id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 38
232
⌀ |
---|---|---|---|---|---|---|---|---|
GHSA-g4wv-rqvc-h4jp
|
An issue was discovered in GitLab Community and Enterprise Edition 10.2 through 11.11. Multiple features contained Server-Side Request Forgery (SSRF) vulnerabilities caused by an insufficient validation to prevent DNS rebinding attacks.
|
[] | null | null | null | null | null |
|
GHSA-3phx-gw24-fgrp
|
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 27.0 and SeaMonkey before 2.24 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to the MPostWriteBarrier class in js/src/jit/MIR.h and stack alignment in js/src/jit/AsmJS.cpp in OdinMonkey, and unknown other vectors.
|
[] | null | null | null | null | null |
|
RHSA-2020:0465
|
Red Hat Security Advisory: java-1.8.0-ibm security update
|
OpenJDK: Incorrect exception processing during deserialization in BeanContextSupport (Serialization, 8224909) OpenJDK: Incorrect isBuiltinStreamHandler check causing URL normalization issues (Networking, 8228548) OpenJDK: Serialization filter changes via jdk.serialFilter property modification (Serialization, 8231422) OpenJDK: Incomplete enforcement of maxDatagramSockets limit in DatagramChannelImpl (Networking, 8231795)
|
[
"cpe:/a:redhat:enterprise_linux:8::supplementary"
] | null | 3.7 | null | null | null |
CVE-2022-30995
|
Sensitive information disclosure due to improper authentication. The following products are affected: Acronis Cyber Protect 15 (Windows, Linux) before build 29486, Acronis Cyber Backup 12.5 (Windows, Linux) before build 16545.
|
[
"cpe:2.3:a:acronis:cyber_backup:12.5:-:*:*:*:*:*:*",
"cpe:2.3:a:acronis:cyber_backup:12.5:10130:*:*:*:*:*:*",
"cpe:2.3:a:acronis:cyber_backup:12.5:10330:*:*:*:*:*:*",
"cpe:2.3:a:acronis:cyber_backup:12.5:11010:*:*:*:*:*:*",
"cpe:2.3:a:acronis:cyber_backup:12.5:13160:*:*:*:*:*:*",
"cpe:2.3:a:acronis:cyber_backup:12.5:13400:*:*:*:*:*:*",
"cpe:2.3:a:acronis:cyber_backup:12.5:14280:*:*:*:*:*:*",
"cpe:2.3:a:acronis:cyber_backup:12.5:14330:*:*:*:*:*:*",
"cpe:2.3:a:acronis:cyber_backup:12.5:16180:*:*:*:*:*:*",
"cpe:2.3:a:acronis:cyber_backup:12.5:16318:*:*:*:*:*:*",
"cpe:2.3:a:acronis:cyber_backup:12.5:16327:*:*:*:*:*:*",
"cpe:2.3:a:acronis:cyber_backup:12.5:7641:*:*:*:*:*:*",
"cpe:2.3:a:acronis:cyber_backup:12.5:7970:*:*:*:*:*:*",
"cpe:2.3:a:acronis:cyber_backup:12.5:8850:*:*:*:*:*:*",
"cpe:2.3:a:acronis:cyber_backup:12.5:9010:*:*:*:*:*:*",
"cpe:2.3:a:acronis:cyber_protect:15:-:*:*:*:*:*:*",
"cpe:2.3:a:acronis:cyber_protect:15:update1:*:*:*:*:*:*",
"cpe:2.3:a:acronis:cyber_protect:15:update2:*:*:*:*:*:*",
"cpe:2.3:a:acronis:cyber_protect:15:update3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | null | 9.3 | null | null |
|
GHSA-386g-g557-2gjj
|
Unauthenticated plugin settings change vulnerability in 59sec THE Leads Management System: 59sec LITE plugin <= 3.4.1 at WordPress.
|
[] | null | 5.3 | null | null | null |
|
CVE-2004-0079
|
The do_change_cipher_spec function in OpenSSL 0.9.6c to 0.9.6k, and 0.9.7a to 0.9.7c, allows remote attackers to cause a denial of service (crash) via a crafted SSL/TLS handshake that triggers a null dereference.
|
[
"cpe:2.3:h:cisco:firewall_services_module:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:firewall_services_module:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:firewall_services_module:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:firewall_services_module:1.1_\\(3.005\\):*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:firewall_services_module:2.1_\\(0.208\\):*:*:*:*:*:*:*",
"cpe:2.3:h:hp:aaa_server:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:apache-based_web_server:2.0.43.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:apache-based_web_server:2.0.43.04:*:*:*:*:*:*:*",
"cpe:2.3:h:symantec:clientless_vpn_gateway_4400:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:ciscoworks_common_management_foundation:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:ciscoworks_common_services:2.2:*:*:*:*:*:*:*",
"cpe:2.3:h:avaya:converged_communications_server:2.0:*:*:*:*:*:*:*",
"cpe:2.3:h:avaya:sg200:4.4:*:*:*:*:*:*:*",
"cpe:2.3:h:avaya:sg200:4.31.29:*:*:*:*:*:*:*",
"cpe:2.3:h:avaya:sg203:4.4:*:*:*:*:*:*:*",
"cpe:2.3:h:avaya:sg203:4.31.29:*:*:*:*:*:*:*",
"cpe:2.3:h:avaya:sg208:*:*:*:*:*:*:*:*",
"cpe:2.3:h:avaya:sg208:4.4:*:*:*:*:*:*:*",
"cpe:2.3:h:avaya:sg5:4.2:*:*:*:*:*:*:*",
"cpe:2.3:h:avaya:sg5:4.3:*:*:*:*:*:*:*",
"cpe:2.3:h:avaya:sg5:4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.3.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.3.3:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:4.8:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:4.8:releng:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:4.9:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:5.1:release:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:5.1:releng:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:5.2:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:5.2.1:release:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:8.05:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:11.11:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:11.23:*:*:*:*:*:*:*",
"cpe:2.3:o:openbsd:openbsd:3.3:*:*:*:*:*:*:*",
"cpe:2.3:o:openbsd:openbsd:3.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:linux:7.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:linux:7.3:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:sco:openserver:5.0.6:*:*:*:*:*:*:*",
"cpe:2.3:o:sco:openserver:5.0.7:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1\\(11\\)e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1\\(11b\\)e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1\\(11b\\)e12:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1\\(11b\\)e14:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1\\(13\\)e9:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1\\(19\\)e1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(14\\)sy:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(14\\)sy1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2sy:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2za:*:*:*:*:*:*:*",
"cpe:2.3:a:4d:webstar:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:4d:webstar:5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:4d:webstar:5.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:4d:webstar:5.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:4d:webstar:5.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:4d:webstar:5.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:4d:webstar:5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:4d:webstar:5.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:avaya:intuity_audix:*:*:lx:*:*:*:*:*",
"cpe:2.3:a:avaya:intuity_audix:5.1.46:*:*:*:*:*:*:*",
"cpe:2.3:a:avaya:intuity_audix:s3210:*:*:*:*:*:*:*",
"cpe:2.3:a:avaya:intuity_audix:s3400:*:*:*:*:*:*:*",
"cpe:2.3:a:avaya:vsu:5:*:*:*:*:*:*:*",
"cpe:2.3:a:avaya:vsu:5x:*:*:*:*:*:*:*",
"cpe:2.3:a:avaya:vsu:100_r2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:avaya:vsu:500:*:*:*:*:*:*:*",
"cpe:2.3:a:avaya:vsu:2000_r2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:avaya:vsu:5000_r2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:avaya:vsu:7500_r2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:avaya:vsu:10000_r2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:checkpoint:firewall-1:*:*:vsx-ng-ai:*:*:*:*:*",
"cpe:2.3:a:checkpoint:firewall-1:2.0:*:gx:*:*:*:*:*",
"cpe:2.3:a:checkpoint:firewall-1:next_generation_fp0:*:*:*:*:*:*:*",
"cpe:2.3:a:checkpoint:firewall-1:next_generation_fp1:*:*:*:*:*:*:*",
"cpe:2.3:a:checkpoint:firewall-1:next_generation_fp2:*:*:*:*:*:*:*",
"cpe:2.3:a:checkpoint:provider-1:4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:checkpoint:provider-1:4.1:sp1:*:*:*:*:*:*",
"cpe:2.3:a:checkpoint:provider-1:4.1:sp2:*:*:*:*:*:*",
"cpe:2.3:a:checkpoint:provider-1:4.1:sp3:*:*:*:*:*:*",
"cpe:2.3:a:checkpoint:provider-1:4.1:sp4:*:*:*:*:*:*",
