id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
189k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
patch_commit_url
stringlengths
36
232
CVE-2004-2767
NWFTPD.nlm before 5.04.25 in the FTP server in Novell NetWare does not promptly close DS sessions, which allows remote attackers to cause a denial of service (connection slot exhaustion) by establishing many FTP sessions that persist for the lifetime of a DS session.
[ "cpe:2.3:a:novell:netware_ftp_server:*:*:*:*:*:*:*:*", "cpe:2.3:o:novell:netware:*:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
GHSA-j6jq-3q8p-xgg6
Netflix Security Monkey Open Redirect vulnerability
Netflix Security Monkey before 0.8.0 has an Open Redirect. The logout functionality accepted the "next" parameter which then redirects to any domain irrespective of the Host header.
[]
null
null
6.1
null
null
GHSA-rfmp-w9w5-rmhv
REDCap through 15.0.0 has a security flaw in the Project Dashboards name, exposing users to a Cross-Site Request Forgery (CSRF) attack. An attacker can exploit this by luring users into clicking on a Project Dashboards name that contains the malicious payload, which triggers a logout request and terminates their session. This vulnerability stems from the absence of CSRF protections on the logout functionality, allowing malicious actions to be executed without user consent.
[]
null
8.8
null
null
null
GHSA-vq5j-6vrq-2cm6
Dell Encryption Admin Utilities versions prior to 11.10.2 contain an Improper Link Resolution vulnerability. A local malicious user could potentially exploit this vulnerability, leading to privilege escalation.
[]
null
7.8
null
null
null
GHSA-fm97-p25w-w6fj
The accelerated rendering functionality of NVIDIA Binary Graphics Driver (binary blob driver) For Linux v8774 and v8762, and probably on other operating systems, allows local and remote attackers to execute arbitrary code via a large width value in a font glyph, which can be used to overwrite arbitrary memory locations.
[]
null
null
null
null
null
CVE-2019-17373
Certain NETGEAR devices allow unauthenticated access to critical .cgi and .htm pages via a substring ending with .jpg, such as by appending ?x=1.jpg to a URL. This affects MBR1515, MBR1516, DGN2200, DGN2200M, DGND3700, WNR2000v2, WNDR3300, WNDR3400, WNR3500, and WNR834Bv2.
[ "cpe:2.3:o:netgear:mbr1515_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:mbr1515:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:mbr1516_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:mbr1516:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:dgn2200_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:dgn2200:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:dgn2200m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:dgn2200m:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:dgnd3700_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:dgnd3700:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:wnr2000v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:wnr2000v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:wndr3300_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:wndr3300:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:wndr3400_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:wndr3400:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:wnr3500_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:wnr3500:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:wnr834bv2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:wnr834bv2:-:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
null
GHSA-3ppv-wqrq-v3rc
Moxa MXView 2.8 allows remote attackers to read web server's private key file, no access control.
[]
null
null
7.5
null
null
GHSA-62ww-4p3p-7fhj
API information disclosure flaw in Elasticsearch
Elasticsearch versions before 7.11.2 and 6.8.15 contain a document disclosure flaw was found in the Elasticsearch suggester and profile API when Document and Field Level Security are enabled. The suggester and profile API are normally disabled for an index when document level security is enabled on the index. Certain queries are able to enable the profiler and suggester which could lead to disclosing the existence of documents and fields the attacker should not be able to view.
[]
null
5.3
null
null
null
GHSA-gfxp-4g99-rqp6
The Microsoft VFP_OLE_Server ActiveX control allows remote attackers to execute arbitrary code by invoking the foxcommand method.
[]
null
null
null
null
null
CVE-2004-1535
PHP remote file inclusion vulnerability in admin_cash.php for the Cash Mod module for phpBB allows remote attackers to execute arbitrary PHP code by modifying the phpbb_root_path parameter to reference a URL on a remote web server that contains the code.
[ "cpe:2.3:a:phpbb_group:phpbb:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:phpbb_group:phpbb:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:phpbb_group:phpbb:2.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:phpbb_group:phpbb:2.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:phpbb_group:phpbb:2.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:phpbb_group:phpbb:2.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:phpbb_group:phpbb:2.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:phpbb_group:phpbb:2.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:phpbb_group:phpbb:2.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:phpbb_group:phpbb:2.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:phpbb_group:phpbb:2.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:phpbb_group:phpbb:rc1:*:*:*:*:*:*:*", "cpe:2.3:a:phpbb_group:phpbb:rc1_pre:*:*:*:*:*:*:*", "cpe:2.3:a:phpbb_group:phpbb:rc2:*:*:*:*:*:*:*", "cpe:2.3:a:phpbb_group:phpbb:rc3:*:*:*:*:*:*:*", "cpe:2.3:a:phpbb_group:phpbb:rc4:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
GHSA-3gm4-j75g-v7fj
Stack overflow vulnerability in function jsi_evalcode_sub in jsish before 3.0.18, allows remote attackers to cause a Denial of Service via a crafted value to the execute parameter.
[]
null
null
null
null
null
GHSA-x8pf-qjr3-w5cf
Vulnerability in AMSS++ version 4.31, which does not sufficiently encode user-controlled input, resulting in a Cross-Site Scripting (XSS) vulnerability through /amssplus/modules/book/main/select_send_2.php, in multiple parameters. This vulnerability could allow a remote attacker to send a specially crafted URL to an authenticated user and steal their session cookie credentials.
[]
null
7.1
null
null
null
CVE-2009-0278
Sun Java System Application Server (AS) 8.1 and 8.2 allows remote attackers to read the Web Application configuration files in the (1) WEB-INF or (2) META-INF directory via a malformed request.
[ "cpe:2.3:a:sun:java_system_application_server:8.1:*:linux:*:*:*:*:*", "cpe:2.3:a:sun:java_system_application_server:8.1:*:sparc:*:*:*:*:*", "cpe:2.3:a:sun:java_system_application_server:8.1:*:windows:*:*:*:*:*", "cpe:2.3:a:sun:java_system_application_server:8.1:*:x86:*:*:*:*:*", "cpe:2.3:a:sun:java_system_application_server:8.2:*:linux:*:*:*:*:*", "cpe:2.3:a:sun:java_system_application_server:8.2:*:sparc:*:*:*:*:*", "cpe:2.3:a:sun:java_system_application_server:8.2:*:windows:*:*:*:*:*", "cpe:2.3:a:sun:java_system_application_server:8.2:*:x86:*:*:*:*:*" ]
null
null
null
5
null
GHSA-gfqg-mjpq-p8h5
Cross-Site Request Forgery (CSRF) in GitHub repository chiefonboarding/chiefonboarding prior to v2.0.47.
