id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 36
232
⌀ |
---|---|---|---|---|---|---|---|---|
CVE-2003-0037
|
Buffer overflows in noffle news server 1.0.1 and earlier allow remote attackers to cause a denial of service (segmentation fault) and possibly execute arbitrary code.
|
[
"cpe:2.3:a:noffle:noffle:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-3mgj-ppp2-8gvj
|
In the Linux kernel, the following vulnerability has been resolved:wifi: ath6kl: remove WARN on bad firmware inputIf the firmware gives bad input, that's nothing to do with
the driver's stack at this point etc., so the WARN_ON()
doesn't add any value. Additionally, this is one of the
top syzbot reports now. Just print a message, and as an
added bonus, print the sizes too.
|
[] | null | null | null | null | null |
|
GHSA-mjqg-8q9p-p7qh
|
Vulnerability in LAT/Telnet Gateway (lattelnet) on Ultrix 4.1 and 4.2 allows attackers to gain root privileges.
|
[] | null | null | null | null | null |
|
GHSA-f546-v666-559x
|
Craft CMS Cross-site Scripting vulnerability
|
Craft CMS 4.2.0.1 is affected by Cross Site Scripting (XSS) in the file src/web/assets/cp/src/js/BaseElementSelectInput.js and in specific on the line `label: elementInfo.label`.
|
[] | null | 5.4 | null | null | null |
CVE-2011-3058
|
Google Chrome before 18.0.1025.142 does not properly handle the EUC-JP encoding system, which might allow remote attackers to conduct cross-site scripting (XSS) attacks via unspecified vectors.
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-gj96-2265-wv5x
|
A CWE-248: Uncaught Exception vulnerability exists in Modicon M580, Modicon BMENOC 0311, and Modicon BMENOC 0321, which could cause a Denial of Service attack on the PLC when sending specific data on the REST API of the controller/communication module.
|
[] | null | null | null | null | null |
|
cisco-sa-20181003-prime-id
|
Cisco Prime Infrastructure Information Disclosure Vulnerability
|
A vulnerability in the server backup function of Cisco Prime Infrastructure could allow an authenticated, remote attacker to view sensitive information.
The vulnerability is due to the transmission of sensitive information as part of a GET request. An attacker could exploit this vulnerability by sending a GET request to a vulnerable device. A successful exploit could allow the attacker to view sensitive information.
There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-prime-id ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-prime-id"]
|
[] | null | null | 4.3 | null | null |
CVE-2016-9179
|
lynx: It was found that Lynx doesn't parse the authority component of the URL correctly when the host name part ends with '?', and could instead be tricked into connecting to a different host.
|
[
"cpe:2.3:a:lynx:lynx:*:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 | null |
|
GHSA-gr59-j2cc-29g3
|
In the Linux kernel, the following vulnerability has been resolved:Revert "wifi: mac80211: fix memory leak in ieee80211_if_add()"This reverts commit 13e5afd3d773c6fc6ca2b89027befaaaa1ea7293.ieee80211_if_free() is already called from free_netdev(ndev)
because ndev->priv_destructor == ieee80211_if_freesyzbot reported:general protection fault, probably for non-canonical address 0xdffffc0000000004: 0000 [#1] PREEMPT SMP KASAN
KASAN: null-ptr-deref in range [0x0000000000000020-0x0000000000000027]
CPU: 0 PID: 10041 Comm: syz-executor.0 Not tainted 6.2.0-rc2-syzkaller-00388-g55b98837e37d #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022
RIP: 0010:pcpu_get_page_chunk mm/percpu.c:262 [inline]
RIP: 0010:pcpu_chunk_addr_search mm/percpu.c:1619 [inline]
RIP: 0010:free_percpu mm/percpu.c:2271 [inline]
RIP: 0010:free_percpu+0x186/0x10f0 mm/percpu.c:2254
Code: 80 3c 02 00 0f 85 f5 0e 00 00 48 8b 3b 48 01 ef e8 cf b3 0b 00 48 ba 00 00 00 00 00 fc ff df 48 8d 78 20 48 89 f9 48 c1 e9 03 <80> 3c 11 00 0f 85 3b 0e 00 00 48 8b 58 20 48 b8 00 00 00 00 00 fc
RSP: 0018:ffffc90004ba7068 EFLAGS: 00010002
RAX: 0000000000000000 RBX: ffff88823ffe2b80 RCX: 0000000000000004
RDX: dffffc0000000000 RSI: ffffffff81c1f4e7 RDI: 0000000000000020
RBP: ffffe8fffe8fc220 R08: 0000000000000005 R09: 0000000000000000
R10: 0000000000000000 R11: 1ffffffff2179ab2 R12: ffff8880b983d000
R13: 0000000000000003 R14: 0000607f450fc220 R15: ffff88823ffe2988
FS: 00007fcb349de700(0000) GS:ffff8880b9800000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000001b32220000 CR3: 000000004914f000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
<TASK>
netdev_run_todo+0x6bf/0x1100 net/core/dev.c:10352
ieee80211_register_hw+0x2663/0x4040 net/mac80211/main.c:1411
mac80211_hwsim_new_radio+0x2537/0x4d80 drivers/net/wireless/mac80211_hwsim.c:4583
hwsim_new_radio_nl+0xa09/0x10f0 drivers/net/wireless/mac80211_hwsim.c:5176
genl_family_rcv_msg_doit.isra.0+0x1e6/0x2d0 net/netlink/genetlink.c:968
genl_family_rcv_msg net/netlink/genetlink.c:1048 [inline]
genl_rcv_msg+0x4ff/0x7e0 net/netlink/genetlink.c:1065
netlink_rcv_skb+0x165/0x440 net/netlink/af_netlink.c:2564
genl_rcv+0x28/0x40 net/netlink/genetlink.c:1076
netlink_unicast_kernel net/netlink/af_netlink.c:1330 [inline]
netlink_unicast+0x547/0x7f0 net/netlink/af_netlink.c:1356
netlink_sendmsg+0x91b/0xe10 net/netlink/af_netlink.c:1932
sock_sendmsg_nosec net/socket.c:714 [inline]
sock_sendmsg+0xd3/0x120 net/socket.c:734
____sys_sendmsg+0x712/0x8c0 net/socket.c:2476
___sys_sendmsg+0x110/0x1b0 net/socket.c:2530
__sys_sendmsg+0xf7/0x1c0 net/socket.c:2559
do_syscall_x64 arch/x86/entry/common.c:50 [inline]
do_syscall_64+0x39/0xb0 arch/x86/entry/common.c:80
entry_SYSCALL_64_after_hwframe+0x63/0xcd
|
[] | null | 5.5 | null | null | null |
|
CVE-2021-25390
|
Intent redirection vulnerability in PhotoTable prior to SMR MAY-2021 Release 1 allows attackers to execute privileged action.
