3:a:microsoft:azure_data_box_gateway:-:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:azure_stack_edge:-:*:*:*:*:*:*:*"
] | null | 6.5 | null | null | null |
GHSA-cvg2-rcw5-j6vm
|
The Delete All Comments Easily WordPress plugin through 1.3 is lacking Cross-Site Request Forgery (CSRF) checks, which could result in an unauthenticated attacker making a logged in admin delete all comments from the blog.
|
[] | null | null | null | null | null |
|
CVE-2018-11221
|
Unauthenticated untrusted file upload in Artica Pandora FMS through version 7.23 allows an attacker to upload an arbitrary plugin via include/ajax/update_manager.ajax in the update system.
|
[
"cpe:2.3:a:artica:pandora_fms:*:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 | null |
|
CVE-2020-26249
|
Remote Code Execution (RCE) Exploit on Cross Site Scripting (XSS) Vulnerability
|
Red Discord Bot Dashboard is an easy-to-use interactive web dashboard to control your Redbot. In Red Discord Bot before version 0.1.7a an RCE exploit has been discovered. This exploit allows Discord users with specially crafted Server names and Usernames/Nicknames to inject code into the webserver front-end code. By abusing this exploit, it's possible to perform destructive actions and/or access sensitive information. This high severity exploit has been fixed on version 0.1.7a. There are no workarounds, bot owners must upgrade their relevant packages (Dashboard module and Dashboard webserver) in order to patch this issue.
|
[
"cpe:2.3:a:cogboard:red-dashboard:0.1.2:alpha0:*:*:*:*:*:*",
"cpe:2.3:a:cogboard:red-dashboard:0.1.3:alpha0:*:*:*:*:*:*",
"cpe:2.3:a:cogboard:red-dashboard:0.1.4:alpha0:*:*:*:*:*:*",
"cpe:2.3:a:cogboard:red-dashboard:0.1.5:alpha0:*:*:*:*:*:*",
"cpe:2.3:a:cogboard:red-dashboard:0.1.6:alpha0:*:*:*:*:*:*"
] | null | 7.7 | null | null | null |
GHSA-x56h-2x3p-c97x
|
An issue was discovered in ReportController in Unicom Focal Point 7.6.1. A user who has administrative privilege in Focal Point can perform SQL injection via the image parameter during a delete report image operation.
|
[] | null | 6.5 | null | null | null |
|
CVE-2021-3491
|
Linux kernel io_uring PROVIDE_BUFFERS MAX_RW_COUNT bypass
|
The io_uring subsystem in the Linux kernel allowed the MAX_RW_COUNT limit to be bypassed in the PROVIDE_BUFFERS operation, which led to negative values being usedin mem_rw when reading /proc/<PID>/mem. This could be used to create a heap overflow leading to arbitrary code execution in the kernel. It was addressed via commit d1f82808877b ("io_uring: truncate lengths larger than MAX_RW_COUNT on provide buffers") (v5.13-rc1) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. It was introduced in ddf0322db79c ("io_uring: add IORING_OP_PROVIDE_BUFFERS") (v5.7-rc1).
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:20.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:21.04:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
GHSA-4jx4-gmpg-qw4c
|
ZEROF Web Server 1.0 (April 2021) allows SQL Injection via the /HandleEvent endpoint for the login page.
|
[] | null | null | null | null | null |
|
GHSA-2h2w-vccm-6fx5
|
Vulnerability that cards can call unauthorized APIs in the FRS process
Impact: Successful exploitation of this vulnerability may affect availability.
|
[] | null | 4.4 | null | null | null |
|
GHSA-q4gh-2cv2-8pcv
|
Unprotected Alternate Channel vulnerability in debug console of GateManager allows system administrator to obtain sensitive information. This issue affects: GateManager all versions prior to 9.7.
|
[] | null | 4.9 | null | null | null |
|
CVE-2018-18211
|
PbootCMS 1.2.1 has SQL injection via the HTTP POST data to the api.php/cms/addform?fcode=1 URI.
|
[
"cpe:2.3:a:pbootcms:pbootcms:1.2.1:*:*:*:*:*:*:*"
] | null | null | 8.1 | 6.8 | null |
|
GHSA-8fj5-fh3w-74fw
|
Acrobat Reader versions 20.005.30636, 24.002.20965, 24.002.20964, 24.001.30123 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[] | null | 7.8 | null | null | null |
|
CVE-2022-38871
|
In Free5gc v3.0.5, the AMF breaks due to malformed NAS messages.
|
[
"cpe:2.3:a:free5gc:free5gc:3.0.5:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
|
RHSA-2019:4154
|
Red Hat Security Advisory: kernel-alt security, bug fix, and enhancement update
|
kernel: Race condition in drivers/md/dm.c:dm_get_from_kobject() allows local users to cause a denial of service kernel: use-after-free Read in vhost_transport_send_pkt kernel: Information leak in cdrom_ioctl_drive_status Kernel: KVM: OOB memory access via mmio ring buffer
|
[
"cpe:/o:redhat:enterprise_linux:7::server"
] | null | null | 7 | null | null |
GHSA-7w63-rpf8-69q7
|
The Popup Builder plugin 2.2.8 through 2.6.7.6 for WordPress is vulnerable to SQL injection (in the sgImportPopups function in sg_popup_ajax.php) via PHP Deserialization on attacker-controlled data with the attachmentUrl POST variable. This allows creation of an arbitrary WordPress Administrator account, leading to possible Remote Code Execution because Administrators can run PHP code on Wordpress instances. (This issue has been fixed in the 3.x branch of popup-builder.)
