id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 36
232
⌀ |
---|---|---|---|---|---|---|---|---|
GHSA-38mp-p2g2-47gf
|
In sortSimPhoneAccountsForEmergency of CreateConnectionProcessor.java, there is a possible prevention of access to emergency calling due to an unhandled exception. In rare instances, this could lead to local denial of service with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12Android ID: A-208267659
|
[] | null | null | null | null | null |
|
CVE-2023-1909
|
PHPGurukul BP Monitoring Management System User Profile Update profile.php sql injection
|
A vulnerability, which was classified as critical, was found in PHPGurukul BP Monitoring Management System 1.0. Affected is an unknown function of the file profile.php of the component User Profile Update Handler. The manipulation of the argument name/mobno leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-225318 is the identifier assigned to this vulnerability.
|
[
"cpe:2.3:a:phpgurukul:bp_monitoring_management_system:1.0:*:*:*:*:*:*:*"
] | null | 4.7 | 4.7 | 5.8 | null |
GHSA-422c-v5pr-46mh
|
GroupWise 5.5 and 6 running in live remote or smart caching mode allows remote attackers to read arbitrary users' mailboxes by extracting usernames and passwords from sniffed network traffic, as addressed by the "Padlock" fix.
|
[] | null | null | null | null | null |
|
CVE-2020-24706
|
An issue was discovered in certain WSO2 products. The Try It tool allows Reflected XSS. This affects API Manager through 3.1.0, API Manager Analytics 2.5.0, IS as Key Manager through 5.10.0, Identity Server through 5.10.0, Identity Server Analytics through 5.6.0, and IoT Server 3.1.0.
|
[
"cpe:2.3:a:wso2:api_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:wso2:api_manager_analytics:2.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wso2:identity_server:*:*:*:*:*:*:*:*",
"cpe:2.3:a:wso2:identity_server_analytics:*:*:*:*:*:*:*:*",
"cpe:2.3:a:wso2:identity_server_as_key_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:wso2:iot_server:3.1.0:*:*:*:*:*:*:*"
] | null | 6.1 | null | null | null |
|
GHSA-2qmv-gpqm-6x56
|
Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.0-8.0.42, 8.4.0-8.4.5 and 9.0.0-9.3.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
|
[] | null | 4.9 | null | null | null |
|
GHSA-qj32-xx7f-66p6
|
Unspecified vulnerability in Oracle 10 and 11 Express allows local users to affect availability via unknown vectors related to the Kernel.
|
[] | null | null | null | null | null |
|
CVE-2007-4363
|
Multiple cross-site scripting (XSS) vulnerabilities in the nodereference module in Drupal Content Construction Kit (CCK) before 4.7.x-1.6, and 5.x before 5.x-1.6 ,allow remote attackers to inject arbitrary web script or HTML via nodereference fields, when using (1) the plain formatter or (2) the autocomplete text field widget without Views.module.
|
[
"cpe:2.3:a:drupal:content_construction_kit:4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:content_construction_kit:5.2:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
CVE-2017-14719
|
Before version 4.8.2, WordPress was vulnerable to a directory traversal attack during unzip operations in the ZipArchive and PclZip components.
|
[
"cpe:2.3:a:wordpress:wordpress:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.7.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.7.6:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.7.7:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.7.8:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.7.9:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.7.10:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.7.11:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.7.12:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.7.13:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.7.14:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.7.15:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.7.16:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.7.17:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.7.18:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.7.19:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.7.20:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.7.21:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.7.22:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.8:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.8.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.8.4:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.8.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.8.6:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.8.7:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.8.8:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.8.9:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.8.10:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.8.11:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.8.12:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.8.13:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.8.14:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.8.15:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.8.16:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.8.17:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.8.18:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.8.19:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.8.20:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.8.21:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.8.22:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.9:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.9.4:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.9.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.9.6:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.9.7:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.9.8:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.9.9:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.9.10:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.9.11:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.9.12:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.9.13:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.9.14:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.9.15:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.9.16:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.9.17:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.9.18:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.9.19:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.9.20:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:4.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:4.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:4.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:4.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:4.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:4.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:4.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:4.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:4.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:4.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:4.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:4.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:4.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:4.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:4.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:4.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:4.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:4.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:4.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:4.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:4.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:4.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:4.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:4.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:4.1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:4.1.12:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:4.1.13:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:4.1.14:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:4.1.15:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:4.1.16:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:4.1.17:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:4.1.18:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:4.1.19:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:4.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:4.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:4.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:4.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:4.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:4.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:4.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:4.2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:4.2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:4.2.11:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:4.2.12:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:4.2.13:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:4.2.14:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:4.2.15:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:4.2.16:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:4.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:4.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:4.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:4.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:4.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:4.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:4.3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:4.3.8:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:4.3.9:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:4.3.10:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:4.3.11:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:4.3.12:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:4.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:4.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:4.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:4.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:4.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:4.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:4.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:4.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:4.4.9:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:4.4.10:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:4.4.11:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:4.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:4.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:4.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:4.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:4.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:4.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:4.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:4.5.8:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:4.5.9:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:4.5.10:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:4.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:4.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:4.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:4.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:4.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:4.6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:4.6.7:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:4.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:4.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:4.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:4.7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:4.7.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:4.8.1:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 | null |
|
RHSA-2024:6464
|
Red Hat Security Advisory: glib2 security update
|
glib2: Signal subscription vulnerabilities
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 3.8 | null | null | null |
CVE-2024-30433
|
WordPress MultiVendorX Marketplace plugin <= 4.1.3 - Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in MultiVendorX WC Marketplace allows Stored XSS.This issue affects WC Marketplace: from n/a through 4.1.3.
