id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 36
232
⌀ |
---|---|---|---|---|---|---|---|---|
CVE-2004-2767
|
NWFTPD.nlm before 5.04.25 in the FTP server in Novell NetWare does not promptly close DS sessions, which allows remote attackers to cause a denial of service (connection slot exhaustion) by establishing many FTP sessions that persist for the lifetime of a DS session.
|
[
"cpe:2.3:a:novell:netware_ftp_server:*:*:*:*:*:*:*:*",
"cpe:2.3:o:novell:netware:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-j6jq-3q8p-xgg6
|
Netflix Security Monkey Open Redirect vulnerability
|
Netflix Security Monkey before 0.8.0 has an Open Redirect. The logout functionality accepted the "next" parameter which then redirects to any domain irrespective of the Host header.
|
[] | null | null | 6.1 | null | null |
GHSA-rfmp-w9w5-rmhv
|
REDCap through 15.0.0 has a security flaw in the Project Dashboards name, exposing users to a Cross-Site Request Forgery (CSRF) attack. An attacker can exploit this by luring users into clicking on a Project Dashboards name that contains the malicious payload, which triggers a logout request and terminates their session. This vulnerability stems from the absence of CSRF protections on the logout functionality, allowing malicious actions to be executed without user consent.
|
[] | null | 8.8 | null | null | null |
|
GHSA-vq5j-6vrq-2cm6
|
Dell Encryption Admin Utilities versions prior to 11.10.2 contain an Improper Link Resolution vulnerability. A local malicious user could potentially exploit this vulnerability, leading to privilege escalation.
|
[] | null | 7.8 | null | null | null |
|
GHSA-fm97-p25w-w6fj
|
The accelerated rendering functionality of NVIDIA Binary Graphics Driver (binary blob driver) For Linux v8774 and v8762, and probably on other operating systems, allows local and remote attackers to execute arbitrary code via a large width value in a font glyph, which can be used to overwrite arbitrary memory locations.
|
[] | null | null | null | null | null |
|
CVE-2019-17373
|
Certain NETGEAR devices allow unauthenticated access to critical .cgi and .htm pages via a substring ending with .jpg, such as by appending ?x=1.jpg to a URL. This affects MBR1515, MBR1516, DGN2200, DGN2200M, DGND3700, WNR2000v2, WNDR3300, WNDR3400, WNR3500, and WNR834Bv2.
|
[
"cpe:2.3:o:netgear:mbr1515_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:mbr1515:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:mbr1516_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:mbr1516:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:dgn2200_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:dgn2200:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:dgn2200m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:dgn2200m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:dgnd3700_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:dgnd3700:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:wnr2000v2_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wnr2000v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:wndr3300_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wndr3300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:wndr3400_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wndr3400:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:wnr3500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wnr3500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:wnr834bv2_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wnr834bv2:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 | null |
|
GHSA-3ppv-wqrq-v3rc
|
Moxa MXView 2.8 allows remote attackers to read web server's private key file, no access control.
|
[] | null | null | 7.5 | null | null |
|
GHSA-62ww-4p3p-7fhj
|
API information disclosure flaw in Elasticsearch
|
Elasticsearch versions before 7.11.2 and 6.8.15 contain a document disclosure flaw was found in the Elasticsearch suggester and profile API when Document and Field Level Security are enabled. The suggester and profile API are normally disabled for an index when document level security is enabled on the index. Certain queries are able to enable the profiler and suggester which could lead to disclosing the existence of documents and fields the attacker should not be able to view.
|
[] | null | 5.3 | null | null | null |
GHSA-gfxp-4g99-rqp6
|
The Microsoft VFP_OLE_Server ActiveX control allows remote attackers to execute arbitrary code by invoking the foxcommand method.
|
[] | null | null | null | null | null |
|
CVE-2004-1535
|
PHP remote file inclusion vulnerability in admin_cash.php for the Cash Mod module for phpBB allows remote attackers to execute arbitrary PHP code by modifying the phpbb_root_path parameter to reference a URL on a remote web server that contains the code.
|
[
"cpe:2.3:a:phpbb_group:phpbb:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:phpbb_group:phpbb:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpbb_group:phpbb:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:phpbb_group:phpbb:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:phpbb_group:phpbb:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:phpbb_group:phpbb:2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:phpbb_group:phpbb:2.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:phpbb_group:phpbb:2.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:phpbb_group:phpbb:2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:phpbb_group:phpbb:2.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:phpbb_group:phpbb:2.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:phpbb_group:phpbb:rc1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpbb_group:phpbb:rc1_pre:*:*:*:*:*:*:*",
"cpe:2.3:a:phpbb_group:phpbb:rc2:*:*:*:*:*:*:*",
"cpe:2.3:a:phpbb_group:phpbb:rc3:*:*:*:*:*:*:*",
"cpe:2.3:a:phpbb_group:phpbb:rc4:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-3gm4-j75g-v7fj
|
Stack overflow vulnerability in function jsi_evalcode_sub in jsish before 3.0.18, allows remote attackers to cause a Denial of Service via a crafted value to the execute parameter.
|
[] | null | null | null | null | null |
|
GHSA-x8pf-qjr3-w5cf
|
Vulnerability in AMSS++ version 4.31, which does not sufficiently encode user-controlled input, resulting in a Cross-Site Scripting (XSS) vulnerability through /amssplus/modules/book/main/select_send_2.php, in multiple parameters. This vulnerability could allow a remote attacker to send a specially crafted URL to an authenticated user and steal their session cookie credentials.
|
[] | null | 7.1 | null | null | null |
|
CVE-2009-0278
|
Sun Java System Application Server (AS) 8.1 and 8.2 allows remote attackers to read the Web Application configuration files in the (1) WEB-INF or (2) META-INF directory via a malformed request.
|
[
"cpe:2.3:a:sun:java_system_application_server:8.1:*:linux:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_application_server:8.1:*:sparc:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_application_server:8.1:*:windows:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_application_server:8.1:*:x86:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_application_server:8.2:*:linux:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_application_server:8.2:*:sparc:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_application_server:8.2:*:windows:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_application_server:8.2:*:x86:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-gfqg-mjpq-p8h5
|
Cross-Site Request Forgery (CSRF) in GitHub repository chiefonboarding/chiefonboarding prior to v2.0.47.
|
[] | null | null | 4.3 | null | null |
|
CVE-2016-0521
|
Unspecified vulnerability in the Oracle iProcurement component in Oracle E-Business Suite 11.5.10.2 allows remote attackers to affect integrity via unknown vectors related to Redirection.
|
[
"cpe:2.3:a:oracle:e-business_suite:11.5.10.2:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
RHSA-2017:1414
|
Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.23 Service Pack 1 for RHEL 6
|
httpd: Padding Oracle in Apache mod_session_crypto httpd: DoS vulnerability in mod_auth_digest openssl: OCSP Status Request extension unbounded memory growth openssl: ECDSA P-256 timing attack key recovery SSL/TLS: Malformed plain-text ALERT packets could cause remote DoS httpd: Incomplete handling of LimitRequestFields directive in mod_http2 httpd: Apache HTTP Request Parsing Whitespace Defects
|
[
"cpe:/a:redhat:jboss_core_services:1::el6"
] | null | null | 4 | null | null |
GHSA-m9gq-w7jg-mrwv
|
In JetBrains ReSharper before 2024.3.4, 2024.2.8, and 2024.1.7, Rider before 2024.3.4, 2024.2.8, and 2024.1.7, dotTrace before 2024.3.4, 2024.2.8, and 2024.1.7, ETW Host Service before 16.43, Local Privilege Escalation via the ETW Host Service was possible
|
[] | null | 7.8 | null | null | null |
|
GHSA-g6q5-rqfh-3jr6
|
The cvtClump function in the rgb2ycbcr tool in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (out-of-bounds write) by setting the "-v" option to -1.
|
[] | null | null | 7.5 | null | null |
|
CVE-2019-11509
|
In Pulse Secure Pulse Connect Secure (PCS) before 8.1R15.1, 8.2 before 8.2R12.1, 8.3 before 8.3R7.1, and 9.0 before 9.0R3.4 and Pulse Policy Secure (PPS) before 5.1R15.1, 5.2 before 5.2R12.1, 5.3 before 5.3R15.1, 5.4 before 5.4R7.1, and 9.0 before 9.0R3.2, an authenticated attacker (via the admin web interface) can exploit Incorrect Access Control to execute arbitrary code on the appliance.