|
[
"cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*"
] | null | 4 | null | null | null |
|
CVE-2018-1000223
|
soundtouch version up to and including 2.0.0 contains a Buffer Overflow vulnerability in SoundStretch/WavFile.cpp:WavInFile::readHeaderBlock() that can result in arbitrary code execution. This attack appear to be exploitable via victim must open maliocius file in soundstretch utility.
|
[
"cpe:2.3:a:surina:soundtouch:*:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.8 | null |
|
GHSA-xxmg-3gv9-85h2
|
A possible use-after-free and double-free in c-ares lib version 1.16.0 if ares_destroy() is called prior to ares_getaddrinfo() completing. This flaw possibly allows an attacker to crash the service that uses c-ares lib. The highest threat from this vulnerability is to this service availability.
|
[] | null | 3.3 | null | null | null |
|
CVE-2015-8335
|
Huawei VCN500 with software before V100R002C00SPC201 logs passwords in cleartext, which allows remote authenticated users to obtain sensitive information by triggering log generation and then reading the log.
|
[
"cpe:2.3:a:huawei:vcn500:v100r002c00spc200:*:*:*:*:*:*:*",
"cpe:2.3:a:huawei:vcn500:v100r002c00spc200b010:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:vcn500:-:*:*:*:*:*:*:*"
] | null | null | 6.5 | 4 | null |
|
GHSA-w772-rr97-rmmm
|
Microsoft Internet Explorer 5.01 through 7 allows remote attackers to execute arbitrary code via a crafted website using Javascript that creates, modifies, deletes, and accesses document objects using the tags property, which triggers heap corruption, related to uninitialized or deleted objects, a different issue than CVE-2007-3902 and CVE-2007-3903, and a variant of "Uninitialized Memory Corruption Vulnerability."
|
[] | null | null | null | null | null |
|
CVE-2020-10727
|
A flaw was found in ActiveMQ Artemis management API from version 2.7.0 up until 2.12.0, where a user inadvertently stores passwords in plaintext in the Artemis shadow file (etc/artemis-users.properties file) when executing the `resetUsers` operation. A local attacker can use this flaw to read the contents of the Artemis shadow file.
|
[
"cpe:2.3:a:apache:activemq_artemis:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"
] | null | 5.5 | null | 2.1 | null |
|
CVE-2022-24673
|
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Canon imageCLASS MF644Cdw 10.02 printers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the implementation of the SLP protocol. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-15845.
|
[
"cpe:2.3:o:canon:d1620_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:d1620:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:d1650_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:d1650:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:d1520_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:d1520:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:d1550_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:d1550:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:mf1127c_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mf1127c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:mf1238_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mf1238:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:mf1238_ii_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mf1238_ii:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:mf1643i_ii_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mf1643i_ii:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:mf1643if_ii_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mf1643if_ii:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:mf414dw_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mf414dw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:mf416dw_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mf416dw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:mf419dw_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mf419dw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:mf515dw_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mf515dw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:mf424dw_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mf424dw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:mf426dw_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mf426dw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:mf429dw_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mf429dw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:mf525dw_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mf525dw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:mf445dw_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mf445dw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:mf448dw_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mf448dw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:mf449dw_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mf449dw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:mf543dw_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mf543dw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:mf451dw_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mf451dw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:mf452dw_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mf452dw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:mf453dw_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mf453dw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:mf455dw_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mf455dw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:mf6160dw_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mf6160dw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:mf6180dw_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mf6180dw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:mf624cdw_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mf624cdw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:mf628cdw_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mf628cdw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:mf632cdw_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mf632cdw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:mf634cdw_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mf634cdw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:mf641cw_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mf641cw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:mf642cdw_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mf642cdw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:mf644cdw_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mf644cdw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:mf726cdw_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mf726cdw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:mf729cdw_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mf729cdw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:mf731cdw_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mf731cdw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:mf733cdw_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mf733cdw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:mf735cdw_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mf735cdw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:mf741cdw_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mf741cdw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:mf743cdw_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mf743cdw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:mf745cdw_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mf745cdw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:mf746cdw_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mf746cdw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:mf810cdn_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mf810cdn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:mf820cdn_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mf820cdn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:mf8280cw_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mf8280cw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:mf8580cdw_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mf8580cdw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:lbp1127c_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:lbp1127c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:lbp1238_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:lbp1238:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:lbp1238_ii_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:lbp1238_ii:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:lbp214dw_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:lbp214dw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:lbp215dw_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:lbp215dw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:lbp226dw_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:lbp226dw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:lbp227dw_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:lbp227dw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:lbp228dw_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:lbp228dw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:lbp236dw_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:lbp236dw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:lbp237dw_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:lbp237dw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:lbp251dw_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:lbp251dw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:lbp253dw_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:lbp253dw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:lbp612cdw_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:lbp612cdw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:lbp622cdw_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:lbp622cdw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:lbp623cdw_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:lbp623cdw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:lbp654cdw_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:lbp654cdw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:lbp664cdw_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:lbp664cdw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:ir1435i_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:ir1435i:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:1435if_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:1435if:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:1435p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:1435p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:1435i\\+_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:1435i\\+:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:1435if\\+_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:1435if\\+:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:1435p\\+_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:1435p\\+:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:ir1643i_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:ir1643i:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:ir1643if_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:ir1643if:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:wg7240_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:wg7240:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:wg7250_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:wg7250:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:wg7250f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:wg7250f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:wg7250z_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:wg7250z:-:*:*:*:*:*:*:*"
] | null | null | 8.8 | null | null |
|
CVE-2008-4062
|
Multiple unspecified vulnerabilities in Mozilla Firefox before 2.0.0.17 and 3.x before 3.0.2, Thunderbird before 2.0.0.17, and SeaMonkey before 1.1.12 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to the JavaScript engine and (1) misinterpretation of the characteristics of Namespace and QName in jsxml.c, (2) misuse of signed integers in the nsEscapeCount function in nsEscape.cpp, and (3) interaction of JavaScript garbage collection with certain use of an NPObject in the nsNPObjWrapper::GetNewOrUsed function in nsJSNPRuntime.cpp.
|
[
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*"
] | null | null | null | 10 | null |
|
GHSA-xvxq-p298-r7fw
|
The CRM Plugin before 4.2.4 for Redmine allows XSS via crafted vCard data.