|
[] | null | 6.5 | null | null | null |
CVE-2008-3165
|
Directory traversal vulnerability in rss.php in fuzzylime (cms) 3.01a and earlier, when magic_quotes_gpc is disabled, allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the p parameter, as demonstrated using content.php, a different vector than CVE-2007-4805.
|
[
"cpe:2.3:a:fuzzylime:fuzzylime_cms:*:a:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
RHSA-2009:1140
|
Red Hat Security Advisory: ruby security update
|
fetchmail/mutt/evolution/...: APOP password disclosure vulnerability ruby: Incorrect checks for validity of X.509 certificates ruby: DoS vulnerability in BigDecimal
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null | null |
RHSA-2004:048
|
Red Hat Security Advisory: : Updated PWLib packages fix protocol security issues
|
security flaw
|
[
"cpe:/o:redhat:linux:9"
] | null | null | null | null | null |
CVE-2010-2731
|
Unspecified vulnerability in Microsoft Internet Information Services (IIS) 5.1 on Windows XP SP3, when directory-based Basic Authentication is enabled, allows remote attackers to bypass intended access restrictions and execute ASP files via a crafted request, aka "Directory Authentication Bypass Vulnerability."
|
[
"cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
CVE-2005-0425
|
Unknown vulnerability in IBM Websphere Application Server 5.0, 5.1, and 6.0 when running on Windows, allows remote attackers to obtain the source code for Java Server Pages (.jsp) via a crafted URL that causes the page to be processed by the file serving servlet instead of the JSP engine.
|
[
"cpe:2.3:a:ibm:websphere_application_server:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:5.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-366v-v593-vgfm
|
Multiple unspecified vulnerabilities in Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, might allow attackers to execute arbitrary code via unknown vectors.
|
[] | null | null | null | null | null |
|
CVE-2023-27079
|
Command Injection vulnerability found in Tenda G103 v.1.0.05 allows an attacker to obtain sensitive information via a crafted package
|
[
"cpe:2.3:o:tenda:g103_firmware:1.0.05:*:*:*:*:*:*:*",
"cpe:2.3:h:tenda:g103:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
|
CVE-2024-21645
|
pyLoad Log Injection
|
pyLoad is the free and open-source Download Manager written in pure Python. A log injection vulnerability was identified in `pyload` allowing any unauthenticated actor to inject arbitrary messages into the logs gathered by `pyload`. Forged or otherwise, corrupted log files can be used to cover an attacker’s tracks or even to implicate another party in the commission of a malicious act. This vulnerability has been patched in version 0.5.0b3.dev77.
|
[
"cpe:2.3:a:pyload:pyload:*:*:*:*:*:*:*:*",
"cpe:2.3:a:pyload:pyload:0.5.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:pyload:pyload:0.5.0:beta2:*:*:*:*:*:*"
] | null | 5.3 | null | null | null |
GHSA-7w47-ph55-4fr4
|
SAP ASE 16.0 SP02 PL03 and prior versions allow attackers who own SourceDB and TargetDB databases to elevate privileges to sa (system administrator) via dbcc import_sproc SQL injection.
|
[] | null | null | 9.8 | null | null |
|
CVE-2006-0282
|
Unspecified vulnerability in Oracle Database Server 8.1.7.4, 9.0.1.5, 9.0.1.5 FIPS, 9.2.0.7, and 10.1.0.5, Application Server 1.0.2.2, 9.0.4.2, and 10.1.2.0.2, and Collaboration Suite Release 2, version 9.0.4.2 (Oracle9i) has unspecified impact and attack vectors, as identified by Oracle Vuln# DBC01 in the Protocol Support component.
|
[
"cpe:2.3:a:oracle:application_server:1.0.2.2:r1:*:*:*:*:*:*",
"cpe:2.3:a:oracle:application_server:9.0.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:application_server:10.1.2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:application_server:10.1.2.0.2:r2:*:*:*:*:*:*",
"cpe:2.3:a:oracle:collaboration_suite:9.0.4.2:r2:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_server:8.1.7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_server:9.0.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_server:9.0.1.5:*:fips:*:*:*:*:*",
"cpe:2.3:a:oracle:database_server:9.2.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_server:10.1.0.5:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
CVE-2019-2186
|
In GetMBheader of combined_decode.cpp, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-7.1.1 Android-7.1.2 Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-136175447
|
[
"cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*"
] | null | 8.8 | null | 9.3 | null |
|
GHSA-4hg5-3p5m-xg4p
|
Unspecified vulnerability in the Oracle Spatial component in Oracle Database 9.0.1.5 FIPS+, 9.2.0.8, 9.2.0.8DV, and 10.1.0.5 has unknown impact and remote attack vectors, aka DB06.