|
[] | null | null | null | null | null |
|
CVE-2019-25070
|
WolfCMS User Add cross site scripting
|
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in WolfCMS up to 0.8.3.1. It has been rated as problematic. This issue affects some unknown processing of the file /wolfcms/?/admin/user/add of the component User Add. The manipulation of the argument name leads to basic cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-135125 was assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
|
[
"cpe:2.3:a:wolfcms:wolf_cms:*:*:*:*:*:*:*:*"
] | null | 3.5 | 3.5 | 3.5 | null |
PYSEC-2021-208
| null |
TensorFlow is an end-to-end open source platform for machine learning. The implementation of `tf.raw_ops.MaxPoolGradWithArgmax` can cause reads outside of bounds of heap allocated data if attacker supplies specially crafted inputs. The implementation(https://github.com/tensorflow/tensorflow/blob/31bd5026304677faa8a0b77602c6154171b9aec1/tensorflow/core/kernels/image/draw_bounding_box_op.cc#L116-L130) assumes that the last element of `boxes` input is 4, as required by [the op](https://www.tensorflow.org/api_docs/python/tf/raw_ops/DrawBoundingBoxesV2). Since this is not checked attackers passing values less than 4 can write outside of bounds of heap allocated objects and cause memory corruption. If the last dimension in `boxes` is less than 4, accesses similar to `tboxes(b, bb, 3)` will access data outside of bounds. Further during code execution there are also writes to these indices. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
|
[] | null | null | null | null | null |
CVE-2021-29843
|
IBM MQ 9.1 LTS, 9.1 CD, 9.2 LTS, and 9.2CD is vulnerable to a denial of service attack caused by an issue processing message properties. IBM X-Force ID: 205203.
|
[
"cpe:2.3:a:ibm:mq_appliance:*:*:*:*:lts:*:*:*",
"cpe:2.3:a:ibm:mq_appliance:*:*:*:*:continuous_delivery:*:*:*"
] | null | null | 5.3 | null | null |
|
GHSA-53xh-mr6w-445f
|
An issue has been discovered in GitLab CE/EE affecting all versions starting from 16.0 before 16.3.6, all versions starting from 16.4 before 16.4.2, and all versions starting from 16.5.0 before 16.5.1 which have the `super_sidebar_logged_out` feature flag enabled. Affected versions with this default-disabled feature flag enabled may unintentionally disclose GitLab version metadata to unauthorized actors.
|
[] | null | 3.7 | null | null | null |
|
CVE-2018-15907
|
Technicolor (formerly RCA) TC8305C devices allow remote attackers to cause a denial of service (networking outage) via a flood of random MAC addresses, as demonstrated by macof. NOTE: this might overlap CVE-2018-15852 and CVE-2018-16310. NOTE: Technicolor denies that the described behavior is a vulnerability and states that Wi-Fi traffic is slowed or stopped only while the devices are exposed to a MAC flooding attack. This has been confirmed through testing against official up-to-date versions
|
[
"cpe:2.3:o:technicolor:tc8305c_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:technicolor:tc8305c:-:*:*:*:*:*:*:*"
] | null | null | 6.5 | 6.1 | null |
|
GHSA-prf9-gx8m-9cfq
|
ConnectWise-Password-Encryption-Utility.exe in ConnectWise Risk Assessment allows an attacker to extract a hardcoded AES decryption key via reverse engineering. This key is embedded in plaintext within the binary and used in cryptographic operations without dynamic key management. Once obtained the key can be used to decrypt CSV input files used for authenticated network scanning.
|
[] | null | 6 | null | null | null |
|
CVE-2024-49627
|
WordPress WordPress Image SEO plugin <= 1.1.4 - Cross Site Request Forgery (CSRF) vulnerability
|
Cross-Site Request Forgery (CSRF) vulnerability in Noor Alam WordPress Image SEO allows Cross Site Request Forgery.This issue affects WordPress Image SEO: from n/a through 1.1.4.
|
[
"cpe:2.3:a:noorsplugin:wordpress_image_seo:*:*:*:*:*:wordpress:*:*"
] | null | 4.3 | null | null | null |
CVE-2017-0804
|
A elevation of privilege vulnerability in the MediaTek mmc driver. Product: Android. Versions: Android kernel. Android ID: A-36274676. References: M-ALPS03361487.
|
[
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | 6.8 | null |
|
GHSA-7g62-fhrq-8725
|
A vulnerability classified as critical has been found in SourceCodester Payroll Management System 1.0. This affects the function login of the file main. The manipulation leads to buffer overflow. The exploit has been disclosed to the public and may be used.
|
[] | 5.3 | 6.3 | null | null | null |
|
GHSA-778h-vxxj-rp93
|
Unspecified vulnerability in Oracle Java SE 8u92 and Java SE Embedded 8u91 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Hotspot.