|
[] | null | 6.1 | null | null | null |
|
CVE-2018-17861
|
A cross-site scripting (XSS) vulnerability in SAP J2EE Engine/7.01/Portal/EPP allows remote attackers to inject arbitrary web script via the wsdlLib parameter to /ctcprotocol/Protocol. NOTE: This vulnerability only affects products that are no longer supported by the maintainer
|
[
"cpe:2.3:a:sap:j2ee_engine:7.01:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 | null |
|
GHSA-27p4-mjh7-m9j7
|
Improper boundary check in Quram Agif library prior to SMR Apr-2022 Release 1 allows attackers to cause denial of service via crafted image file.
|
[] | null | 5.5 | null | null | null |
|
GHSA-5fhg-238q-4c3r
|
A Path Traversal vulnerability in web component of Ivanti Avalanche before 6.4.3 allows a remote authenticated attacker to delete arbitrary files, thereby leading to Denial-of-Service.
|
[] | null | null | 7.1 | null | null |
|
CVE-2005-2453
|
Cross-site scripting (XSS) vulnerability in NetworkActiv Web Server 1.0, 2.0.0.6, 3.0.1.1, and 3.5.13, and possibly other versions, allows remote attackers to inject arbitrary web script or HTML via the query string.
|
[
"cpe:2.3:a:networkactiv:networkactiv_web_server:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:networkactiv:networkactiv_web_server:2.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:networkactiv:networkactiv_web_server:3.0.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:networkactiv:networkactiv_web_server:3.5.13:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
CVE-2023-29815
|
mccms v2.6.3 is vulnerable to Cross Site Request Forgery (CSRF).
|
[
"cpe:2.3:a:chshcms:mccms:2.6.3:*:*:*:*:*:*:*"
] | null | 8.8 | null | null | null |
|
GHSA-969v-mwp3-4mr3
|
Magento 2 Community Edition RCE Vulnerability
|
A remote code execution vulnerability exists in Magento Open Source prior to 1.9.4.2, and Magento Commerce prior to 1.14.4.2, Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2. An authenticated user with admin privileges to create sitemaps can execute arbitrary PHP code by creating a malicious sitemap file.
|
[] | null | null | 7.2 | null | null |
GHSA-2cqh-cfpq-83ph
|
In the Linux kernel, the following vulnerability has been resolved:ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failedWe got follow bug_on when run fsstress with injecting IO fault:
[130747.323114] kernel BUG at fs/ext4/extents_status.c:762!
[130747.323117] Internal error: Oops - BUG: 0 [#1] SMP
......
[130747.334329] Call trace:
[130747.334553] ext4_es_cache_extent+0x150/0x168 [ext4]
[130747.334975] ext4_cache_extents+0x64/0xe8 [ext4]
[130747.335368] ext4_find_extent+0x300/0x330 [ext4]
[130747.335759] ext4_ext_map_blocks+0x74/0x1178 [ext4]
[130747.336179] ext4_map_blocks+0x2f4/0x5f0 [ext4]
[130747.336567] ext4_mpage_readpages+0x4a8/0x7a8 [ext4]
[130747.336995] ext4_readpage+0x54/0x100 [ext4]
[130747.337359] generic_file_buffered_read+0x410/0xae8
[130747.337767] generic_file_read_iter+0x114/0x190
[130747.338152] ext4_file_read_iter+0x5c/0x140 [ext4]
[130747.338556] __vfs_read+0x11c/0x188
[130747.338851] vfs_read+0x94/0x150
[130747.339110] ksys_read+0x74/0xf0This patch's modification is according to Jan Kara's suggestion in:
https://patchwork.ozlabs.org/project/linux-ext4/patch/[email protected]/
"I see. Now I understand your patch. Honestly, seeing how fragile is trying
to fix extent tree after split has failed in the middle, I would probably
go even further and make sure we fix the tree properly in case of ENOSPC
and EDQUOT (those are easily user triggerable). Anything else indicates a
HW problem or fs corruption so I'd rather leave the extent tree as is and
don't try to fix it (which also means we will not create overlapping
extents)."
|
[] | null | 5.5 | null | null | null |
|
CVE-2018-8929
|
Improper restriction of communication channel to intended endpoints vulnerability in HTTP daemon in Synology SSL VPN Client before 1.2.4-0224 allows remote attackers to conduct man-in-the-middle attacks via a crafted payload.
|
[
"cpe:2.3:a:synology:ssl_vpn_client:*:*:*:*:*:*:*:*"
] | null | null | 7.3 | null | null |
|
GHSA-87hv-wrhm-fv9f
|
Adobe Prelude versions 9.0 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to arbitrary code execution.
|
[] | null | null | null | null | null |
|
CVE-2018-11557
|
YIBAN Easy class education platform 2.0 has XSS via the articlelist.php k parameter.
|
[
"cpe:2.3:a:yiban:easy_class_education_platform:2.0:*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 | null |
|
CVE-2014-7642
|
The Pegasus Airlines (aka com.wPegasusAirlines) application 0.84.13503.96707 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
|
[
"cpe:2.3:a:pegasus_airlines_project:pegasus_airlines:0.84.13503.96707:*:*:*:*:android:*:*"
] | null | null | null | 5.4 | null |
|
CVE-2019-20703
|
Certain NETGEAR devices are affected by command injection by an authenticated user. This affects D3600 before 1.0.0.76, D6000 before 1.0.0.76, and XR500 before 2.3.2.32.
|
[
"cpe:2.3:o:netgear:xr500_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:xr500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:d3600_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:d3600:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:d6000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:d6000:-:*:*:*:*:*:*:*"
] | null | null | 6.3 | null | null |
|
CVE-2019-0746
|
An information disclosure vulnerability exists when the scripting engine does not properly handle objects in memory in Microsoft Edge, aka 'Scripting Engine Information Disclosure Vulnerability'.
|
[
"cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:chakracore:-:*:*:*:*:*:*:*"
] | null | null | 6.5 | 4.3 | null |
|
CVE-2023-36941
|
A cross-site scripting (XSS) vulnerability in PHPGurukul Online Fire Reporting System Using PHP and MySQL 1.2 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the team name, leader, and member fields.
|
[
"cpe:2.3:a:phpgurukul:online_fire_reporting_system:1.2:*:*:*:*:*:*:*"
] | null | 6.1 | null | null | null |
|
CVE-2013-2313
|
Session fixation vulnerability in LOCKON EC-CUBE 2.11.0 through 2.12.3enP2 allows remote attackers to hijack web sessions via unspecified vectors.