|
[] | null | null | null | null | null |
|
GHSA-9qhf-jjcc-w776
|
The affected application lacks proper validation of user-supplied data when parsing font files (e.g., FNT). This could lead to an out-of-bounds read. An attacker could leverage this vulnerability to potentially execute arbitrary code in the context of the current process.
|
[] | null | 7.8 | null | null | null |
|
GHSA-f6fm-8rjv-g8ww
|
In venc, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08810810 / ALPS08805789; Issue ID: MSV-1502.
|
[] | null | 9.8 | null | null | null |
|
GHSA-8h8h-m4q6-r9hq
|
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in WP Lab WP-Lister Lite for eBay allows Reflected XSS.This issue affects WP-Lister Lite for eBay: from n/a through 3.6.3.
|
[] | null | 7.1 | null | null | null |
|
GHSA-rh9r-xpf4-gh2j
|
The zone determination function in Microsoft Internet Explorer 5.5 and 6.0 allows remote attackers to run scripts in the Local Computer zone by embedding the script in a cookie, aka the "Cookie-based Script Execution" vulnerability.
|
[] | null | null | null | null | null |
|
CVE-2008-5665
|
SQL injection vulnerability in index.php in the xhresim module in XOOPS allows remote attackers to execute arbitrary SQL commands via the no parameter.
|
[
"cpe:2.3:a:xoops:xoops:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2013-4148
|
Integer signedness error in the virtio_net_load function in hw/net/virtio-net.c in QEMU 1.x before 1.7.2 allows remote attackers to execute arbitrary code via a crafted savevm image, which triggers a buffer overflow.
|
[
"cpe:2.3:a:qemu:qemu:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.0:rc4:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.1:rc1:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.1:rc2:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.1:rc3:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.1:rc4:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.5.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.5.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.5.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.6.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.6.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.6.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.7.1:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2022-29213
|
Incomplete validation in signal ops leads to crashes in TensorFlow
|
TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the `tf.compat.v1.signal.rfft2d` and `tf.compat.v1.signal.rfft3d` lack input validation and under certain condition can result in crashes (due to `CHECK`-failures). Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 contain a patch for this issue.
|
[
"cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*",
"cpe:2.3:a:google:tensorflow:2.7.0:rc0:*:*:*:*:*:*",
"cpe:2.3:a:google:tensorflow:2.7.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:google:tensorflow:2.8.0:-:*:*:*:*:*:*",
"cpe:2.3:a:google:tensorflow:2.8.0:rc0:*:*:*:*:*:*",
"cpe:2.3:a:google:tensorflow:2.8.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:google:tensorflow:2.9.0:rc0:*:*:*:*:*:*",
"cpe:2.3:a:google:tensorflow:2.9.0:rc1:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
GHSA-mw7m-hgvv-grm6
|
In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Automobile and Snapdragon Mobile SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 450, SD 615/16/SD 415, SD 625, SD 820, SD 820A, SD 835, SD 845, SD 850, SDM630, SDM636, SDM660, and Snapdragon_High_Med_2016, input is not properly validated in a QTEE API function.
|
[] | null | null | 9.8 | null | null |
|
GHSA-ccjv-cx2v-q4rv
|
Unrestricted file upload vulnerability in IBM SPSS Analytical Decision Management 6.1 before IF1, 6.2 before IF1, and 7.0 before FP1 IF6 allows remote authenticated users to execute arbitrary code by uploading and accessing a JSP file.
|
[] | null | null | null | null | null |
|
CVE-2008-0573
|
IPSecDrv.sys 10.4.0.12 in SafeNET HighAssurance Remote and SoftRemote allows local users to gain privileges via a crafted IPSECDRV_IOCTL IOCTL request.
|
[
"cpe:2.3:a:safenet:ipsecdrv.sys:10.4.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:safenet:safenet_highassurance_remote:1.4.12:*:*:*:*:*:*:*",
"cpe:2.3:a:safenet:softremote_vpn_client:1.4.12:*:*:*:*:*:*:*"
] | null | null | null | 7.2 | null |
|
GHSA-r297-g992-2jwc
|
Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in WP Messiah Ai Image Alt Text Generator for WP. This issue affects Ai Image Alt Text Generator for WP: from n/a through 1.0.8.
|
[] | null | 4.3 | null | null | null |
|
CVE-2025-38419
|
remoteproc: core: Cleanup acquired resources when rproc_handle_resources() fails in rproc_attach()
|
In the Linux kernel, the following vulnerability has been resolved:
remoteproc: core: Cleanup acquired resources when rproc_handle_resources() fails in rproc_attach()
When rproc->state = RPROC_DETACHED and rproc_attach() is used
to attach to the remote processor, if rproc_handle_resources()
returns a failure, the resources allocated by imx_rproc_prepare()
should be released, otherwise the following memory leak will occur.
