id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 38
232
⌀ |
---|---|---|---|---|---|---|---|---|
CVE-2025-25086
|
WordPress Secret Meta plugin <= 1.2.1 - CSRF to Reflected Cross Site Scripting (XSS) vulnerability
|
Cross-Site Request Forgery (CSRF) vulnerability in WPDeveloper Secret Meta allows Reflected XSS.This issue affects Secret Meta: from n/a through 1.2.1.
|
[] | null | 7.1 | null | null | null |
GHSA-j65r-8hrg-qc6x
|
An attacker can make the Node.js HTTP/2 server completely unavailable by sending a small amount of HTTP/2 frames packets with a few HTTP/2 frames inside. It is possible to leave some data in nghttp2 memory after reset when headers with HTTP/2 CONTINUATION frame are sent to the server and then a TCP connection is abruptly closed by the client triggering the Http2Session destructor while header frames are still being processed (and stored in memory) causing a race condition.
|
[] | null | null | 8.2 | null | null |
|
CVE-2006-1874
|
Unspecified vulnerability in Oracle Database Server 8.1.7.4, 9.0.1.5, and 9.2.0.6 has unknown impact and attack vectors in the Oracle Spatial component, aka Vuln# DB09. NOTE: Oracle has not disputed reliable claims that this issue is SQL injection in MDSYS.PRVT_IDX using the (1) EXECUTE_INSERT, (2) EXECUTE_DELETE, (3) EXECUTE_UPDATE, (4) EXECUTE UPDATE, and (5) CRT_DUMMY functions.
|
[
"cpe:2.3:a:oracle:database_server:8.1.7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_server:9.0.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_server:9.2.0.6:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2004-0213
|
Utility Manager in Windows 2000 launches winhlp32.exe while Utility Manager is running with raised privileges, which allows local users to gain system privileges via a "Shatter" style attack that sends a Windows message to cause Utility Manager to launch winhlp32 by directly accessing the context sensitive help and bypassing the GUI, then sending another message to winhlp32 in order to open a user-selected file, a different vulnerability than CVE-2003-0908.
|
[
"cpe:2.3:o:microsoft:windows_2000:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2000:-:sp3:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2000:-:sp4:*:*:*:*:*:*"
] | null | 7.8 | null | 7.2 | null |
|
GHSA-pjwc-7xmf-rc5q
|
Cross-site scripting (XSS) vulnerability in index.php in Maian Cart 1.1 allows remote attackers to inject arbitrary web script or HTML via the keywords parameter in a search command. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
|
[] | null | null | null | null | null |
|
GHSA-53xg-38vg-33gj
|
SQUARE ENIX Co., Ltd. Kaku-San-Sei Million Arthur before 2.25 for Android stores "product credentials" on the SD card, which allows attackers to gain privileges via a crafted application.
|
[] | null | null | null | null | null |
|
GHSA-p6jv-pfj3-5933
|
Services_Twitter 0.6.3 does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
|
[] | null | null | null | null | null |
|
CVE-2019-13476
|
In CentOS-WebPanel.com (aka CWP) CentOS Web Panel 0.9.8.837, XSS in the domain parameter allows a low-privilege user to achieve root access via the email list page.
|
[
"cpe:2.3:a:control-webpanel:webpanel:0.9.8.837:*:*:*:*:*:*:*"
] | null | null | 5.4 | 3.5 | null |
|
CVE-2006-5211
|
Trend Micro OfficeScan 6.0 in Client/Server/Messaging (CSM) Suite for SMB 2.0 before 6.0.0.1385, and OfficeScan Corporate Edition (OSCE) 6.5 before 6.5.0.1418, 7.0 before 7.0.0.1257, and 7.3 before 7.3.0.1053 allow remote attackers to remove OfficeScan clients via a certain HTTP request that invokes the OfficeScan CGI program.
|
[
"cpe:2.3:a:trend_micro:officescan_corporate_edition:6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:trend_micro:officescan_corporate_edition:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:trend_micro:officescan_corporate_edition:7.3:*:*:*:*:*:*:*"
] | null | null | null | 6.4 | null |
|
CVE-2017-0481
|
An elevation of privilege vulnerability in NFC could enable a proximate attacker to execute arbitrary code within the context of a privileged process. This issue is rated as High because it could be used to gain local access to elevated capabilities, which are not normally accessible to a third-party application. Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1. Android ID: A-33434992.
|
[
"cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*"
] | null | null | 7.8 | 9.3 | null |
|
CVE-2016-6656
|
An issue was discovered in Pivotal Greenplum before 4.3.10.0. Creation of external tables using GPHDFS protocol has a vulnerability whereby arbitrary commands can be injected into the system. In order to exploit this vulnerability the user must have superuser 'gpadmin' access to the system or have been granted GPHDFS protocol permissions in order to create a GPHDFS external table.
|
[
"cpe:2.3:a:pivotal_software:greenplum:*:*:*:*:*:*:*:*"
] | null | null | 7.2 | 6.5 | null |
|
GHSA-89j4-j5mp-mxwm
|
A CWE-1021: Improper Restriction of Rendered UI Layers or Frames vulnerability exists that could cause an adversary to trick the interface user/admin into interacting with the application in an unintended way when the product does not implement restrictions on the ability to render within frames on external addresses. Affected Products: Conext™ ComBox (All Versions)
|
[] | null | 6.5 | null | null | null |
|
GHSA-6p47-2pgh-wj76
|
Improper Authentication vulnerability in Danfoss AKSM8xxA Series.This issue affects Danfoss AK-SM 8xxA Series prior to version 4.2
|
[] | null | 8.2 | null | null | null |
|
CVE-1999-0803
|
The fwluser script in AIX eNetwork Firewall allows local users to write to arbitrary files via a symlink attack.
|
[
"cpe:2.3:a:ibm:aix_enetwork_firewall:3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:aix_enetwork_firewall:3.3:*:*:*:*:*:*:*"
] | null | null | null | 2.1 | null |
|
CVE-2021-20505
|
The PowerVM Logical Partition Mobility(LPM) (PowerVM Hypervisor FW920, FW930, FW940, and FW950) encryption key exchange protocol can be compromised. If an attacker has the ability to capture encrypted LPM network traffic and is able to gain service access to the FSP they can use this information to perform a series of PowerVM service procedures to decrypt the captured migration traffic IBM X-Force ID: 198232
|
[
"cpe:2.3:o:ibm:powervm_hypervisor:fw920:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:powervm_hypervisor:fw930:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:powervm_hypervisor:fw940:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:powervm_hypervisor:fw950:*:*:*:*:*:*:*"
] | null | null | 4.4 | null | null |
|
CVE-2022-4765
|
Portfolio for Elementor, Image Gallery & Post Grid | PowerFolio < 2.3.1 - Contributor+ Stored XSS via Shortcode
|
The Portfolio for Elementor WordPress plugin before 2.3.1 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins.