"cpe:2.3:a:checkpoint:vpn-1:next_generation_fp0:*:*:*:*:*:*:*",
"cpe:2.3:a:checkpoint:vpn-1:next_generation_fp1:*:*:*:*:*:*:*",
"cpe:2.3:a:checkpoint:vpn-1:next_generation_fp2:*:*:*:*:*:*:*",
"cpe:2.3:a:checkpoint:vpn-1:vsx_ng_with_application_intelligence:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:access_registrar:*:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_and_content_networking_software:*:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:css_secure_content_accelerator:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:css_secure_content_accelerator:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:css11000_content_services_switch:*:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:okena_stormwatch:3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:pix_firewall:6.2.2_.111:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:threat_response:*:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webns:6.10:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webns:6.10_b4:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webns:7.1_0.1.02:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webns:7.1_0.2.06:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webns:7.2_0.0.03:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webns:7.10:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webns:7.10_.0.06s:*:*:*:*:*:*:*",
"cpe:2.3:a:dell:bsafe_ssl-j:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:dell:bsafe_ssl-j:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:dell:bsafe_ssl-j:3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:wbem:a.01.05.08:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:wbem:a.02.00.00:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:wbem:a.02.00.01:*:*:*:*:*:*:*",
"cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.2_rc1:*:*:*:*:*:*:*",
"cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.2_rc2:*:*:*:*:*:*:*",
"cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.3_rc1:*:*:*:*:*:*:*",
"cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.3_rc2:*:*:*:*:*:*:*",
"cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.3_rc3:*:*:*:*:*:*:*",
"cpe:2.3:a:neoteris:instant_virtual_extranet:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:neoteris:instant_virtual_extranet:3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:neoteris:instant_virtual_extranet:3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:neoteris:instant_virtual_extranet:3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:neoteris:instant_virtual_extranet:3.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:edirectory:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:edirectory:8.5:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:edirectory:8.5.12a:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:edirectory:8.5.27:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:edirectory:8.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:edirectory:8.7:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:edirectory:8.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:edirectory:8.7.1:sp1:*:*:*:*:*:*",
"cpe:2.3:a:novell:imanager:1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:imanager:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.6c:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.6d:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.6e:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.6f:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.6g:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.6h:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.6i:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.6j:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.6k:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.7:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.7:beta1:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.7:beta2:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.7:beta3:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.7a:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.7b:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.7c:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openssl:0.9.6-15:*:i386:*:*:*:*:*",
"cpe:2.3:a:redhat:openssl:0.9.6b-3:*:i386:*:*:*:*:*",
"cpe:2.3:a:redhat:openssl:0.9.7a-2:*:i386:*:*:*:*:*",
"cpe:2.3:a:redhat:openssl:0.9.7a-2:*:i386_dev:*:*:*:*:*",
"cpe:2.3:a:redhat:openssl:0.9.7a-2:*:i386_perl:*:*:*:*:*",
"cpe:2.3:a:sgi:propack:2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:sgi:propack:2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:sgi:propack:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:stonesoft:servercluster:2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:stonesoft:servercluster:2.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:stonesoft:stonebeat_fullcluster:1_2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:stonesoft:stonebeat_fullcluster:1_3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:stonesoft:stonebeat_fullcluster:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:stonesoft:stonebeat_fullcluster:2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:stonesoft:stonebeat_fullcluster:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:stonesoft:stonebeat_securitycluster:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:stonesoft:stonebeat_securitycluster:2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:stonesoft:stonebeat_webcluster:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:stonesoft:stonebeat_webcluster:2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:stonesoft:stonegate:1.5.17:*:*:*:*:*:*:*",
"cpe:2.3:a:stonesoft:stonegate:1.5.18:*:*:*:*:*:*:*",
"cpe:2.3:a:stonesoft:stonegate:1.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:stonesoft:stonegate:1.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:stonesoft:stonegate:1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:stonesoft:stonegate:1.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:stonesoft:stonegate:1.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:stonesoft:stonegate:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:stonesoft:stonegate:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:stonesoft:stonegate:2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:stonesoft:stonegate:2.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:stonesoft:stonegate:2.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:stonesoft:stonegate:2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:stonesoft:stonegate:2.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:stonesoft:stonegate:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:stonesoft:stonegate:2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:stonesoft:stonegate:2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:stonesoft:stonegate:2.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:stonesoft:stonegate_vpn_client:1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:stonesoft:stonegate_vpn_client:1.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:stonesoft:stonegate_vpn_client:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:stonesoft:stonegate_vpn_client:2.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:stonesoft:stonegate_vpn_client:2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:stonesoft:stonegate_vpn_client:2.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:tarantella:tarantella_enterprise:3.20:*:*:*:*:*:*:*",
"cpe:2.3:a:tarantella:tarantella_enterprise:3.30:*:*:*:*:*:*:*",
"cpe:2.3:a:tarantella:tarantella_enterprise:3.40:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:gsx_server:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:gsx_server:2.0.1_build_2129:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:gsx_server:2.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:gsx_server:2.5.1_build_5336:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:gsx_server:3.0_build_7592:*:*:*:*:*:*:*",