|
[
"cpe:2.3:a:lockon:ec-cube:2.11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:lockon:ec-cube:2.11.1:*:*:*:*:*:*:*",
"cpe:2.3:a:lockon:ec-cube:2.11.2:*:*:*:*:*:*:*",
"cpe:2.3:a:lockon:ec-cube:2.11.3:*:*:*:*:*:*:*",
"cpe:2.3:a:lockon:ec-cube:2.11.4:*:*:*:*:*:*:*",
"cpe:2.3:a:lockon:ec-cube:2.11.5:*:*:*:*:*:*:*",
"cpe:2.3:a:lockon:ec-cube:2.12.0:*:*:*:*:*:*:*",
"cpe:2.3:a:lockon:ec-cube:2.12.1:*:*:*:*:*:*:*",
"cpe:2.3:a:lockon:ec-cube:2.12.2:*:*:*:*:*:*:*",
"cpe:2.3:a:lockon:ec-cube:2.12.3:*:*:*:*:*:*:*",
"cpe:2.3:a:lockon:ec-cube:2.12.3en:*:*:*:*:*:*:*",
"cpe:2.3:a:lockon:ec-cube:2.12.3enp1:*:*:*:*:*:*:*",
"cpe:2.3:a:lockon:ec-cube:2.12.3enp2:*:*:*:*:*:*:*"
] | null | null | null | 4 | null |
|
CVE-2020-0629
|
An elevation of privilege vulnerability exists in the way that the Windows Search Indexer handles objects in memory, aka 'Windows Search Indexer Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0613, CVE-2020-0614, CVE-2020-0623, CVE-2020-0625, CVE-2020-0626, CVE-2020-0627, CVE-2020-0628, CVE-2020-0630, CVE-2020-0631, CVE-2020-0632, CVE-2020-0633.
|
[
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:itanium:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | 4.6 | null |
|
GHSA-x78j-jjmg-frp2
|
Adobe Flash Player before 18.0.0.333 and 19.x through 21.x before 21.0.0.182 on Windows and OS X and before 11.2.202.577 on Linux, Adobe AIR before 21.0.0.176, Adobe AIR SDK before 21.0.0.176, and Adobe AIR SDK & Compiler before 21.0.0.176 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0960, CVE-2016-0961, CVE-2016-0986, CVE-2016-0989, CVE-2016-0992, CVE-2016-1002, and CVE-2016-1005.
|
[] | null | null | 9.8 | null | null |
|
CVE-2023-36371
|
An issue in the GDKfree component of MonetDB Server v11.45.17 and v11.46.0 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
|
[
"cpe:2.3:a:monetdb:monetdb:11.45.17:*:*:*:*:*:*:*",
"cpe:2.3:a:monetdb:monetdb:11.46.0:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
|
CVE-2024-24742
|
Cross-Site Scripting (XSS) vulnerability in SAP CRM (WebClient UI)
|
SAP CRM WebClient UI - version S4FND 102, S4FND 103, S4FND 104, S4FND 105, S4FND 106, WEBCUIF 701, WEBCUIF 731, WEBCUIF 746, WEBCUIF 747, WEBCUIF 748, WEBCUIF 800, WEBCUIF 801, does not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability. An attacker with low privileges can cause limited impact to integrity of the application data after successful exploitation. There is no impact on confidentiality and availability.
|
[
"cpe:2.3:a:sap:crm_-_webclient_ui:s4fnd_102:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:crm_-_webclient_ui:s4fnd_103:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:crm_-_webclient_ui:s4fnd_104:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:crm_-_webclient_ui:s4fnd_105:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:crm_-_webclient_ui:s4fnd_106:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:crm_-_webclient_ui:webcuif_701:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:crm_-_webclient_ui:webcuif_731:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:crm_-_webclient_ui:webcuif_746:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:crm_-_webclient_ui:webcuif_747:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:crm_-_webclient_ui:webcuif_748:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:crm_-_webclient_ui:webcuif_800:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:crm_-_webclient_ui:webcuif_801:*:*:*:*:*:*:*"
] | null | 4.1 | null | null | null |
CVE-2018-6183
|
BitDefender Total Security 2018 allows local users to gain privileges or cause a denial of service by impersonating all the pipes through a use of an "insecurely created named pipe". Ensures full access to Everyone users group.
|
[
"cpe:2.3:a:bitdefender:total_security:2018:*:*:*:*:*:*:*"
] | null | null | 7.8 | 4.6 | null |
|
CVE-2021-27062
|
HEVC Video Extensions Remote Code Execution Vulnerability
|
HEVC Video Extensions Remote Code Execution Vulnerability
|
[
"cpe:2.3:a:microsoft:high_efficiency_video_coding:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
CVE-2019-16288
|
On Tenda N301 wireless routers, a long string in the wifiSSID parameter of a goform/setWifi POST request causes the device to crash.
|
[
"cpe:2.3:o:tenda:n301_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tenda:n301:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | 7.8 | null |
|
GHSA-c9h9-h5gf-885r
|
Magento Open Source allows Uncontrolled Resource Consumption
|
Adobe Commerce versions 2.4.6-p3, 2.4.5-p5, 2.4.4-p6 and earlier are affected by an Uncontrolled Resource Consumption vulnerability that could lead to an application denial-of-service. A high-privileged attacker could leverage this vulnerability to exhaust system resources, causing the application to slow down or crash. Exploitation of this issue does not require user interaction.
|
[] | 6.9 | 4.9 | null | null | null |
CVE-2024-44920
|
A cross-site scripting (XSS) vulnerability in the component admin_collect_news.php of SeaCMS v12.9 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the siteurl parameter.
|
[
"cpe:2.3:a:seacms:seacms:12.9:*:*:*:*:*:*:*"
] | null | 6.1 | null | null | null |
|
CVE-2023-20813
|
In wlan service, there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07453549; Issue ID: ALPS07453549.
|
[
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*"
] | null | 4.4 | null | null | null |
|
GHSA-j38v-hx9g-qhgq
|
Directory traversal vulnerability in website.php in openEngine 1.8 Beta 2 and earlier allows remote attackers to list arbitrary directories and read arbitrary files via a .. (dot dot) in the template parameter.
|
[] | null | null | null | null | null |
|
GHSA-q3q5-qvh5-cmw5
|
liufee CMS File Upload vulnerability
|
File Upload vulnerability in liufee CMS v.2.0.7.1 allows a remote attacker to execute arbitrary code via the image suffix function.
|
[] | null | 9.8 | null | null | null |
CVE-2024-45505
|
Apache HertzBeat: Exists Native Deser RCE and file writing vulnerabilities
|
Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability in Apache HertzBeat (incubating).
This vulnerability can only be exploited by authorized attackers.
This issue affects Apache HertzBeat (incubating): before 1.6.1.