|
[
"cpe:2.3:a:ivanti:connect_secure:8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:8.1:r1.0:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:8.1:r1.1:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:8.1:r10.0:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:8.1:r11.0:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:8.1:r11.1:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:8.1:r12.0:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:8.1:r12.1:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:8.1:r13.0:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:8.1:r14.0:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:8.1:r2.0:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:8.1:r2.1:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:8.1:r3.1:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:8.1:r3.2:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:8.1:r4.0:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:8.1:r4.1:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:8.1:r5.0:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:8.1:r6.0:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:8.1:r7.0:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:8.1:r8.0:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:8.1:r9.0:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:8.1:r9.1:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:8.1:r9.2:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:8.2:r1.0:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:8.2:r1.1:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:8.2:r10.0:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:8.2:r11.0:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:8.2:r12.0:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:8.2:r2.0:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:8.2:r3.0:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:8.2:r3.1:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:8.2:r4.0:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:8.2:r4.1:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:8.2:r5.0:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:8.2:r5.1:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:8.2:r6.0:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:8.2:r7.0:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:8.2:r7.1:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:8.2:r8.0:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:8.2:r8.1:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:8.2:r8.2:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:8.2:r9.0:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:8.3:r1:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:8.3:r2:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:8.3:r2.1:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:8.3:r3:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:8.3:r4:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:8.3:r5:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:8.3:r5.1:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:8.3:r5.2:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:8.3:r6:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:8.3:r6.1:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:8.3:r7:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.0:r1:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.0:r2:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.0:r2.1:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.0:r3:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.0:r3.1:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.0:r3.2:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:policy_secure:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:policy_secure:9.0:r1:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:policy_secure:9.0:r2:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:policy_secure:9.0:r2.1:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:policy_secure:9.0:r3:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:policy_secure:9.0:r3.1:*:*:*:*:*:*",
"cpe:2.3:a:pulsesecure:pulse_policy_secure:5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:pulsesecure:pulse_policy_secure:5.2:r1.0:*:*:*:*:*:*",
"cpe:2.3:a:pulsesecure:pulse_policy_secure:5.2:r10.0:*:*:*:*:*:*",
"cpe:2.3:a:pulsesecure:pulse_policy_secure:5.2:r11.0:*:*:*:*:*:*",
"cpe:2.3:a:pulsesecure:pulse_policy_secure:5.2:r2.0:*:*:*:*:*:*",
"cpe:2.3:a:pulsesecure:pulse_policy_secure:5.2:r3.0:*:*:*:*:*:*",
"cpe:2.3:a:pulsesecure:pulse_policy_secure:5.2:r3.2:*:*:*:*:*:*",
"cpe:2.3:a:pulsesecure:pulse_policy_secure:5.2:r4.0:*:*:*:*:*:*",
"cpe:2.3:a:pulsesecure:pulse_policy_secure:5.2:r5.0:*:*:*:*:*:*",
"cpe:2.3:a:pulsesecure:pulse_policy_secure:5.2:r6.0:*:*:*:*:*:*",
"cpe:2.3:a:pulsesecure:pulse_policy_secure:5.2:r7.0:*:*:*:*:*:*",
"cpe:2.3:a:pulsesecure:pulse_policy_secure:5.2:r7.1:*:*:*:*:*:*",
"cpe:2.3:a:pulsesecure:pulse_policy_secure:5.2:r8.0:*:*:*:*:*:*",
"cpe:2.3:a:pulsesecure:pulse_policy_secure:5.2:r9.0:*:*:*:*:*:*",
"cpe:2.3:a:pulsesecure:pulse_policy_secure:5.2:r9.1:*:*:*:*:*:*",
"cpe:2.3:a:pulsesecure:pulse_policy_secure:5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:pulsesecure:pulse_policy_secure:5.4:r1:*:*:*:*:*:*",
"cpe:2.3:a:pulsesecure:pulse_policy_secure:5.4:r2:*:*:*:*:*:*",
"cpe:2.3:a:pulsesecure:pulse_policy_secure:5.4:r2.1:*:*:*:*:*:*",
"cpe:2.3:a:pulsesecure:pulse_policy_secure:5.4:r3:*:*:*:*:*:*",
"cpe:2.3:a:pulsesecure:pulse_policy_secure:5.4:r4:*:*:*:*:*:*",
"cpe:2.3:a:pulsesecure:pulse_policy_secure:5.4:r5:*:*:*:*:*:*",
"cpe:2.3:a:pulsesecure:pulse_policy_secure:5.4:r5.2:*:*:*:*:*:*",
"cpe:2.3:a:pulsesecure:pulse_policy_secure:5.4:r6:*:*:*:*:*:*",
"cpe:2.3:a:pulsesecure:pulse_policy_secure:5.4:r6.1:*:*:*:*:*:*",
"cpe:2.3:a:pulsesecure:pulse_policy_secure:5.4:r7:*:*:*:*:*:*"
] | null | 8.8 | null | 6.5 | null |
|
GHSA-r7xj-pwvr-9j47
|
Cross-Site Request Forgery (CSRF) vulnerability in Really Simple Security Really Simple SSL allows Cross Site Request Forgery. This issue affects Really Simple SSL: from n/a through 9.1.4.
|
[] | null | 4.3 | null | null | null |
|
GHSA-6xrh-c7j6-5776
|
Acrobat Reader DC version 21.007.20099 (and earlier), 20.004.30017 (and earlier) and 17.011.30204 (and earlier) are affected by a use-after-free vulnerability in the processing of Format event actions that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[] | null | null | null | null | null |
|
GHSA-g82c-4c5m-jmpw
|
SQL injection vulnerability in index.php in TaskFreak! 0.6.1 and earlier allows remote authenticated users to execute arbitrary SQL commands via the sContext parameter.
|
[] | null | null | null | null | null |
|
CVE-2020-26061
|
ClickStudios Passwordstate Password Reset Portal prior to build 8501 is affected by an authentication bypass vulnerability. The ResetPassword function does not validate whether the user has successfully authenticated using security questions. An unauthenticated, remote attacker can send a crafted HTTP request to the /account/ResetPassword page to set a new password for any registered user.
|
[
"cpe:2.3:a:clickstudios:passwordstate:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null |
|
GHSA-8j8g-6gw9-rjrf
|
NAKIVO Backup & Replication before 11.0.0.88174 allows absolute path traversal for reading files via getImageByPath to /c/router (this may lead to remote code execution across the enterprise because PhysicalDiscovery has cleartext credentials).
|
[] | null | 8.6 | null | null | null |
|
GHSA-f4fc-q79g-8f2p
|
Stack-based buffer overflow in the Profinet DCP protocol implementation on the Siemens Scalance S Security Module firewall S602 V2, S612 V2, and S613 V2 with firmware before 2.3.0.3 allows remote attackers to cause a denial of service (device outage) or possibly execute arbitrary code via a crafted DCP frame.
|
[] | null | null | null | null | null |
|
CVE-2025-26568
|
WordPress Easy Amazon Product Information plugin <= 4.0.1 - CSRF to Stored XSS vulnerability
|
Cross-Site Request Forgery (CSRF) vulnerability in jensmueller Easy Amazon Product Information allows Stored XSS. This issue affects Easy Amazon Product Information: from n/a through 4.0.1.
|
[] | null | 7.1 | null | null | null |
RHSA-2003:389
|
Red Hat Security Advisory: kernel security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null | null |
CVE-2013-6812
|
The ONEDC app before 1.7 for iOS does not properly verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
|
[
"cpe:2.3:a:nextdc:onedc:*:-:-:*:-:iphone_os:*:*"
] | null | null | null | 5.8 | null |
|
CVE-2001-1476
|
SSH before 2.0, with RC4 encryption and the "disallow NULL passwords" option enabled, makes it easier for remote attackers to guess portions of user passwords by replaying user sessions with certain modifications, which trigger different messages depending on whether the guess is correct or not.