[]
null
null
4.3
null
null
CVE-2016-0521
Unspecified vulnerability in the Oracle iProcurement component in Oracle E-Business Suite 11.5.10.2 allows remote attackers to affect integrity via unknown vectors related to Redirection.
[ "cpe:2.3:a:oracle:e-business_suite:11.5.10.2:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
RHSA-2017:1414
Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.23 Service Pack 1 for RHEL 6
httpd: Padding Oracle in Apache mod_session_crypto httpd: DoS vulnerability in mod_auth_digest openssl: OCSP Status Request extension unbounded memory growth openssl: ECDSA P-256 timing attack key recovery SSL/TLS: Malformed plain-text ALERT packets could cause remote DoS httpd: Incomplete handling of LimitRequestFields directive in mod_http2 httpd: Apache HTTP Request Parsing Whitespace Defects
[ "cpe:/a:redhat:jboss_core_services:1::el6" ]
null
null
4
null
null
GHSA-m9gq-w7jg-mrwv
In JetBrains ReSharper before 2024.3.4, 2024.2.8, and 2024.1.7, Rider before 2024.3.4, 2024.2.8, and 2024.1.7, dotTrace before 2024.3.4, 2024.2.8, and 2024.1.7, ETW Host Service before 16.43, Local Privilege Escalation via the ETW Host Service was possible
[]
null
7.8
null
null
null
GHSA-g6q5-rqfh-3jr6
The cvtClump function in the rgb2ycbcr tool in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (out-of-bounds write) by setting the "-v" option to -1.
[]
null
null
7.5
null
null
CVE-2019-11509
In Pulse Secure Pulse Connect Secure (PCS) before 8.1R15.1, 8.2 before 8.2R12.1, 8.3 before 8.3R7.1, and 9.0 before 9.0R3.4 and Pulse Policy Secure (PPS) before 5.1R15.1, 5.2 before 5.2R12.1, 5.3 before 5.3R15.1, 5.4 before 5.4R7.1, and 9.0 before 9.0R3.2, an authenticated attacker (via the admin web interface) can exploit Incorrect Access Control to execute arbitrary code on the appliance.
[ "cpe:2.3:a:ivanti:connect_secure:8.1:*:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:8.1:r1.0:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:8.1:r1.1:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:8.1:r10.0:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:8.1:r11.0:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:8.1:r11.1:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:8.1:r12.0:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:8.1:r12.1:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:8.1:r13.0:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:8.1:r14.0:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:8.1:r2.0:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:8.1:r2.1:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:8.1:r3.1:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:8.1:r3.2:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:8.1:r4.0:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:8.1:r4.1:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:8.1:r5.0:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:8.1:r6.0:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:8.1:r7.0:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:8.1:r8.0:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:8.1:r9.0:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:8.1:r9.1:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:8.1:r9.2:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:8.2:r1.0:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:8.2:r1.1:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:8.2:r10.0:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:8.2:r11.0:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:8.2:r12.0:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:8.2:r2.0:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:8.2:r3.0:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:8.2:r3.1:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:8.2:r4.0:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:8.2:r4.1:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:8.2:r5.0:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:8.2:r5.1:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:8.2:r6.0:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:8.2:r7.0:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:8.2:r7.1:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:8.2:r8.0:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:8.2:r8.1:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:8.2:r8.2:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:8.2:r9.0:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:8.3:r1:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:8.3:r2:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:8.3:r2.1:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:8.3:r3:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:8.3:r4:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:8.3:r5:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:8.3:r5.1:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:8.3:r5.2:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:8.3:r6:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:8.3:r6.1:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:8.3:r7:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:9.0:r1:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:9.0:r2:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:9.0:r2.1:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:9.0:r3:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:9.0:r3.1:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:9.0:r3.2:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:9.0:*:*:*:*:*:*:*", "cpe:2.3:a:ivanti:policy_secure:9.0:*:*:*:*:*:*:*", "cpe:2.3:a:ivanti:policy_secure:9.0:r1:*:*:*:*:*:*", "cpe:2.3:a:ivanti:policy_secure:9.0:r2:*:*:*:*:*:*", "cpe:2.3:a:ivanti:policy_secure:9.0:r2.1:*:*:*:*:*:*", "cpe:2.3:a:ivanti:policy_secure:9.0:r3:*:*:*:*:*:*", "cpe:2.3:a:ivanti:policy_secure:9.0:r3.1:*:*:*:*:*:*", "cpe:2.3:a:pulsesecure:pulse_policy_secure:5.2:*:*:*:*:*:*:*", "cpe:2.3:a:pulsesecure:pulse_policy_secure:5.2:r1.0:*:*:*:*:*:*", "cpe:2.3:a:pulsesecure:pulse_policy_secure:5.2:r10.0:*:*:*:*:*:*", "cpe:2.3:a:pulsesecure:pulse_policy_secure:5.2:r11.0:*:*:*:*:*:*", "cpe:2.3:a:pulsesecure:pulse_policy_secure:5.2:r2.0:*:*:*:*:*:*", "cpe:2.3:a:pulsesecure:pulse_policy_secure:5.2:r3.0:*:*:*:*:*:*", "cpe:2.3:a:pulsesecure:pulse_policy_secure:5.2:r3.2:*:*:*:*:*:*", "cpe:2.3:a:pulsesecure:pulse_policy_secure:5.2:r4.0:*:*:*:*:*:*", "cpe:2.3:a:pulsesecure:pulse_policy_secure:5.2:r5.0:*:*:*:*:*:*", "cpe:2.3:a:pulsesecure:pulse_policy_secure:5.2:r6.0:*:*:*:*:*:*", "cpe:2.3:a:pulsesecure:pulse_policy_secure:5.2:r7.0:*:*:*:*:*:*", "cpe:2.3:a:pulsesecure:pulse_policy_secure:5.2:r7.1:*:*:*:*:*:*", "cpe:2.3:a:pulsesecure:pulse_policy_secure:5.2:r8.0:*:*:*:*:*:*", "cpe:2.3:a:pulsesecure:pulse_policy_secure:5.2:r9.0:*:*:*:*:*:*", "cpe:2.3:a:pulsesecure:pulse_policy_secure:5.2:r9.1:*:*:*:*:*:*", "cpe:2.3:a:pulsesecure:pulse_policy_secure:5.4:*:*:*:*:*:*:*", "cpe:2.3:a:pulsesecure:pulse_policy_secure:5.4:r1:*:*:*:*:*:*", "cpe:2.3:a:pulsesecure:pulse_policy_secure:5.4:r2:*:*:*:*:*:*", "cpe:2.3:a:pulsesecure:pulse_policy_secure:5.4:r2.1:*:*:*:*:*:*", "cpe:2.3:a:pulsesecure:pulse_policy_secure:5.4:r3:*:*:*:*:*:*", "cpe:2.3:a:pulsesecure:pulse_policy_secure:5.4:r4:*:*:*:*:*:*", "cpe:2.3:a:pulsesecure:pulse_policy_secure:5.4:r5:*:*:*:*:*:*", "cpe:2.3:a:pulsesecure:pulse_policy_secure:5.4:r5.2:*:*:*:*:*:*", "cpe:2.3:a:pulsesecure:pulse_policy_secure:5.4:r6:*:*:*:*:*:*", "cpe:2.3:a:pulsesecure:pulse_policy_secure:5.4:r6.1:*:*:*:*:*:*", "cpe:2.3:a:pulsesecure:pulse_policy_secure:5.4:r7:*:*:*:*:*:*" ]
null
8.8
null
6.5
null
GHSA-r7xj-pwvr-9j47
Cross-Site Request Forgery (CSRF) vulnerability in Really Simple Security Really Simple SSL allows Cross Site Request Forgery. This issue affects Really Simple SSL: from n/a through 9.1.4.