Users are recommended to upgrade to version 1.6.1, which fixes the issue.
|
[
"cpe:2.3:a:apache:hertzbeat:-:*:*:*:*:*:*:*"
] | null | 8.8 | null | null | null |
GHSA-x238-v9f9-93g8
|
Dell PowerProtect Data Manager Reporting, version(s) 19.16, 19.17, 19.18, contain(s) an Improper Neutralization of Special Elements Used in a Template Engine vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to information disclosure.
|
[] | null | 2.3 | null | null | null |
|
GHSA-6qcm-9vg4-jxv8
|
kpac/script.cpp in KDE kio before 5.32 and kdelibs before 4.14.30 calls the PAC FindProxyForURL function with a full https URL (potentially including Basic Authentication credentials, a query string, or PATH_INFO), which allows remote attackers to obtain sensitive information via a crafted PAC file.
|
[] | null | null | 5.5 | null | null |
|
GHSA-r97q-xhcv-9xx9
|
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: PS). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
|
[] | null | 4.9 | null | null | null |
|
GHSA-2277-2f9f-59cc
|
Ingenico Telium 2 POS terminals have a buffer overflow via SOCKET_TASK in the NTPT3 protocol. This is fixed in Telium 2 SDK v9.32.03 patch N.
|
[] | null | 6.8 | null | null | null |
|
CVE-2005-1048
|
SQL injection vulnerability in modules.php in PostNuke 0.760 RC3 allows remote attackers to execute arbitrary SQL statements via the sid parameter. NOTE: the vendor reports that they could not reproduce the issues for 760 RC3, or for .750.
|
[
"cpe:2.3:a:postnuke_software_foundation:postnuke:0.760_rc3:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2017-10249
|
Vulnerability in the PeopleSoft Enterprise PeopleTools component of Oracle PeopleSoft Products (subcomponent: Integration Broker). Supported versions that are affected are 8.54 and 8.55. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in PeopleSoft Enterprise PeopleTools, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise PeopleTools accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).
|
[
"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.54:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.55:*:*:*:*:*:*:*"
] | null | null | 6.1 | 5.8 | null |
|
GHSA-884x-p7qm-gq3f
|
TinyXML2 through 10.0.0 has a reachable assertion for UINT_MAX/digit, that may lead to application exit, in tinyxml2.cpp XMLUtil::GetCharacterRef.
|
[] | null | 6.5 | null | null | null |
|
GHSA-h4gh-3gv9-c4vm
|
An issue was discovered in PowerDNS Authoritative through 4.3.0 when --enable-experimental-gss-tsig is used. A remote, unauthenticated attacker might be able to cause a double-free, leading to a crash or possibly arbitrary code execution. by sending crafted queries with a GSS-TSIG signature.
|
[] | null | null | null | null | null |
|
ICSA-25-014-03
|
Schneider Electric EcoStruxure
|
Schneider Electric is aware of a vulnerability in its EcoStruxure™ Power Monitoring Expert
(PME) and EcoStruxure™ Power Operation (EPO) products.
EcoStruxure™ Power Monitoring Expert (PME) is an on-premises software used to help power.
critical and energy-intensive facilities maximize uptime and operational efficiency.
EcoStruxure™ Power Operation (EPO) and EcoStruxure™ Power SCADA Operation (PSO) are
on-premises software offers that provides a single platform to monitor and control medium and
lower power systems.
Failure to apply the remediations provided below could result in execution of malicious web
code, or unintended software operation.
|
[] | null | 5.4 | null | null | null |
GHSA-r4p9-pq2w-247v
|
Cross-site scripting (XSS) vulnerability in a-blog 1.51 and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
|
[] | null | null | null | null | null |
|
CVE-2021-31259
|
The gf_isom_cenc_get_default_info_internal function in GPAC 1.0.1 allows attackers to cause a denial of service (NULL pointer dereference) via a crafted file in the MP4Box command.
|
[
"cpe:2.3:a:gpac:gpac:1.0.1:*:*:*:*:*:*:*"
] | null | 5.5 | null | 4.3 | null |
|
GHSA-8whq-qmmg-8jxf
|
TmComm.sys 1.5.0.1052 in the Trend Micro Anti-Rootkit Common Module (RCM), with the VsapiNI.sys 3.320.0.1003 scan engine, as used in Trend Micro PC-cillin Internet Security 2007, Antivirus 2007, Anti-Spyware for SMB 3.2 SP1, Anti-Spyware for Consumer 3.5, Anti-Spyware for Enterprise 3.0 SP2, Client / Server / Messaging Security for SMB 3.5, Damage Cleanup Services 3.2, and possibly other products, assigns Everyone write permission for the \\.\TmComm DOS device interface, which allows local users to access privileged IOCTLs and execute arbitrary code or overwrite arbitrary memory in the kernel context.
|
[] | null | null | null | null | null |
|
CVE-2014-2386
|
Multiple off-by-one errors in Icinga, possibly 1.10.2 and earlier, allow remote attackers to cause a denial of service (crash) via unspecified vectors to the (1) display_nav_table, (2) print_export_link, (3) page_num_selector, or (4) page_limit_selector function in cgi/cgiutils.c or (5) status_page_num_selector function in cgi/status.c, which triggers a stack-based buffer overflow.
|
[
"cpe:2.3:a:icinga:icinga:*:*:*:*:*:*:*:*",
"cpe:2.3:a:icinga:icinga:1.10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:icinga:icinga:1.10.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-r2hq-xr24-chr5
|
A stored cross-site scripting (XSS) vulnerability in the Admin panel in Enhancesoft osTicket v1.17.2 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Role Name parameter.
|
[] | null | 4.8 | null | null | null |
|
GHSA-923r-gp72-rmm4
|
Memory corruption is possible when an attempt is made from userspace or console to write some haptics effects pattern to the haptics debugfs file.
|
[] | null | 6.7 | null | null | null |
|
GHSA-289x-93wc-65xg
|
D-Link DCS-825L firmware version 1.08.01 and possibly prior versions contain an insecure implementation in the mydlink-watch-dog.sh script. The script monitors and respawns the `dcp` and `signalc` binaries without validating their integrity, origin, or permissions. An attacker with filesystem access (e.g., via UART or firmware modification) may replace these binaries to achieve persistent arbitrary code execution with root privileges. The issue stems from improper handling of executable trust and absence of integrity checks in the watchdog logic.
|
[] | null | 7.3 | null | null | null |
|
GHSA-7mj3-xm28-cffc
|
The ASUS DSL-N17U modem with firmware 1.1.0.2 allows attackers to access the admin interface by changing the admin password without authentication via a POST request to Advanced_System_Content.asp with the uiViewTools_username=admin&uiViewTools_Password= and uiViewTools_PasswordConfirm= substrings.