"cpe:2.3:h:avaya:s8300:r2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:h:avaya:s8300:r2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:h:avaya:s8500:r2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:h:avaya:s8500:r2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:h:avaya:s8700:r2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:h:avaya:s8700:r2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:h:bluecoat:proxysg:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:call_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:content_services_switch_11500:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:gss_4480_global_site_selector:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:gss_4490_global_site_selector:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:mds_9000:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:secure_content_accelerator:10000:*:*:*:*:*:*:*",
"cpe:2.3:h:securecomputing:sidewinder:5.2:*:*:*:*:*:*:*",
"cpe:2.3:h:securecomputing:sidewinder:5.2.0.01:*:*:*:*:*:*:*",
"cpe:2.3:h:securecomputing:sidewinder:5.2.0.02:*:*:*:*:*:*:*",
"cpe:2.3:h:securecomputing:sidewinder:5.2.0.03:*:*:*:*:*:*:*",
"cpe:2.3:h:securecomputing:sidewinder:5.2.0.04:*:*:*:*:*:*:*",
"cpe:2.3:h:securecomputing:sidewinder:5.2.1:*:*:*:*:*:*:*",
"cpe:2.3:h:securecomputing:sidewinder:5.2.1.02:*:*:*:*:*:*:*",
"cpe:2.3:h:sun:crypto_accelerator_4000:1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:bluecoat:cacheos_ca_sa:4.1.10:*:*:*:*:*:*:*",
"cpe:2.3:o:bluecoat:cacheos_ca_sa:4.1.12:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:pix_firewall_software:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:pix_firewall_software:6.0\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:pix_firewall_software:6.0\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:pix_firewall_software:6.0\\(3\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:pix_firewall_software:6.0\\(4\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:pix_firewall_software:6.0\\(4.101\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:pix_firewall_software:6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:pix_firewall_software:6.1\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:pix_firewall_software:6.1\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:pix_firewall_software:6.1\\(3\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:pix_firewall_software:6.1\\(4\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:pix_firewall_software:6.1\\(5\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:pix_firewall_software:6.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:pix_firewall_software:6.2\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:pix_firewall_software:6.2\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:pix_firewall_software:6.2\\(3\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:pix_firewall_software:6.2\\(3.100\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:pix_firewall_software:6.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:pix_firewall_software:6.3\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:pix_firewall_software:6.3\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:pix_firewall_software:6.3\\(3.102\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:pix_firewall_software:6.3\\(3.109\\):*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null |
|
GHSA-6vp9-x665-gpr4
|
The Rackspace app 2.1.5 for iOS does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
|
[] | null | null | null | null | null |
|
GHSA-9j99-7q7q-cj5v
|
A vulnerability classified as critical was found in itsourcecode Tailoring Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /expcatedit.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
|
[] | 5.3 | 8.8 | null | null | null |
|
CVE-2022-32095
|
Hospital Management System v1.0 was discovered to contain a SQL injection vulnerability via the editid parameter at orders.php.
|
[
"cpe:2.3:a:hospital_management_system_project:hospital_management_system:1.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 | null |
|
CVE-2024-8884
|
CWE-200: Exposure of Sensitive Information to an Unauthorized Actor vulnerability exists that
could cause exposure of credentials when attacker has access to application on network over
http
|
[
"cpe:2.3:a:schneider_electric:system_monitor_application_in_harmony_industrial_pc_hmibmo_hmibmi_hmipso_hmibmp_hmibmu_hmipsp_hmipep_series:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
|
GHSA-2v8x-vwgj-vjh5
|
The id paramater in Online Shopping Alphaware 1.0 has been discovered to be vulnerable to an Error-Based blind SQL injection in the /alphaware/details.php path. This allows an attacker to retrieve all databases.
|
[] | null | null | null | null | null |
|
CVE-2021-22448
|
There is an improper verification vulnerability in smartphones. Successful exploitation of this vulnerability may cause unauthorized read and write of some files.
|
[
"cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:9.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:magic_ui:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*"
] | null | 9.1 | null | 6.4 | null |
|
CVE-2018-3902
|
An exploitable buffer overflow vulnerability exists in the camera "replace" feature of video-core's HTTP server of Samsung SmartThings Hub STH-ETH-250 devices with firmware version 0.20.17. The video-core process incorrectly extracts the URL field from a user-controlled JSON payload, leading to a buffer overflow on the stack. An attacker can send an HTTP request to trigger this vulnerability.
|
[
"cpe:2.3:o:samsung:sth-eth-250_firmware:0.20.17:*:*:*:*:*:*:*",
"cpe:2.3:h:samsung:sth-eth-250:-:*:*:*:*:*:*:*"
] | null | null | 9.9 | null | null |
|
GHSA-c5f8-g56c-87hf
|
An issue was discovered in WUZHI CMS 4.1.0. There is a CSRF vulnerability that can change the super administrator's username via index.php?m=member&f=index&v=edit&uid=1.
|
[] | null | null | 8.8 | null | null |
|
CVE-2012-1415
|
Cross-site request forgery (CSRF) vulnerability in lib/logout.php in DFLabs PTK 1.0.5 and earlier allows remote attackers to hijack the authentication of administrators or investigators for requests that trigger a logout.
|
[
"cpe:2.3:a:dflabs:ptk:*:*:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
CVE-2021-23138
|
WECON LeviStudioU
|
WECON LeviStudioU Versions 2019-09-21 and prior are vulnerable to a stack-based buffer overflow, which may allow an attacker to remotely execute code.
|
[
"cpe:2.3:a:we-con:levistudiou:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
CVE-2016-10906
|
An issue was discovered in drivers/net/ethernet/arc/emac_main.c in the Linux kernel before 4.5. A use-after-free is caused by a race condition between the functions arc_emac_tx and arc_emac_tx_clean.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | null | 7 | 4.4 | null |
|
RHSA-2023:4058
|
Red Hat Security Advisory: .NET 7.0 security, bug fix, and enhancement update
|
dotnet: race condition in Core SignInManager<TUser> PasswordSignInAsync method
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 8.1 | null | null | null |
CVE-2013-5469
|
The TCP implementation in Cisco IOS does not properly implement the transitions from the ESTABLISHED state to the CLOSED state, which allows remote attackers to cause a denial of service (flood of ACK packets) via a crafted series of ACK and FIN packets, aka Bug ID CSCtz14399.
|
[
"cpe:2.3:o:cisco:ios:-:*:*:*:*:*:*:*"
] | null | null | null | 7.1 | null |
|
GHSA-95gx-q433-7q5x
|
The Swift Framework plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the sf_edit_directory_item() function in all versions up to, and including, 2.7.31. This makes it possible for unauthenticated attackers to update arbitrary posts with arbitrary content. Unfortunately, we did not receive a response from the vendor to send over the vulnerability details.