|
[] | null | null | 9.6 | null | null |
|
CVE-2024-36000
|
mm/hugetlb: fix missing hugetlb_lock for resv uncharge
|
In the Linux kernel, the following vulnerability has been resolved:
mm/hugetlb: fix missing hugetlb_lock for resv uncharge
There is a recent report on UFFDIO_COPY over hugetlb:
https://lore.kernel.org/all/[email protected]/
350: lockdep_assert_held(&hugetlb_lock);
Should be an issue in hugetlb but triggered in an userfault context, where
it goes into the unlikely path where two threads modifying the resv map
together. Mike has a fix in that path for resv uncharge but it looks like
the locking criteria was overlooked: hugetlb_cgroup_uncharge_folio_rsvd()
will update the cgroup pointer, so it requires to be called with the lock
held.
|
[] | null | null | null | null | null |
GHSA-w3m8-585x-v8v5
|
Check Point Endpoint Security Initial Client for Windows before version E81.30 tries to load a DLL placed in any PATH location on a clean image without Endpoint Client installed. An attacker can leverage this to gain LPE using a specially crafted DLL placed in any PATH location accessible with write permissions to the user.
|
[] | null | null | 7.8 | null | null |
|
RHSA-2014:1335
|
Red Hat Security Advisory: python-django-horizon security and bug fix update
|
openstack-horizon: persistent XSS in Horizon Host Aggregates interface
|
[
"cpe:/a:redhat:openstack:5::el7"
] | null | null | null | null | null |
GHSA-mc5v-w52w-gjpc
|
Uncontrolled search path for the Intel(R) RealSense D400 Series Universal Windows Platform (UWP) Driver for Windows(R) 10 all versions may allow an authenticated user to potentially enable escalation of privilege via local access.
|
[] | 5.4 | 6.7 | null | null | null |
|
CVE-2023-45644
|
WordPress CPT Shortcode Generator Plugin <= 1.0 is vulnerable to Cross Site Scripting (XSS)
|
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Anurag Deshmukh CPT Shortcode Generator plugin <= 1.0 versions.
|
[
"cpe:2.3:a:anuragdeshmukh:cpt_shortcode_generator:*:*:*:*:*:wordpress:*:*"
] | null | 5.9 | null | null | null |
GHSA-6vx4-qq88-rhxq
|
A vulnerability was found in PHPGurukul Online DJ Booking Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /admin/user-search.php. The manipulation of the argument searchdata leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
|
[] | 6.9 | 7.3 | null | null | null |
|
CVE-2023-47466
|
TagLib before 2.0 allows a segmentation violation and application crash during tag writing via a crafted WAV file in which an id3 chunk is the only valid chunk.
|
[] | null | 2.9 | null | null | null |
|
GHSA-vv59-hfvc-2j7h
|
A vulnerability classified as critical has been found in Teledyne FLIR AX8 up to 1.46.16. Affected is an unknown function of the file palette.php of the component Web Service Handler. The manipulation of the argument palette leads to command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-215118 is the identifier assigned to this vulnerability.
|
[] | null | 9.8 | null | null | null |
|
GHSA-9r5j-hrx8-q34w
|
In subtitle service, there is a possible application crash due to an integer overflow. This could lead to local denial of service with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: DTV03330673; Issue ID: DTV03330673.
|
[] | null | 4.4 | null | null | null |
|
CVE-2025-27926
|
In Nintex Automation 5.6 and 5.7 before 5.8, the K2 SmartForms Designer folder has configuration files (web.config) containing passwords that are readable by unauthorized users.
|
[] | null | 4.3 | null | null | null |
|
GHSA-cpw5-29fw-w53x
|
Stack-based buffer overflow in PCSoft WinDEV 11 (01F110053p) allows user-assisted remote attackers to execute arbitrary code via a long string in the "used DLL" field in a WDP project file.
|
[] | null | null | null | null | null |
|
CVE-2024-12151
|
Incorrect permission assignment in the user migration feature in Devolutions Server 2024.3.8.0 and earlier allows users to retain their old permission sets.
|
[] | null | 5 | null | null | null |
|
GHSA-79gq-fwvx-q9qx
|
Improper input validation in Samsung Health prior to version 6.27.0.113 allows local attackers to write arbitrary document files to the sandbox of Samsung Health. User interaction is required for triggering this vulnerability.
|
[] | null | 3.3 | null | null | null |
|
GHSA-wcm9-qmw5-8964
|
Payments Director in IBM Financial Transaction Manager (FTM) for ACH Services, Check Services, and Corporate Payment Services (CPS) 3.0.0.x before fp0015 and 3.0.1.0 before iFix0002 allows remote authenticated users to conduct clickjacking attacks via a crafted web site.
|
[] | null | null | 5.7 | null | null |
|
RHSA-2023:2870
|
Red Hat Security Advisory: freeradius:3.0 security update
|
freeradius: Information leakage in EAP-PWD freeradius: Crash on unknown option in EAP-SIM freeradius: Crash on invalid abinary data
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null | null |
CVE-2010-4242
|
The hci_uart_tty_open function in the HCI UART driver (drivers/bluetooth/hci_ldisc.c) in the Linux kernel 2.6.36, and possibly other versions, does not verify whether the tty has a write operation, which allows local users to cause a denial of service (NULL pointer dereference) via vectors related to the Bluetooth driver.