[]
null
4.3
null
null
null
GHSA-6xrh-c7j6-5776
Acrobat Reader DC version 21.007.20099 (and earlier), 20.004.30017 (and earlier) and 17.011.30204 (and earlier) are affected by a use-after-free vulnerability in the processing of Format event actions that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[]
null
null
null
null
null
GHSA-g82c-4c5m-jmpw
SQL injection vulnerability in index.php in TaskFreak! 0.6.1 and earlier allows remote authenticated users to execute arbitrary SQL commands via the sContext parameter.
[]
null
null
null
null
null
CVE-2020-26061
ClickStudios Passwordstate Password Reset Portal prior to build 8501 is affected by an authentication bypass vulnerability. The ResetPassword function does not validate whether the user has successfully authenticated using security questions. An unauthenticated, remote attacker can send a crafted HTTP request to the /account/ResetPassword page to set a new password for any registered user.
[ "cpe:2.3:a:clickstudios:passwordstate:*:*:*:*:*:*:*:*" ]
null
7.5
null
5
null
GHSA-8j8g-6gw9-rjrf
NAKIVO Backup & Replication before 11.0.0.88174 allows absolute path traversal for reading files via getImageByPath to /c/router (this may lead to remote code execution across the enterprise because PhysicalDiscovery has cleartext credentials).
[]
null
8.6
null
null
null
GHSA-f4fc-q79g-8f2p
Stack-based buffer overflow in the Profinet DCP protocol implementation on the Siemens Scalance S Security Module firewall S602 V2, S612 V2, and S613 V2 with firmware before 2.3.0.3 allows remote attackers to cause a denial of service (device outage) or possibly execute arbitrary code via a crafted DCP frame.
[]
null
null
null
null
null
CVE-2025-26568
WordPress Easy Amazon Product Information plugin <= 4.0.1 - CSRF to Stored XSS vulnerability
Cross-Site Request Forgery (CSRF) vulnerability in jensmueller Easy Amazon Product Information allows Stored XSS. This issue affects Easy Amazon Product Information: from n/a through 4.0.1.
[]
null
7.1
null
null
null
RHSA-2003:389
Red Hat Security Advisory: kernel security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws" ]
null
null
null
null
null
CVE-2013-6812
The ONEDC app before 1.7 for iOS does not properly verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[ "cpe:2.3:a:nextdc:onedc:*:-:-:*:-:iphone_os:*:*" ]
null
null
null
5.8
null
CVE-2001-1476
SSH before 2.0, with RC4 encryption and the "disallow NULL passwords" option enabled, makes it easier for remote attackers to guess portions of user passwords by replaying user sessions with certain modifications, which trigger different messages depending on whether the guess is correct or not.
[ "cpe:2.3:a:ssh:ssh:1.2.24:*:*:*:*:*:*:*", "cpe:2.3:a:ssh:ssh:1.2.25:*:*:*:*:*:*:*", "cpe:2.3:a:ssh:ssh:1.2.26:*:*:*:*:*:*:*", "cpe:2.3:a:ssh:ssh:1.2.27:*:*:*:*:*:*:*", "cpe:2.3:a:ssh:ssh:1.2.28:*:*:*:*:*:*:*", "cpe:2.3:a:ssh:ssh:1.2.29:*:*:*:*:*:*:*", "cpe:2.3:a:ssh:ssh:1.2.30:*:*:*:*:*:*:*", "cpe:2.3:a:ssh:ssh:1.2.31:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2020-29062
An issue was discovered on CDATA 72408A, 9008A, 9016A, 92408A, 92416A, 9288, 97016, 97024P, 97028P, 97042P, 97084P, 97168P, FD1002S, FD1104, FD1104B, FD1104S, FD1104SN, FD1108S, FD1204S-R2, FD1204SN, FD1204SN-R2, FD1208S-R2, FD1216S-R1, FD1608GS, FD1608SN, FD1616GS, FD1616SN, and FD8000 devices. There is a default blank password for the guest account.