|
[
"cpe:2.3:a:ssh:ssh:1.2.24:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:ssh:1.2.25:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:ssh:1.2.26:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:ssh:1.2.27:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:ssh:1.2.28:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:ssh:1.2.29:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:ssh:1.2.30:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:ssh:1.2.31:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2020-29062
|
An issue was discovered on CDATA 72408A, 9008A, 9016A, 92408A, 92416A, 9288, 97016, 97024P, 97028P, 97042P, 97084P, 97168P, FD1002S, FD1104, FD1104B, FD1104S, FD1104SN, FD1108S, FD1204S-R2, FD1204SN, FD1204SN-R2, FD1208S-R2, FD1216S-R1, FD1608GS, FD1608SN, FD1616GS, FD1616SN, and FD8000 devices. There is a default blank password for the guest account.
|
[
"cpe:2.3:o:cdatatec:72408a_firmware:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:72408a_firmware:2.4.03_000:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:72408a_firmware:2.4.04_001:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:72408a_firmware:2.4.05_000:*:*:*:*:*:*:*",
"cpe:2.3:h:cdatatec:72408a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:9008a_firmware:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:9008a_firmware:2.4.03_000:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:9008a_firmware:2.4.04_001:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:9008a_firmware:2.4.05_000:*:*:*:*:*:*:*",
"cpe:2.3:h:cdatatec:9008a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:9016a_firmware:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:9016a_firmware:2.4.03_000:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:9016a_firmware:2.4.04_001:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:9016a_firmware:2.4.05_000:*:*:*:*:*:*:*",
"cpe:2.3:h:cdatatec:9016a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:92408a_firmware:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:92408a_firmware:2.4.03_000:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:92408a_firmware:2.4.04_001:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:92408a_firmware:2.4.05_000:*:*:*:*:*:*:*",
"cpe:2.3:h:cdatatec:92408a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:92416a_firmware:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:92416a_firmware:2.4.03_000:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:92416a_firmware:2.4.04_001:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:92416a_firmware:2.4.05_000:*:*:*:*:*:*:*",
"cpe:2.3:h:cdatatec:92416a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:9288_firmware:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:9288_firmware:2.4.03_000:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:9288_firmware:2.4.04_001:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:9288_firmware:2.4.05_000:*:*:*:*:*:*:*",
"cpe:2.3:h:cdatatec:9288:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:97016_firmware:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:97016_firmware:2.4.03_000:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:97016_firmware:2.4.04_001:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:97016_firmware:2.4.05_000:*:*:*:*:*:*:*",
"cpe:2.3:h:cdatatec:97016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:97024p_firmware:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:97024p_firmware:2.4.03_000:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:97024p_firmware:2.4.04_001:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:97024p_firmware:2.4.05_000:*:*:*:*:*:*:*",
"cpe:2.3:h:cdatatec:97024p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:97028p_firmware:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:97028p_firmware:2.4.03_000:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:97028p_firmware:2.4.04_001:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:97028p_firmware:2.4.05_000:*:*:*:*:*:*:*",
"cpe:2.3:h:cdatatec:97028p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:97042p_firmware:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:97042p_firmware:2.4.03_000:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:97042p_firmware:2.4.04_001:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:97042p_firmware:2.4.05_000:*:*:*:*:*:*:*",
"cpe:2.3:h:cdatatec:97042p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:97084p_firmware:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:97084p_firmware:2.4.03_000:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:97084p_firmware:2.4.04_001:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:97084p_firmware:2.4.05_000:*:*:*:*:*:*:*",
"cpe:2.3:h:cdatatec:97084p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:97168p_firmware:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:97168p_firmware:2.4.03_000:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:97168p_firmware:2.4.04_001:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:97168p_firmware:2.4.05_000:*:*:*:*:*:*:*",
"cpe:2.3:h:cdatatec:97168p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1002s_firmware:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1002s_firmware:2.4.03_000:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1002s_firmware:2.4.04_001:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1002s_firmware:2.4.05_000:*:*:*:*:*:*:*",
"cpe:2.3:h:cdatatec:fd1002s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1104_firmware:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1104_firmware:2.4.03_000:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1104_firmware:2.4.04_001:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1104_firmware:2.4.05_000:*:*:*:*:*:*:*",
"cpe:2.3:h:cdatatec:fd1104:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1104b_firmware:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1104b_firmware:2.4.03_000:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1104b_firmware:2.4.04_001:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1104b_firmware:2.4.05_000:*:*:*:*:*:*:*",
"cpe:2.3:h:cdatatec:fd1104b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1104s_firmware:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1104s_firmware:2.4.03_000:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1104s_firmware:2.4.04_001:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1104s_firmware:2.4.05_000:*:*:*:*:*:*:*",
"cpe:2.3:h:cdatatec:fd1104s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1104sn_firmware:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1104sn_firmware:2.4.03_000:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1104sn_firmware:2.4.04_001:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1104sn_firmware:2.4.05_000:*:*:*:*:*:*:*",
"cpe:2.3:h:cdatatec:fd1104sn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1108s_firmware:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1108s_firmware:2.4.03_000:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1108s_firmware:2.4.04_001:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1108s_firmware:2.4.05_000:*:*:*:*:*:*:*",
"cpe:2.3:h:cdatatec:fd1108s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1204s-r2_firmware:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1204s-r2_firmware:2.4.03_000:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1204s-r2_firmware:2.4.04_001:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1204s-r2_firmware:2.4.05_000:*:*:*:*:*:*:*",
"cpe:2.3:h:cdatatec:fd1204s-r2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1204sn_firmware:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1204sn_firmware:2.4.03_000:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1204sn_firmware:2.4.04_001:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1204sn_firmware:2.4.05_000:*:*:*:*:*:*:*",
"cpe:2.3:h:cdatatec:fd1204sn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1204sn-r2_firmware:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1204sn-r2_firmware:2.4.03_000:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1204sn-r2_firmware:2.4.04_001:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1204sn-r2_firmware:2.4.05_000:*:*:*:*:*:*:*",
"cpe:2.3:h:cdatatec:fd1204sn-r2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1208s-r2_firmware:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1208s-r2_firmware:2.4.03_000:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1208s-r2_firmware:2.4.04_001:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1208s-r2_firmware:2.4.05_000:*:*:*:*:*:*:*",
"cpe:2.3:h:cdatatec:fd1208s-r2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1216s-r1_firmware:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1216s-r1_firmware:2.4.03_000:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1216s-r1_firmware:2.4.04_001:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1216s-r1_firmware:2.4.05_000:*:*:*:*:*:*:*",
"cpe:2.3:h:cdatatec:fd1216s-r1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1608gs_firmware:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1608gs_firmware:2.4.03_000:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1608gs_firmware:2.4.04_001:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1608gs_firmware:2.4.05_000:*:*:*:*:*:*:*",
"cpe:2.3:h:cdatatec:fd1608gs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1608sn_firmware:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1608sn_firmware:2.4.03_000:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1608sn_firmware:2.4.04_001:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1608sn_firmware:2.4.05_000:*:*:*:*:*:*:*",
"cpe:2.3:h:cdatatec:fd1608sn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1616gs_firmware:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1616gs_firmware:2.4.03_000:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1616gs_firmware:2.4.04_001:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1616gs_firmware:2.4.05_000:*:*:*:*:*:*:*",
"cpe:2.3:h:cdatatec:fd1616gs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1616sn_firmware:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1616sn_firmware:2.4.03_000:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1616sn_firmware:2.4.04_001:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd1616sn_firmware:2.4.05_000:*:*:*:*:*:*:*",
"cpe:2.3:h:cdatatec:fd1616sn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd8000_firmware:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd8000_firmware:2.4.03_000:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd8000_firmware:2.4.04_001:*:*:*:*:*:*:*",
"cpe:2.3:o:cdatatec:fd8000_firmware:2.4.05_000:*:*:*:*:*:*:*",
"cpe:2.3:h:cdatatec:fd8000:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 | null |
|
GHSA-mh89-qc88-2rhh
|
Draytek Vigor 3910 v4.3.2.6 was discovered to contain a buffer overflow in the saveitem parameter at lan2lan.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.