|
[
"cpe:2.3:o:linux:linux_kernel:2.6.36:*:*:*:*:*:*:*"
] | null | null | null | 4 | null |
|
GHSA-qvh8-qx49-47qj
|
Simple Customer Relationship Management System v1.0 as discovered to contain a SQL injection vulnerability via the contact parameter in the user profile update function.
|
[] | null | 8.8 | null | null | null |
|
CVE-2020-35501
|
A flaw was found in the Linux kernels implementation of audit rules, where a syscall can unexpectedly not be correctly not be logged by the audit subsystem
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*"
] | null | 3.4 | null | 3.6 | null |
|
RHSA-2008:0089
|
Red Hat Security Advisory: kernel security and bug fix update
|
Null pointer to an inode in a dentry can cause an oops in sysfs_readdir Buffer overflow in CIFS VFS Issue with core dump owner Security: vulnerability of copy_to_user in PAL emulation kernel: filesystem corruption by unprivileged user via directory truncation
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null | null |
CVE-2007-6569
|
Cross-site scripting (XSS) vulnerability in the View Error Log functionality in Sun Java System Web Proxy Server 4.x before 4.0.6 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka BugID 6566246.
|
[
"cpe:2.3:a:sun:java_system_web_proxy_server:*:*:hp_ux:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_web_proxy_server:*:*:linux:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_web_proxy_server:*:*:sparc:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_web_proxy_server:*:*:windows:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_web_proxy_server:*:*:x86:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_web_proxy_server:3.6:*:aix:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_web_proxy_server:3.6:*:hp_ux:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_web_proxy_server:3.6:*:sparc:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_web_proxy_server:3.6:*:windows:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_web_server:6.1:*:aix:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_web_server:6.1:*:hp_ux:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_web_server:6.1:*:linux:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_web_server:6.1:*:sparc:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_web_server:6.1:*:windows:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_web_server:6.1:*:x86:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_web_server:7.0:*:hp_ux:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_web_server:7.0:*:linux:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_web_server:7.0:*:sparc:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_web_server:7.0:*:windows:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_web_server:7.0:*:x86:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
ICSA-14-133-01
|
Yokogawa Multiple Products Vulnerabilities
|
Heap-based buffer overflow in BKCLogSvr.exe in Yokogawa CENTUM CS 3000 R3.09.50 and earlier allows remote attackers to execute arbitrary code via crafted UDP packets. Stack-based buffer overflow in BKHOdeq.exe in Yokogawa CENTUM CS 3000 R3.09.50 and earlier allows remote attackers to execute arbitrary code via a crafted TCP packet. Stack-based buffer overflow in BKBCopyD.exe in Yokogawa CENTUM CS 3000 R3.09.50 and earlier allows remote attackers to execute arbitrary code via a crafted TCP packet. Stack-based buffer overflow in BKESimmgr.exe in the Expanded Test Functions package in Yokogawa CENTUM CS 1000, CENTUM CS 3000 Entry Class R3.09.50 and earlier, CENTUM VP R5.03.00 and earlier, CENTUM VP Entry Class R5.03.00 and earlier, Exaopc R3.71.02 and earlier, B/M9000CS R5.05.01 and earlier, and B/M9000 VP R7.03.01 and earlier allows remote attackers to execute arbitrary code via a crafted packet.
|
[] | null | null | null | null | null |
GHSA-w48m-gwjw-75cg
|
Multiple stack-based buffer overflows in the BackupToAvi method in the (1) UMS_Ctrl 1.5.1.1 and (2) UMS_Ctrl_STW 2.0.1.0 ActiveX controls in Samsung NET-i viewer 1.37.120316 allow remote attackers to execute arbitrary code via a long string in the fname parameter. NOTE: some of these details are obtained from third party information.
|
[] | null | null | null | null | null |
|
cisco-sa-20190501-aci-insecure-fabric
|
Cisco Nexus 9000 Series Fabric Switches Application Centric Infrastructure Mode Insecure Fabric Authentication Vulnerability
|
A vulnerability in the Transport Layer Security (TLS) certificate validation functionality of Cisco Nexus 9000 Series Application Centric Infrastructure (ACI) Mode Switch Software could allow an unauthenticated, remote attacker to perform insecure TLS client authentication on an affected device.
The vulnerability is due to insufficient TLS client certificate validations for certificates sent between the various components of an ACI fabric. An attacker who has possession of a certificate that is trusted by the Cisco Manufacturing CA and the corresponding private key could exploit this vulnerability by presenting a valid certificate while attempting to connect to the targeted device. An exploit could allow the attacker to gain full control of all other components within the ACI fabric of an affected device.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
|
[] | null | null | 8.1 | null | null |
GHSA-h9f4-g4q9-45gx
|
Buffer overflows in NetWin Authentication Module (NWAuth) 3.0b and earlier, as implemented in DMail, SurgeFTP, and possibly other packages, could allow attackers to execute arbitrary code via long arguments to (1) the -del command or (2) the -lookup command.