[ "cpe:2.3:o:cdatatec:72408a_firmware:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:72408a_firmware:2.4.03_000:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:72408a_firmware:2.4.04_001:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:72408a_firmware:2.4.05_000:*:*:*:*:*:*:*", "cpe:2.3:h:cdatatec:72408a:-:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:9008a_firmware:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:9008a_firmware:2.4.03_000:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:9008a_firmware:2.4.04_001:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:9008a_firmware:2.4.05_000:*:*:*:*:*:*:*", "cpe:2.3:h:cdatatec:9008a:-:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:9016a_firmware:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:9016a_firmware:2.4.03_000:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:9016a_firmware:2.4.04_001:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:9016a_firmware:2.4.05_000:*:*:*:*:*:*:*", "cpe:2.3:h:cdatatec:9016a:-:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:92408a_firmware:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:92408a_firmware:2.4.03_000:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:92408a_firmware:2.4.04_001:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:92408a_firmware:2.4.05_000:*:*:*:*:*:*:*", "cpe:2.3:h:cdatatec:92408a:-:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:92416a_firmware:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:92416a_firmware:2.4.03_000:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:92416a_firmware:2.4.04_001:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:92416a_firmware:2.4.05_000:*:*:*:*:*:*:*", "cpe:2.3:h:cdatatec:92416a:-:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:9288_firmware:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:9288_firmware:2.4.03_000:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:9288_firmware:2.4.04_001:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:9288_firmware:2.4.05_000:*:*:*:*:*:*:*", "cpe:2.3:h:cdatatec:9288:-:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:97016_firmware:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:97016_firmware:2.4.03_000:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:97016_firmware:2.4.04_001:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:97016_firmware:2.4.05_000:*:*:*:*:*:*:*", "cpe:2.3:h:cdatatec:97016:-:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:97024p_firmware:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:97024p_firmware:2.4.03_000:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:97024p_firmware:2.4.04_001:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:97024p_firmware:2.4.05_000:*:*:*:*:*:*:*", "cpe:2.3:h:cdatatec:97024p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:97028p_firmware:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:97028p_firmware:2.4.03_000:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:97028p_firmware:2.4.04_001:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:97028p_firmware:2.4.05_000:*:*:*:*:*:*:*", "cpe:2.3:h:cdatatec:97028p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:97042p_firmware:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:97042p_firmware:2.4.03_000:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:97042p_firmware:2.4.04_001:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:97042p_firmware:2.4.05_000:*:*:*:*:*:*:*", "cpe:2.3:h:cdatatec:97042p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:97084p_firmware:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:97084p_firmware:2.4.03_000:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:97084p_firmware:2.4.04_001:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:97084p_firmware:2.4.05_000:*:*:*:*:*:*:*", "cpe:2.3:h:cdatatec:97084p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:97168p_firmware:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:97168p_firmware:2.4.03_000:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:97168p_firmware:2.4.04_001:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:97168p_firmware:2.4.05_000:*:*:*:*:*:*:*", "cpe:2.3:h:cdatatec:97168p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1002s_firmware:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1002s_firmware:2.4.03_000:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1002s_firmware:2.4.04_001:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1002s_firmware:2.4.05_000:*:*:*:*:*:*:*", "cpe:2.3:h:cdatatec:fd1002s:-:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1104_firmware:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1104_firmware:2.4.03_000:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1104_firmware:2.4.04_001:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1104_firmware:2.4.05_000:*:*:*:*:*:*:*", "cpe:2.3:h:cdatatec:fd1104:-:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1104b_firmware:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1104b_firmware:2.4.03_000:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1104b_firmware:2.4.04_001:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1104b_firmware:2.4.05_000:*:*:*:*:*:*:*", "cpe:2.3:h:cdatatec:fd1104b:-:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1104s_firmware:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1104s_firmware:2.4.03_000:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1104s_firmware:2.4.04_001:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1104s_firmware:2.4.05_000:*:*:*:*:*:*:*", "cpe:2.3:h:cdatatec:fd1104s:-:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1104sn_firmware:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1104sn_firmware:2.4.03_000:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1104sn_firmware:2.4.04_001:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1104sn_firmware:2.4.05_000:*:*:*:*:*:*:*", "cpe:2.3:h:cdatatec:fd1104sn:-:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1108s_firmware:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1108s_firmware:2.4.03_000:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1108s_firmware:2.4.04_001:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1108s_firmware:2.4.05_000:*:*:*:*:*:*:*", "cpe:2.3:h:cdatatec:fd1108s:-:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1204s-r2_firmware:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1204s-r2_firmware:2.4.03_000:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1204s-r2_firmware:2.4.04_001:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1204s-r2_firmware:2.4.05_000:*:*:*:*:*:*:*", "cpe:2.3:h:cdatatec:fd1204s-r2:-:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1204sn_firmware:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1204sn_firmware:2.4.03_000:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1204sn_firmware:2.4.04_001:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1204sn_firmware:2.4.05_000:*:*:*:*:*:*:*", "cpe:2.3:h:cdatatec:fd1204sn:-:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1204sn-r2_firmware:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1204sn-r2_firmware:2.4.03_000:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1204sn-r2_firmware:2.4.04_001:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1204sn-r2_firmware:2.4.05_000:*:*:*:*:*:*:*", "cpe:2.3:h:cdatatec:fd1204sn-r2:-:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1208s-r2_firmware:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1208s-r2_firmware:2.4.03_000:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1208s-r2_firmware:2.4.04_001:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1208s-r2_firmware:2.4.05_000:*:*:*:*:*:*:*", "cpe:2.3:h:cdatatec:fd1208s-r2:-:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1216s-r1_firmware:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1216s-r1_firmware:2.4.03_000:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1216s-r1_firmware:2.4.04_001:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1216s-r1_firmware:2.4.05_000:*:*:*:*:*:*:*", "cpe:2.3:h:cdatatec:fd1216s-r1:-:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1608gs_firmware:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1608gs_firmware:2.4.03_000:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1608gs_firmware:2.4.04_001:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1608gs_firmware:2.4.05_000:*:*:*:*:*:*:*", "cpe:2.3:h:cdatatec:fd1608gs:-:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1608sn_firmware:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1608sn_firmware:2.4.03_000:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1608sn_firmware:2.4.04_001:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1608sn_firmware:2.4.05_000:*:*:*:*:*:*:*", "cpe:2.3:h:cdatatec:fd1608sn:-:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1616gs_firmware:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1616gs_firmware:2.4.03_000:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1616gs_firmware:2.4.04_001:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1616gs_firmware:2.4.05_000:*:*:*:*:*:*:*", "cpe:2.3:h:cdatatec:fd1616gs:-:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1616sn_firmware:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1616sn_firmware:2.4.03_000:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1616sn_firmware:2.4.04_001:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1616sn_firmware:2.4.05_000:*:*:*:*:*:*:*", "cpe:2.3:h:cdatatec:fd1616sn:-:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd8000_firmware:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd8000_firmware:2.4.03_000:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd8000_firmware:2.4.04_001:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd8000_firmware:2.4.05_000:*:*:*:*:*:*:*", "cpe:2.3:h:cdatatec:fd8000:-:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
null
GHSA-mh89-qc88-2rhh
Draytek Vigor 3910 v4.3.2.6 was discovered to contain a buffer overflow in the saveitem parameter at lan2lan.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.