|
[] | null | null | null | null | null |
|
CVE-2025-7903
|
yangzongzhuan RuoYi Image Source ui layer
|
A vulnerability classified as problematic was found in yangzongzhuan RuoYi up to 4.8.1. Affected by this vulnerability is an unknown functionality of the component Image Source Handler. The manipulation leads to improper restriction of rendered ui layers. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
|
[] | 5.3 | 4.3 | 4.3 | 4 | null |
CVE-2022-4473
|
Widget Shortcode <= 0.3.5 - Contributor+ Stored XSS
|
The Widget Shortcode WordPress plugin through 0.3.5 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins.
|
[
"cpe:2.3:a:widget_shortcode_project:widget_shortcode:*:*:*:*:*:wordpress:*:*"
] | null | 5.4 | null | null | null |
CVE-2020-16593
|
A Null Pointer Dereference vulnerability exists in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.35, in scan_unit_for_symbols, as demonstrated in addr2line, that can cause a denial of service via a crafted file.
|
[
"cpe:2.3:a:gnu:binutils:2.35:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:solidfire_\\&_hci_management_node:-:*:*:*:*:*:*:*"
] | null | 5.5 | null | 4.3 | null |
|
CVE-2007-5663
|
Adobe Reader and Acrobat 8.1.1 and earlier allows remote attackers to execute arbitrary code via a crafted PDF file that calls an insecure JavaScript method in the EScript.api plug-in. NOTE: this issue might be subsumed by CVE-2008-0655.
|
[
"cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*"
] | null | null | null | 9.3 | null |
|
GHSA-h6fx-jmr6-xg2g
|
** UNSUPPORTED WHEN ASSIGNED ** In ARCHIBUS Web Central 21.3.3.815 (a version from 2014), XSS occurs in /archibus/dwr/call/plaincall/workflow.runWorkflowRule.dwr because the data received as input from clients is re-included within the HTTP response returned by the application without adequate validation. In this way, if HTML code or client-side executable code (e.g., Javascript) is entered as input, the expected execution flow could be altered. This is fixed in all recent versions, such as version 26. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
|
[] | null | 6.1 | null | null | null |
|
CVE-2023-50920
|
An issue was discovered on GL.iNet devices before version 4.5.0. They assign the same session ID after each user reboot, allowing attackers to share session identifiers between different sessions and bypass authentication or access control measures. Attackers can impersonate legitimate users or perform unauthorized actions. This affects A1300 4.4.6, AX1800 4.4.6, AXT1800 4.4.6, MT3000 4.4.6, MT2500 4.4.6, MT6000 4.5.0, MT1300 4.3.7, MT300N-V2 4.3.7, AR750S 4.3.7, AR750 4.3.7, AR300M 4.3.7, and B1300 4.3.7.
|
[
"cpe:2.3:h:gl.inet:a1300:-:*:*:*:*:*:*:*",
"cpe:2.3:h:gl.inet:ax1800:-:*:*:*:*:*:*:*",
"cpe:2.3:h:gl.inet:axt1800:-:*:*:*:*:*:*:*",
"cpe:2.3:h:gl.inet:mt3000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:gl.inet:mt2500:-:*:*:*:*:*:*:*",
"cpe:2.3:h:gl.inet:mt6000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:gl.inet:mt1300:-:*:*:*:*:*:*:*",
"cpe:2.3:h:gl.inet:mt300n_v2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:gl.inet:ar750s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:gl.inet:ar750:-:*:*:*:*:*:*:*",
"cpe:2.3:h:gl.inet:ar300m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:gl.inet:b1300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-ax1800_firmware:4.3.7:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-ax1800_firmware:4.4.6:*:*:*:*:*:*:*",
"cpe:2.3:h:gl-inet:gl-ax1800:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-axt1800_firmware:4.3.7:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-axt1800_firmware:4.4.6:*:*:*:*:*:*:*",
"cpe:2.3:h:gl-inet:gl-axt1800:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-mt3000_firmware:4.3.7:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-mt3000_firmware:4.4.6:*:*:*:*:*:*:*",
"cpe:2.3:h:gl-inet:gl-mt3000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-mt2500_firmware:4.3.7:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-mt2500_firmware:4.4.6:*:*:*:*:*:*:*",
"cpe:2.3:h:gl-inet:gl-mt2500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-mt6000_firmware:4.3.7:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-mt6000_firmware:4.4.6:*:*:*:*:*:*:*",
"cpe:2.3:h:gl-inet:gl-mt6000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-mt1300_firmware:4.3.7:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-mt1300_firmware:4.4.6:*:*:*:*:*:*:*",
"cpe:2.3:h:gl-inet:gl-mt1300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-mt300n-v2_firmware:4.3.7:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-mt300n-v2_firmware:4.4.6:*:*:*:*:*:*:*",
"cpe:2.3:h:gl-inet:gl-mt300n-v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-ar750s_firmware:4.3.7:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-ar750s_firmware:4.4.6:*:*:*:*:*:*:*",
"cpe:2.3:h:gl-inet:gl-ar750s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-ar750_firmware:4.3.7:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-ar750_firmware:4.4.6:*:*:*:*:*:*:*",
"cpe:2.3:h:gl-inet:gl-ar750:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-ar300m_firmware:4.3.7:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-ar300m_firmware:4.4.6:*:*:*:*:*:*:*",
"cpe:2.3:h:gl-inet:gl-ar300m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-b1300_firmware:4.3.7:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-b1300_firmware:4.4.6:*:*:*:*:*:*:*",
"cpe:2.3:h:gl-inet:gl-b1300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-a1300_firmware:4.3.7:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-a1300_firmware:4.4.6:*:*:*:*:*:*:*",
"cpe:2.3:h:gl-inet:gl-a1300:-:*:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
|
CVE-2017-6910
|
The HTTP and WebSocket engine components in the server in Kaazing Gateway before 4.5.3 hotfix-1, Gateway - JMS Edition before 4.0.5 hotfix-15, 4.0.6 before hotfix-4, 4.0.7, 4.0.9 before hotfix-19, 4.4.x before 4.4.2 hotfix-1, 4.5.x before 4.5.3 hotfix-1, and Gateway Community and Enterprise Editions before 5.6.0 allow remote attackers to bypass intended access restrictions and obtain sensitive information via vectors related to HTTP request handling.