|
[] | null | 7.5 | null | null | null |
|
GHSA-w5jp-mx9h-36w9
|
A vulnerability has been found in EnGenius ENH1350EXT, ENS500-AC and ENS620EXT up to 20241118 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /admin/network/ajax_getChannelList. The manipulation of the argument countryCode leads to command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
|
[] | 5.1 | 4.7 | null | null | null |
|
GHSA-v69j-fpvc-hw57
|
Remote Procedure Call Runtime Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-28327, CVE-2021-28329, CVE-2021-28330, CVE-2021-28331, CVE-2021-28332, CVE-2021-28333, CVE-2021-28335, CVE-2021-28336, CVE-2021-28337, CVE-2021-28338, CVE-2021-28339, CVE-2021-28340, CVE-2021-28341, CVE-2021-28342, CVE-2021-28343, CVE-2021-28344, CVE-2021-28345, CVE-2021-28346, CVE-2021-28352, CVE-2021-28353, CVE-2021-28354, CVE-2021-28355, CVE-2021-28356, CVE-2021-28357, CVE-2021-28358, CVE-2021-28434.
|
[] | null | 8.8 | null | null | null |
|
GHSA-h3w2-65pw-69gj
|
SQL injection vulnerability in print_raincheck.php in phpRAINCHECK 1.0.1 and earlier allows remote attackers to execute arbitrary SQL commands via the id parameter.
|
[] | null | null | null | null | null |
|
GHSA-xrrw-wm7v-5p7r
|
Apple iPhone OS 1.0 through 2.2.1 and iPhone OS for iPod touch 1.1 through 2.2.1 stores an exception for a hostname when the user accepts an untrusted Exchange server certificate, which causes it to be accepted without prompting in future usage and allows remote Exchange servers to obtain sensitive information such as credentials.
|
[] | null | null | null | null | null |
|
CVE-2023-37954
|
A cross-site request forgery (CSRF) vulnerability in Jenkins Rebuilder Plugin 320.v5a_0933a_e7d61 and earlier allows attackers to rebuild a previous build.
|
[
"cpe:2.3:a:jenkins:rebuilder:*:*:*:*:*:jenkins:*:*"
] | null | 4.3 | null | null | null |
|
CVE-2010-1444
|
The ZIP archive decompressor in VideoLAN VLC media player before 1.0.6 allows remote attackers to cause a denial of service (invalid memory access and application crash) or possibly execute arbitrary code via a crafted archive.
|
[
"cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:0.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:0.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:0.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:0.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:0.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:0.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:0.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:0.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:0.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:0.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:0.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:0.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:0.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:0.8.4:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:0.8.4a:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:0.8.5:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:0.8.6:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:0.8.6a:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:0.8.6b:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:0.8.6c:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:0.8.6d:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:0.8.6e:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:0.8.6f:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:0.8.6g:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:0.8.6h:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:0.8.6i:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:0.8.1337:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:0.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:0.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:0.9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:0.9.4:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:0.9.5:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:0.9.6:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:0.9.8a:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:0.9.9:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:0.9.9a:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:0.9.10:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:1.0.4:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-55x8-6f5x-9xx6
|
Microsoft MPEG-2 Video Extension Remote Code Execution Vulnerability
|
[] | null | 7.8 | null | null | null |
|
CVE-2009-2240
|
Cross-site scripting (XSS) vulnerability in AD2000 free-sw leger (aka Web Conference Room Free) 1.6.4 and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
|
[
"cpe:2.3:a:ad2000:free-sw_leger:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
CVE-2022-28116
|
Online Banking System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter.
|
[
"cpe:2.3:a:online_banking_system_project:online_banking_system:1.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 | null |
|
CVE-2016-1560
|
ExaGrid appliances with firmware before 4.8 P26 have a default password of (1) inflection for the root shell account and (2) support for the support account in the web interface, which allows remote attackers to obtain administrative access via an SSH or HTTP session.
|
[
"cpe:2.3:o:exagrid:ex3000_firmware:4.8:*:*:*:*:*:*:*",
"cpe:2.3:h:exagrid:ex3000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:exagrid:ex5000_firmware:4.8:*:*:*:*:*:*:*",
"cpe:2.3:h:exagrid:ex5000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:exagrid:ex7000_firmware:4.8:*:*:*:*:*:*:*",
"cpe:2.3:h:exagrid:ex7000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:exagrid:ex10000e_firmware:4.8:*:*:*:*:*:*:*",
"cpe:2.3:h:exagrid:ex10000e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:exagrid:ex13000e_firmware:4.8:*:*:*:*:*:*:*",
"cpe:2.3:h:exagrid:ex13000e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:exagrid:ex21000e_firmware:4.8:*:*:*:*:*:*:*",
"cpe:2.3:h:exagrid:ex21000e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:exagrid:ex32000e_firmware:4.8:*:*:*:*:*:*:*",
"cpe:2.3:h:exagrid:ex32000e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:exagrid:ex40000e_firmware:4.8:*:*:*:*:*:*:*",
"cpe:2.3:h:exagrid:ex40000e:-:*:*:*:*:*:*:*"
] | null | null | 9.8 | 10 | null |
|
CVE-2010-0408
|
The ap_proxy_ajp_request function in mod_proxy_ajp.c in mod_proxy_ajp in the Apache HTTP Server 2.2.x before 2.2.15 does not properly handle certain situations in which a client sends no request body, which allows remote attackers to cause a denial of service (backend server outage) via a crafted request, related to use of a 500 error code instead of the appropriate 400 error code.
|
[
"cpe:2.3:a:apache:http_server:2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:2.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:2.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:2.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:2.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:2.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:2.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:2.2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:2.2.11:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:2.2.12:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:2.2.13:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:2.2.14:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-2f8j-394w-hvgc
|
An issue was discovered on certain GL-iNet devices, including MT6000, MT3000, MT2500, AXT1800, and AX1800 4.6.2. The SID generated for a specific user is not tied to that user itself, which allows other users to potentially use it for authentication. Once an attacker bypasses the application's authentication procedures, they can generate a valid SID, escalate privileges, and gain full control.
|
[] | null | 8 | null | null | null |
|
GHSA-49v2-h77h-w34h
|
Apache HTTP Server, when running on Linux with a document root on a Windows share mounted using smbfs, allows remote attackers to obtain unprocessed content such as source files for .php programs via a trailing "\" (backslash), which is not handled by the intended AddType directive.
|
[] | null | null | null | null | null |
|
CVE-2006-6436
|
Cross-site scripting (XSS) vulnerability in the Network controller in Xerox WorkCentre and WorkCentre Pro before 12.050.03.000, 13.x before 13.050.03.000, and 14.x before 14.050.03.000 allows remote attackers to inject arbitrary web script or HTML via HTTP TRACE messages.
|
[
"cpe:2.3:h:xerox:workcentre_232:*:*:*:*:*:*:*:*",
"cpe:2.3:h:xerox:workcentre_232:*:*:pro:*:*:*:*:*",
"cpe:2.3:h:xerox:workcentre_238:*:*:*:*:*:*:*:*",
"cpe:2.3:h:xerox:workcentre_238:*:*:pro:*:*:*:*:*",
"cpe:2.3:h:xerox:workcentre_245:*:*:*:*:*:*:*:*",
"cpe:2.3:h:xerox:workcentre_245:*:*:pro:*:*:*:*:*",
"cpe:2.3:h:xerox:workcentre_255:*:*:*:*:*:*:*:*",
"cpe:2.3:h:xerox:workcentre_255:*:*:pro:*:*:*:*:*",
"cpe:2.3:h:xerox:workcentre_265:*:*:*:*:*:*:*:*",
"cpe:2.3:h:xerox:workcentre_265:*:*:pro:*:*:*:*:*",
"cpe:2.3:h:xerox:workcentre_275:*:*:*:*:*:*:*:*",
"cpe:2.3:h:xerox:workcentre_275:*:*:pro:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
GHSA-h66h-vhxh-6fr4
|
GPAC v2.3-DEV-rev566-g50c2ab06f-master was discovered to contain a double free via the gf_filterpacket_del function at /gpac/src/filter_core/filter.c.