|
[
"cpe:2.3:a:pwrplugins:portfolio_for_elementor:*:*:*:*:*:wordpress:*:*"
] | null | 5.4 | null | null | null |
CVE-2018-1000808
|
Python Cryptographic Authority pyopenssl version Before 17.5.0 contains a CWE - 401 : Failure to Release Memory Before Removing Last Reference vulnerability in PKCS #12 Store that can result in Denial of service if memory runs low or is exhausted. This attack appear to be exploitable via Depends upon calling application, however it could be as simple as initiating a TLS connection. Anything that would cause the calling application to reload certificates from a PKCS #12 store.. This vulnerability appears to have been fixed in 17.5.0.
|
[
"cpe:2.3:a:pyopenssl_project:pyopenssl:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:a:redhat:gluster_storage:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openstack:13:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
] | null | null | 5.9 | 4.3 | null |
|
CVE-2013-2929
|
The Linux kernel before 3.12.2 does not properly use the get_dumpable function, which allows local users to bypass intended ptrace restrictions or obtain sensitive information from IA64 scratch registers via a crafted application, related to kernel/ptrace.c and arch/ia64/include/asm/processor.h.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0:rc5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0:rc6:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0:rc7:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.12:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.13:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.14:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.15:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.16:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.17:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.18:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.19:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.20:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.21:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.22:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.23:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.24:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.25:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.26:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.27:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.28:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.29:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.30:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.31:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.32:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.33:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.34:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.35:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.36:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.37:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.38:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.39:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.40:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.41:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.42:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.43:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.44:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.45:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.46:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.47:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.48:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.49:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.50:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.51:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.52:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.53:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.54:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.55:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.56:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.57:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.58:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.59:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.60:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.61:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.62:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.63:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.64:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.65:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.66:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.67:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.68:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2:rc5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2:rc6:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2:rc7:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.12:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.13:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.14:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.15:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.16:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.17:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.18:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.19:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.20:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.21:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.22:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.23:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.24:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.25:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.26:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.27:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.28:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.29:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.30:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3:rc5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3:rc6:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3:rc7:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4:rc5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4:rc6:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4:rc7:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.12:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.13:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.14:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.15:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.16:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.17:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.18:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.19:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.20:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.21:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.22:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.23:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.24:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.25:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.26:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.27:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.28:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.29:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.30:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.31:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.32:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.5.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.5.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.5.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.5.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.5.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.5.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.6.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.6.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.6.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.6.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.6.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.6.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.6.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.6.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.6.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.6.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.7.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.7.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.7.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.7.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.7.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.7.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.7.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.7.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.7.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.8.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.8.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.8.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.8.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.8.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.8.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.8.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.8.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.8.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.8.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.8.12:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.8.13:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9:rc5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9:rc6:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9:rc7:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.10.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.10.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.10.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.10.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.10.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.10.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.10.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.10.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.10.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.10.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.10.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.10.12:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.10.13:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.10.14:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.10.15:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.10.16:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.10.17:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.10.18:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.11.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.11.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.11.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.11.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.11.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.11.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.11.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.12:*:*:*:*:*:*:*"
] | null | null | null | 3.3 | null |
|
GHSA-rjr6-c78c-px55
|
A server side injection vulnerability exists which could allow an authenticated administrative user to achieve Remote Code Execution in ClearPass. Resolution: Fixed in 6.7.13, 6.8.4, 6.9.0 and higher.
|
[] | null | null | null | null | null |
|
CVE-2025-1211
|
Versions of the package hackney before 1.21.0 are vulnerable to Server-side Request Forgery (SSRF) due to improper parsing of URLs by URI built-in module and hackey. Given the URL http://[email protected]/, the URI function will parse and see the host as 127.0.0.1 (which is correct), and hackney will refer the host as 127.2.2.2/.
This vulnerability can be exploited when users rely on the URL function for host checking.
|
[] | 6.3 | 6.5 | null | null | null |
|
GHSA-23gg-m473-8fr9
|
A bug in the code allows an attacker to sign a forged zbx_session cookie, which then allows them to sign in with admin permissions.
|
[] | null | 8.8 | null | null | null |
|
GHSA-3hmv-gr4c-qpjc
|
Russcom PHPImages allows remote attackers to upload files of arbitrary types by uploading a file with a .gif extension. NOTE: due to lack of specific information about attack vectors do not depend on the existence of another vulnerability, it is not clear whether this is a vulnerability.
|
[] | null | null | null | null | null |
|
CVE-2012-1118
|
The access_has_bug_level function in core/access_api.php in MantisBT before 1.2.9 does not properly restrict access when the private_bug_view_threshold is set to an array, which allows remote attackers to bypass intended restrictions and perform certain operations on private bug reports.
|
[
"cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:0.18.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:0.19.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:0.19.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:0.19.0a1:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:0.19.0a2:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:0.19.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:0.19.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:0.19.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:0.19.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:0.19.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc4:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.0.0:rc5:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.0.0a1:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.0.0a2:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.0.0a3:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.2.0a1:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.2.0a2:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mantisbt:mantisbt:1.2.7:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-vwrh-j67m-m9gp
|
Handle leak in Microsoft Windows 2000 telnet service allows attackers to cause a denial of service by starting a large number of sessions and terminating them.
|
[] | null | null | null | null | null |
|
GHSA-4gp7-wgqw-q868
|
SQL injection vulnerability in the is_god function in includes/nukesentinel.php in NukeSentinel 2.5.11 allows remote attackers to execute arbitrary SQL commands via base64-encoded data in an admin cookie, a different vector than CVE-2007-5125.
|
[] | null | null | null | null | null |
|
CVE-2025-21289
|
Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability
|
Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability
|
[] | null | 7.5 | null | null | null |
CVE-2024-21878
|
Command Injection through Unsafe File Name Evaluation in internal script in Enphase IQ Gateway v4.x to and including 8.x
|
Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability in Enphase IQ Gateway (formerly known as Envoy) allows OS Command Injection. This vulnerability is present in an internal script.This issue affects Envoy: from 4.x up to and including 8.x and is currently unpatched.
|
[
"cpe:2.3:h:enphase:envoy:*:*:*:*:*:*:*:*",
"cpe:2.3:o:enphase:iq_gateway_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:enphase:iq_gateway:-:*:*:*:*:*:*:*"
] | 9.2 | null | null | null | null |
GHSA-8jxj-w5fr-rjvp
|
Falcon web server 2.0.0.1020 and earlier allows remote attackers to bypass authentication and read restricted files via an extra / (slash) in the requested URL.
|
[] | null | null | null | null | null |
|
CVE-2018-10730
|
All Phoenix Contact managed FL SWITCH 3xxx, 4xxx, 48xx products running firmware version 1.0 to 1.33 are prone to OS command injection.