|
[] | null | null | null | null | null |
|
CVE-2014-2710
|
Multiple cross-site scripting (XSS) vulnerabilities in Oliver (formerly Webshare) 1.3.1 and earlier allow remote attackers to inject arbitrary web script or HTML via the PATH_INFO to the (1) login page (index.php) or (2) login form (loginform-inc.php).
|
[
"cpe:2.3:a:oliver_project:oliver:*:*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 | null |
|
CVE-2014-6143
|
The IBM WebSphere DataPower XC10 appliance 2.1 and 2.5 before FP4 allows local users to obtain sensitive information by reading a response.
|
[
"cpe:2.3:o:ibm:websphere_datapower_xc10_appliance_firmware:2.1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:websphere_datapower_xc10_appliance_firmware:2.5.0.0:*:*:*:*:*:*:*"
] | null | null | null | 2.1 | null |
|
GHSA-4g99-g84m-jr5m
|
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.34 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
|
[] | null | 4.9 | null | null | null |
|
GHSA-8rrr-rr37-wgfc
|
Knowage Suite 7.3 is vulnerable to Stored Cross-Site Scripting (XSS). An attacker can inject arbitrary web script in '/knowage/restful-services/signup/update' via the 'surname' parameter.
|
[] | null | null | null | null | null |
|
GHSA-8vxj-gx32-j925
|
Varnish Cache, with HTTP/2 enabled, allows request smuggling and VCL authorization bypass via a large Content-Length header for a POST request. This affects Varnish Enterprise 6.0.x before 6.0.8r3, and Varnish Cache 5.x and 6.x before 6.5.2, 6.6.x before 6.6.1, and 6.0 LTS before 6.0.8.
|
[] | null | 6.5 | null | null | null |
|
GHSA-5qcr-q6p5-3jp9
|
Buffer Overflow vulnerability in function LoadRGB in PluginDDS.cpp in FreeImage 3.18.0 allows remote attackers to run arbitrary code and cause other impacts via crafted image file.
|
[] | null | 7.8 | null | null | null |
|
CVE-2016-0113
|
Microsoft Internet Explorer 9 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2016-0105, CVE-2016-0107, CVE-2016-0111, and CVE-2016-0112.
|
[
"cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:11:*:*:*:*:*:*:*"
] | null | null | 7.5 | 7.6 | null |
|
CVE-2022-20312
|
In WifiP2pManager, there is a possible toobtain WiFi P2P MAC address without user consent due to missing permission check. This could lead to local information disclosure without additional execution privileges needed. User interaction is not needed forexploitationProduct: AndroidVersions: Android-13Android ID: A-192244925
|
[
"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
|
RHSA-2017:2728
|
Red Hat Security Advisory: postgresql security update
|
postgresql: Empty password accepted in some authentication methods postgresql: pg_user_mappings view discloses passwords to users lacking server privileges
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.5 | null | null |
CVE-2021-38900
|
IBM Business Process Manager 8.5 and 8.6 and IBM Business Automation Workflow 18.0, 19.0, 20.0 and 21.0 could allow a privileged user to obtain highly sensitive information due to improper access controls. IBM X-Force ID: 209607.
|
[
"cpe:2.3:a:ibm:business_automation_workflow:18.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:business_automation_workflow:18.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:business_automation_workflow:18.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:business_automation_workflow:19.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:business_automation_workflow:19.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:business_automation_workflow:20.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:business_automation_workflow:21.0.0.0:*:*:*:-:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.6.0.0:-:*:*:-:*:*:*",
"cpe:2.3:a:ibm:workflow_process_service:21.0.2:*:*:*:*:*:*:*"
] | null | null | 4.9 | null | null |
|
GHSA-qwg9-63m8-jhjg
|
Multiple cross-site scripting (XSS) vulnerabilities in WordPress 2.2.1 allow remote authenticated administrators to inject arbitrary web script or HTML via (1) the Options Database Table in the Admin Panel, accessed through options.php; or (2) the opml_url parameter to link-import.php. NOTE: this might not cross privilege boundaries in some configurations, since the Administrator role has the unfiltered_html capability.
|
[] | null | null | null | null | null |
|
CVE-2008-2050
|
Stack-based buffer overflow in the FastCGI SAPI (fastcgi.c) in PHP before 5.2.6 has unknown impact and attack vectors.
|
[
"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.4:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
CVE-2017-6011
|
An issue was discovered in icoutils 0.31.1. An out-of-bounds read leading to a buffer overflow was observed in the "simple_vec" function in the "extract.c" source file. This affects icotool.
|
[
"cpe:2.3:a:icoutils_project:icoutils:0.31.1:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
] | null | null | 5.5 | 4.3 | null |
|
GHSA-2365-p872-cmm2
|
ClipperCMS 1.3.3 allows remote authenticated administrators to upload .htaccess files.
|
[] | null | null | 7.2 | null | null |
|
GHSA-2g72-c9c4-mr3v
|
Cisco IOS 12.2, 12.4, 15.0, 15.2, and 15.3, when a VRF interface is configured, allows remote attackers to cause a denial of service (interface queue wedge) via crafted ICMPv4 packets, aka Bug ID CSCsi02145.