|
[] | null | 7.8 | null | null | null |
|
RHSA-2013:0579
|
Red Hat Security Advisory: rhev-hypervisor6 security, bug fix, and enhancement update
|
libvirt+dnsmasq: DNS configured to answer DNS queries from non-virtual networks kernel: block: default SCSI command filter does not accomodate commands overlap across device classes kernel: vhost: fix length for cross region descriptor
|
[
"cpe:/o:redhat:enterprise_linux:6::hypervisor"
] | null | null | null | null | null |
CVE-2001-1217
|
Directory traversal vulnerability in PL/SQL Apache module in Oracle Oracle 9i Application Server allows remote attackers to access sensitive information via a double encoded URL with .. (dot dot) sequences.
|
[
"cpe:2.3:a:oracle:application_server:1.0.2:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
CVE-2024-7531
|
Calling `PK11_Encrypt()` in NSS using CKM_CHACHA20 and the same buffer for input and output can result in plaintext on an Intel Sandy Bridge processor. In Firefox this only affects the QUIC header protection feature when the connection is using the ChaCha20-Poly1305 cipher suite. The most likely outcome is connection failure, but if the connection persists despite the high packet loss it could be possible for a network observer to identify packets as coming from the same source despite a network path change. This vulnerability affects Firefox < 129, Firefox ESR < 115.14, and Firefox ESR < 128.1.
|
[
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:128.0:*:*:*:*:*:*:*"
] | null | 6.3 | null | null | null |
|
CVE-2017-18160
|
AGPS session failure in GNSS module due to cyphersuites are hardcoded and needed manual update everytime in snapdragon mobile and snapdragon wear in versions MDM9635M, MDM9645, MDM9650, MDM9655, MSM8909W, SD 835, SD 845, SD 850
|
[
"cpe:2.3:o:qualcomm:mdm9635m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9635m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9645_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9645:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9650:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9655_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9655:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8909w_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8909w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_835_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_835:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_845_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_845:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_850_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_850:-:*:*:*:*:*:*:*"
] | null | null | 9.8 | 10 | null |
|
CVE-2017-14301
|
STDU Viewer 1.6.375 allows attackers to execute arbitrary code or cause a denial of service via a crafted .jb2 file, related to "Data from Faulting Address controls subsequent Write Address starting at STDUJBIG2File!DllUnregisterServer+0x00000000000076d3."
|
[
"cpe:2.3:a:stdutility:stdu_viewer:1.6.375:*:*:*:*:*:*:*"
] | null | null | 7.8 | 4.6 | null |
|
RHSA-2011:0350
|
Red Hat Security Advisory: tomcat5 and tomcat6 security update
|
JDK Double.parseDouble Denial-Of-Service tomcat: remote DoS via NIO connector
|
[
"cpe:/a:redhat:jboss_enterprise_web_server:1.0"
] | null | null | null | null | null |
GHSA-4cxp-jjp3-3qpw
|
WordPress before 4.8.3 is affected by an issue where $wpdb->prepare() can create unexpected and unsafe queries leading to potential SQL injection (SQLi) in plugins and themes, as demonstrated by a "double prepare" approach, a different vulnerability than CVE-2017-14723.
|
[] | null | null | 9.8 | null | null |
|
CVE-2022-3716
|
SourceCodester Online Medicine Ordering System cross site scripting
|
A vulnerability classified as problematic was found in SourceCodester Online Medicine Ordering System 1.0. Affected by this vulnerability is an unknown functionality of the file /omos/admin/?page=user/list. The manipulation of the argument First Name/Middle Name/Last Name leads to cross site scripting. The attack can be launched remotely. The associated identifier of this vulnerability is VDB-212347.
|
[
"cpe:2.3:a:oretnom23:online_medicine_ordering_system:1.0:*:*:*:*:*:*:*"
] | null | 3.5 | null | null | null |
GHSA-wq2c-7m9f-vjwv
|
Unrestricted file upload vulnerability in admin/upload.php in Benja CMS 0.1 allows remote attackers to upload and execute arbitrary PHP files via unspecified vectors, followed by a direct request to the file in billeder/.
|
[] | null | null | null | null | null |
|
CVE-2017-12141
|
In ytnef 1.9.2, a heap-based buffer overflow vulnerability was found in the function TNEFFillMapi in ytnef.c, which allows attackers to cause a denial of service via a crafted file.
|
[
"cpe:2.3:a:ytnef_project:ytnef:1.9.2:*:*:*:*:*:*:*"
] | null | null | 5.5 | 4.3 | null |
|
CVE-2018-3213
|
Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: Docker Images). The supported version that is affected is prior to Docker 12.2.1.3.20180913. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3 to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle WebLogic Server accessible data. CVSS 3.0 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
|
[
"cpe:2.3:a:oracle:weblogic_server:*:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 | null |
|
CVE-2017-1000498
|
AndroidSVG version 1.2.2 is vulnerable to XXE attacks in the SVG parsing component resulting in denial of service and possibly remote code execution
|
[
"cpe:2.3:a:androidsvg_project:androidsvg:1.2.2:-:*:*:*:*:*:*"
] | null | 7.8 | null | 6.8 | null |
|
RHSA-2012:1380
|
Red Hat Security Advisory: python-django-horizon security update
|
OpenStack-Horizon: Open redirect through 'next' parameter
|
[
"cpe:/a:redhat:openstack:1::el6"
] | null | null | null | null | null |
GHSA-wr4x-7qhj-2g7g
|
The PRNG implementation in the DNS resolver in Bionic in Android before 4.1.1 incorrectly uses time and PID information during the generation of random numbers for query ID values and UDP source ports, which makes it easier for remote attackers to spoof DNS responses by guessing these numbers, a related issue to CVE-2015-0800.
|
[] | null | null | null | null | null |
|
CVE-2012-6090
|
Multiple stack-based buffer overflows in the expand function in os/pl-glob.c in SWI-Prolog before 6.2.5 and 6.3.x before 6.3.7 allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted filename.
|
[
"cpe:2.3:a:swi-prolog:swi-prolog:*:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:5.6.50:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:5.6.51:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:5.6.52:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:5.6.53:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:5.6.54:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:5.6.55:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:5.6.56:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:5.6.57:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:5.6.58:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:5.6.59:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:5.6.61:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:5.6.62:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:5.6.63:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:5.6.64:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:5.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:5.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:5.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:5.8.3:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:5.10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:5.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:5.10.2:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:5.10.3:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:5.10.4:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:5.10.5:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:6.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:6.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:6.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:6.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:6.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:6.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:6.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:6.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:6.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:6.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:6.3.6:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2008-5035
|
The Resource Monitoring and Control (RMC) daemon in IBM Hardware Management Console (HMC) 7 release 3.2.0 SP1 and 3.3.0 SP2 allows remote attackers to cause a denial of service (daemon crash or hang) via a packet with an invalid length.
|
[
"cpe:2.3:a:ibm:hardware_management_console:3.2.0:sp1:*:*:*:*:*:*",
"cpe:2.3:a:ibm:hardware_management_console:3.3.0:sp2:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-j4cv-xr5r-hq23
|
In the Linux kernel, the following vulnerability has been resolved:mm/hugetlb: fix missing hugetlb_lock for resv unchargeThere is a recent report on UFFDIO_COPY over hugetlb:https://lore.kernel.org/all/[email protected]/350: lockdep_assert_held(&hugetlb_lock);Should be an issue in hugetlb but triggered in an userfault context, where
it goes into the unlikely path where two threads modifying the resv map
together. Mike has a fix in that path for resv uncharge but it looks like
the locking criteria was overlooked: hugetlb_cgroup_uncharge_folio_rsvd()
will update the cgroup pointer, so it requires to be called with the lock
held.
|
[] | null | null | null | null | null |
|
CVE-2021-44476
|
A sandboxing issue in Odoo Community 15.0 and earlier and Odoo Enterprise 15.0 and earlier allows authenticated administrators to read local files on the server, including sensitive configuration files.
|
[
"cpe:2.3:a:odoo:odoo:*:*:*:*:community:*:*:*",
"cpe:2.3:a:odoo:odoo:*:*:*:*:enterprise:*:*:*"
] | null | null | 6.8 | null | null |
|
CVE-2025-24301
|
Arkcompiler Ets Runtime has an UAF vulnerability
|
in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through use after free. This vulnerability can be exploited only in restricted scenarios.