|
[
"cpe:2.3:o:phoenixcontact:fl_switch_3005_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_switch_3005:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_switch_3005t_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_switch_3005t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_switch_3004t-fx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_switch_3004t-fx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_switch_3004t-fx_st_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_switch_3004t-fx_st:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_switch_3008_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_switch_3008:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_switch_3008t_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_switch_3008t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_switch_3006t-2fx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_switch_3006t-2fx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_switch_3006t-2fx_st_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_switch_3006t-2fx_st:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_switch_3012e-2sfx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_switch_3012e-2sfx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_switch_3016e_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_switch_3016e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_switch_3016_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_switch_3016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_switch_3016t_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_switch_3016t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_switch_3006t-2fx_sm_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_switch_3006t-2fx_sm:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_switch_4008t-2sfp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_switch_4008t-2sfp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_switch_4008t-2gt-4fx_sm_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_switch_4008t-2gt-4fx_sm:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_switch_4008t-2gt-3fx_sm_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_switch_4008t-2gt-3fx_sm:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_switch_4808e-16fx_lc-4gc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_switch_4808e-16fx_lc-4gc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_switch_4808e-16fx_sm-4gc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_switch_4808e-16fx_sm-4gc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_switch_4808e-16fx_sm_st-4gc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_switch_4808e-16fx_sm_st-4gc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_switch_4808e-16fx_st-4gc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_switch_4808e-16fx_st-4gc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_switch_4808e-16fx-4gc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_switch_4808e-16fx-4gc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_switch_4808e-16fx_sm_lc-4gc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_switch_4808e-16fx_sm_lc-4gc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_switch_4012t_2gt_2fx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_switch_4012t_2gt_2fx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_switch_4012t-2gt-2fx_st_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_switch_4012t-2gt-2fx_st:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_switch_4824e-4gc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_switch_4824e-4gc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_switch_4800e-24fx-4gc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_switch_4800e-24fx-4gc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_switch_4800e-24fx_sm-4gc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_switch_4800e-24fx_sm-4gc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_switch_3012e-2fx_sm_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_switch_3012e-2fx_sm:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_switch_4000t-8poe-2sfp-r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_switch_4000t-8poe-2sfp-r:-:*:*:*:*:*:*:*"
] | null | null | 9.1 | 9 | null |
|
GHSA-7fgx-h8gw-6q4h
|
Adobe InDesign versions 17.2.1 (and earlier) and 16.4.1 (and earlier) are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[] | null | 7.8 | null | null | null |
|
CVE-2014-8611
|
The __sflush function in fflush.c in stdio in libc in FreeBSD 10.1 and the kernel in Apple iOS before 9 mishandles failures of the write system call, which allows context-dependent attackers to execute arbitrary code or cause a denial of service (heap-based buffer overflow) via a crafted application.
|
[
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:10.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
] | null | null | null | 6.9 | null |
|
CVE-2024-47666
|
scsi: pm80xx: Set phy->enable_completion only when we wait for it
|
In the Linux kernel, the following vulnerability has been resolved:
scsi: pm80xx: Set phy->enable_completion only when we wait for it
pm8001_phy_control() populates the enable_completion pointer with a stack
address, sends a PHY_LINK_RESET / PHY_HARD_RESET, waits 300 ms, and
returns. The problem arises when a phy control response comes late. After
300 ms the pm8001_phy_control() function returns and the passed
enable_completion stack address is no longer valid. Late phy control
response invokes complete() on a dangling enable_completion pointer which
leads to a kernel crash.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
CVE-2016-7405
|
The qstr method in the PDO driver in the ADOdb Library for PHP before 5.x before 5.20.7 might allow remote attackers to conduct SQL injection attacks via vectors related to incorrect quoting.
|
[
"cpe:2.3:a:adodb_project:adodb:5.00:beta:*:*:*:*:*:*",
"cpe:2.3:a:adodb_project:adodb:5.01:beta:*:*:*:*:*:*",
"cpe:2.3:a:adodb_project:adodb:5.02:*:*:*:*:*:*:*",
"cpe:2.3:a:adodb_project:adodb:5.02:a:*:*:*:*:*:*",
"cpe:2.3:a:adodb_project:adodb:5.03:*:*:*:*:*:*:*",
"cpe:2.3:a:adodb_project:adodb:5.04:*:*:*:*:*:*:*",
"cpe:2.3:a:adodb_project:adodb:5.04:a:*:*:*:*:*:*",
"cpe:2.3:a:adodb_project:adodb:5.05:*:*:*:*:*:*:*",
"cpe:2.3:a:adodb_project:adodb:5.06:*:*:*:*:*:*:*",
"cpe:2.3:a:adodb_project:adodb:5.06:a:*:*:*:*:*:*",
"cpe:2.3:a:adodb_project:adodb:5.07:*:*:*:*:*:*:*",
"cpe:2.3:a:adodb_project:adodb:5.08:*:*:*:*:*:*:*",
"cpe:2.3:a:adodb_project:adodb:5.08:a:*:*:*:*:*:*",
"cpe:2.3:a:adodb_project:adodb:5.09:*:*:*:*:*:*:*",
"cpe:2.3:a:adodb_project:adodb:5.09:a:*:*:*:*:*:*",
"cpe:2.3:a:adodb_project:adodb:5.10:*:*:*:*:*:*:*",
"cpe:2.3:a:adodb_project:adodb:5.11:*:*:*:*:*:*:*",
"cpe:2.3:a:adodb_project:adodb:5.12:*:*:*:*:*:*:*",
"cpe:2.3:a:adodb_project:adodb:5.13:*:*:*:*:*:*:*",
"cpe:2.3:a:adodb_project:adodb:5.14:*:*:*:*:*:*:*",
"cpe:2.3:a:adodb_project:adodb:5.15:*:*:*:*:*:*:*",
"cpe:2.3:a:adodb_project:adodb:5.16:*:*:*:*:*:*:*",
"cpe:2.3:a:adodb_project:adodb:5.16:a:*:*:*:*:*:*",
"cpe:2.3:a:adodb_project:adodb:5.17:*:*:*:*:*:*:*",
"cpe:2.3:a:adodb_project:adodb:5.18:*:*:*:*:*:*:*",
"cpe:2.3:a:adodb_project:adodb:5.18:a:*:*:*:*:*:*",
"cpe:2.3:a:adodb_project:adodb:5.19:*:*:*:*:*:*:*",
"cpe:2.3:a:adodb_project:adodb:5.20.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adodb_project:adodb:5.20.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adodb_project:adodb:5.20.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adodb_project:adodb:5.20.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adodb_project:adodb:5.20.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adodb_project:adodb:5.20.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adodb_project:adodb:5.20.6:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:25:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 | null |
|
GHSA-c9g8-fgq6-h2wg
|
A vulnerability in Cisco Integrated Management Controller (IMC) Supervisor, Cisco UCS Director, and Cisco UCS Director Express for Big Data could allow an unauthenticated, remote attacker to log in to the CLI of an affected system by using the SCP User account (scpuser), which has default user credentials. The vulnerability is due to the presence of a documented default account with an undocumented default password and incorrect permission settings for that account. Changing the default password for this account is not enforced during the installation of the product. An attacker could exploit this vulnerability by using the account to log in to an affected system. A successful exploit could allow the attacker to execute arbitrary commands with the privileges of the scpuser account. This includes full read and write access to the system's database.