Since almost the same thing is done in imx_rproc_prepare() and
rproc_resource_cleanup(), Function rproc_resource_cleanup() is able
to deal with empty lists so it is better to fix the "goto" statements
in rproc_attach(). replace the "unprepare_device" goto statement with
"clean_up_resources" and get rid of the "unprepare_device" label.
unreferenced object 0xffff0000861c5d00 (size 128):
comm "kworker/u12:3", pid 59, jiffies 4294893509 (age 149.220s)
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
00 00 02 88 00 00 00 00 00 00 10 00 00 00 00 00 ............
backtrace:
[<00000000f949fe18>] slab_post_alloc_hook+0x98/0x37c
[<00000000adbfb3e7>] __kmem_cache_alloc_node+0x138/0x2e0
[<00000000521c0345>] kmalloc_trace+0x40/0x158
[<000000004e330a49>] rproc_mem_entry_init+0x60/0xf8
[<000000002815755e>] imx_rproc_prepare+0xe0/0x180
[<0000000003f61b4e>] rproc_boot+0x2ec/0x528
[<00000000e7e994ac>] rproc_add+0x124/0x17c
[<0000000048594076>] imx_rproc_probe+0x4ec/0x5d4
[<00000000efc298a1>] platform_probe+0x68/0xd8
[<00000000110be6fe>] really_probe+0x110/0x27c
[<00000000e245c0ae>] __driver_probe_device+0x78/0x12c
[<00000000f61f6f5e>] driver_probe_device+0x3c/0x118
[<00000000a7874938>] __device_attach_driver+0xb8/0xf8
[<0000000065319e69>] bus_for_each_drv+0x84/0xe4
[<00000000db3eb243>] __device_attach+0xfc/0x18c
[<0000000072e4e1a4>] device_initial_probe+0x14/0x20
|
[] | null | null | null | null | null |
GHSA-64j2-vfrj-6r28
|
Western Digital Dashboard before 3.2.2.9 allows DLL Hijacking that leads to compromise of the SYSTEM account.
|
[] | null | null | null | null | null |
|
CVE-2022-49671
|
RDMA/cm: Fix memory leak in ib_cm_insert_listen
|
In the Linux kernel, the following vulnerability has been resolved:
RDMA/cm: Fix memory leak in ib_cm_insert_listen
cm_alloc_id_priv() allocates resource for the cm_id_priv. When
cm_init_listen() fails it doesn't free it, leading to memory leak.
Add the missing error unwind.
|
[] | null | 5.5 | null | null | null |
GHSA-5g4q-5r23-wrrp
|
Missing Authorization vulnerability in Webcodin WCP Contact Form allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WCP Contact Form: from n/a through 3.1.0.
|
[] | null | 7.5 | null | null | null |
|
GHSA-6vgm-3w54-5w82
|
WordPress 2.0.1 and earlier allows remote attackers to obtain sensitive information via a direct request to (1) default-filters.php, (2) template-loader.php, (3) rss-functions.php, (4) locale.php, (5) wp-db.php, and (6) kses.php in the wp-includes/ directory; and (7) edit-form-advanced.php, (8) admin-functions.php, (9) edit-link-form.php, (10) edit-page-form.php, (11) admin-footer.php, and (12) menu.php in the wp-admin directory; and possibly (13) list directory contents of the wp-includes directory. NOTE: the vars.php, edit-form.php, wp-settings.php, and edit-form-comment.php vectors are already covered by CVE-2005-4463. The menu-header.php vector is already covered by CVE-2005-2110. Other vectors might be covered by CVE-2005-1688. NOTE: if the typical installation of WordPress does not list any site-specific files to wp-includes, then vector [13] is not an exposure.
|
[] | null | null | null | null | null |
|
CVE-2020-10746
|
A flaw was found in Infinispan (org.infinispan:infinispan-server-runtime) version 10, where it permits local access to controls via both REST and HotRod APIs. This flaw allows a user authenticated to the local machine to perform all operations on the caches, including the creation, update, deletion, and shutdown of the entire server.
|
[
"cpe:2.3:a:infinispan:infinispan-server-runtime:10.0.0:-:*:*:*:*:*:*"
] | null | 6.1 | null | 5.6 | null |
|
GHSA-jp89-5qr2-95pm
|
Cross-site scripting (XSS) vulnerability in posts.php in 427BB 2.2 and 2.2.1 allows remote attackers to inject arbitrary Javascript via a new message with a url bbcode tag containing a javascript URI.
|
[] | null | null | null | null | null |
|
CVE-2021-40401
|
A use-after-free vulnerability exists in the RS-274X aperture definition tokenization functionality of Gerbv 2.7.0 and dev (commit b5f1eacd) and Gerbv forked 2.7.1. A specially-crafted gerber file can lead to code execution. An attacker can provide a malicious file to trigger this vulnerability.
|
[
"cpe:2.3:a:gerbv_project:gerbv:2.7.0:-:*:*:*:*:*:*",
"cpe:2.3:a:gerbv_project:gerbv:2.7.1:forked_dev:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*"
] | null | null | 10 | null | null |
|
GHSA-xrqq-qf24-xjgx
|
A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Sonoma 14.6, macOS Monterey 12.7.6, macOS Ventura 13.6.8. An app may be able to modify protected parts of the file system.
|
[] | null | 4.4 | null | null | null |
|
GHSA-2hg8-4q64-3p6w
|
Multiple cross-site scripting (XSS) vulnerabilities in the (1) tasks and (2) search views in Horde Kronolith H4 before 3.0.17 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.