|
[] | null | 3.8 | null | null | null |
CVE-2021-28464
|
VP9 Video Extensions Remote Code Execution Vulnerability
|
VP9 Video Extensions Remote Code Execution Vulnerability
|
[
"cpe:2.3:a:microsoft:vp9_video_extensions:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
GHSA-hx58-x97g-cc9p
|
** DISPUTED ** The Bitcoin Proof-of-Work algorithm does not consider a certain attack methodology related to 80-byte block headers with a variety of initial 64-byte chunks followed by the same 16-byte chunk, multiple candidate root values ending with the same 4 bytes, and calculations involving sqrt numbers. This violates the security assumptions of (1) the choice of input, outside of the dedicated nonce area, fed into the Proof-of-Work function should not change its difficulty to evaluate and (2) every Proof-of-Work function execution should be independent. NOTE: a number of persons feel that this methodology is a benign mining optimization, not a vulnerability.
|
[] | null | null | 7.5 | null | null |
|
GHSA-fj57-vhrc-73r7
|
Joomla! vulnerable to Cross-site Scripting
|
Multiple cross-site scripting (XSS) vulnerabilities in the back end in Joomla! 1.5 through 1.5.17 allow remote attackers to inject arbitrary web script or HTML via unknown vectors related to "various administrator screens," possibly the search parameter in administrator/index.php.
|
[] | null | null | null | null | null |
CVE-2022-3450
|
Use after free in Peer Connection in Google Chrome prior to 106.0.5249.119 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | null | null |
|
GHSA-v4mq-p756-p4f5
|
Play Framework's Assets controller vulnerable to directory traversal
|
A directory traversal vulnerability has been found in the Assets controller in Play Framework 2.6.12 through 2.6.15 (fixed in 2.6.16) when running on Windows. It allows a remote attacker to download arbitrary files from the target server via specially crafted HTTP requests.
|
[] | null | null | 7.5 | null | null |
RHSA-2021:2313
|
Red Hat Security Advisory: samba security and bug fix update
|
samba: Negative idmap cache entries can cause incorrect group entries in the Samba file server process token
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 6.8 | null | null | null |
CVE-2023-5504
|
The BackWPup plugin for WordPress is vulnerable to Directory Traversal in versions up to, and including, 4.0.1 via the Log File Folder. This allows authenticated attackers to store backups in arbitrary folders on the server provided they can be written to by the server. Additionally, default settings will place an index.php and a .htaccess file into the chosen directory (unless already present) when the first backup job is run that are intended to prevent directory listing and file access. This means that an attacker could set the backup directory to the root of another site in a shared environment and thus disable that site.
|
[
"cpe:2.3:a:inpsyde:backwpup:*:*:*:*:*:wordpress:*:*"
] | null | 8.7 | null | null | null |
|
GHSA-cpp5-h7pc-fp83
|
Reflected XSS in business intelligence in Checkmk <2.2.0p8, <2.1.0p32, <2.0.0p38, <=1.6.0p30.
|
[] | null | 5.4 | null | null | null |
|
GHSA-cj46-35hf-rv96
|
In PHP versions before 7.4.31, 8.0.24 and 8.1.11, the phar uncompressor code would recursively uncompress "quines" gzip files, resulting in an infinite loop.
|
[] | null | 5.5 | null | null | null |
|
CVE-2007-0252
|
Unspecified vulnerability in easy-content filemanager allows remote attackers to upload or modify arbitrary files via unspecified vectors.
|
[
"cpe:2.3:a:easy-content_filemanager:easy-content_filemanager:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-p6fg-9q8x-647w
|
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Leap Contractor Contact Form Website to Workflow Tool plugin <= 4.0.0 versions.
|
[] | null | 7.1 | null | null | null |
|
GHSA-34gq-5fpf-r3h5
|
TOTOLINK A3100R V4.1.2cu.5050_B20200504 and V4.1.2cu.5247_B20211129 were discovered to contain a stack overflow via the comment parameter in the function setIpQosRules. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request.
|
[] | null | 7.5 | null | null | null |
|
CVE-2006-3886
|
SQL injection vulnerability in Shalwan MusicBox 2.3.4 and earlier allows remote attackers to execute arbitrary SQL commands via the page parameter in a viewgallery action in a request for the top-level URI. NOTE: the start parameter/search action is already covered by CVE-2006-1807, and the show parameter/top action is already covered by CVE-2006-1360.
|
[
"cpe:2.3:a:musicbox:musicbox:2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:musicbox:musicbox:2.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:musicbox:musicbox:2.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:musicbox:musicbox:2.3_beta_2:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2024-8578
|
TOTOLINK AC1200 T8 cstecgi.cgi setWiFiMeshName buffer overflow
|
A vulnerability was found in TOTOLINK AC1200 T8 4.1.5cu.861_B20230220. It has been rated as critical. Affected by this issue is the function setWiFiMeshName of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument device_name leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
|
[
"cpe:2.3:o:totolink:ac1200_t8_firmware:4.1.5cu.861_b20230220:*:*:*:*:*:*:*",
"cpe:2.3:o:totolink:t8_firmware:4.1.5cu.861_b20230220:*:*:*:*:*:*:*",
"cpe:2.3:h:totolink:t8:-:*:*:*:*:*:*:*"
] | 8.7 | 8.8 | 8.8 | 9 | null |
CVE-2004-2346
|
Multiple cross-site scripting (XSS) vulnerabilities in Forum Web Server 1.6 and earlier allow remote attackers to inject arbitrary web script or HTML via (1) the Subject field in post1.htm and (2) the File Description field in postfile2.htm.
|
[
"cpe:2.3:a:minihttpserver.net:forum_web_server:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
CVE-2024-6633
|
Insecure Default in FileCatalyst Workflow 5.1.6 Build 139 (and earlier)
|
The default credentials for the setup HSQL database (HSQLDB) for FileCatalyst Workflow are published in a vendor knowledgebase article. Misuse of these credentials could lead to a compromise of confidentiality, integrity, or availability of the software.
The HSQLDB is only included to facilitate installation, has been deprecated, and is not intended for production use per vendor guides. However, users who have not configured FileCatalyst Workflow to use an alternative database per recommendations are vulnerable to attack from any source that can reach the HSQLDB.
|
[
"cpe:2.3:a:fortra:filecatalyst_workflow:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
CVE-2025-24806
|
Regulation applies separately to Username-based logins to Email-based logins in authelia
|
Authelia is an open-source authentication and authorization server providing two-factor authentication and single sign-on (SSO) for applications via a web portal. If users are allowed to sign in via both username and email the regulation system treats these as separate login events. This leads to the regulation limitations being effectively doubled assuming an attacker using brute-force to find a user password. It's important to note that due to the effective operation of regulation where no user-facing sign of their regulation ban being visible either via timing or via API responses, it's effectively impossible to determine if a failure occurs due to a bad username password combination, or a effective ban blocking the attempt which heavily mitigates any form of brute-force. This occurs because the records and counting process for this system uses the method utilized for sign in rather than the effective username attribute. This has a minimal impact on account security, this impact is increased naturally in scenarios when there is no two-factor authentication required and weak passwords are used. This makes it a bit easier to brute-force a password. A patch for this issue has been applied to versions 4.38.19, and 4.39.0. Users are advised to upgrade. Users unable to upgrade should 1. Not heavily modify the default settings in a way that ends up with shorter or less frequent regulation bans. The default settings effectively mitigate any potential for this issue to be exploited. and 2. Disable the ability for users to login via an email address.
|
[] | 2.3 | null | null | null | null |
GHSA-jfpm-rpx4-72wc
|
adbyby v2.7 allows external users to make connections via port 8118. This can cause a program logic error and lead to a Denial of Service (DoS) via high CPU usage due to a large number of connections.
|
[] | null | 6.5 | null | null | null |
|
CVE-2024-40801
|
A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Sonoma 14.7, macOS Sequoia 15. An app may be able to access protected user data.
|
[
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
|
GHSA-c82h-4vv7-76g8
|
A stored Cross-site Scripting (XSS) vulnerability affecting ENOVIA Collaborative Industry Innovator from Release 3DEXPERIENCE R2022x through Release 3DEXPERIENCE R2024x allows an attacker to execute arbitrary script code in user's browser session.