|
[] | null | 9.8 | null | null | null |
|
CVE-2021-29487
|
Authentication bypass in Octobercms
|
octobercms in a CMS platform based on the Laravel PHP Framework. In affected versions of the october/system package an attacker can exploit this vulnerability to bypass authentication and takeover of and user account on an October CMS server. The vulnerability is exploitable by unauthenticated users via a specially crafted request. This only affects frontend users and the attacker must obtain a Laravel secret key for cookie encryption and signing in order to exploit this vulnerability. The issue has been patched in Build 472 and v1.1.5.
|
[
"cpe:2.3:a:octobercms:october:*:*:*:*:*:*:*:*"
] | null | 7.4 | null | null | null |
CVE-2023-38870
|
A SQL injection vulnerability exists in gugoan Economizzer commit 3730880 (April 2023) and v.0.9-beta1. The cash book has a feature to list accomplishments by category, and the 'category_id' parameter is vulnerable to SQL Injection.
|
[
"cpe:2.3:a:economizzer:economizzer:0.9:beta1:*:*:*:wordpress:*:*",
"cpe:2.3:a:economizzer:economizzer:april_2023:*:*:*:*:wordpress:*:*"
] | null | 9.8 | null | null | null |
|
CVE-2020-11988
|
Apache XmlGraphics Commons 2.4 and earlier is vulnerable to server-side request forgery, caused by improper input validation by the XMPParser. By using a specially-crafted argument, an attacker could exploit this vulnerability to cause the underlying server to make arbitrary GET requests. Users should upgrade to 2.6 or later.
|
[
"cpe:2.3:a:apache:xmlgraphics_commons:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*"
] | null | 8.2 | null | 6.4 | null |
|
GHSA-3mfq-73xr-2v9w
|
repository/repository_ajax.php in Moodle 2.2.x before 2.2.5 and 2.3.x before 2.3.2 allows remote authenticated users to bypass intended upload-size restrictions via a -1 value in the maxbytes field.
|
[] | null | null | null | null | null |
|
GHSA-wff2-3734-8hcr
|
A vulnerability, which was classified as problematic, was found in Wavelog up to 1.8.0. Affected is the function index of the file /qso of the component Live QSO. The manipulation of the argument manual leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.8.1 is able to address this issue. The patch is identified as b31002cec6b71ab5f738881806bb546430ec692e. It is recommended to upgrade the affected component.
|
[] | 6.9 | 4.3 | null | null | null |
|
GHSA-vqr9-vjpx-74p5
|
Unspecified vulnerability in JustSystems Ichitaro 13, 2004 through 2008, Lite2, and Ichitaro viewer 5.1.5.0 and earlier allows remote attackers to execute arbitrary code via a crafted file, as exploited in the wild by Trojan.Tarodrop.H in March 2009.
|
[] | null | null | null | null | null |
|
CVE-2010-2761
|
The multipart_init function in (1) CGI.pm before 3.50 and (2) Simple.pm in CGI::Simple 1.112 and earlier uses a hardcoded value of the MIME boundary string in multipart/x-mixed-replace content, which allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via crafted input that contains this value, a different vulnerability than CVE-2010-3172.
|
[
"cpe:2.3:a:andy_armstrong:cgi.pm:*:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:1.42:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:1.43:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:1.44:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:1.45:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:1.50:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:1.51:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:1.52:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:1.53:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:1.54:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:1.55:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:1.56:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:1.57:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.01:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.13:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.14:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.15:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.16:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.17:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.18:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.19:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.20:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.21:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.22:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.23:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.24:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.25:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.26:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.27:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.28:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.29:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.30:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.31:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.32:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.33:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.34:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.35:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.36:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.37:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.38:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.39:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.40:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.41:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.42:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.43:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.44:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.45:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.46:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.47:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.48:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.49:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.50:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.51:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.52:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.53:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.54:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.55:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.56:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.57:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.58:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.59:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.60:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.61:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.62:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.63:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.64:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.65:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.66:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.67:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.68:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.69:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.70:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.71:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.72:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.73:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.74:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.75:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.76:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.77:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.78:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.79:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.80:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.81:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.82:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.83:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.84:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.85:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.86:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.87:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.88:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.89:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.90:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.91:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.92:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.93:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.94:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.95:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.96:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.97:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.98:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.99:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.751:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:2.752:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:3.00:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:3.01:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:3.02:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:3.03:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:3.04:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:3.05:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:3.06:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:3.07:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:3.08:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:3.09:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:3.10:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:3.11:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:3.12:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:3.13:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:3.14:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:3.15:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:3.16:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:3.17:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:3.18:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:3.19:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:3.20:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:3.21:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:3.22:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:3.23:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:3.24:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:3.25:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:3.26:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:3.27:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:3.28:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:3.29:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:3.30:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:3.31:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:3.32:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:3.33:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:3.34:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:3.35:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:3.36:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:3.37:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:3.38:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:3.39:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:3.40:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:3.41:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:3.42:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:3.43:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:3.44:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:3.45:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:3.46:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:3.47:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi.pm:3.48:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi-simple:*:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi-simple:0.078:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi-simple:0.079:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi-simple:0.080:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi-simple:0.081:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi-simple:0.082:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi-simple:0.83:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi-simple:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi-simple:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi-simple:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi-simple:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi-simple:1.103:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi-simple:1.104:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi-simple:1.105:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi-simple:1.106:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi-simple:1.107:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi-simple:1.108:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi-simple:1.109:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi-simple:1.110:*:*:*:*:*:*:*",
"cpe:2.3:a:andy_armstrong:cgi-simple:1.111:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
CVE-2025-43576
|
Acrobat Reader | Use After Free (CWE-416)
|
Acrobat Reader versions 24.001.30235, 20.005.30763, 25.001.20521 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[] | null | 7.8 | null | null | null |
CVE-2022-23279
|
Windows ALPC Elevation of Privilege Vulnerability
|
Windows ALPC Elevation of Privilege Vulnerability
|
[
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*"
] | null | 7 | null | null | null |
CVE-2000-0360
|
Buffer overflow in INN 2.2.1 and earlier allows remote attackers to cause a denial of service via a maliciously formatted article.
|
[
"cpe:2.3:a:isc:inn:1.4sec:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:inn:1.4sec2:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:inn:1.4unoff3:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:inn:1.4unoff4:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:inn:1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:inn:1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:inn:1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:inn:1.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:inn:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:inn:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:inn:2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:inn:2.2.1:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
CVE-2006-3370
|
Blueboy 1.0.3 stores bb_news_config.inc under the web document root with insufficient access control, which allows remote attackers to obtain sensitive information, including the database configuration.
|
[
"cpe:2.3:a:bb-news:blueboy:1.0.3:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-fhfq-m7m3-8884
|
An issue in EasyIO CPT Graphics v0.8 allows attackers to discover valid users in the application.
|
[] | null | 5.3 | null | null | null |
|
CVE-2025-6836
|
code-projects Library System profile.php sql injection
|
A vulnerability classified as critical has been found in code-projects Library System 1.0. Affected is an unknown function of the file /profile.php. The manipulation of the argument phone leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.