[]
null
7.5
null
null
null
GHSA-w5jp-mx9h-36w9
A vulnerability has been found in EnGenius ENH1350EXT, ENS500-AC and ENS620EXT up to 20241118 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /admin/network/ajax_getChannelList. The manipulation of the argument countryCode leads to command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
[]
5.1
4.7
null
null
null
GHSA-v69j-fpvc-hw57
Remote Procedure Call Runtime Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-28327, CVE-2021-28329, CVE-2021-28330, CVE-2021-28331, CVE-2021-28332, CVE-2021-28333, CVE-2021-28335, CVE-2021-28336, CVE-2021-28337, CVE-2021-28338, CVE-2021-28339, CVE-2021-28340, CVE-2021-28341, CVE-2021-28342, CVE-2021-28343, CVE-2021-28344, CVE-2021-28345, CVE-2021-28346, CVE-2021-28352, CVE-2021-28353, CVE-2021-28354, CVE-2021-28355, CVE-2021-28356, CVE-2021-28357, CVE-2021-28358, CVE-2021-28434.
[]
null
8.8
null
null
null
GHSA-h3w2-65pw-69gj
SQL injection vulnerability in print_raincheck.php in phpRAINCHECK 1.0.1 and earlier allows remote attackers to execute arbitrary SQL commands via the id parameter.
[]
null
null
null
null
null
GHSA-xrrw-wm7v-5p7r
Apple iPhone OS 1.0 through 2.2.1 and iPhone OS for iPod touch 1.1 through 2.2.1 stores an exception for a hostname when the user accepts an untrusted Exchange server certificate, which causes it to be accepted without prompting in future usage and allows remote Exchange servers to obtain sensitive information such as credentials.
[]
null
null
null
null
null
CVE-2023-37954
A cross-site request forgery (CSRF) vulnerability in Jenkins Rebuilder Plugin 320.v5a_0933a_e7d61 and earlier allows attackers to rebuild a previous build.
[ "cpe:2.3:a:jenkins:rebuilder:*:*:*:*:*:jenkins:*:*" ]
null
4.3
null
null
null
CVE-2010-1444
The ZIP archive decompressor in VideoLAN VLC media player before 1.0.6 allows remote attackers to cause a denial of service (invalid memory access and application crash) or possibly execute arbitrary code via a crafted archive.
[ "cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc_media_player:0.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc_media_player:0.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc_media_player:0.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc_media_player:0.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc_media_player:0.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc_media_player:0.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc_media_player:0.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc_media_player:0.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc_media_player:0.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc_media_player:0.7.2:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc_media_player:0.8.0:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc_media_player:0.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc_media_player:0.8.2:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc_media_player:0.8.4:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc_media_player:0.8.4a:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc_media_player:0.8.5:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc_media_player:0.8.6:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc_media_player:0.8.6a:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc_media_player:0.8.6b:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc_media_player:0.8.6c:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc_media_player:0.8.6d:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc_media_player:0.8.6e:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc_media_player:0.8.6f:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc_media_player:0.8.6g:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc_media_player:0.8.6h:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc_media_player:0.8.6i:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc_media_player:0.8.1337:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc_media_player:0.9.0:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc_media_player:0.9.1:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc_media_player:0.9.3:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc_media_player:0.9.4:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc_media_player:0.9.5:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc_media_player:0.9.6:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc_media_player:0.9.8a:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc_media_player:0.9.9:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc_media_player:0.9.9a:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc_media_player:0.9.10:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc_media_player:1.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc_media_player:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc_media_player:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc_media_player:1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc_media_player:1.0.4:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
GHSA-55x8-6f5x-9xx6
Microsoft MPEG-2 Video Extension Remote Code Execution Vulnerability
[]
null
7.8
null
null
null
CVE-2009-2240
Cross-site scripting (XSS) vulnerability in AD2000 free-sw leger (aka Web Conference Room Free) 1.6.4 and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
[ "cpe:2.3:a:ad2000:free-sw_leger:*:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
CVE-2022-28116
Online Banking System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter.
[ "cpe:2.3:a:online_banking_system_project:online_banking_system:1.0:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
null
CVE-2016-1560
ExaGrid appliances with firmware before 4.8 P26 have a default password of (1) inflection for the root shell account and (2) support for the support account in the web interface, which allows remote attackers to obtain administrative access via an SSH or HTTP session.
[ "cpe:2.3:o:exagrid:ex3000_firmware:4.8:*:*:*:*:*:*:*", "cpe:2.3:h:exagrid:ex3000:-:*:*:*:*:*:*:*", "cpe:2.3:o:exagrid:ex5000_firmware:4.8:*:*:*:*:*:*:*", "cpe:2.3:h:exagrid:ex5000:-:*:*:*:*:*:*:*", "cpe:2.3:o:exagrid:ex7000_firmware:4.8:*:*:*:*:*:*:*", "cpe:2.3:h:exagrid:ex7000:-:*:*:*:*:*:*:*", "cpe:2.3:o:exagrid:ex10000e_firmware:4.8:*:*:*:*:*:*:*", "cpe:2.3:h:exagrid:ex10000e:-:*:*:*:*:*:*:*", "cpe:2.3:o:exagrid:ex13000e_firmware:4.8:*:*:*:*:*:*:*", "cpe:2.3:h:exagrid:ex13000e:-:*:*:*:*:*:*:*", "cpe:2.3:o:exagrid:ex21000e_firmware:4.8:*:*:*:*:*:*:*", "cpe:2.3:h:exagrid:ex21000e:-:*:*:*:*:*:*:*", "cpe:2.3:o:exagrid:ex32000e_firmware:4.8:*:*:*:*:*:*:*", "cpe:2.3:h:exagrid:ex32000e:-:*:*:*:*:*:*:*", "cpe:2.3:o:exagrid:ex40000e_firmware:4.8:*:*:*:*:*:*:*", "cpe:2.3:h:exagrid:ex40000e:-:*:*:*:*:*:*:*" ]
null
null
9.8
10
null
CVE-2010-0408
The ap_proxy_ajp_request function in mod_proxy_ajp.c in mod_proxy_ajp in the Apache HTTP Server 2.2.x before 2.2.15 does not properly handle certain situations in which a client sends no request body, which allows remote attackers to cause a denial of service (backend server outage) via a crafted request, related to use of a 500 error code instead of the appropriate 400 error code.
[ "cpe:2.3:a:apache:http_server:2.2:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.2.8:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.2.9:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.2.11:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.2.12:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.2.13:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.2.14:*:*:*:*:*:*:*" ]
null
null
null
5
null
GHSA-2f8j-394w-hvgc
An issue was discovered on certain GL-iNet devices, including MT6000, MT3000, MT2500, AXT1800, and AX1800 4.6.2. The SID generated for a specific user is not tied to that user itself, which allows other users to potentially use it for authentication. Once an attacker bypasses the application's authentication procedures, they can generate a valid SID, escalate privileges, and gain full control.