|
[] | null | 8.7 | null | null | null |
|
CVE-2025-43739
|
Liferay Portal 7.4.0 through 7.4.3.132, and Liferay DXP 2025.Q1.0 through 2025.Q1.6, 2024.Q4.0 through 2024.Q4.7, 2024.Q3.1 through 2024.Q3.13, 2024.Q2.0 through 2024.Q2.13, 2024.Q1.1 through 2024.Q1.16 and 7.4 GA through update 92 allow any authenticated user to modify the content of emails sent through the calendar portlet, allowing an attacker to send phishing emails to any other user in the same organization.
|
[] | 5.3 | null | null | null | null |
|
CVE-2024-35724
|
WordPress Bosa Elementor Addons and Templates for WooCommerce plugin <= 1.0.12 - Broken Access Control vulnerability
|
Missing Authorization vulnerability in Bosa Themes Bosa Elementor Addons and Templates for WooCommerce.This issue affects Bosa Elementor Addons and Templates for WooCommerce: from n/a through 1.0.12.
|
[
"cpe:2.3:a:bosathemes:bosa_elementor_addons_and_templates_for_woocommerce:*:*:*:*:*:wordpress:*:*"
] | null | 4.3 | null | null | null |
GHSA-r6pf-3j3c-px2j
|
In libstagefright, there is a possible dead loop due to an uncaught exception. This could lead to remote denial of service with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-124783982
|
[] | null | null | null | null | null |
|
CVE-2021-22719
|
A CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability exists in C-Bus Toolkit (V1.15.7 and prior) that could allow a remote code execution when a file is uploaded.
|
[
"cpe:2.3:a:schneider-electric:c-bus_toolkit:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.5 | null |
|
CVE-2022-23119
|
A directory traversal vulnerability in Trend Micro Deep Security and Cloud One - Workload Security Agent for Linux version 20 and below could allow an attacker to read arbitrary files from the file system. Please note: an attacker must first obtain compromised access to the target Deep Security Manager (DSM) or the target agent must be not yet activated or configured in order to exploit this vulnerability.
|
[
"cpe:2.3:a:trendmicro:deep_security_agent:*:*:*:*:long_term_support:*:*:*",
"cpe:2.3:a:trendmicro:deep_security_agent:10.0:-:*:*:long_term_support:*:*:*",
"cpe:2.3:a:trendmicro:deep_security_agent:10.0:update1:*:*:long_term_support:*:*:*",
"cpe:2.3:a:trendmicro:deep_security_agent:10.0:update10:*:*:long_term_support:*:*:*",
"cpe:2.3:a:trendmicro:deep_security_agent:10.0:update11:*:*:long_term_support:*:*:*",
"cpe:2.3:a:trendmicro:deep_security_agent:10.0:update12:*:*:long_term_support:*:*:*",
"cpe:2.3:a:trendmicro:deep_security_agent:10.0:update13:*:*:long_term_support:*:*:*",
"cpe:2.3:a:trendmicro:deep_security_agent:10.0:update14:*:*:long_term_support:*:*:*",
"cpe:2.3:a:trendmicro:deep_security_agent:10.0:update15:*:*:long_term_support:*:*:*",
"cpe:2.3:a:trendmicro:deep_security_agent:10.0:update16:*:*:long_term_support:*:*:*",
"cpe:2.3:a:trendmicro:deep_security_agent:10.0:update17:*:*:long_term_support:*:*:*",
"cpe:2.3:a:trendmicro:deep_security_agent:10.0:update18:*:*:long_term_support:*:*:*",
"cpe:2.3:a:trendmicro:deep_security_agent:10.0:update19:*:*:long_term_support:*:*:*",
"cpe:2.3:a:trendmicro:deep_security_agent:10.0:update2:*:*:long_term_support:*:*:*",
"cpe:2.3:a:trendmicro:deep_security_agent:10.0:update20:*:*:long_term_support:*:*:*",
"cpe:2.3:a:trendmicro:deep_security_agent:10.0:update21:*:*:long_term_support:*:*:*",
"cpe:2.3:a:trendmicro:deep_security_agent:10.0:update22:*:*:long_term_support:*:*:*",
"cpe:2.3:a:trendmicro:deep_security_agent:10.0:update23:*:*:long_term_support:*:*:*",
"cpe:2.3:a:trendmicro:deep_security_agent:10.0:update24:*:*:long_term_support:*:*:*",
"cpe:2.3:a:trendmicro:deep_security_agent:10.0:update25:*:*:long_term_support:*:*:*",
"cpe:2.3:a:trendmicro:deep_security_agent:10.0:update26:*:*:long_term_support:*:*:*",
"cpe:2.3:a:trendmicro:deep_security_agent:10.0:update27:*:*:long_term_support:*:*:*",
"cpe:2.3:a:trendmicro:deep_security_agent:10.0:update28:*:*:long_term_support:*:*:*",
"cpe:2.3:a:trendmicro:deep_security_agent:10.0:update29:*:*:long_term_support:*:*:*",
"cpe:2.3:a:trendmicro:deep_security_agent:10.0:update3:*:*:long_term_support:*:*:*",
"cpe:2.3:a:trendmicro:deep_security_agent:10.0:update30:*:*:long_term_support:*:*:*",
"cpe:2.3:a:trendmicro:deep_security_agent:10.0:update31:*:*:long_term_support:*:*:*",
"cpe:2.3:a:trendmicro:deep_security_agent:10.0:update4:*:*:long_term_support:*:*:*",
"cpe:2.3:a:trendmicro:deep_security_agent:10.0:update5:*:*:long_term_support:*:*:*",
"cpe:2.3:a:trendmicro:deep_security_agent:10.0:update6:*:*:long_term_support:*:*:*",
"cpe:2.3:a:trendmicro:deep_security_agent:10.0:update7:*:*:long_term_support:*:*:*",
"cpe:2.3:a:trendmicro:deep_security_agent:10.0:update8:*:*:long_term_support:*:*:*",
"cpe:2.3:a:trendmicro:deep_security_agent:10.0:update9:*:*:long_term_support:*:*:*",
"cpe:2.3:a:trendmicro:deep_security_agent:11.0:-:*:*:long_term_support:*:*:*",
"cpe:2.3:a:trendmicro:deep_security_agent:11.0:update1:*:*:long_term_support:*:*:*",
"cpe:2.3:a:trendmicro:deep_security_agent:11.0:update10:*:*:long_term_support:*:*:*",
"cpe:2.3:a:trendmicro:deep_security_agent:11.0:update11:*:*:long_term_support:*:*:*",
"cpe:2.3:a:trendmicro:deep_security_agent:11.0:update12:*:*:long_term_support:*:*:*",
"cpe:2.3:a:trendmicro:deep_security_agent:11.0:update13:*:*:long_term_support:*:*:*",
"cpe:2.3:a:trendmicro:deep_security_agent:11.0:update14:*:*:long_term_support:*:*:*",
"cpe:2.3:a:trendmicro:deep_security_agent:11.0:update15:*:*:long_term_support:*:*:*",
"cpe:2.3:a:trendmicro:deep_security_agent:11.0:update16:*:*:long_term_support:*:*:*",
"cpe:2.3:a:trendmicro:deep_security_agent:11.0:update17:*:*:long_term_support:*:*:*",
"cpe:2.3:a:trendmicro:deep_security_agent:11.0:update18:*:*:long_term_support:*:*:*",
"cpe:2.3:a:trendmicro:deep_security_agent:11.0:update19:*:*:long_term_support:*:*:*",
"cpe:2.3:a:trendmicro:deep_security_agent:11.0:update2:*:*:long_term_support:*:*:*",
"cpe:2.3:a:trendmicro:deep_security_agent:11.0:update20:*:*:long_term_support:*:*:*",
"cpe:2.3:a:trendmicro:deep_security_agent:11.0:update21:*:*:long_term_support:*:*:*",
"cpe:2.3:a:trendmicro:deep_security_agent:11.0:update22:*:*:long_term_support:*:*:*",
"cpe:2.3:a:trendmicro:deep_security_agent:11.0:update23:*:*:long_term_support:*:*:*",
"cpe:2.3:a:trendmicro:deep_security_agent:11.0:update24:*:*:long_term_support:*:*:*",
"cpe:2.3:a:trendmicro:deep_security_agent:11.0:update25:*:*:long_term_support:*:*:*",
"cpe:2.3:a:trendmicro:deep_security_agent:11.0:update26:*:*:long_term_support:*:*:*",
"cpe:2.3:a:trendmicro:deep_security_agent:11.0:update27:*:*:long_term_support:*:*:*",