|
[] | null | 5.3 | null | null | null |
|
GHSA-5h5c-mrf4-82q5
|
Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 mishandle DLL loading, which allows local users to gain privileges via a crafted application, aka "Windows DLL Loading Remote Code Execution Vulnerability."
|
[] | null | null | 7.8 | null | null |
|
GHSA-mrfj-252f-4h27
|
The Throne Rush (aka com.progrestar.bft) application 2.3.10 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
|
[] | null | null | null | null | null |
|
GHSA-3j7x-gh3j-ghqj
|
ImageMagick before 7.0.5-2 and GraphicsMagick before 1.3.24 use uninitialized memory in the RLE decoder, allowing an attacker to leak sensitive information from process memory space, as demonstrated by remote attacks against ImageMagick code in a long-running server process that converts image data on behalf of multiple users. This is caused by a missing initialization step in the ReadRLEImage function in coders/rle.c.
|
[] | null | 7.5 | null | null | null |
|
RHSA-2024:6312
|
Red Hat Security Advisory: python3.11-setuptools security update
|
pypa/setuptools: Remote code execution via download functions in the package_index module in pypa/setuptools
|
[
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 8.8 | null | null | null |
RHSA-2025:3215
|
Red Hat Security Advisory: kernel security update
|
kernel: net/bluetooth: race condition in conn_info_{min,max}_age_set() kernel: arp: Prevent overflow in arp_req_get(). kernel: netfilter: nf_conntrack_h323: Add protection for bmp length out of range kernel: drm/vmwgfx: Create debugfs ttm_resource_manager entry only if needed kernel: mlxsw: spectrum_acl_tcam: Fix possible use-after-free during rehash kernel: ipv6: prevent NULL dereference in ip6_output() kernel: scsi: mpi3mr: Avoid memcpy field-spanning write WARNING kernel: ipv4: Fix uninit-value access in __ip_make_skb() kernel: ftruncate: pass a signed offset kernel: protect the fetch of ->fd[fd] in do_dup2() from mispredictions kernel: arm64: cacheinfo: Avoid out-of-bounds write to cacheinfo array
|
[
"cpe:/a:redhat:rhel_eus:9.4::appstream",
"cpe:/a:redhat:rhel_eus:9.4::crb",
"cpe:/a:redhat:rhel_eus:9.4::nfv",
"cpe:/a:redhat:rhel_eus:9.4::realtime",
"cpe:/o:redhat:rhel_eus:9.4::baseos"
] | null | 7 | null | null | null |
GHSA-gcm6-ww8r-qm6x
|
The installer for BackOffice Server includes account names and passwords in a setup file (reboot.ini) which is not deleted.
|
[] | null | null | null | null | null |
|
GHSA-p23r-j983-4557
|
Directory traversal vulnerability in GNU tar 1.13.19 and earlier allows local users to overwrite arbitrary files during archive extraction via a tar file whose filenames contain a .. (dot dot).
|
[] | null | null | null | null | null |
|
CVE-2023-7089
|
Easy SVG Allow <= 1.0 - Author+ Stored XSS via SVG
|
The Easy SVG Allow WordPress plugin through 1.0 does not sanitize uploaded SVG files, which could allow users with a role as low as Author to upload a malicious SVG containing XSS payloads.
|
[
"cpe:2.3:a:benjaminzekavica:easy_svg_support:*:*:*:*:*:wordpress:*:*"
] | null | 5.4 | null | null | null |
GHSA-cqp4-gpw2-h4r2
|
Cross-site scripting (XSS) vulnerability in __swift/thirdparty/PHPExcel/PHPExcel/Shared/JAMA/docs/download.php in Kayako Fusion 4.40.1148, and possibly before 4.50.1581, allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO.
|
[] | null | null | null | null | null |
|
GHSA-hggh-f6m4-4c3w
|
An attacker with local access the to medical office computer can
escalate his Windows user privileges to "NT AUTHORITY\SYSTEM" by
exploiting a command injection vulnerability in the Elefant Update
Service. The command injection can be exploited by communicating with
the Elefant Update Service which is running as "SYSTEM" via Windows
Named Pipes.The Elefant Software Updater (ESU) consists of two components. An ESU
service which runs as "NT AUTHORITY\SYSTEM" and an ESU tray client
which communicates with the service to update or repair the installation
and is running with user permissions. The communication is implemented
using named pipes. A crafted message of type
"MessageType.SupportServiceInfos" can be sent to the local ESU service
to inject commands, which are then executed as "NT AUTHORITY\SYSTEM".
|
[] | null | 7.8 | null | null | null |
|
GHSA-x63x-qrg6-ggcj
|
There is a NULL pointer deference in the Allwinner R818 SoC Android Q SDK V1.0 camera driver /dev/cedar_dev that could use the ioctl cmd IOCTL_GET_IOMMU_ADDR to cause a system crash.
|
[] | null | null | null | null | null |
|
GHSA-268h-h8j2-2m45
|
An issue was discovered in DSK DSKNet 2.16.136.0 and 2.17.136.5. A SQL Injection vulnerability allows authenticated users to taint database data and extract sensitive information via crafted HTTP requests. The type of SQL Injection is blind boolean based.
|
[] | null | 7.1 | null | null | null |
|
GHSA-qhxx-93xr-42wh
|
Protection mechanism failure in firmware for some Intel(R) SSD DC Products may allow a privileged user to potentially enable information disclosure via local access.
|
[] | null | 4.4 | null | null | null |
|
GHSA-g5qw-hp88-696m
|
"IBM InfoSphere Information Server 11.7 is potentially vulnerable to CSV Injection. A remote attacker could execute arbitrary commands on the system, caused by improper validation of csv file contents. IBM X-Force ID: 223598."
|
[] | null | 9.8 | null | null | null |
|
GHSA-wg78-f39r-7g9q
|
An issue was discovered in WECON Technology LEVI Studio HMI Editor v1.8.29 and prior. A specially-crafted malicious file may be able to cause a heap-based buffer overflow vulnerability when opened by a user.
|
[] | null | null | 7.8 | null | null |
|
CVE-2017-3055
|
Adobe Acrobat Reader versions 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier have an exploitable heap overflow vulnerability in JPEG 2000 parsing of the fragment list tag. Successful exploitation could lead to arbitrary code execution.
|
[
"cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:reader:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | 9.3 | null |
|
CVE-2025-43561
|
ColdFusion | Incorrect Authorization (CWE-863)
|
ColdFusion versions 2025.1, 2023.13, 2021.19 and earlier are affected by an Incorrect Authorization vulnerability that could result in arbitrary code execution in the context of the current user. A high-privileged attacker could leverage this vulnerability to bypass authentication mechanisms and execute code. Exploitation of this issue does not require user interaction and scope is changed.