|
[
"cpe:2.3:a:kaazing:kaazing_gateway:*:*:*:*:*:*:*:*",
"cpe:2.3:a:kaazing:kaazing_gateway:4.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:kaazing:kaazing_gateway:4.5.3:hotfix1:*:*:*:*:*:*",
"cpe:2.3:a:kaazing:kaazing_gateway:*:hotfix1:*:*:jms:*:*:*",
"cpe:2.3:a:kaazing:kaazing_gateway:*:*:*:*:jms:*:*:*",
"cpe:2.3:a:kaazing:kaazing_gateway:4.0.5:*:*:*:jms:*:*:*",
"cpe:2.3:a:kaazing:kaazing_gateway:4.0.6:*:*:*:jms:*:*:*",
"cpe:2.3:a:kaazing:kaazing_gateway:4.0.6:hotfix2:*:*:jms:*:*:*",
"cpe:2.3:a:kaazing:kaazing_gateway:4.0.7:*:*:*:jms:*:*:*",
"cpe:2.3:a:kaazing:kaazing_gateway:4.4.2:hotfix1:*:*:jms:*:*:*",
"cpe:2.3:a:kaazing:kaazing_gateway:4.5.3:hotfix1:*:*:jms:*:*:*",
"cpe:2.3:a:tenefit:kaazing_websocket_gateway:*:*:*:*:community:*:*:*",
"cpe:2.3:a:tenefit:kaazing_websocket_gateway:*:*:*:*:enterprise:*:*:*"
] | null | null | 7.5 | 5 | null |
|
CVE-2018-19025
|
In JUUKO K-808, an attacker could specially craft a packet that encodes an arbitrary command, which could be executed on the K-808 (Firmware versions prior to numbers ending ...9A, ...9B, ...9C, etc.).
|
[
"cpe:2.3:o:juuko:k-808_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juuko:k-808:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | 10 | null |
|
CVE-2014-2708
|
Multiple SQL injection vulnerabilities in graph_xport.php in Cacti 0.8.7g, 0.8.8b, and earlier allow remote attackers to execute arbitrary SQL commands via the (1) graph_start, (2) graph_end, (3) graph_height, (4) graph_width, (5) graph_nolegend, (6) print_source, (7) local_graph_id, or (8) rra_id parameter.
|
[
"cpe:2.3:a:cacti:cacti:0.8.8b:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2023-4814
|
A Privilege escalation vulnerability exists in Trellix Windows DLP endpoint for windows which can be abused to delete any file/folder for which the user does not have permission to.
|
[
"cpe:2.3:a:trellix:data_loss_prevention:11.10.100.17:*:*:*:*:*:*:*"
] | null | 7.1 | null | null | null |
|
GHSA-p786-96f8-68ff
|
xscreensaver before 5.14 crashes during activation and leaves the screen unlocked when in Blank Only Mode and when DPMS is disabled, which allows local attackers to access resources without authentication.
|
[] | null | 7.8 | null | null | null |
|
CVE-2025-22326
|
WordPress 5centsCDN – WordPress CDN Plugin plugin <= 24.8.16 - Reflected Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in 5centsCDN 5centsCDN allows Reflected XSS.This issue affects 5centsCDN: from n/a through 24.8.16.
|
[] | null | 7.1 | null | null | null |
CVE-2025-9311
|
itsourcecode Apartment Management System addfair.php sql injection
|
A vulnerability was identified in itsourcecode Apartment Management System 1.0. Affected by this issue is some unknown functionality of the file /fair/addfair.php. The manipulation of the argument ID leads to sql injection. Remote exploitation of the attack is possible. The exploit is publicly available and might be used.
|
[] | 6.9 | 7.3 | 7.3 | 7.5 | null |
GHSA-jc98-q59f-rmj3
|
Buffer overflow in dlogin 1.0a could allow local users to gain privileges via unknown attack vectors.
|
[] | null | null | null | null | null |
|
GHSA-9qv7-h3f8-5wpx
|
Insecure Win32 memory objects in Endpoint Windows Agents in RSA NetWitness Platform before 12.2 allow local and admin Windows user accounts to modify the endpoint agent service configuration: to either disable it completely or run user-supplied code or commands, thereby bypassing tamper-protection features via ACL modification.
|
[] | null | 6.7 | null | null | null |
|
GHSA-wjgq-vwg2-v722
|
The GoogleAuthUtil.getToken method in the Google Play services SDK before 2015 sets parameters in OAuth token requests upon finding a corresponding _opt_ parameter in the Bundle extras argument, which allows attackers to bypass an intended consent dialog and retrieve tokens for arbitrary OAuth scopes including the SID and LSID scopes, and consequently obtain access to a Google account, via a crafted application, as demonstrated by setting the has_permission=1 parameter value upon finding _opt_has_permission in that argument.
|
[] | null | null | null | null | null |
|
GHSA-xm5w-7vqw-w9rq
|
Kofax Power PDF JPG File Parsing Use-After-Free Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Kofax Power PDF. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of JPG files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-20460.
|
[] | null | null | 3.3 | null | null |
|
CVE-2017-11233
|
Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable memory corruption vulnerability in the image conversion engine when processing Enhanced Metafile Format (EMF) data related to block transfer of pixels. Successful exploitation could lead to arbitrary code execution.
|
[
"cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:reader:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*"
] | null | null | 6.5 | 4.3 | null |
|
GHSA-prq9-w4j8-gg56
|
: Insufficient Session Expiration vulnerability in Progress Sitefinity allows : Session Fixation.This issue affects Sitefinity: from 4.0 through 14.4.8142, from 15.0.8200 through 15.0.8229, from 15.1.8300 through 15.1.8327, from 15.2.8400 through 15.2.8421.
|
[] | null | 6.8 | null | null | null |
|
CVE-2022-22810
|
A CWE-307: Improper Restriction of Excessive Authentication Attempts vulnerability exists that could allow an attacker to manipulate the admin after numerous attempts at guessing credentials. Affected Product: spaceLYnk (V2.6.2 and prior), Wiser for KNX (formerly homeLYnk) (V2.6.2 and prior), fellerLYnk (V2.6.2 and prior)
|
[
"cpe:2.3:o:schneider-electric:spacelynk_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:spacelynk:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:wiser_for_knx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:wiser_for_knx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:fellerlynk_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:fellerlynk:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | 5 | null |
|
CVE-2013-1715
|
Multiple untrusted search path vulnerabilities in the (1) full installer and (2) stub installer in Mozilla Firefox before 23.0 on Windows allow local users to gain privileges via a Trojan horse DLL in the default downloads directory. NOTE: this issue exists because of an incomplete fix for CVE-2012-4206.