|
[] | null | null | null | null | null |
|
CVE-2025-48146
|
WordPress SEO Flow by LupsOnline plugin <= 2.2.0 - CSRF to Stored XSS vulnerability
|
Cross-Site Request Forgery (CSRF) vulnerability in Michael Lups SEO Flow by LupsOnline allows Stored XSS. This issue affects SEO Flow by LupsOnline: from n/a through 2.2.0.
|
[] | null | 7.1 | null | null | null |
GHSA-9f3v-f8rw-8w6m
|
A vulnerability, which was classified as critical, was found in Hindu Matrimonial Script. Affected is an unknown function of the file /admin/generalsettings.php. The manipulation leads to improper privilege management. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
|
[] | null | 8.8 | null | null | null |
|
GHSA-vmfr-7h39-rx5w
|
An issue was discovered in zzcms 2019. SQL Injection exists in user/ztconfig.php via the daohang or img POST parameter.
|
[] | null | null | null | null | null |
|
GHSA-426f-2r7q-j2xm
|
Improper Input Validation vulnerability in The Wikimedia Foundation Mediawiki - HTML Tags allows Cross-Site Scripting (XSS).This issue affects Mediawiki - HTML Tags: from 1.39 through 1.43.
|
[] | 10 | 5.4 | null | null | null |
|
CVE-2024-32596
|
WordPress DSGVO Youtube plugin <= 1.4.5 - Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Eric-Oliver Mächler DSGVO Youtube allows Stored XSS.This issue affects DSGVO Youtube: from n/a through 1.4.5.
|
[
"cpe:2.3:a:eric_olivier_machler:dsgvo_youtube:-:*:*:*:*:*:*:*"
] | null | 6.5 | null | null | null |
CVE-2021-32630
|
Various
|
Admidio is a free, open source user management system for websites of organizations and groups. In Admidio before version 4.0.4, there is an authenticated RCE via .phar file upload. A php web shell can be uploaded via the Documents & Files upload feature. Someone with upload permissions could rename the php shell with a .phar extension, visit the file, triggering the payload for a reverse/bind shell. This can be mitigated by excluding a .phar file extension to be uploaded (like you did with .php .phtml .php5 etc). The vulnerability is patched in version 4.0.4.
|
[
"cpe:2.3:a:admidio:admidio:*:*:*:*:*:*:*:*"
] | null | 9.6 | null | null | null |
CVE-2024-20664
|
Microsoft Message Queuing Information Disclosure Vulnerability
|
Microsoft Message Queuing Information Disclosure Vulnerability
|
[
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*"
] | null | 6.5 | null | null | null |
CVE-2022-29666
|
CSCMS Music Portal System v4.2 was discovered to contain a SQL injection vulnerability via the id parameter at /admin.php/pic/admin/lists/zhuan.
|
[
"cpe:2.3:a:chshcms:cscms_music_portal_system:4.2:*:*:*:*:*:*:*"
] | null | 7.2 | null | 6.5 | null |
|
CVE-2023-41770
|
Layer 2 Tunneling Protocol Remote Code Execution Vulnerability
|
Layer 2 Tunneling Protocol Remote Code Execution Vulnerability
|
[
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*"
] | null | 8.1 | null | null | null |
RHSA-2012:1203
|
Red Hat Security Advisory: flash-plugin security update
|
flash-plugin: code execution flaw (APSB12-18) flash-plugin: multiple code execution flaws (APSB12-19) flash-plugin: multiple code execution flaws (APSB12-19) flash-plugin: multiple code execution flaws (APSB12-19) flash-plugin: multiple code execution flaws (APSB12-19) flash-plugin: multiple code execution flaws (APSB12-19) flash-plugin: cross-domain information leak flaw (APSB12-19) flash-plugin: arbitrary code exec via integer overflow in copyRawDataTo method in Matrix3D class
|
[
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
] | null | null | null | null | null |
CVE-2012-5187
|
The Weathernews Touch application 2.3.2 and earlier for Android allows attackers to obtain sensitive information about logged locations via a crafted application that leverages read permission for system log files.