|
[] | null | 9.1 | null | null | null |
CVE-2021-1288
|
Cisco IOS XR Software Enf Broker Denial of Service Vulnerability
|
Multiple vulnerabilities in the ingress packet processing function of Cisco IOS XR Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. For more information about these vulnerabilities, see the Details section of this advisory.
|
[
"cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*"
] | null | 8.6 | null | null | null |
GHSA-hg5p-m73j-gf56
|
A File Inclusion vulnerability exists in Zabbix 2.0.6 due to inadequate sanitization of request strings in CGI scripts, which could let a remote malicious user execute arbitrary code.
|
[] | null | null | null | null | null |
|
CVE-2021-1550
|
Cisco Small Business 100, 300, and 500 Series Wireless Access Points Command Injection Vulnerabilities
|
Multiple vulnerabilities in the web-based management interface of certain Cisco Small Business 100, 300, and 500 Series Wireless Access Points could allow an authenticated, remote attacker to perform command injection attacks against an affected device. These vulnerabilities are due to improper validation of user-supplied input. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to the web-based management interface of an affected system. A successful exploit could allow the attacker to execute arbitrary commands with root privileges on the device. To exploit these vulnerabilities, the attacker must have valid administrative credentials for the device.
|
[
"cpe:2.3:o:cisco:wap125_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:wap125:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:wap131_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:wap131:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:wap150_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:wap150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:wap351_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:wap351:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:wap361_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:wap361:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:wap581_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:wap581:-:*:*:*:*:*:*:*"
] | null | 4.7 | null | null | null |
CVE-2016-2441
|
The Qualcomm buspm driver in Android before 2016-05-01 on Nexus 5X, 6, and 6P devices allows attackers to gain privileges via a crafted application, aka internal bug 26354602.
|
[
"cpe:2.3:h:google:nexus_5x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:google:nexus_6:-:*:*:*:*:*:*:*",
"cpe:2.3:h:google:nexus_6p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*"
] | null | null | 7 | 7.6 | null |
|
RHEA-2022:5463
|
Red Hat Enhancement Advisory: Red Hat Single Sign-On 7.6.0 update
|
liquibase: Improper Restriction of XML External Entity
|
[
"cpe:/a:redhat:red_hat_single_sign_on:7.6.0"
] | null | 7.3 | null | null | null |
GHSA-rgwr-hf3f-55jg
|
A system does not present an appropriate legal message or warning to a user who is accessing it.
|
[] | null | null | null | null | null |
|
GHSA-cr29-m84p-98f7
|
iThemes Builder Theme Market before 5.1.27 for WordPress has XSS via add_query_arg() and remove_query_arg().
|
[] | null | null | 6.1 | null | null |
|
GHSA-97q6-87j9-jw23
|
VMware AirWatch Console (9.2.x before 9.2.2 and 9.1.x before 9.1.5) contains a Cross Site Request Forgery vulnerability when accessing the App Catalog. An attacker may exploit this issue by tricking users into installing a malicious application on their devices.
|
[] | null | null | 8.8 | null | null |
|
GHSA-8vmr-c9ff-vrfh
|
The QSslSocket::sslErrors function in Qt before 4.6.5, 4.7.x before 4.7.6, 4.8.x before 4.8.5, when using certain versions of openSSL, uses an "incompatible structure layout" that can read memory from the wrong location, which causes Qt to report an incorrect error when certificate validation fails and might cause users to make unsafe security decisions to accept a certificate.
|
[] | null | null | null | null | null |
|
GHSA-vgrg-5wpm-gwfh
|
A sql injection vulnerability exists in the ObjectYPT functionality of WWBN AVideo 11.6 and dev master commit 3f7c0364. A specially-crafted HTTP request can lead to a SQL injection. An attacker can send an HTTP request to trigger this vulnerability.This vulnerability exists in the aVideoEncoder functionality which can be used to add new videos, allowing an attacker to inject SQL by manipulating the videoDownloadedLink or duration parameter.
|
[] | null | 8.8 | null | null | null |
|
GHSA-pv49-965m-2m35
|
Out-of-bounds Read vulnerability in Open Networking Foundation (ONF) libfluid (libfluid_msg module). This vulnerability is associated with program routine fluid_msg::of13::GroupStats::unpack.This issue affects libfluid: 0.1.0.
|
[] | null | 6.5 | null | null | null |
|
CVE-2009-0035
|
alsa-utils 1.0.19 and later versions allows local users to overwrite arbitrary files via a symlink attack via the /usr/bin/alsa-info and /usr/bin/alsa-info.sh scripts.
|
[
"cpe:2.3:a:alsa-project:alsa:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | 3.6 | null |
|
CVE-2018-25081
|
Bitwarden through 2023.2.1 offers password auto-fill within a cross-domain IFRAME element. NOTE: the vendor's position is that there have been important legitimate cross-domain configurations (e.g., an apple.com IFRAME element on the icloud.com website) and that "Auto-fill on page load" is not enabled by default.
|
[
"cpe:2.3:a:bitwarden:bitwarden:*:*:*:*:browser:*:*:*"
] | null | 7.5 | null | null | null |
|
RHSA-2024:8105
|
Red Hat Security Advisory: python-gevent security update
|
python-gevent: privilege escalation via a crafted script to the WSGIServer component
|
[
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 9.1 | null | null | null |
CVE-2022-42906
|
powerline-gitstatus (aka Powerline Gitstatus) before 1.3.2 allows arbitrary code execution. git repositories can contain per-repository configuration that changes the behavior of git, including running arbitrary commands. When using powerline-gitstatus, changing to a directory automatically runs git commands in order to display information about the current repository in the prompt. If an attacker can convince a user to change their current directory to one controlled by the attacker, such as in a shared filesystem or extracted archive, powerline-gitstatus will run arbitrary commands under the attacker's control. NOTE: this is similar to CVE-2022-20001.
|
[
"cpe:2.3:a:powerline_gitstatus_project:powerline_gitstatus:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
|
CVE-2022-1471
|
Remote Code execution in SnakeYAML
|
SnakeYaml's Constructor() class does not restrict types which can be instantiated during deserialization. Deserializing yaml content provided by an attacker can lead to remote code execution. We recommend using SnakeYaml's SafeConsturctor when parsing untrusted content to restrict deserialization. We recommend upgrading to version 2.0 and beyond.
|
[
"cpe:2.3:a:snakeyaml_project:snakeyaml:*:*:*:*:*:*:*:*"
] | null | 8.3 | null | null | null |
GHSA-jwv4-h8g3-3qmm
|
Buffer overflow in the DB Software Laboratory VImpX ActiveX control in VImpX.ocx 4.7.3 allows remote attackers to execute arbitrary code via a long LogFile parameter.