|
[] | null | null | null | null | null |
|
GHSA-rgg5-92ch-9hcx
|
The Admire Extra plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'space' shortcode in all versions up to, and including, 1.6 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] | null | 6.4 | null | null | null |
|
GHSA-557r-mpfm-f4j6
|
index.php in PEGames uses the extract function to overwrite critical variables, which allows remote attackers to conduct PHP remote file inclusion attacks via the abs_url parameter, which is later extracted to overwrite a previously uncontrolled value.
|
[] | null | null | null | null | null |
|
GHSA-35hp-p589-4cwf
|
A vulnerability has been found in SourceCodester Online Eyewear Shop 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file oews/classes/Users.php of the component POST Request Handler. The manipulation of the argument firstname/middlename/lastname/lastname/contact leads to cross site scripting. The attack can be launched remotely. The identifier VDB-220369 was assigned to this vulnerability.
|
[] | null | 6.1 | null | null | null |
|
CVE-2024-4120
|
Tenda W15E modifyIpMacBind formIPMacBindModify stack-based overflow
|
A vulnerability was found in Tenda W15E 15.11.0.14. It has been rated as critical. This issue affects the function formIPMacBindModify of the file /goform/modifyIpMacBind. The manipulation of the argument IPMacBindRuleId/IPMacBindRuleIp/IPMacBindRuleMac/IPMacBindRuleRemark leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-261863. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
|
[
"cpe:2.3:h:tenda:w15e:-:*:*:*:*:*:*:*"
] | null | 8.8 | 8.8 | 9 | null |
CVE-2021-36296
|
Dell VNX2 OE for File versions 8.1.21.266 and earlier, contain an authenticated remote code execution vulnerability. A remote malicious user with privileges may exploit this vulnerability to execute commands on the system.
|
[
"cpe:2.3:a:dell:emc_unity_operating_environment:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:vnx_vg10:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:vnx_vg50:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:vnx5200:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:vnx5400:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:vnx5600:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:vnx5800:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:vnx7600:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:vnx8000:-:*:*:*:*:*:*:*"
] | null | 7.2 | null | null | null |
|
GHSA-f5cm-hf7h-g464
|
Cross-Site Request Forgery (CSRF) vulnerability in SKT Themes Posterity allows Cross Site Request Forgery.This issue affects Posterity: from n/a through 3.3.
|
[] | null | 4.3 | null | null | null |
|
GHSA-5w95-m5g4-hrhx
|
Heap-based buffer overflow in Microsoft Office Excel 2002 SP3, Office 2004 and 2008 for Mac, and Open XML File Format Converter for Mac allows remote attackers to execute arbitrary code via a spreadsheet containing a malformed Binary File Format (aka BIFF) record that triggers memory corruption, aka "Excel Document Parsing Heap Overflow Vulnerability."
|
[] | null | null | null | null | null |
|
CVE-2015-3129
|
Use-after-free vulnerability in Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and OS X and before 11.2.202.481 on Linux, Adobe AIR before 18.0.0.180, Adobe AIR SDK before 18.0.0.180, and Adobe AIR SDK & Compiler before 18.0.0.180 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-3118, CVE-2015-3124, CVE-2015-3127, CVE-2015-3128, CVE-2015-3131, CVE-2015-3132, CVE-2015-3136, CVE-2015-3137, CVE-2015-4428, CVE-2015-4430, and CVE-2015-5117.
|
[
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:14.0.0.125:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:14.0.0.145:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:14.0.0.176:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:14.0.0.179:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.152:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.167:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.189:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.223:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.239:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.246:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:16.0.0.235:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:16.0.0.257:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:16.0.0.287:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:16.0.0.296:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:17.0.0.134:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:17.0.0.169:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:17.0.0.188:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:17.0.0.190:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:18.0.0.160:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:18.0.0.194:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
GHSA-pfx2-4968-v9w2
|
XnView Classic for Windows Version 2.40 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted .fpx file, related to an "Error Code (0xc000041d) starting at wow64!Wow64NotifyDebugger+0x000000000000001d."
|
[] | null | null | 7.8 | null | null |
|
CVE-2020-25850
|
HGiga MailSherlock - Arbitrary File Download
|
The function, view the source code, of HGiga MailSherlock does not validate specific characters. Remote attackers can use this flaw to download arbitrary system files.
|
[
"cpe:2.3:a:hgiga:msr45_isherlock-user:*:*:*:*:*:*:*:*",
"cpe:2.3:a:hgiga:ssr45_isherlock-user:*:*:*:*:*:*:*:*"
] | null | 8.1 | null | null | null |
GHSA-376m-3h9j-6rv5
|
Buffer overflow in swverify in HP-UX 11.0, and possibly other programs, allows local users to gain privileges via a long command line argument.
|
[] | null | null | null | null | null |
|
RHSA-2025:4496
|
Red Hat Security Advisory: kpatch-patch-5_14_0-284_104_1, kpatch-patch-5_14_0-284_52_1, kpatch-patch-5_14_0-284_79_1, and kpatch-patch-5_14_0-284_92_1 security update
|
kernel: nvme-tcp: fix potential memory corruption in nvme_tcp_recv_pdu()
|
[
"cpe:/o:redhat:rhel_eus:9.2::baseos"
] | null | 8 | null | null | null |
GHSA-v42g-f47f-rwpr
|
An exploitable SQL injection vulnerability exists in the authenticated part of YouPHPTube 7.6. Specially crafted web requests can cause a SQL injection. An attacker can send a web request with parameters containing SQL injection attacks to trigger this vulnerability, potentially allowing exfiltration of the database, user credentials and in certain configuration, access the underlying operating system.