[]
null
8
null
null
null
GHSA-49v2-h77h-w34h
Apache HTTP Server, when running on Linux with a document root on a Windows share mounted using smbfs, allows remote attackers to obtain unprocessed content such as source files for .php programs via a trailing "\" (backslash), which is not handled by the intended AddType directive.
[]
null
null
null
null
null
CVE-2006-6436
Cross-site scripting (XSS) vulnerability in the Network controller in Xerox WorkCentre and WorkCentre Pro before 12.050.03.000, 13.x before 13.050.03.000, and 14.x before 14.050.03.000 allows remote attackers to inject arbitrary web script or HTML via HTTP TRACE messages.
[ "cpe:2.3:h:xerox:workcentre_232:*:*:*:*:*:*:*:*", "cpe:2.3:h:xerox:workcentre_232:*:*:pro:*:*:*:*:*", "cpe:2.3:h:xerox:workcentre_238:*:*:*:*:*:*:*:*", "cpe:2.3:h:xerox:workcentre_238:*:*:pro:*:*:*:*:*", "cpe:2.3:h:xerox:workcentre_245:*:*:*:*:*:*:*:*", "cpe:2.3:h:xerox:workcentre_245:*:*:pro:*:*:*:*:*", "cpe:2.3:h:xerox:workcentre_255:*:*:*:*:*:*:*:*", "cpe:2.3:h:xerox:workcentre_255:*:*:pro:*:*:*:*:*", "cpe:2.3:h:xerox:workcentre_265:*:*:*:*:*:*:*:*", "cpe:2.3:h:xerox:workcentre_265:*:*:pro:*:*:*:*:*", "cpe:2.3:h:xerox:workcentre_275:*:*:*:*:*:*:*:*", "cpe:2.3:h:xerox:workcentre_275:*:*:pro:*:*:*:*:*" ]
null
null
null
6.8
null
GHSA-h66h-vhxh-6fr4
GPAC v2.3-DEV-rev566-g50c2ab06f-master was discovered to contain a double free via the gf_filterpacket_del function at /gpac/src/filter_core/filter.c.
[]
null
7.8
null
null
null
RHSA-2013:0579
Red Hat Security Advisory: rhev-hypervisor6 security, bug fix, and enhancement update
libvirt+dnsmasq: DNS configured to answer DNS queries from non-virtual networks kernel: block: default SCSI command filter does not accomodate commands overlap across device classes kernel: vhost: fix length for cross region descriptor
[ "cpe:/o:redhat:enterprise_linux:6::hypervisor" ]
null
null
null
null
null
CVE-2001-1217
Directory traversal vulnerability in PL/SQL Apache module in Oracle Oracle 9i Application Server allows remote attackers to access sensitive information via a double encoded URL with .. (dot dot) sequences.
[ "cpe:2.3:a:oracle:application_server:1.0.2:*:*:*:*:*:*:*" ]
null
null
null
5
null
CVE-2024-7531
Calling `PK11_Encrypt()` in NSS using CKM_CHACHA20 and the same buffer for input and output can result in plaintext on an Intel Sandy Bridge processor. In Firefox this only affects the QUIC header protection feature when the connection is using the ChaCha20-Poly1305 cipher suite. The most likely outcome is connection failure, but if the connection persists despite the high packet loss it could be possible for a network observer to identify packets as coming from the same source despite a network path change. This vulnerability affects Firefox < 129, Firefox ESR < 115.14, and Firefox ESR < 128.1.
[ "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox_esr:128.0:*:*:*:*:*:*:*" ]
null
6.3
null
null
null
CVE-2017-18160
AGPS session failure in GNSS module due to cyphersuites are hardcoded and needed manual update everytime in snapdragon mobile and snapdragon wear in versions MDM9635M, MDM9645, MDM9650, MDM9655, MSM8909W, SD 835, SD 845, SD 850
[ "cpe:2.3:o:qualcomm:mdm9635m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9635m:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9645_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9645:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9650:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9655_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9655:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:msm8909w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:msm8909w:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_835_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_835:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_845_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_845:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_850_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_850:-:*:*:*:*:*:*:*" ]
null
null
9.8
10
null
CVE-2017-14301
STDU Viewer 1.6.375 allows attackers to execute arbitrary code or cause a denial of service via a crafted .jb2 file, related to "Data from Faulting Address controls subsequent Write Address starting at STDUJBIG2File!DllUnregisterServer+0x00000000000076d3."
[ "cpe:2.3:a:stdutility:stdu_viewer:1.6.375:*:*:*:*:*:*:*" ]
null
null
7.8
4.6
null
RHSA-2011:0350
Red Hat Security Advisory: tomcat5 and tomcat6 security update
JDK Double.parseDouble Denial-Of-Service tomcat: remote DoS via NIO connector
[ "cpe:/a:redhat:jboss_enterprise_web_server:1.0" ]
null
null
null
null
null
GHSA-4cxp-jjp3-3qpw
WordPress before 4.8.3 is affected by an issue where $wpdb->prepare() can create unexpected and unsafe queries leading to potential SQL injection (SQLi) in plugins and themes, as demonstrated by a "double prepare" approach, a different vulnerability than CVE-2017-14723.
[]
null
null
9.8
null
null
CVE-2022-3716
SourceCodester Online Medicine Ordering System cross site scripting
A vulnerability classified as problematic was found in SourceCodester Online Medicine Ordering System 1.0. Affected by this vulnerability is an unknown functionality of the file /omos/admin/?page=user/list. The manipulation of the argument First Name/Middle Name/Last Name leads to cross site scripting. The attack can be launched remotely. The associated identifier of this vulnerability is VDB-212347.
[ "cpe:2.3:a:oretnom23:online_medicine_ordering_system:1.0:*:*:*:*:*:*:*" ]
null
3.5
null
null
null
GHSA-wq2c-7m9f-vjwv
Unrestricted file upload vulnerability in admin/upload.php in Benja CMS 0.1 allows remote attackers to upload and execute arbitrary PHP files via unspecified vectors, followed by a direct request to the file in billeder/.
[]
null
null
null
null
null
CVE-2017-12141
In ytnef 1.9.2, a heap-based buffer overflow vulnerability was found in the function TNEFFillMapi in ytnef.c, which allows attackers to cause a denial of service via a crafted file.