|
[] | null | null | null | null | null |
|
CVE-2006-5764
|
PHP remote file inclusion vulnerability in contact.php in Free File Hosting 1.1 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the AD_BODY_TEMP parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. NOTE: this issue was later reported for the "File Upload System" which is a component of Free File Hosting.
|
[
"cpe:2.3:a:free_php_scripts:free_file_hosting:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2014-8731
|
PHPMemcachedAdmin 1.2.2 and earlier allows remote attackers to execute arbitrary PHP code via vectors related "serialized data and the last part of the concatenated filename," which creates a file in webroot.
|
[
"cpe:2.3:a:phpmemcachedadmin_project:phpmemcachedadmin:*:*:*:*:*:*:*:*"
] | null | null | 9.8 | 10 | null |
|
CVE-2017-1000143
|
Mahara 1.8 before 1.8.7 and 1.9 before 1.9.5 and 1.10 before 1.10.3 and 15.04 before 15.04.0 are vulnerable to users receiving watchlist notifications about pages they do not have access to anymore.
|
[
"cpe:2.3:a:mahara:mahara:1.8:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.8:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.8.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.8.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.8.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.8.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.9:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.9.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.10:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.10.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:15.04:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:15.04:rc2:*:*:*:*:*:*"
] | null | null | 4.3 | 4 | null |
|
GHSA-v64q-8rwf-28g2
|
The ExifJpegHUFFTable::deriveTable function in ExifHuffmanTable.cpp in OpenExif 2.1.4 allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) via a crafted jpg file.
|
[] | null | null | 5.5 | null | null |
|
GHSA-ch96-rh97-j6j3
|
A Path Traversal vulnerability in the J-Web component of Juniper Networks Junos OS allows an authenticated attacker to upload arbitrary files to the device by bypassing validation checks built into Junos OS. The attacker should not be able to execute the file due to validation checks built into Junos OS. Successful exploitation of this vulnerability could lead to loss of filesystem integrity. This issue affects Juniper Networks Junos OS: all versions prior to 19.1R3-S9; 19.2 versions prior to 19.2R3-S6; 19.3 versions prior to 19.3R3-S7; 19.4 versions prior to 19.4R3-S9; 20.1 versions prior to 20.1R3-S5; 20.2 versions prior to 20.2R3-S5; 20.3 versions prior to 20.3R3-S5; 20.4 versions prior to 20.4R3-S4; 21.1 versions prior to 21.1R3-S2; 21.2 versions prior to 21.2R3-S1; 21.3 versions prior to 21.3R2-S2, 21.3R3; 21.4 versions prior to 21.4R1-S2, 21.4R2-S1, 21.4R3; 22.1 versions prior to 22.1R1-S1, 22.1R2.
|
[] | null | 4.3 | null | null | null |
|
CVE-2013-1477
|
Unspecified vulnerability in the JavaFX component in Oracle Java SE JavaFX 2.2.4 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors, a different vulnerability than other CVEs listed in the February 2013 CPU.
|
[
"cpe:2.3:a:oracle:javafx:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:javafx:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:javafx:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:javafx:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:javafx:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:javafx:2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:javafx:2.2.3:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
GHSA-xjxx-grm6-73vf
|
In the Linux kernel, the following vulnerability has been resolved:block: fix wrong mode for blkdev_put() from disk_scan_partitions()If disk_scan_partitions() is called with 'FMODE_EXCL',
blkdev_get_by_dev() will be called without 'FMODE_EXCL', however, follow
blkdev_put() is still called with 'FMODE_EXCL', which will cause
'bd_holders' counter to leak.Fix the problem by using the right mode for blkdev_put().
|
[] | null | null | null | null | null |
|
CVE-2024-8114
|
Missing Authorization in GitLab
|
An issue has been discovered in GitLab CE/EE affecting all versions from 8.12 before 17.4.5, 17.5 before 17.5.3, and 17.6 before 17.6.1. This issue allows an attacker with access to a victim's Personal Access Token (PAT) to escalate privileges.
|
[
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*",
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:17.6.0:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:17.6.0:*:*:*:enterprise:*:*:*"
] | null | 8.2 | null | null | null |
CVE-2018-6392
|
The filter_slice function in libavfilter/vf_transpose.c in FFmpeg through 3.4.1 allows remote attackers to cause a denial of service (out-of-array access) via a crafted MP4 file.
|
[
"cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] | null | null | 6.5 | 4.3 | null |
|
GHSA-2h55-hc4f-7vj2
|
A heap-based buffer over-read exists in libopencad 0.2.0 in the ReadCHAR function in lib/dwg/io.cpp, resulting in an application crash.
|
[] | null | null | 6.5 | null | null |
|
CVE-2019-12810
|
A memory corruption vulnerability exists in the .PSD parsing functionality of ALSee v5.3 ~ v8.39. A specially crafted .PSD file can cause an out of bounds write vulnerability resulting in code execution. By persuading a victim to open a specially-crafted .PSD file, an attacker could execute arbitrary code.
|
[
"cpe:2.3:a:estsoft:alsee:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | null | 7.8 | 6.8 | null |
|
GHSA-x2fq-3hq8-jf6h
|
Incorrect default permissions in the Intel(R) Support android application before version v23.02.07 may allow a privileged user to potentially enable information disclosure via local access.
|
[] | null | 4.4 | null | null | null |
|
GHSA-f9mq-jph6-9mhm
|
Arbitrary file read via window-open IPC in Electron
|
ImpactThe vulnerability allows arbitrary local file read by defining unsafe window options on a child window opened via window.open.WorkaroundsEnsure you are calling `event.preventDefault()` on all [`new-window`](https://electronjs.org/docs/api/web-contents#event-new-window) events where the `url` or `options` is not something you expect.Fixed Versions`9.0.0-beta.21``8.2.4``7.2.4`For more informationIf you have any questions or comments about this advisory:Email us at [[email protected]](mailto:[email protected])
|
[] | null | 6.8 | null | null | null |
CVE-2024-51378
|
getresetstatus in dns/views.py and ftp/views.py in CyberPanel (aka Cyber Panel) before 1c0c6cb allows remote attackers to bypass authentication and execute arbitrary commands via /dns/getresetstatus or /ftp/getresetstatus by bypassing secMiddleware (which is only for a POST request) and using shell metacharacters in the statusfile property, as exploited in the wild in October 2024 by PSAUX. Versions through 2.3.6 and (unpatched) 2.3.7 are affected.
|
[
"cpe:2.3:a:cyberpanel:cyberpanel:*:*:*:*:*:*:*:*"
] | null | 10 | null | null | null |
|
GHSA-qq7f-3qf3-cr8j
|
SQL injection vulnerability in FlexCustomer 0.0.4 and earlier allows remote attackers to bypass authentication and execute arbitrary SQL commands via the admin and ordinary user interface, probably involving the (1) checkuser and (2) checkpass parameters to (a) admin/index.php, and (3) username and (4) password parameters to (b) index.php. NOTE: it was later reported that 0.0.6 is also affected.
|
[] | null | null | null | null | null |
|
CVE-2006-6982
|
3proxy 0.5 to 0.5.2 does not offer NTLM authentication before basic authentication, which might cause browsers with incomplete RFC2616/RFC2617 support to use basic cleartext authentication even if NTLM is available, which makes it easier for attackers to steal credentials.
|
[
"cpe:2.3:a:3proxy:3proxy:0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:3proxy:3proxy:0.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:3proxy:3proxy:0.5.2:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-48mr-3phh-9xcg
|
An issue was discovered in ytnef before 1.9.1. This is related to a patch described as "2 of 9. Infinite Loop / DoS in the TNEFFillMapi function in lib/ytnef.c."
|
[] | null | null | 5.5 | null | null |
|
CVE-2025-30473
|
Apache Airflow Common SQL Provider: Remote Code Execution via Sql Injection
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Apache Airflow Common SQL Provider.