|
[] | null | 8.8 | null | null | null |
|
CVE-2008-1171
|
Multiple PHP remote file inclusion vulnerabilities in the 123 Flash Chat Module for phpBB allow remote attackers to execute arbitrary PHP code via a URL in the phpbb_root_path parameter to (1) 123flashchat.php and (2) phpbb_login_chat.php. NOTE: CVE disputes this issue because $phpbb_root_path is explicitly set to "./" in both programs
|
[
"cpe:2.3:a:phpbb:123_flash_chat_module:*:*:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
GHSA-w93q-rjgc-5vpf
|
A configuration issue was addressed with additional restrictions. This issue is fixed in macOS Big Sur 11.7, macOS Monterey 12.6. An app may be able to access user-sensitive data.
|
[] | null | 5.5 | null | null | null |
|
GHSA-x633-mvxm-f9pp
|
An issue was discovered on Mofi Network MOFI4500-4GXeLTE 4.1.5-std devices. The poof.cgi script contains undocumented code that provides the ability to remotely reboot the device. An adversary with the private key (but not the root password) can remotely reboot the device.
|
[] | null | null | null | null | null |
|
GHSA-hm72-qxg7-34pg
|
miniserv.pl in (1) Webmin before 1.070 and (2) Usermin before 1.000 does not properly handle metacharacters such as line feeds and carriage returns (CRLF) in Base-64 encoded strings during Basic authentication, which allows remote attackers to spoof a session ID and gain root privileges.
|
[] | null | null | null | null | null |
|
CVE-2016-3818
|
libc in Android 4.x before 4.4.4 allows remote attackers to cause a denial of service (device hang or reboot) via a crafted file, aka internal bug 28740702.
|
[
"cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.4.3:*:*:*:*:*:*:*"
] | null | null | 5.5 | 7.1 | null |
|
GHSA-rrxw-6cxg-833x
|
Azure RTOS GUIX Studio Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-30175, CVE-2022-30176, CVE-2022-34687, CVE-2022-35773, CVE-2022-35779.
|
[] | null | 7.8 | null | null | null |
|
GHSA-3ggj-v8pg-xq6f
|
Heap-based buffer overflow in SPICE before 0.12.6 allows guest OS users to cause a denial of service (heap-based memory corruption and QEMU-KVM crash) or possibly execute arbitrary code on the host via QXL commands related to the surface_id parameter.
|
[] | null | null | 7.8 | null | null |
|
GHSA-mf23-wm84-g9x3
|
IPv4-in-IPv6 and IPv6-in-IPv6 tunneling (RFC 2473) do not require the validation or verification of the source of a network packet, allowing an attacker to spoof and route arbitrary traffic via an exposed network interface. This is a similar issue to CVE-2020-10136.
|
[] | null | 5.4 | null | null | null |
|
GHSA-jjmf-rvpm-r6pc
|
On BIG-IP version 16.0.x before 16.0.1.1, 15.1.x before 15.1.2.1, and 14.1.x before 14.1.3.1, under some circumstances, Traffic Management Microkernel (TMM) may restart on the BIG-IP system while passing large bursts of traffic. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated.
|
[] | null | null | null | null | null |
|
GHSA-2mrh-6cph-qr8h
|
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is 7.1.10. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 2.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N).
|
[] | null | 2.3 | null | null | null |
|
CVE-2017-1000507
|
Canvs Canvas version 3.4.2 contains a Cross Site Scripting (XSS) vulnerability in User's details that can result in denial of service and execution of javascript code.
|
[
"cpe:2.3:a:cnvs:canvas:3.4.2:*:*:*:*:*:*:*"
] | null | null | 5.4 | 3.5 | null |
|
RHSA-2020:4682
|
Red Hat Security Advisory: grafana security, bug fix, and enhancement update
|
grafana: XSS vulnerability via a column style on the "Dashboard > Table Panel" screen grafana: arbitrary file read via MySQL data source grafana: stored XSS grafana: XSS annotation popup vulnerability grafana: XSS via column.title or cellLinkTooltip grafana: information disclosure through world-readable /var/lib/grafana/grafana.db grafana: information disclosure through world-readable grafana configuration files grafana: XSS via the OpenTSDB datasource
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 6.1 | null | null | null |
GHSA-3xvg-x47j-x75w
|
Ansible Improper Input Validation vulnerability
|
In ansible it was found that inventory variables are loaded from current working directory when running ad-hoc command which are under attacker's control, allowing to run arbitrary code as a result.
|
[] | 8.5 | null | 7.8 | null | null |
GHSA-qffq-rf2r-34hh
|
A Buffer Overflow vulnerabiltiy exists in TP-LINK WR-886N 20190826 2.3.8 in thee /cloud_config/router_post/login feature, which allows malicious users to execute arbitrary code on the system via a crafted post request.