|
[
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:19.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:19.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:19.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:20.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:20.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:21.0:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*"
] | null | null | null | 6.9 | null |
|
GHSA-jv33-9pvf-mxwh
|
The Better WordPress Google XML Sitemaps WordPress plugin through 1.4.1 does not sanitise and escape its logs when outputting them in the admin dashboard, which could allow unauthenticated users to perform Stored Cross-Site Scripting attacks against admins
|
[] | null | 6.1 | null | null | null |
|
CVE-2019-4741
|
IBM Content Navigator 3.0CD is vulnerable to Server Side Request Forgery (SSRF). This may allow an unauthenticated attacker to send unauthorized requests from the system, potentially leading to network enumeration or facilitating other attacks. IBM X-Force ID: 172815.
|
[
"cpe:2.3:a:ibm:content_navigator:3.0.0:*:*:*:continuous_delivery:*:*:*",
"cpe:2.3:o:ibm:aix:-:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | null | 5.3 | null | null |
|
CVE-2021-20265
|
A flaw was found in the way memory resources were freed in the unix_stream_recvmsg function in the Linux kernel when a signal was pending. This flaw allows an unprivileged local user to crash the system by exhausting available memory. The highest threat from this vulnerability is to system availability.
|
[
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:tekelec_platform_distribution:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | 4.9 | null |
|
GHSA-w893-jhmx-r3gr
|
A cross-site scripting (XSS) vulnerability in the component /management/term of School Fees Management System v1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the tname parameter.
|
[] | null | 5.4 | null | null | null |
|
GHSA-mxrc-xx6x-q2cc
|
On affected platforms running Arista EOS with mirroring to multiple destinations configured, an internal system error may trigger a kernel panic and cause system reload.
|
[] | null | 5.9 | null | null | null |
|
CVE-2023-25001
|
A maliciously crafted SKP file in Autodesk Navisworks 2023 and 2022 be used to trigger use-after-free vulnerability. Exploitation of this vulnerability may lead to code execution.
|
[
"cpe:2.3:a:autodesk:navisworks:2022:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:navisworks:2023:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
|
GHSA-7rgf-jq37-62rj
|
XSS & SQLi in HugeIT slideshow v1.0.4
|
[] | null | null | 7.2 | null | null |
|
GHSA-jv79-99w2-fh63
|
SQL injection vulnerability in the JShop (com_jshop) component for Joomla! allows remote attackers to execute arbitrary SQL commands via the pid parameter in a product action to index.php.
|
[] | null | null | null | null | null |
|
CVE-2025-47287
|
Tornado vulnerable to excessive logging caused by malformed multipart form data
|
Tornado is a Python web framework and asynchronous networking library. When Tornado's ``multipart/form-data`` parser encounters certain errors, it logs a warning but continues trying to parse the remainder of the data. This allows remote attackers to generate an extremely high volume of logs, constituting a DoS attack. This DoS is compounded by the fact that the logging subsystem is synchronous. All versions of Tornado prior to 6.5.0 are affected. The vulnerable parser is enabled by default. Upgrade to Tornado version 6.50 to receive a patch. As a workaround, risk can be mitigated by blocking `Content-Type: multipart/form-data` in a proxy.
|
[] | null | 7.5 | null | null | null |
GHSA-4p5j-63r4-89jw
|
joyplus-cms 1.6.0 has admin_ajax.php?action=savexml&tab=vodplay CSRF.
|
[] | null | 8.8 | null | null | null |
|
GHSA-827g-rqf3-jrp6
|
LuaExpat before 1.2.0 does not properly detect recursion during entity expansion, which allows remote attackers to cause a denial of service (memory and CPU consumption) via a crafted XML document containing a large number of nested entity references, a similar issue to CVE-2003-1564.
|
[] | null | null | null | null | null |
|
GHSA-9vxm-4m9h-fv2h
|
The ImageRecycle pdf & image compression plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the optimizeAllOn function in all versions up to, and including, 3.1.13. This makes it possible for authenticated attackers, with subscriber-level access and above, to modify image optimization settings.
|
[] | null | 4.3 | null | null | null |
|
GHSA-q745-cfqh-hcrw
|
phpThumb is vulnerable to Command Injection through its gif_outputAsJpeg function
|
gif_outputAsJpeg in phpThumb through 1.7.23 allows phpthumb.gif.php OS Command Injection via a crafted parameter value. This is fixed in 1.7.23-202506081709.
|
[] | null | 4.9 | null | null | null |
CVE-2022-41424
|
Bento4 v1.6.0-639 was discovered to contain a memory leak via the AP4_SttsAtom::Create function in mp42hls.
|
[
"cpe:2.3:a:axiosys:bento4:1.6.0-639:*:*:*:*:*:*:*"
] | null | 6.5 | null | null | null |
|
GHSA-7j8f-prmh-229c
|
A memory corruption issue was addressed with improved validation. This issue is fixed in iOS 14.4.1 and iPadOS 14.4.1, Safari 14.0.3 (v. 14610.4.3.1.7 and 15610.4.3.1.7), watchOS 7.3.2, macOS Big Sur 11.2.3. Processing maliciously crafted web content may lead to arbitrary code execution.
|
[] | null | 8.8 | null | null | null |
|
CVE-2009-4179
|
Stack-based buffer overflow in ovalarm.exe in HP OpenView Network Node Manager (OV NNM) 7.01, 7.51, and 7.53 allows remote attackers to execute arbitrary code via a long HTTP Accept-Language header in an OVABverbose action.
|
[
"cpe:2.3:a:hp:openview_network_node_manager:7.0.1:*:hp_ux:*:*:*:*:*",
"cpe:2.3:a:hp:openview_network_node_manager:7.0.1:*:linux:*:*:*:*:*",
"cpe:2.3:a:hp:openview_network_node_manager:7.0.1:*:solaris:*:*:*:*:*",
"cpe:2.3:a:hp:openview_network_node_manager:7.0.1:*:windows:*:*:*:*:*",
"cpe:2.3:a:hp:openview_network_node_manager:7.51:-:hp-ux:*:*:*:*:*",
"cpe:2.3:a:hp:openview_network_node_manager:7.51:-:linux:*:*:*:*:*",
"cpe:2.3:a:hp:openview_network_node_manager:7.51:-:solaris:*:*:*:*:*",
"cpe:2.3:a:hp:openview_network_node_manager:7.51:-:windows:*:*:*:*:*",
"cpe:2.3:a:hp:openview_network_node_manager:7.53:-:hp-ux:*:*:*:*:*",
"cpe:2.3:a:hp:openview_network_node_manager:7.53:-:linux:*:*:*:*:*",
"cpe:2.3:a:hp:openview_network_node_manager:7.53:-:solaris:*:*:*:*:*",
"cpe:2.3:a:hp:openview_network_node_manager:7.53:-:windows:*:*:*:*:*"
] | null | null | null | 10 | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.