[ "cpe:2.3:a:ytnef_project:ytnef:1.9.2:*:*:*:*:*:*:*" ]
null
null
5.5
4.3
null
CVE-2018-3213
Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: Docker Images). The supported version that is affected is prior to Docker 12.2.1.3.20180913. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3 to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle WebLogic Server accessible data. CVSS 3.0 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
[ "cpe:2.3:a:oracle:weblogic_server:*:*:*:*:*:*:*:*" ]
null
null
7.5
5
null
CVE-2017-1000498
AndroidSVG version 1.2.2 is vulnerable to XXE attacks in the SVG parsing component resulting in denial of service and possibly remote code execution
[ "cpe:2.3:a:androidsvg_project:androidsvg:1.2.2:-:*:*:*:*:*:*" ]
null
7.8
null
6.8
null
RHSA-2012:1380
Red Hat Security Advisory: python-django-horizon security update
OpenStack-Horizon: Open redirect through 'next' parameter
[ "cpe:/a:redhat:openstack:1::el6" ]
null
null
null
null
null
GHSA-wr4x-7qhj-2g7g
The PRNG implementation in the DNS resolver in Bionic in Android before 4.1.1 incorrectly uses time and PID information during the generation of random numbers for query ID values and UDP source ports, which makes it easier for remote attackers to spoof DNS responses by guessing these numbers, a related issue to CVE-2015-0800.
[]
null
null
null
null
null
CVE-2012-6090
Multiple stack-based buffer overflows in the expand function in os/pl-glob.c in SWI-Prolog before 6.2.5 and 6.3.x before 6.3.7 allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted filename.
[ "cpe:2.3:a:swi-prolog:swi-prolog:*:*:*:*:*:*:*:*", "cpe:2.3:a:swi-prolog:swi-prolog:5.6.50:*:*:*:*:*:*:*", "cpe:2.3:a:swi-prolog:swi-prolog:5.6.51:*:*:*:*:*:*:*", "cpe:2.3:a:swi-prolog:swi-prolog:5.6.52:*:*:*:*:*:*:*", "cpe:2.3:a:swi-prolog:swi-prolog:5.6.53:*:*:*:*:*:*:*", "cpe:2.3:a:swi-prolog:swi-prolog:5.6.54:*:*:*:*:*:*:*", "cpe:2.3:a:swi-prolog:swi-prolog:5.6.55:*:*:*:*:*:*:*", "cpe:2.3:a:swi-prolog:swi-prolog:5.6.56:*:*:*:*:*:*:*", "cpe:2.3:a:swi-prolog:swi-prolog:5.6.57:*:*:*:*:*:*:*", "cpe:2.3:a:swi-prolog:swi-prolog:5.6.58:*:*:*:*:*:*:*", "cpe:2.3:a:swi-prolog:swi-prolog:5.6.59:*:*:*:*:*:*:*", "cpe:2.3:a:swi-prolog:swi-prolog:5.6.61:*:*:*:*:*:*:*", "cpe:2.3:a:swi-prolog:swi-prolog:5.6.62:*:*:*:*:*:*:*", "cpe:2.3:a:swi-prolog:swi-prolog:5.6.63:*:*:*:*:*:*:*", "cpe:2.3:a:swi-prolog:swi-prolog:5.6.64:*:*:*:*:*:*:*", "cpe:2.3:a:swi-prolog:swi-prolog:5.8.0:*:*:*:*:*:*:*", "cpe:2.3:a:swi-prolog:swi-prolog:5.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:swi-prolog:swi-prolog:5.8.2:*:*:*:*:*:*:*", "cpe:2.3:a:swi-prolog:swi-prolog:5.8.3:*:*:*:*:*:*:*", "cpe:2.3:a:swi-prolog:swi-prolog:5.10.0:*:*:*:*:*:*:*", "cpe:2.3:a:swi-prolog:swi-prolog:5.10.1:*:*:*:*:*:*:*", "cpe:2.3:a:swi-prolog:swi-prolog:5.10.2:*:*:*:*:*:*:*", "cpe:2.3:a:swi-prolog:swi-prolog:5.10.3:*:*:*:*:*:*:*", "cpe:2.3:a:swi-prolog:swi-prolog:5.10.4:*:*:*:*:*:*:*", "cpe:2.3:a:swi-prolog:swi-prolog:5.10.5:*:*:*:*:*:*:*", "cpe:2.3:a:swi-prolog:swi-prolog:6.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:swi-prolog:swi-prolog:6.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:swi-prolog:swi-prolog:6.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:swi-prolog:swi-prolog:6.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:swi-prolog:swi-prolog:6.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:swi-prolog:swi-prolog:6.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:swi-prolog:swi-prolog:6.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:swi-prolog:swi-prolog:6.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:swi-prolog:swi-prolog:6.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:swi-prolog:swi-prolog:6.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:swi-prolog:swi-prolog:6.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:swi-prolog:swi-prolog:6.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:swi-prolog:swi-prolog:6.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:swi-prolog:swi-prolog:6.3.6:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2008-5035
The Resource Monitoring and Control (RMC) daemon in IBM Hardware Management Console (HMC) 7 release 3.2.0 SP1 and 3.3.0 SP2 allows remote attackers to cause a denial of service (daemon crash or hang) via a packet with an invalid length.
[ "cpe:2.3:a:ibm:hardware_management_console:3.2.0:sp1:*:*:*:*:*:*", "cpe:2.3:a:ibm:hardware_management_console:3.3.0:sp2:*:*:*:*:*:*" ]
null
null
null
5
null
GHSA-j4cv-xr5r-hq23
In the Linux kernel, the following vulnerability has been resolved:mm/hugetlb: fix missing hugetlb_lock for resv unchargeThere is a recent report on UFFDIO_COPY over hugetlb:https://lore.kernel.org/all/[email protected]/350: lockdep_assert_held(&hugetlb_lock);Should be an issue in hugetlb but triggered in an userfault context, where it goes into the unlikely path where two threads modifying the resv map together. Mike has a fix in that path for resv uncharge but it looks like the locking criteria was overlooked: hugetlb_cgroup_uncharge_folio_rsvd() will update the cgroup pointer, so it requires to be called with the lock held.
[]
null
null
null
null
null
CVE-2021-44476
A sandboxing issue in Odoo Community 15.0 and earlier and Odoo Enterprise 15.0 and earlier allows authenticated administrators to read local files on the server, including sensitive configuration files.
[ "cpe:2.3:a:odoo:odoo:*:*:*:*:community:*:*:*", "cpe:2.3:a:odoo:odoo:*:*:*:*:enterprise:*:*:*" ]
null
null
6.8
null
null
CVE-2025-24301
Arkcompiler Ets Runtime has an UAF vulnerability
in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through use after free. This vulnerability can be exploited only in restricted scenarios.