|
[] | 6.9 | 7.3 | 7.3 | 7.5 | null |
CVE-2023-47077
|
Adobe InDesign CC 2023 Memory Corruption Vulnerability VI.
|
Adobe InDesign versions 19.0 (and earlier) and 17.4.2 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[
"cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:indesign:19.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
GHSA-hrqc-2rrc-vr54
|
Vulnerability in the Oracle Financial Services Analytical Applications Infrastructure product of Oracle Financial Services Applications (component: Infrastructure). Supported versions that are affected are 8.0.6-8.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Financial Services Analytical Applications Infrastructure. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Financial Services Analytical Applications Infrastructure accessible data. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).
|
[] | null | null | null | null | null |
|
CVE-2007-3627
|
Multiple SQL injection vulnerabilities in PHP Lite Calendar Express 2.2 allow remote attackers to execute arbitrary SQL commands via the cid parameter to (1) login.php, (2) auth.php, and (3) subscribe.php. NOTE: the month.php, year.php, week.php, and day.php vectors are already covered by CVE-2005-4009. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
|
[
"cpe:2.3:a:php_lite:calendar_express:2.2:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-2vpr-vq4j-xqcm
|
SQL injection vulnerability in admin/news.php in PHP Forge 3.0 beta 2 allows remote attackers to execute arbitrary SQL commands via the id parameter in the news module to admin.php.
|
[] | null | null | null | null | null |
|
GHSA-3vpg-mwgf-4jvj
|
A flaw was found in nbdkit due to to improperly caching plaintext state across the STARTTLS encryption boundary. A MitM attacker could use this flaw to inject a plaintext NBD_OPT_STRUCTURED_REPLY before proxying everything else a client sends to the server, potentially leading the client to terminate the NBD session. The highest threat from this vulnerability is to system availability.
|
[] | null | 3.1 | null | null | null |
|
GHSA-g6wq-rr9q-jmfw
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in onOffice GmbH onOffice for WP-Websites allows SQL Injection. This issue affects onOffice for WP-Websites: from n/a through 5.7.
|
[] | null | 7.6 | null | null | null |
|
CVE-2020-6148
|
A heap overflow vulnerability exists in Pixar OpenUSD 20.05 when the software parses compressed sections in binary USD files. An instance exists in USDC file format FIELDSETS section decompression heap overflow.
|
[
"cpe:2.3:a:pixar:openusd:20.05:*:*:*:*:*:*:*"
] | null | null | 8.8 | null | null |
|
GHSA-gm9v-q76h-x92w
|
PHP remote file inclusion vulnerability in admin/lib_action_step.php in Hot Open Tickets (HOT) 11012004_ver2f, when register_globals is enabled, allows remote attackers to include arbitrary files via the GLOBALS[CLASS_PATH] parameter. NOTE: this issue might be resultant from a global overwrite vulnerability.
|
[] | null | null | null | null | null |
|
GHSA-j5q5-3xrg-g36w
|
Missing Authorization vulnerability in 8Degree Themes Coming Soon Landing Page and Maintenance Mode WordPress Plugin allows Retrieve Embedded Sensitive Data.This issue affects Coming Soon Landing Page and Maintenance Mode WordPress Plugin: from n/a through 2.2.0.
|
[] | null | 5.3 | null | null | null |
|
GHSA-cvvq-777c-65v4
|
libyara/re.c in the regexp module in YARA 3.5.0 allows remote attackers to cause a denial of service (stack consumption) via a crafted rule that is mishandled in the _yr_re_emit function.
|
[] | null | null | 7.5 | null | null |
|
cisco-sa-asaftd-snmp-dos-7TcnzxTU
|
Cisco Adaptive Security Appliance and Firepower Threat Defense Software SNMP Denial of Service Vulnerability
|
A vulnerability in the Simple Network Management Protocol (SNMP) feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, remote attacker to cause an unexpected reload of the device.
This vulnerability is due to insufficient input validation of SNMP packets. An attacker could exploit this vulnerability by sending a crafted SNMP request to an affected device using IPv4 or IPv6. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition. This vulnerability affects all versions of SNMP (versions 1, 2c, and 3) and requires a valid SNMP community string or valid SNMPv3 user credentials.
For more information, see the Details ["#details"] section of this advisory.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is part of the October 2024 release of the Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: October 2024 Semiannual Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication ["https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75300"].
|
[] | null | 7.7 | null | null | null |
GHSA-hmhg-vrf4-c942
|
CSP MySQL User Manager 2.3.1 allows SQL injection, and resultant Authentication Bypass, via a crafted username during a login attempt.
|
[] | null | null | 9.8 | null | null |
|
CVE-2024-53672
|
Authenticated Remote Command Injection in HPE Aruba Networking ClearPass Policy Manager Web-Based Management Interface
|
A vulnerability in the ClearPass Policy Manager web-based management interface allows remote authenticated users to run arbitrary commands on the underlying host. Successful exploit could allow an attacker to execute arbitrary commands as a lower privileged user on the underlying operating system.
|
[] | null | 4.7 | null | null | null |
CVE-2020-2207
|
Jenkins VncViewer Plugin 1.7 and earlier does not escape a parameter value in the checkVncServ form validation endpoint, resulting in a reflected cross-site scripting (XSS) vulnerability.
|
[
"cpe:2.3:a:jenkins:vncviewer:*:*:*:*:*:jenkins:*:*"
] | null | 6.1 | null | 4.3 | null |
|
CVE-2017-11716
|
MetInfo through 5.3.17 allows stored XSS via HTML Edit Mode.
|
[
"cpe:2.3:a:metinfo_project:metinfo:*:*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 | null |
|
CVE-2022-40220
|
An OS command injection vulnerability exists in the httpd txt/restore.cgi functionality of Siretta QUARTZ-GOLD G5.0.1.5-210720-141020. A specially-crafted network request can lead to arbitrary command execution. An attacker can send an HTTP request to trigger this vulnerability.
|
[
"cpe:2.3:o:siretta:quartz-gold_firmware:g5.0.1.5-210720-141020:*:*:*:*:*:*:*",
"cpe:2.3:h:siretta:quartz-gold:-:*:*:*:*:*:*:*"
] | null | null | 7.2 | null | null |
|
CVE-2007-0144
|
Cross-site scripting (XSS) vulnerability in search.asp in Digitizing Quote And Ordering System 1.0 allows remote authenticated attackers to inject arbitrary web script or HTML via the ordernum parameter.
|
[
"cpe:2.3:a:digitizing_quote_and_ordering_system:digitizing_quote_and_ordering_system:1.0:*:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
GHSA-qjvg-gx5p-355w
|
Dell Avamar, versions prior to 19.12 with patch 338905, excluding version 19.10SP1 with patch 338904, contains a Trusting HTTP Permission Methods on the Server-Side vulnerability in Security. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Information exposure.
|
[] | null | 8.3 | null | null | null |
|
CVE-2023-49224
|
Precor touchscreen console P62, P80, and P82 contains a default SSH public key in the authorized_keys file. A remote attacker could use this key to gain root privileges.