|
[
"cpe:2.3:a:weathernews:weathernews_touch:*:-:*:*:*:android:*:*",
"cpe:2.3:a:weathernews:weathernews_touch:1.20:-:*:*:*:android:*:*",
"cpe:2.3:a:weathernews:weathernews_touch:1.23:-:*:*:*:android:*:*",
"cpe:2.3:a:weathernews:weathernews_touch:1.33:-:*:*:*:android:*:*",
"cpe:2.3:a:weathernews:weathernews_touch:1.35:-:*:*:*:android:*:*",
"cpe:2.3:a:weathernews:weathernews_touch:1.38:-:*:*:*:android:*:*",
"cpe:2.3:a:weathernews:weathernews_touch:1.39:-:*:*:*:android:*:*",
"cpe:2.3:a:weathernews:weathernews_touch:1.40:-:*:*:*:android:*:*",
"cpe:2.3:a:weathernews:weathernews_touch:1.43:-:*:*:*:android:*:*",
"cpe:2.3:a:weathernews:weathernews_touch:1.44:-:*:*:*:android:*:*",
"cpe:2.3:a:weathernews:weathernews_touch:1.49:-:*:*:*:android:*:*",
"cpe:2.3:a:weathernews:weathernews_touch:1.50:-:*:*:*:android:*:*",
"cpe:2.3:a:weathernews:weathernews_touch:1.51:-:*:*:*:android:*:*",
"cpe:2.3:a:weathernews:weathernews_touch:1.53:-:*:*:*:android:*:*",
"cpe:2.3:a:weathernews:weathernews_touch:1.55:-:*:*:*:android:*:*",
"cpe:2.3:a:weathernews:weathernews_touch:1.58:-:*:*:*:android:*:*",
"cpe:2.3:a:weathernews:weathernews_touch:1.64:-:*:*:*:android:*:*",
"cpe:2.3:a:weathernews:weathernews_touch:1.65:-:*:*:*:android:*:*",
"cpe:2.3:a:weathernews:weathernews_touch:1.66:-:*:*:*:android:*:*",
"cpe:2.3:a:weathernews:weathernews_touch:1.67:-:*:*:*:android:*:*",
"cpe:2.3:a:weathernews:weathernews_touch:1.68:-:*:*:*:android:*:*",
"cpe:2.3:a:weathernews:weathernews_touch:2.0.0:-:*:*:*:android:*:*",
"cpe:2.3:a:weathernews:weathernews_touch:2.1.0:-:*:*:*:android:*:*",
"cpe:2.3:a:weathernews:weathernews_touch:2.1.1:-:*:*:*:android:*:*",
"cpe:2.3:a:weathernews:weathernews_touch:2.2.0:-:*:*:*:android:*:*",
"cpe:2.3:a:weathernews:weathernews_touch:2.3.1:-:*:*:*:android:*:*"
] | null | null | null | 4.3 | null |
|
CVE-2022-29985
|
Online Sports Complex Booking System 1.0 is vulnerable to SQL Injection via \scbs\classes\Master.php?f=delete_category.
|
[
"cpe:2.3:a:online_sports_complex_booking_system_project:online_sports_complex_booking_system:1.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 | null |
|
CVE-2025-3699
|
Missing Authentication for Critical Function vulnerability in Mitsubishi Electric Corporation G-50 Version 3.37 and prior, G-50-W Version 3.37 and prior, G-50A Version 3.37 and prior, GB-50 Version 3.37 and prior, GB-50A Version 3.37 and prior, GB-24A Version 9.12 and prior, G-150AD Version 3.21 and prior, AG-150A-A Version 3.21 and prior, AG-150A-J Version 3.21 and prior, GB-50AD Version 3.21 and prior, GB-50ADA-A Version 3.21 and prior, GB-50ADA-J Version 3.21 and prior, EB-50GU-A Version 7.11 and prior, EB-50GU-J Version 7.11 and prior, AE-200J Version 8.01 and prior, AE-200A Version 8.01 and prior, AE-200E Version 8.01 and prior, AE-50J Version 8.01 and prior, AE-50A Version 8.01 and prior, AE-50E Version 8.01 and prior, EW-50J Version 8.01 and prior, EW-50A Version 8.01 and prior, EW-50E Version 8.01 and prior, TE-200A Version 8.01 and prior, TE-50A Version 8.01 and prior, TW-50A Version 8.01 and prior, and CMS-RMD-J Version 1.40 and prior allows a remote unauthenticated attacker to bypass authentication and then control the air conditioning systems illegally, or disclose information in them by exploiting this vulnerability. In addition, the attacker may tamper with firmware for them using the disclosed information.
|
[] | null | 9.8 | null | null | null |
|
GHSA-wr4v-x69c-q5jx
|
OpenConnect through 8.08 mishandles negative return values from X509_check_ function calls, which might assist attackers in performing man-in-the-middle attacks.
|
[] | null | 5.9 | null | null | null |
|
GHSA-7xh9-cpwq-c77x
|
LibTIFF 4.0.7 has a signed integer overflow, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image.
|
[] | null | null | 7.8 | null | null |
|
CVE-2008-2448
|
Multiple SQL injection vulnerabilities in Meto Forum 1.1 allow remote attackers to execute arbitrary SQL commands via the (1) id parameter to (a) admin/duzenle.asp and (b) admin_oku.asp; the (2) kid parameter to (c) kategori.asp and (d) admin_kategori.asp; and unspecified parameters to (e) uye.asp and (f) oku.asp.
|
[
"cpe:2.3:a:aspindir:meto_forum:1.1:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-ww39-6r8q-4hxx
|
Use-after-free vulnerability in oowriter in OpenOffice.org (OOo) 2.x and 3.x before 3.3 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via malformed tables in an RTF document.
|
[] | null | null | null | null | null |
|
CVE-2021-31795
|
The PowerVR GPU kernel driver in pvrsrvkm.ko through 2021-04-24 for the Linux kernel, as used on Alcatel 1S phones, allows attackers to overwrite heap memory via PhysmemNewRamBackedPMR.
|
[
"cpe:2.3:a:pvrsrvkm.ko_project:pvrsrvkm.ko:*:*:*:*:*:*:*:*"
] | null | 7 | null | 6.9 | null |
|
GHSA-5c3m-78cg-3wpv
|
A flaw was found in the grub2-set-bootflag utility of grub2. A local attacker could run this utility under resource pressure (for example by setting RLIMIT), causing grub2 configuration files to be truncated and leaving the system unbootable on subsequent reboots.