|
[] | null | 9.8 | null | null | null |
|
GHSA-wvxc-855f-jvrv
|
Azure Identity Library for .NET Information Disclosure Vulnerability
|
Azure Identity Library for .NET Information Disclosure Vulnerability
|
[] | null | 5.5 | null | null | null |
CVE-2025-46726
|
Langroid Vulnerable to XXE Injection via XMLToolMessage
|
Langroid is a framework for building large-language-model-powered applications. Prior to version 0.53.4, a LLM application leveraging `XMLToolMessage` class may be exposed to untrusted XML input that could result in DoS and/or exposing local files with sensitive information. Version 0.53.4 fixes the issue.
|
[] | 7.8 | null | null | null | null |
RHSA-2021:1006
|
Red Hat Security Advisory: OpenShift Container Platform 4.7.5 security and bug fix update
|
golang: crypto/elliptic: incorrect operations on the P-224 curve gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation fabric8-kubernetes-client: vulnerable to a path traversal leading to integrity and availability compromise
|
[
"cpe:/a:redhat:openshift:4.7::el7",
"cpe:/a:redhat:openshift:4.7::el8"
] | null | 7.4 | null | null | null |
RHSA-2017:2561
|
Red Hat Security Advisory: Red Hat Enterprise Virtualization 3.x - 30 Day End Of Life Notice
|
This is the 30 day notification for the End of Production Phase 2 of
Red Hat Enterprise Virtualization 3.x.
|
[
"cpe:/a:redhat:rhev_manager:3"
] | null | null | null | null | null |
CVE-2023-47867
|
MachineSense FeverWarn Improper Access Control
|
MachineSense FeverWarn devices are configured as Wi-Fi hosts in a way that attackers within range could connect to the device's web services and compromise the device.
|
[
"cpe:2.3:o:machinesense:feverwarn_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:machinesense:feverwarn:-:*:*:*:*:*:*:*"
] | null | 8.8 | null | null | null |
GHSA-6gj2-5366-p95v
|
ChakraCore RCE Vulnerability
|
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8266, CVE-2018-8380, CVE-2018-8384.
|
[] | null | null | 7.5 | null | null |
GHSA-mgjw-ppjc-jj5p
|
Blue Coat Advanced Secure Gateway (ASG) 6.6 before 6.6.5.4 and Content Analysis System (CAS) 1.3 before 1.3.7.4 are susceptible to an OS command injection vulnerability. An authenticated malicious administrator can execute arbitrary OS commands with elevated system privileges.
|
[] | null | null | 7.2 | null | null |
|
CVE-2020-26997
|
A vulnerability has been identified in Solid Edge SE2020 (All versions < SE2020MP13), Solid Edge SE2020 (All versions < SE2020MP14), Solid Edge SE2021 (All Versions < SE2021MP4). Affected applications lack proper validation of user-supplied data when parsing PAR files. This could lead to pointer dereferences of a value obtained from untrusted source. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-11919)
|
[
"cpe:2.3:a:siemens:solid_edge_se2020:*:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:solid_edge_se2021:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | 6.8 | null |
|
GHSA-g583-4mg8-hq84
|
In decrypt_1_2 of CryptoPlugin.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-244569759
|
[] | null | 5.5 | null | null | null |
|
GHSA-6c3v-h837-jcq5
|
Stack-based buffer overflow in nipplib.dll in Novell iPrint Client before 5.64 allows remote attackers to execute arbitrary code via a crafted iprint-client-config-info parameter in a printer-url.
|
[] | null | null | null | null | null |
|
GHSA-vgvw-jj2g-rp9v
|
Mozilla Firefox before 2.0.0.17 and 3.x before 3.0.2, Thunderbird before 2.0.0.17, and SeaMonkey before 1.1.12 allow remote attackers to create documents that lack script-handling objects, and execute arbitrary code with chrome privileges, via vectors related to (1) the document.loadBindingDocument function and (2) XSLT.
|
[] | null | null | null | null | null |
|
CVE-2020-12146
|
Silver Peak Unity OrchestratorTM subject to path traversal.
|
In Silver Peak Unity Orchestrator versions prior to 8.9.11+, 8.10.11+, or 9.0.1+, an authenticated user can access, modify, and delete restricted files on the Orchestrator server using the/debugFiles REST API.
|
[
"cpe:2.3:a:silver-peak:unity_orchestrator:*:*:*:*:*:*:*:*"
] | null | 6.6 | null | null | null |
GHSA-m65c-6q88-9x7g
|
A buffer overflow resulting in a potentially exploitable crash due to memory allocation issues when handling large amounts of incoming data. This vulnerability affects Thunderbird < 45.5, Firefox ESR < 45.5, and Firefox < 50.
|
[] | null | null | 7.5 | null | null |
|
GHSA-f2gq-74f6-v2f7
|
IBM AIX's 7.3 Python implementation could allow a non-privileged local user to exploit a vulnerability to cause a denial of service. IBM X-Force ID: 267965.
|
[] | null | 6.2 | null | null | null |
|
GHSA-hhf2-fwjq-ffr3
|
The E-Mail Security Virtual Appliance (ESVA) (tested on version ESVA_2057) contains an unauthenticated command injection vulnerability in the learn-msg.cgi script. The CGI handler fails to sanitize user-supplied input passed via the id parameter, allowing attackers to inject arbitrary shell commands. Exploitation requires no authentication and results in full command execution on the underlying system.