|
[
"cpe:2.3:o:precor:p62:*:*:*:*:*:*:*:*",
"cpe:2.3:o:precor:p80:*:*:*:*:*:*:*:*",
"cpe:2.3:o:precor:p82:*:*:*:*:*:*:*:*"
] | null | 8 | null | null | null |
|
GHSA-p9r7-7v2q-9hqx
|
A vulnerability was found in TOTOLINK X15 1.0.0-B20230714.1105. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /boafrm/formMultiAPVLAN of the component HTTP POST Request Handler. The manipulation of the argument submit-url leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
|
[] | 7.4 | 8.8 | null | null | null |
|
GHSA-c63m-82w2-w8f6
|
Remote Desktop Licensing Diagnoser Information Disclosure Vulnerability.
|
[] | null | 5.5 | null | null | null |
|
GHSA-w53q-mr8f-936x
|
Exphox WebRadar is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.
|
[] | null | null | 6.1 | null | null |
|
GHSA-mf6m-m52m-43jc
|
Password recovery vulnerability in SICK SIM1004 Partnumber 1098148 with firmware version < 2.0.0 allows an unprivileged remote attacker to gain access to the userlevel defined as RecoverableUserLevel by invocating the password recovery mechanism method. This leads to a increase in their privileges on the system and thereby affecting the confidentiality integrity and availability of the system. An attacker can expect repeatable success by exploiting the vulnerability. The recommended solution is to update the firmware to a version >= 2.0.0 as soon as possible.
|
[] | null | 9.8 | null | null | null |
|
CVE-2025-20208
|
A vulnerability in the web-based management interface of Cisco TelePresence Management Suite (TMS) could allow a low-privileged, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface.
This vulnerability is due to insufficient input validation by the web-based management interface. An attacker could exploit this vulnerability by inserting malicious data in a specific data field in the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
|
[] | null | 4.6 | null | null | null |
|
CVE-2023-34975
|
QTS, QuTS hero, QuTScloud
|
An OS command injection vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated administrators to execute commands via a network.
QuTScloud c5.1.x is not affected.
We have already fixed the vulnerability in the following versions:
QuTS hero h4.5.4.2626 build 20231225 and later
QTS 4.5.4.2627 build 20231225 and later
|
[
"cpe:2.3:a:qnap:video_station:*:*:*:*:*:*:*:*"
] | null | 6.6 | null | null | null |
RHSA-2022:0633
|
Red Hat Security Advisory: sysstat security update
|
sysstat: memory corruption due to an integer overflow in remap_struct in sa_common.c
|
[
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 5.5 | null | null | null |
GHSA-v6gx-jhvf-5gpp
|
WinGate is being used.
|
[] | null | null | null | null | null |
|
CVE-2002-0149
|
Buffer overflow in ASP Server-Side Include Function in IIS 4.0, 5.0 and 5.1 allows remote attackers to cause a denial of service and possibly execute arbitrary code via long file names.
|
[
"cpe:2.3:a:microsoft:internet_information_server:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_information_services:5.0:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2010-3900
|
Midori before 0.2.5, when WebKitGTK+ before 1.1.14 or LibSoup before 2.29.91 is used, does not verify X.509 certificates, which allows man-in-the-middle attackers to spoof arbitrary https web sites via a crafted server certificate, a related issue to CVE-2010-3312.
|
[
"cpe:2.3:a:christian_dywan:midori:*:*:*:*:*:*:*:*",
"cpe:2.3:a:christian_dywan:midori:0.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:christian_dywan:midori:0.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:christian_dywan:midori:0.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:christian_dywan:midori:0.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:christian_dywan:midori:0.2.3:*:*:*:*:*:*:*"
] | null | null | null | 5.8 | null |
|
CVE-2023-33211
|
WordPress WP-Piwik Plugin <= 1.0.27 is vulnerable to Cross Site Scripting (XSS)
|
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in André Bräkling WP-Matomo Integration (WP-Piwik) plugin <= 1.0.27 versions.
|
[
"cpe:2.3:a:wp-matomo_integration_project:wp-matomo_integration:*:*:*:*:*:wordpress:*:*"
] | null | 5.9 | null | null | null |
CVE-2012-2928
|
The Gliffy plugin before 3.7.1 for Atlassian JIRA, and before 4.2 for Atlassian Confluence, does not properly restrict the capabilities of third-party XML parsers, which allows remote attackers to read arbitrary files or cause a denial of service (resource consumption) via unspecified vectors.
|
[
"cpe:2.3:a:gliffy:gliffy:*:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:jira:*:*:*:*:*:*:*:*",
"cpe:2.3:a:gliffy:gliffy:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gliffy:gliffy:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:gliffy:gliffy:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gliffy:gliffy:2.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:gliffy:gliffy:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gliffy:gliffy:2.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gliffy:gliffy:2.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:gliffy:gliffy:2.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:gliffy:gliffy:2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gliffy:gliffy:2.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gliffy:gliffy:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:gliffy:gliffy:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gliffy:gliffy:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gliffy:gliffy:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:gliffy:gliffy:3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:gliffy:gliffy:3.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:gliffy:gliffy:3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:gliffy:gliffy:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gliffy:gliffy:3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gliffy:gliffy:3.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:gliffy:gliffy:3.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:gliffy:gliffy:3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:gliffy:gliffy:3.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gliffy:gliffy:3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:gliffy:gliffy:3.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:confluence_server:4.1.9:*:*:*:*:*:*:*"
] | null | null | null | 6.4 | null |
|
CVE-2023-36520
|
WordPress Editorial Calendar Plugin <= 3.7.12 is vulnerable to Insecure Direct Object References (IDOR)
|
Authorization Bypass Through User-Controlled Key vulnerability in MarketingFire Editorial Calendar.This issue affects Editorial Calendar: from n/a through 3.7.12.
|
[
"cpe:2.3:a:zackgrossbart:editorial_calendar:*:*:*:*:*:wordpress:*:*"
] | null | 5.4 | null | null | null |
GHSA-37vj-5xqx-3r34
|
Certain NETGEAR devices are affected by stored XSS. This affects D3600 before 1.0.0.75, D6000 before 1.0.0.75, D7800 before 1.0.1.44, DM200 before 1.0.0.58, R7500v2 before 1.0.3.40, R7800 before 1.0.2.60, R8900 before 1.0.4.12, R9000 before 1.0.4.12, RBK20 before 2.3.0.22, RBR20 before 2.3.0.22, RBS20 before 2.3.0.22, RBK50 before 2.3.0.22, RBR50 before 2.3.0.22, RBS50 before 2.3.0.22, RBS40 before 2.3.0.22, WN3000RPv2 before 1.0.0.68, WN3000RPv3 before 1.0.2.70, WN3100RPv2 before 1.0.0.60, WNDR4300v2 before 1.0.0.58, WNDR4500v3 before 1.0.0.58, and WNR2000v5 before 1.0.0.68.