"cpe:2.3:a:trendmicro:deep_security_agent:11.0:update3:*:*:long_term_support:*:*:*",
"cpe:2.3:a:trendmicro:deep_security_agent:11.0:update4:*:*:long_term_support:*:*:*",
"cpe:2.3:a:trendmicro:deep_security_agent:11.0:update5:*:*:long_term_support:*:*:*",
"cpe:2.3:a:trendmicro:deep_security_agent:11.0:update6:*:*:long_term_support:*:*:*",
"cpe:2.3:a:trendmicro:deep_security_agent:11.0:update7:*:*:long_term_support:*:*:*",
"cpe:2.3:a:trendmicro:deep_security_agent:11.0:update8:*:*:long_term_support:*:*:*",
"cpe:2.3:a:trendmicro:deep_security_agent:11.0:update9:*:*:long_term_support:*:*:*",
"cpe:2.3:a:trendmicro:deep_security_agent:12.0:-:*:*:long_term_support:*:*:*",
"cpe:2.3:a:trendmicro:deep_security_agent:12.0:update1:*:*:long_term_support:*:*:*",
"cpe:2.3:a:trendmicro:deep_security_agent:12.0:update10:*:*:long_term_support:*:*:*",
"cpe:2.3:a:trendmicro:deep_security_agent:12.0:update11:*:*:long_term_support:*:*:*",
"cpe:2.3:a:trendmicro:deep_security_agent:12.0:update12:*:*:long_term_support:*:*:*",
"cpe:2.3:a:trendmicro:deep_security_agent:12.0:update13:*:*:long_term_support:*:*:*",
"cpe:2.3:a:trendmicro:deep_security_agent:12.0:update14:*:*:long_term_support:*:*:*",
"cpe:2.3:a:trendmicro:deep_security_agent:12.0:update15:*:*:long_term_support:*:*:*",
"cpe:2.3:a:trendmicro:deep_security_agent:12.0:update16:*:*:long_term_support:*:*:*",
"cpe:2.3:a:trendmicro:deep_security_agent:12.0:update17:*:*:long_term_support:*:*:*",
"cpe:2.3:a:trendmicro:deep_security_agent:12.0:update18:*:*:long_term_support:*:*:*",
"cpe:2.3:a:trendmicro:deep_security_agent:12.0:update19:*:*:long_term_support:*:*:*",
"cpe:2.3:a:trendmicro:deep_security_agent:12.0:update2:*:*:long_term_support:*:*:*",
"cpe:2.3:a:trendmicro:deep_security_agent:12.0:update20:*:*:long_term_support:*:*:*",
"cpe:2.3:a:trendmicro:deep_security_agent:12.0:update21:*:*:long_term_support:*:*:*",
"cpe:2.3:a:trendmicro:deep_security_agent:12.0:update3:*:*:long_term_support:*:*:*",
"cpe:2.3:a:trendmicro:deep_security_agent:12.0:update4:*:*:long_term_support:*:*:*",
"cpe:2.3:a:trendmicro:deep_security_agent:12.0:update5:*:*:long_term_support:*:*:*",
"cpe:2.3:a:trendmicro:deep_security_agent:12.0:update6:*:*:long_term_support:*:*:*",
"cpe:2.3:a:trendmicro:deep_security_agent:12.0:update7:*:*:long_term_support:*:*:*",
"cpe:2.3:a:trendmicro:deep_security_agent:12.0:update8:*:*:long_term_support:*:*:*",
"cpe:2.3:a:trendmicro:deep_security_agent:12.0:update9:*:*:long_term_support:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | 4.3 | null |
|
CVE-2023-31138
|
DHIS2 Core vulnerable to Improper Access Control with PATCH requests
|
DHIS2 Core contains the service layer and Web API for DHIS2, an information system for data capture. Starting in the 2.36 branch and prior to versions 2.37.9.1, 2.38.3.1, and 2.39.1.2, using object model traversal in the payload of a PATCH request, authenticated users with write access to an object may be able to modify related objects that they should not have access to. DHIS2 implementers should upgrade to a supported version of DHIS2 to receive a patch: 2.37.9.1, 2.38.3.1, or 2.39.1.2. It is possible to work around this issue by blocking all PATCH requests on a reverse proxy, but this may cause some issues with the functionality of built-in applications using legacy PATCH requests.
|
[
"cpe:2.3:a:dhis2:dhis_2:*:*:*:*:*:*:*:*"
] | null | 7.1 | null | null | null |
GHSA-2p25-rmjx-pfqv
|
In the Linux kernel, the following vulnerability has been resolved:clk: imx: Remove CLK_SET_PARENT_GATE for DRAM mux for i.MX7DFor i.MX7D DRAM related mux clock, the clock source change should ONLY
be done done in low level asm code without accessing DRAM, and then
calling clk API to sync the HW clock status with clk tree, it should never
touch real clock source switch via clk API, so CLK_SET_PARENT_GATE flag
should NOT be added, otherwise, DRAM's clock parent will be disabled when
DRAM is active, and system will hang.
|
[] | null | 5.5 | null | null | null |
|
GHSA-xcvf-58hp-27qh
|
Directory traversal vulnerability in the VulCore web service (WSVulnerabilityCore/VulCore.asmx) in Lenovo ThinkManagement Console 9.0.3 allows remote attackers to delete arbitrary files via a .. (dot dot) in the filename parameter in a SetTaskLogByFile SOAP request.
|
[] | null | null | null | null | null |
|
GHSA-vm7v-r797-g9gr
|
Windows Kernel Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2023-21675, CVE-2023-21747, CVE-2023-21748, CVE-2023-21749, CVE-2023-21750, CVE-2023-21754, CVE-2023-21755, CVE-2023-21772, CVE-2023-21773.
|
[] | null | 7.8 | null | null | null |
|
CVE-2022-33329
|
Multiple command injection vulnerabilities exist in the web_server ajax endpoints functionalities of Robustel R1510 3.3.0. A specially-crafted network packets can lead to arbitrary command execution. An attacker can send a sequence of requests to trigger these vulnerabilities.The `/ajax/set_sys_time/` API is affected by a command injection vulnerability.
|
[
"cpe:2.3:o:robustel:r1510_firmware:3.3.0:*:*:*:*:*:*:*",
"cpe:2.3:h:robustel:r1510:-:*:*:*:*:*:*:*"
] | null | null | 9.1 | null | null |
|
RHSA-2015:1947
|
Red Hat Security Advisory: Red Hat JBoss Operations Network 3.3.4 update
|
Cassandra: remote code execution via unauthenticated JMX/RMI interface
|
[
"cpe:/a:redhat:jboss_operations_network:3.3"
] | null | null | null | null | null |
RHSA-2023:7257
|
Red Hat Security Advisory: dotnet6.0 security update
|
dotnet: Arbitrary File Write and Deletion Vulnerability: FormatFtpCommand dotnet: ASP.NET Security Feature Bypass Vulnerability in Blazor forms
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 5.5 | null | null | null |
CVE-2019-6244
|
An issue was discovered in UsualToolCMS 8.0. cmsadmin/a_sqlbackx.php?t=sql allows CSRF attacks that can execute SQL statements, and consequently execute arbitrary PHP code by writing that code into a .php file.
|
[
"cpe:2.3:a:usualtool:usualtoolcms:8.0:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.8 | null |
|
GHSA-7wm2-j9cm-6464
|
PHP remote file inclusion vulnerability in mutant_functions.php in the Mutant 0.9.2 portal for phpBB 2.2 allows remote attackers to execute arbitrary PHP code via a URL in the phpbb_root_path parameter.
|
[] | null | null | null | null | null |
|
GHSA-r3pg-4m7c-9pvw
|
XML external entity (XXE) vulnerability in the xmlStringLenDecodeEntities function in parser.c in libxml2 before 2.9.4, when not in validating mode, allows context-dependent attackers to read arbitrary files or cause a denial of service (resource consumption) via unspecified vectors.
|
[] | null | null | 7.1 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.