When using the partition clause in SQLTableCheckOperator as parameter (which was a recommended pattern), Authenticated UI User could inject arbitrary SQL command when triggering DAG exposing partition_clause to the user.
This allowed the DAG Triggering user to escalate privileges to execute those arbitrary commands which they normally would not have.
This issue affects Apache Airflow Common SQL Provider: before 1.24.1.
Users are recommended to upgrade to version 1.24.1, which fixes the issue.
|
[] | null | 8.8 | null | null |
https://github.com/apache/airflow/pull/48098
|
CVE-2024-11821
|
Privilege Escalation in langgenius/dify
|
A privilege escalation vulnerability exists in langgenius/dify version 0.9.1. This vulnerability allows a normal user to modify Orchestrate instructions for a chatbot created by an admin user. The issue arises because the application does not properly enforce access controls on the endpoint /console/api/apps/{chatbot-id}/model-config, allowing unauthorized users to alter chatbot configurations.
|
[] | null | null | 4.3 | null | null |
GHSA-54px-fhff-75hp
|
A memory initialization issue was addressed with improved memory handling. This issue is fixed in iOS 12.2, macOS Mojave 10.14.4. A local user may be able to read kernel memory.
|
[] | null | null | null | null | null |
|
GHSA-wv32-c2xr-97ch
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in enituretechnology LTL Freight Quotes – Unishippers Edition allows Reflected XSS. This issue affects LTL Freight Quotes – Unishippers Edition: from n/a through 2.5.8.
|
[] | null | 7.1 | null | null | null |
|
GHSA-3r6p-4374-4569
|
Cross-site scripting (XSS) vulnerability in IBM WebSphere Portal 6.1.0 through 6.1.0.6 CF27, 6.1.5 through 6.1.5.3 CF27, 7.0.0 through 7.0.0.2 CF29, 8.0.0 through 8.0.0.1 CF14, and 8.5.0 before CF04 allows remote attackers to inject arbitrary web script or HTML via a crafted URL.
|
[] | null | null | null | null | null |
|
GHSA-4f29-g223-2grv
|
An Improper Validation of Syntactic Correctness of Input vulnerability in the Juniper DHCP daemon (jdhcpd) of Juniper Networks Junos OS allows an adjacent unauthenticated attacker sending a malformed DHCP packet to cause a crash of jdhcpd and thereby a Denial of Service (DoS). If option-82 is configured in a DHCP snooping / -security scenario, jdhcpd crashes if a specific malformed DHCP request packet is received. The DHCP functionality is impacted while jdhcpd restarts, and continued exploitation of the vulnerability will lead to the unavailability of the DHCP service and thereby a sustained DoS. This issue affects Juniper Networks Junos OS 13.2 version 13.2R1 and later versions prior to 15.1R7-S11; 18.3 versions prior to 18.3R3-S6; 18.4 versions prior to 18.4R2-S9, 18.4R3-S10; 19.1 versions prior to 19.1R2-S3, 19.1R3-S7; 19.2 versions prior to 19.2R1-S8, 19.2R3-S4; 19.3 versions prior to 19.3R2-S7, 19.3R3-S4; 19.4 versions prior to 19.4R3-S6; 20.1 versions prior to 20.1R3-S3; 20.2 versions prior to 20.2R3-S3; 20.3 versions prior to 20.3R3-S1; 20.4 versions prior to 20.4R3; 21.1 versions prior to 21.1R2-S1, 21.1R3; 21.2 versions prior to 21.2R1-S1, 21.2R2. This issue does not affect Juniper Networks Junos OS version 12.3R12 and prior versions.
|
[] | null | null | null | null | null |
|
GHSA-375f-cc53-h7vh
|
Benjamin BALET Jorani v1.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the Comment parameter at application/controllers/Leaves.php.
|
[] | null | 6.1 | null | null | null |
|
GHSA-8mxc-7fg2-rfv7
|
Buffer overflow in Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code via unspecified vectors.
|
[] | null | null | null | null | null |
|
GHSA-38h6-wxxg-2c7g
|
WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3.
|
[] | null | null | null | null | null |
|
CVE-2022-46859
|
WordPress Spiffy Calendar Plugin <= 4.9.1 is vulnerable to SQL Injection
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Spiffy Plugins Spiffy Calendar spiffy-calendar allows SQL Injection.This issue affects Spiffy Calendar: from n/a through 4.9.1.
|
[
"cpe:2.3:a:spiffyplugins:spiffy_calendar:*:*:*:*:*:wordpress:*:*"
] | null | 9.8 | null | null | null |
GHSA-2qcm-cv9r-3v6h
|
The 'systemui/settings_network.php' and 'systemui/settings_patching.php' scripts in the Quest KACE System Management Appliance 8.0.318 are accessible only from localhost. This restriction can be bypassed by modifying the 'Host' and 'X_Forwarded_For' HTTP headers in a POST request. An anonymous user can abuse this vulnerability to execute critical functions without authorization.
|
[] | null | null | 5.5 | null | null |
|
RHSA-2023:2248
|
Red Hat Security Advisory: xorg-x11-server security and bug fix update
|
xorg-x11-server: buffer overflow in _GetCountedString() in xkb/xkb.c xorg-x11-server: memory leak in ProcXkbGetKbdByName() in xkb/xkb.c xorg-x11-server: XkbGetKbdByName use-after-free xorg-x11-server: XTestSwapFakeInput stack overflow xorg-x11-server: XIPassiveUngrab out-of-bounds access xorg-x11-server: XvdiSelectVideoNotify use-after-free xorg-x11-server: ScreenSaverSetAttributes use-after-free xorg-x11-server: XIChangeProperty out-of-bounds access xorg-x11-server: DeepCopyPointerClasses use-after-free leads to privilege elevation
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 7.8 | null | null | null |
CVE-2016-8409
|
An information disclosure vulnerability in the NVIDIA video driver could enable a local malicious application to access data outside of its permission levels. This issue is rated as Moderate because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10. Android ID: A-31495687. References: N-CVE-2016-8409.