|
[] | null | null | null | null | null |
|
CVE-2021-34890
|
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Bentley View 10.15.0.75. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of JT files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-14843.
|
[
"cpe:2.3:a:bentley:bentley_view:*:*:*:*:*:*:*:*",
"cpe:2.3:a:bentley:microstation:*:*:*:*:*:*:*:*"
] | null | null | 3.3 | null | null |
|
GHSA-w8mw-25qv-x5vf
|
In wlan driver, there is a possible out of bounds write due to improper input validation. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07944987; Issue ID: ALPS07944987.
|
[] | null | 4.4 | null | null | null |
|
CVE-2024-4715
|
Campcodes Complete Web-Based School Management System update_grade.php cross site scripting
|
A vulnerability, which was classified as problematic, was found in Campcodes Complete Web-Based School Management System 1.0. This affects an unknown part of the file /model/update_grade.php. The manipulation of the argument name leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-263793 was assigned to this vulnerability.
|
[] | 5.3 | 3.5 | 3.5 | 4 | null |
cisco-sa-asaftd-webvpn-dos-hOnB9pH4
|
Cisco Adaptive Security Appliance and Firepower Threat Defense Software SSL VPN Memory Management Denial of Service Vulnerability
|
A vulnerability in the SSL VPN feature for Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause an affected device to reload unexpectedly, resulting in a denial of service (DoS) condition.
This vulnerability is due to a logic error in memory management when the device is handling SSL VPN connections. An attacker could exploit this vulnerability by sending crafted SSL/TLS packets to the SSL VPN server of the affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is part of the October 2024 release of the Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: October 2024 Semiannual Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication ["https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75300"].
|
[] | null | 8.6 | null | null | null |
CVE-2023-43842
|
Incorrect access control in the account management function of web interface in Aten PE6208 2.3.228 and 2.4.232 allows remote authenticated users to alter user and administrator accounts credentials via HTTP POST request.
|
[] | null | 7.3 | null | null | null |
|
CVE-2018-8997
|
In Windows Master (aka Windows Optimization Master) 7.99.13.604, the driver file (WoptiHWDetect.SYS) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0xf1002004.
|
[
"cpe:2.3:a:windows_optimization_master_project:windows_optimization_master:7.99.13.604:*:*:*:*:*:*:*"
] | null | null | 7.8 | 6.1 | null |
|
GHSA-w9v5-63v9-9qvj
|
In the Linux kernel, the following vulnerability has been resolved:ksmbd: fix use-after-free in SMB request handlingA race condition exists between SMB request handling in
`ksmbd_conn_handler_loop()` and the freeing of `ksmbd_conn` in the
workqueue handler `handle_ksmbd_work()`. This leads to a UAF.KASAN: slab-use-after-free Read in handle_ksmbd_workKASAN: slab-use-after-free in rtlock_slowlock_lockedThis race condition arises as follows:`ksmbd_conn_handler_loop()` waits for `conn->r_count` to reach zero:
`wait_event(conn->r_count_q, atomic_read(&conn->r_count) == 0);`Meanwhile, `handle_ksmbd_work()` decrements `conn->r_count` using
`atomic_dec_return(&conn->r_count)`, and if it reaches zero, calls
`ksmbd_conn_free()`, which frees `conn`.However, after `handle_ksmbd_work()` decrements `conn->r_count`,
it may still access `conn->r_count_q` in the following line:
`waitqueue_active(&conn->r_count_q)` or `wake_up(&conn->r_count_q)`
This results in a UAF, as `conn` has already been freed.The discovery of this UAF can be referenced in the following PR for
syzkaller's support for SMB requests.
|
[] | null | 7 | null | null | null |
|
CVE-2020-7588
|
A vulnerability has been identified in Opcenter Execution Discrete (All versions < V3.2), Opcenter Execution Foundation (All versions < V3.2), Opcenter Execution Process (All versions < V3.2), Opcenter Intelligence (All versions < V3.3), Opcenter Quality (All versions < V11.3), Opcenter RD&L (V8.0), SIMATIC IT LMS (All versions < V2.6), SIMATIC IT Production Suite (All versions < V8.0), SIMATIC Notifier Server for Windows (All versions), SIMATIC PCS neo (All versions < V3.0 SP1), SIMATIC STEP 7 (TIA Portal) V15 (All versions < V15.1 Update 5), SIMATIC STEP 7 (TIA Portal) V16 (All versions < V16 Update 2), SIMOCODE ES V15.1 (All versions < V15.1 Update 4), SIMOCODE ES V16 (All versions < V16 Update 1), Soft Starter ES V15.1 (All versions < V15.1 Update 3), Soft Starter ES V16 (All versions < V16 Update 1). Sending a specially crafted packet to the affected service could cause a partial remote denial-of-service, that would cause the service to restart itself.
|
[
"cpe:2.3:a:siemens:opcenter_execution_discrete:*:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:opcenter_execution_foundation:*:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:opcenter_execution_process:*:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:opcenter_intelligence:*:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:opcenter_quality:*:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:opcenter_rd\\&l:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simatic_it_lms:*:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simatic_it_production_suite:*:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simatic_notifier_server:*:*:*:*:*:windows:*:*",
"cpe:2.3:a:siemens:simatic_pcs_neo:*:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simatic_step_7:*:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simatic_step_7:16:-:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simatic_step_7:16:update_1:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simocode_es:*:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:soft_starter_es:*:*:*:*:*:*:*:*"
] | null | 5.3 | null | 5 | null |
|
CVE-2007-1396
|
The import_request_variables function in PHP 4.0.7 through 4.4.6, and 5.x before 5.2.2, when called without a prefix, does not prevent the (1) GET, (2) POST, (3) COOKIE, (4) FILES, (5) SERVER, (6) SESSION, and other superglobals from being overwritten, which allows remote attackers to spoof source IP address and Referer data, and have other unspecified impact. NOTE: it could be argued that this is a design limitation of PHP and that only the misuse of this feature, i.e. implementation bugs in applications, should be included in CVE. However, it has been fixed by the vendor.
|
[
"cpe:2.3:a:php:php:4.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.8:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.9:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.10:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.11:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.1:*:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
CVE-2004-0226
|
Multiple buffer overflows in Midnight Commander (mc) before 4.6.0 may allow attackers to cause a denial of service or execute arbitrary code.