|
[] | null | 5.5 | null | null | null |
|
CVE-2020-6984
|
Rockwell Automation MicroLogix 1400 Controllers Series B v21.001 and prior, Series A, all versions, MicroLogix 1100 Controller, all versions, RSLogix 500 Software v12.001 and prior, The cryptographic function utilized to protect the password in MicroLogix is discoverable.
|
[
"cpe:2.3:o:rockwellautomation:micrologix_1400_a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:rockwellautomation:micrologix_1400_b_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:rockwellautomation:micrologix_1400:-:*:*:*:*:*:*:*",
"cpe:2.3:o:rockwellautomation:micrologix_1100_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:rockwellautomation:micrologix_1100:-:*:*:*:*:*:*:*",
"cpe:2.3:a:rockwellautomation:rslogix_500:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null |
|
CVE-2006-1376
|
The installation of Debian GNU/Linux 3.1r1 from the network install CD creates /var/log/debian-installer/cdebconf with world writable permissions, which allows local users to cause a denial of service (disk consumption).
|
[
"cpe:2.3:o:debian:debian_linux:3.1:r1:*:*:*:*:*:*"
] | null | null | null | 2.1 | null |
|
CVE-2006-6996
|
Multiple cross-site scripting (XSS) vulnerabilities in warforge.NEWS 1.0 allow remote attackers to inject arbitrary HTML and web script via the (1) title and (2) newspost parameters to (a) newsadd.php, and the (3) name, title, and (4) comment parameters to (b) news.php, a different set of vectors than CVE-2006-1818. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
|
[
"cpe:2.3:a:the_war_forge:warforge.news:1.0:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-rxgc-f7rc-pv6h
|
ZyXEL ZyWALL/USG series devices have a Bleichenbacher vulnerability in their Internet Key Exchange (IKE) handshake implementation used for IPsec based VPN connections.
|
[] | null | null | 5.9 | null | null |
|
RHSA-2024:9637
|
Red Hat Security Advisory: webkit2gtk3 security update
|
webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash
|
[
"cpe:/a:redhat:rhel_e4s:9.0::appstream"
] | null | 4.3 | null | null | null |
CVE-2012-1585
|
OpenStack Compute (Nova) Essex before 2011.3 allows remote authenticated users to cause a denial of service (Nova-API log file and disk consumption) via a long server name.
|
[
"cpe:2.3:a:openstack:nova:*:*:*:*:*:*:*:*"
] | null | null | null | 4 | null |
|
GHSA-mwv5-mpw5-23rm
|
Cross-site scripting (XSS) vulnerability in index.php in Pictures Pro (aka Tim Grissett) Photo Cart 4.1 allows remote attackers to inject arbitrary web script or HTML via the amessage parameter. NOTE: some of these details are obtained from third party information.
|
[] | null | null | null | null | null |
|
GHSA-4734-5452-r5fh
|
OpenSLP as used in ESXi and the Horizon DaaS appliances has a heap overwrite issue. VMware has evaluated the severity of this issue to be in the Critical severity range with a maximum CVSSv3 base score of 9.8.
|
[] | null | 9.8 | null | null | null |
|
CVE-2015-6020
|
ZyXEL PMG5318-B20A devices with firmware 1.00AANC0b5 allow remote authenticated users to obtain administrative privileges by leveraging access to the user account.
|
[
"cpe:2.3:o:zyxel:pmg5318-b20a_firmware:v100aanc0b5:*:*:*:*:*:*:*"
] | null | null | 8 | 8.3 | null |
|
GHSA-qwf5-4p6v-8h59
|
IBM OpenPages with Watson 8.3 and 9.0 could allow an authenticated user to obtain sensitive information that should only be available to privileged users.
|
[] | null | 4.3 | null | null | null |
|
CVE-2021-1616
|
Cisco IOS XE Software H.323 Application Level Gateway Bypass Vulnerability
|
A vulnerability in the H.323 application level gateway (ALG) used by the Network Address Translation (NAT) feature of Cisco IOS XE Software could allow an unauthenticated, remote attacker to bypass the ALG. This vulnerability is due to insufficient data validation of traffic that is traversing the ALG. An attacker could exploit this vulnerability by sending crafted traffic to a targeted device. A successful exploit could allow the attacker to bypass the ALG and open connections that should not be allowed to a remote device located behind the ALG. Note: This vulnerability has been publicly discussed as NAT Slipstreaming.
|
[
"cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*"
] | null | 4.7 | null | null | null |
RHBA-2021:0621
|
Red Hat Bug Fix Advisory: microcode_ctl bug fix and enhancement update
|
hw: Vector Register Leakage-Active
|
[
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 2.8 | null | null | null |
CVE-2023-3290
|
A BOLA vulnerability in POST /customers in EasyAppointments < 1.5.0
|
A BOLA vulnerability in POST /customers allows a low privileged user to create a low privileged user (customer) in the system. This results in unauthorized data manipulation.
|
[
"cpe:2.3:a:alextselegidis:easyappointments:*:*:*:*:*:*:*:*",
"cpe:2.3:a:easyappointments:easyappointments:*:*:*:*:*:*:*:*"
] | null | 5 | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.