|
[] | 9.3 | null | null | null | null |
|
CVE-2023-41074
|
The issue was addressed with improved checks. This issue is fixed in tvOS 17, Safari 17, watchOS 10, iOS 17 and iPadOS 17, macOS Sonoma 14. Processing web content may lead to arbitrary code execution.
|
[
"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*"
] | null | 8.8 | null | null | null |
|
GHSA-2fq7-v233-xx5v
|
Stack-based buffer overflow in the MPS.StormPlayer.1 ActiveX control in mps.dll 3.9.4.27 in Baofeng Storm allows remote attackers to execute arbitrary code via a long argument to the OnBeforeVideoDownload method, as exploited in the wild in April and May 2009. NOTE: some of these details are obtained from third party information. NOTE: it was later reported that 3.09.04.17 and earlier are also affected.
|
[] | null | null | null | null | null |
|
CVE-2016-9025
|
Exponent CMS before 2.6.0 has improper input validation in purchaseOrderController.php.
|
[
"cpe:2.3:a:exponentcms:exponent_cms:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 | null |
|
GHSA-php6-q5jp-h3rj
|
The default configuration of HP Client Automation (HPCA) Enterprise Infrastructure (aka Radia) allows remote attackers to read log files, and consequently cause a denial of service or have unspecified other impact, via web requests.
|
[] | null | null | null | null | null |
|
GHSA-9mcr-873m-xcxp
|
Tungstenite allows remote attackers to cause a denial of service
|
The Tungstenite crate through 0.20.0 for Rust allows remote attackers to cause a denial of service (minutes of CPU consumption) via an excessive length of an HTTP header in a client handshake. The length affects both how many times a parse is attempted (e.g., thousands of times) and the average amount of data for each parse attempt (e.g., millions of bytes).
|
[] | null | 7.5 | null | null | null |
CVE-2021-25759
|
In JetBrains Hub before 2020.1.12629, an authenticated user can delete 2FA settings of any other user.
|
[
"cpe:2.3:a:jetbrains:hub:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4 | null |
|
CVE-2023-45800
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Hanbiro Hanbiro groupware allows Information Elicitation.This issue affects Hanbiro groupware: from V3.8.79 before V3.8.81.1.
|
[
"cpe:2.3:a:hanbiro:groupware:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
|
CVE-2025-53473
|
Server-side request forgery (SSRF) vulnerability exists n multiple versions of Nimesa Backup and Recovery, If this vulnerability is exploited, unintended requests may be sent to internal servers.
|
[] | 6.9 | null | 7.3 | null | null |
|
GHSA-pfq2-wh4j-r5cm
|
libc in Android 4.x before 4.4.4 allows remote attackers to cause a denial of service (device hang or reboot) via a crafted file, aka internal bug 28740702.
|
[] | null | null | 5.5 | null | null |
|
RHSA-2022:5030
|
Red Hat Security Advisory: Red Hat Fuse Online 7.10.2.P1 security update
|
google-oauth-client: Token signature not verified eventsource: Exposure of Sensitive Information
|
[
"cpe:/a:redhat:jboss_fuse:7"
] | null | 9.3 | null | null | null |
GHSA-g7xw-pf29-g7fm
|
SAP Commerce, versions 1811, 1905, does not perform necessary authorization checks for an anonymous user, due to Missing Authorization Check. This affects confidentiality of secure media.
|
[] | null | null | null | null | null |
|
GHSA-p87q-j7mq-759c
|
In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Mobile and Snapdragon Wear IPQ4019, MDM9206, MDM9607, MDM9635M, MDM9640, MDM9645, MSM8909W, SD 210/SD 212/SD 205, SD 400, SD 410/12, SD 615/16/SD 415, SD 800, and SD 810, the function tzbsp_pil_verify_sig() does not strictly check that the pointer to ELF and program headers and hash segment is within secure memory. It only checks that the address is not in non-secure memory. A given address range can overlap with both secure and non-secure regions - hence if such an address is passed in, it would not pass the non-secure range check, and would be considered valid by the function, even though that memory area could be modified by the non-secure side.
|
[] | null | null | 9.8 | null | null |
|
GHSA-f49g-9gwg-jc3x
|
Intel Alert Management System (aka AMS or AMS2), as used in Symantec Antivirus Corporate Edition (SAVCE) 10.x before 10.1 MR10, Symantec System Center (SSC) 10.x, and Symantec Quarantine Server 3.5 and 3.6, allows remote attackers to execute arbitrary commands via crafted messages over TCP, as discovered by Junaid Bohio, a different vulnerability than CVE-2010-0110 and CVE-2010-0111. NOTE: some of these details are obtained from third party information.
|
[] | null | null | null | null | null |
|
CVE-2022-2354
|
WP-DBManager < 2.80.8 - Admin+ Remote Command Execution
|
The WP-DBManager WordPress plugin before 2.80.8 does not prevent administrators from running arbitrary commands on the server in multisite installations, where only super-administrators should.
|
[
"cpe:2.3:a:wp-dbmanager_project:wp-dbmanager:*:*:*:*:*:wordpress:*:*"
] | null | 7.2 | null | null | null |
CVE-2023-26466
|
A user with non-Admin access can change a configuration file on the client to modify the Server URL.
|
[
"cpe:2.3:a:pega:synchronization_engine:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.