|
[
"cpe:2.3:a:midnight_commander:midnight_commander:4.5.40:*:*:*:*:*:*:*",
"cpe:2.3:a:midnight_commander:midnight_commander:4.5.41:*:*:*:*:*:*:*",
"cpe:2.3:a:midnight_commander:midnight_commander:4.5.42:*:*:*:*:*:*:*",
"cpe:2.3:a:midnight_commander:midnight_commander:4.5.43:*:*:*:*:*:*:*",
"cpe:2.3:a:midnight_commander:midnight_commander:4.5.44:*:*:*:*:*:*:*",
"cpe:2.3:a:midnight_commander:midnight_commander:4.5.45:*:*:*:*:*:*:*",
"cpe:2.3:a:midnight_commander:midnight_commander:4.5.46:*:*:*:*:*:*:*",
"cpe:2.3:a:midnight_commander:midnight_commander:4.5.47:*:*:*:*:*:*:*",
"cpe:2.3:a:midnight_commander:midnight_commander:4.5.48:*:*:*:*:*:*:*",
"cpe:2.3:a:midnight_commander:midnight_commander:4.5.49:*:*:*:*:*:*:*",
"cpe:2.3:a:midnight_commander:midnight_commander:4.5.50:*:*:*:*:*:*:*",
"cpe:2.3:a:midnight_commander:midnight_commander:4.5.51:*:*:*:*:*:*:*",
"cpe:2.3:a:midnight_commander:midnight_commander:4.5.52:*:*:*:*:*:*:*",
"cpe:2.3:a:midnight_commander:midnight_commander:4.5.55:*:*:*:*:*:*:*",
"cpe:2.3:a:midnight_commander:midnight_commander:4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:sgi:propack:2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:sgi:propack:2.4:*:*:*:*:*:*:*",
"cpe:2.3:o:gentoo:linux:0.5:*:*:*:*:*:*:*",
"cpe:2.3:o:gentoo:linux:0.7:*:*:*:*:*:*:*",
"cpe:2.3:o:gentoo:linux:1.1a:*:*:*:*:*:*:*",
"cpe:2.3:o:gentoo:linux:1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:gentoo:linux:1.4:*:*:*:*:*:*:*",
"cpe:2.3:o:gentoo:linux:1.4:rc1:*:*:*:*:*:*",
"cpe:2.3:o:gentoo:linux:1.4:rc2:*:*:*:*:*:*",
"cpe:2.3:o:gentoo:linux:1.4:rc3:*:*:*:*:*:*",
"cpe:2.3:o:slackware:slackware_linux:*:*:*:*:*:*:*:*",
"cpe:2.3:o:slackware:slackware_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:slackware:slackware_linux:9.1:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
CVE-2003-0280
|
Multiple buffer overflows in the SMTP Service for ESMTP CMailServer 4.0.2003.03.27 allow remote attackers to execute arbitrary code via long (1) MAIL FROM or (2) RCPT TO commands.
|
[
"cpe:2.3:a:youngzsoft:cmailserver:4.0.2003.23.27:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
GHSA-xg6v-vr2f-h5xx
|
Improper memory initialization in Platform Sample/Silicon Reference firmware Intel(R) Server Board, Intel(R) Server System and Intel(R) Compute Module may allow privileged user to potentially enable an escalation of privilege via local access.
|
[] | null | null | 6.7 | null | null |
|
GHSA-xpqx-4wj8-ww45
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in mkkmail Aparat Responsive allows DOM-Based XSS. This issue affects Aparat Responsive: from n/a through 1.3.
|
[] | null | 6.5 | null | null | null |
|
GHSA-7ghv-4mjc-99wp
|
An out-of-bounds Read vulnerability in WLAvalancheService component of Ivanti Avalanche before 6.4.3 allows an authenticated remote attacker to perform denial of service attacks. In certain conditions this could also lead to remote code execution.
|
[] | null | null | 7.5 | null | null |
|
CVE-2023-5712
|
The System Dashboard plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the sd_global_value() function hooked via an AJAX action in all versions up to, and including, 2.8.7. This makes it possible for authenticated attackers, with subscriber-level access and above, to retrieve sensitive global value information.
|
[
"cpe:2.3:a:bowo:system_dashboard:*:*:*:*:*:wordpress:*:*"
] | null | 4.3 | null | null | null |
|
GHSA-4w78-w35x-w85p
|
All versions prior to V2.06.00.00 of ZTE ZXDT22 SF01, an monitoring system of ZTE energy product, are impacted by directory traversal vulnerability that allows remote attackers to read arbitrary files on the system via a full path name after host address.
|
[] | null | null | 7.5 | null | null |
|
CVE-2024-37373
|
Improper input validation in the Central Filestore in Ivanti Avalanche 6.3.1 allows a remote authenticated attacker with admin rights to achieve RCE.
|
[
"cpe:2.3:a:ivanti:avalanche:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:avalanche:6.3.1:*:*:*:premise:*:*:*",
"cpe:2.3:a:ivanti:avalanche:6.3.1.1507:*:*:*:premise:*:*:*",
"cpe:2.3:a:ivanti:avalanche:6.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:avalanche:6.3.2:*:*:*:*:windows:*:*",
"cpe:2.3:a:ivanti:avalanche:6.3.2:*:*:*:premise:*:*:*",
"cpe:2.3:a:ivanti:avalanche:6.3.2.3490:*:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:avalanche:6.3.2.3490:*:*:*:premise:*:*:*",
"cpe:2.3:a:ivanti:avalanche:6.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:avalanche:6.3.3:*:*:*:premise:*:*:*",
"cpe:2.3:a:ivanti:avalanche:6.3.3.101:*:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:avalanche:6.3.3.101:*:*:*:premise:*:*:*",
"cpe:2.3:a:ivanti:avalanche:6.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:avalanche:6.3.4:*:*:*:premise:*:*:*",
"cpe:2.3:a:ivanti:avalanche:6.3.4.153:*:*:*:premise:*:*:*",
"cpe:2.3:a:ivanti:avalanche:6.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:avalanche:6.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:avalanche:6.4.1:*:*:*:premise:*:*:*",
"cpe:2.3:a:ivanti:avalanche:6.4.1.207:*:*:*:premise:*:*:*",
"cpe:2.3:a:ivanti:avalanche:6.4.1.236:*:*:*:premise:*:*:*",
"cpe:2.3:a:ivanti:avalanche:6.4.2:*:*:*:premise:*:*:*"
] | null | null | 7.2 | null | null |
|
ICSA-18-088-02
|
Siemens TIM 1531 IRC
|
A remote attacker with network access to port 80/tcp or port 443/tcp could perform administrative operations on the device without prior authentication. Successful exploitation could allow to cause a denial-of-service, or read and manipulate data as well as configuration settings of the affected device. At the stage of publishing this security advisory no public exploitation is known. Siemens provides mitigations to resolve it.
|
[] | null | 9.8 | null | null | null |
GHSA-9h9j-m9f5-4f79
|
The Signal app before 5.34 for iOS allows URI spoofing via RTLO injection. It incorrectly renders RTLO encoded URLs beginning with a non-breaking space, when there is a hash character in the URL. This technique allows a remote unauthenticated attacker to send legitimate looking links, appearing to be any website URL, by abusing the non-http/non-https automatic rendering of URLs. An attacker can spoof, for example, example.com, and masquerade any URL with a malicious destination. An attacker requires a subdomain such as gepj, txt, fdp, or xcod, which would appear backwards as jpeg, txt, pdf, and docx respectively.
|
[] | null | 7.5 | null | null | null |
|
GHSA-qvjj-36wg-8jh8
|
A vulnerability has been found in Campcodes Coffee Shop POS System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /admin/categories/view_category.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-226975.
|
[] | null | null | 6.3 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.