|
[
"cpe:2.3:o:linux:linux_kernel:3.10:*:*:*:*:*:*:*"
] | null | null | 4.7 | 2.6 | null |
|
RHSA-2020:0122
|
Red Hat Security Advisory: java-11-openjdk security update
|
OpenJDK: Incorrect exception processing during deserialization in BeanContextSupport (Serialization, 8224909) OpenJDK: Improper checks of SASL message properties in GssKrb5Base (Security, 8226352) OpenJDK: Incorrect isBuiltinStreamHandler check causing URL normalization issues (Networking, 8228548) OpenJDK: Use of unsafe RSA-MD5 checksum in Kerberos TGS (Security, 8229951) OpenJDK: Serialization filter changes via jdk.serialFilter property modification (Serialization, 8231422) OpenJDK: Excessive memory usage in OID processing in X.509 certificate parsing (Libraries, 8234037) OpenJDK: Incorrect handling of unexpected CertificateVerify TLS handshake messages (JSSE, 8231780)
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 4.8 | null | null | null |
CVE-2020-24203
|
Insecure File Permissions and Arbitrary File Upload in the upload pic function in updatesubcategory.php in Projects World Travel Management System v1.0 allows remote unauthenticated attackers to gain remote code execution.
|
[
"cpe:2.3:a:projectworlds:travel_management_system:1.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 | null |
|
GHSA-wh3f-976p-qfcj
|
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
|
[] | null | null | null | null | null |
|
GHSA-94ch-c848-c3m7
|
In Android before security patch level 2018-04-05 on Qualcomm Snapdragon Mobile SD 210/SD 212/SD 205, SD 400, SD 430, SD 450, SD 617, SD 625, SD 650/52, SD 800, SD 808, SD 820, SD 835, an integer overflow vulnerability exists in a video library.
|
[] | null | null | 9.8 | null | null |
|
GHSA-53q7-57w3-2j4r
|
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in takeover of MySQL Server. CVSS 3.1 Base Score 7.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H).
|
[] | null | 7.2 | null | null | null |
|
CVE-2024-51836
|
WordPress Wezido plugin <= 1.2 - Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Teconce Wezido allows DOM-Based XSS.This issue affects Wezido: from n/a through 1.2.
|
[] | null | 6.5 | null | null | null |
CVE-2022-30511
|
School Dormitory Management System 1.0 is vulnerable to SQL Injection via accounts/view_details.php:4.
|
[
"cpe:2.3:a:school_dormitory_management_system_project:school_dormitory_management_system:1.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 | null |
|
CVE-2016-6357
|
A vulnerability in the configured security policies, including drop email filtering, in Cisco AsyncOS for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass a configured drop filter by using an email with a corrupted attachment. More Information: CSCuz01651. Known Affected Releases: 10.0.9-015 9.7.1-066 9.9.6-026.
|
[
"cpe:2.3:a:cisco:email_security_appliance:9.7.1-066:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:email_security_appliance:9.9.6-026:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 | null |
|
GHSA-2qpj-g893-v358
|
SQL injection vulnerability in news.php in Ero Auktion 2.0 and 2010 allows remote attackers to execute arbitrary SQL commands via the id parameter.
|
[] | null | null | null | null | null |
|
GHSA-68v9-m4mj-hq4h
|
Improper privilege management vulnerability in PhoneStatusBarPolicy in System UI prior to SMR Mar-2023 Release 1 allows attacker to turn off Do not disturb via unprotected intent.
|
[] | null | 3.3 | null | null | null |
|
CVE-2022-4612
|
Click Studios Passwordstate insufficiently protected credentials
|
A vulnerability has been found in Click Studios Passwordstate and Passwordstate Browser Extension Chrome and classified as problematic. This vulnerability affects unknown code. The manipulation leads to insufficiently protected credentials. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. It is recommended to upgrade the affected component. VDB-216274 is the identifier assigned to this vulnerability.
|
[
"cpe:2.3:a:clickstudios:passwordstate:*:*:*:*:*:*:*:*",
"cpe:2.3:a:clickstudios:passwordstate:9.5:build_9500:*:*:*:-:*:*",
"cpe:2.3:a:clickstudios:passwordstate:9.5:build_9512:*:*:*:-:*:*",
"cpe:2.3:a:clickstudios:passwordstate:9.5:build_9519:*:*:*:-:*:*",
"cpe:2.3:a:clickstudios:passwordstate:9.5:build_9531:*:*:*:-:*:*",
"cpe:2.3:a:clickstudios:passwordstate:9.5:build_9533:*:*:*:-:*:*",
"cpe:2.3:a:clickstudios:passwordstate:9.5:build_9535:*:*:*:-:*:*",
"cpe:2.3:a:clickstudios:passwordstate:9.5:build_9583:*:*:*:-:*:*",
"cpe:2.3:a:clickstudios:passwordstate:9.5.8.4:*:*:*:*:chrome:*:*"
] | null | 4.3 | null | null | null |
RHSA-2022:6147
|
Red Hat Security Advisory: OpenShift Container Platform 4.9.47 bug fix and security update
|
go-getter: command injection vulnerability go-getter: unsafe download (issue 1 of 3) go-getter: unsafe download (issue 2 of 3) go-getter: unsafe download (issue 3 of 3)
|
[
"cpe:/a:redhat:openshift:4.9::el8"
] | null | 8.6 | null | null | null |
CVE-2020-27845
|
There's a flaw in src/lib/openjp2/pi.c of openjpeg in versions prior to 2.4.0. If an attacker is able to provide untrusted input to openjpeg's conversion/encoding functionality, they could cause an out-of-bounds read. The highest impact of this flaw is to application availability.
|
[
"cpe:2.3:a:uclouvain:openjpeg:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:outside_in_technology:8.5.5:*:*:*:*:*:*:*"
] | null | 5.5 | null | 4.3 | null |
|
GHSA-wg2j-jjvh-qg4h
|
Multiple PHP remote file inclusion vulnerabilities in PhotoKorn Gallery 1.52 and earlier allow remote attackers to execute arbitrary PHP code via a URL in the dir_path parameter in (1) includes/cart.inc.php or (2) extras/ext_cats.php.
|
[] | null | null | null | null | null |
|
GHSA-7892-3f52-8277
|
Netgear R7000 1.0.11.136 is vulnerable to Command Injection in RMT_invite.cgi via device_name2 parameter.
|
[] | null | 8.4 | null | null | null |
|
CVE-2022-35048
|
OTFCC commit 617837b was discovered to contain a heap buffer overflow via /release-x64/otfccdump+0x6b0b2c.
|
[
"cpe:2.3:a:otfcc_project:otfcc:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.