[]
null
3.8
null
null
null
CVE-2021-28464
VP9 Video Extensions Remote Code Execution Vulnerability
VP9 Video Extensions Remote Code Execution Vulnerability
[ "cpe:2.3:a:microsoft:vp9_video_extensions:-:*:*:*:*:*:*:*" ]
null
7.8
null
null
null
GHSA-hx58-x97g-cc9p
** DISPUTED ** The Bitcoin Proof-of-Work algorithm does not consider a certain attack methodology related to 80-byte block headers with a variety of initial 64-byte chunks followed by the same 16-byte chunk, multiple candidate root values ending with the same 4 bytes, and calculations involving sqrt numbers. This violates the security assumptions of (1) the choice of input, outside of the dedicated nonce area, fed into the Proof-of-Work function should not change its difficulty to evaluate and (2) every Proof-of-Work function execution should be independent. NOTE: a number of persons feel that this methodology is a benign mining optimization, not a vulnerability.
[]
null
null
7.5
null
null
GHSA-fj57-vhrc-73r7
Joomla! vulnerable to Cross-site Scripting
Multiple cross-site scripting (XSS) vulnerabilities in the back end in Joomla! 1.5 through 1.5.17 allow remote attackers to inject arbitrary web script or HTML via unknown vectors related to "various administrator screens," possibly the search parameter in administrator/index.php.
[]
null
null
null
null
null
CVE-2022-3450
Use after free in Peer Connection in Google Chrome prior to 106.0.5249.119 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" ]
null
8.8
null
null
null
GHSA-v4mq-p756-p4f5
Play Framework's Assets controller vulnerable to directory traversal
A directory traversal vulnerability has been found in the Assets controller in Play Framework 2.6.12 through 2.6.15 (fixed in 2.6.16) when running on Windows. It allows a remote attacker to download arbitrary files from the target server via specially crafted HTTP requests.
[]
null
null
7.5
null
null
RHSA-2021:2313
Red Hat Security Advisory: samba security and bug fix update
samba: Negative idmap cache entries can cause incorrect group entries in the Samba file server process token
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
6.8
null
null
null
CVE-2023-5504
The BackWPup plugin for WordPress is vulnerable to Directory Traversal in versions up to, and including, 4.0.1 via the Log File Folder. This allows authenticated attackers to store backups in arbitrary folders on the server provided they can be written to by the server. Additionally, default settings will place an index.php and a .htaccess file into the chosen directory (unless already present) when the first backup job is run that are intended to prevent directory listing and file access. This means that an attacker could set the backup directory to the root of another site in a shared environment and thus disable that site.
[ "cpe:2.3:a:inpsyde:backwpup:*:*:*:*:*:wordpress:*:*" ]
null
8.7
null
null
null
GHSA-cpp5-h7pc-fp83
Reflected XSS in business intelligence in Checkmk <2.2.0p8, <2.1.0p32, <2.0.0p38, <=1.6.0p30.
[]
null
5.4
null
null
null
GHSA-cj46-35hf-rv96
In PHP versions before 7.4.31, 8.0.24 and 8.1.11, the phar uncompressor code would recursively uncompress "quines" gzip files, resulting in an infinite loop.
[]
null
5.5
null
null
null
CVE-2007-0252
Unspecified vulnerability in easy-content filemanager allows remote attackers to upload or modify arbitrary files via unspecified vectors.
[ "cpe:2.3:a:easy-content_filemanager:easy-content_filemanager:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
GHSA-p6fg-9q8x-647w
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Leap Contractor Contact Form Website to Workflow Tool plugin <= 4.0.0 versions.
[]
null
7.1
null
null
null
GHSA-34gq-5fpf-r3h5
TOTOLINK A3100R V4.1.2cu.5050_B20200504 and V4.1.2cu.5247_B20211129 were discovered to contain a stack overflow via the comment parameter in the function setIpQosRules. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request.
[]
null
7.5
null
null
null
CVE-2006-3886
SQL injection vulnerability in Shalwan MusicBox 2.3.4 and earlier allows remote attackers to execute arbitrary SQL commands via the page parameter in a viewgallery action in a request for the top-level URI. NOTE: the start parameter/search action is already covered by CVE-2006-1807, and the show parameter/top action is already covered by CVE-2006-1360.
[ "cpe:2.3:a:musicbox:musicbox:2.3:*:*:*:*:*:*:*", "cpe:2.3:a:musicbox:musicbox:2.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:musicbox:musicbox:2.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:musicbox:musicbox:2.3_beta_2:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2024-8578
TOTOLINK AC1200 T8 cstecgi.cgi setWiFiMeshName buffer overflow
A vulnerability was found in TOTOLINK AC1200 T8 4.1.5cu.861_B20230220. It has been rated as critical. Affected by this issue is the function setWiFiMeshName of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument device_name leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
[ "cpe:2.3:o:totolink:ac1200_t8_firmware:4.1.5cu.861_b20230220:*:*:*:*:*:*:*", "cpe:2.3:o:totolink:t8_firmware:4.1.5cu.861_b20230220:*:*:*:*:*:*:*", "cpe:2.3:h:totolink:t8:-:*:*:*:*:*:*:*" ]
8.7
8.8
8.8
9
null
CVE-2004-2346
Multiple cross-site scripting (XSS) vulnerabilities in Forum Web Server 1.6 and earlier allow remote attackers to inject arbitrary web script or HTML via (1) the Subject field in post1.htm and (2) the File Description field in postfile2.htm.
[ "cpe:2.3:a:minihttpserver.net:forum_web_server:*:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
CVE-2024-6633
Insecure Default in FileCatalyst Workflow 5.1.6 Build 139 (and earlier)
The default credentials for the setup HSQL database (HSQLDB) for FileCatalyst Workflow are published in a vendor knowledgebase article. Misuse of these credentials could lead to a compromise of confidentiality, integrity, or availability of the software. The HSQLDB is only included to facilitate installation, has been deprecated, and is not intended for production use per vendor guides. However, users who have not configured FileCatalyst Workflow to use an alternative database per recommendations are vulnerable to attack from any source that can reach the HSQLDB.
[ "cpe:2.3:a:fortra:filecatalyst_workflow:*:*:*:*:*:*:*:*" ]
null
9.8
null
null
null
CVE-2025-24806
Regulation applies separately to Username-based logins to Email-based logins in authelia
Authelia is an open-source authentication and authorization server providing two-factor authentication and single sign-on (SSO) for applications via a web portal. If users are allowed to sign in via both username and email the regulation system treats these as separate login events. This leads to the regulation limitations being effectively doubled assuming an attacker using brute-force to find a user password. It's important to note that due to the effective operation of regulation where no user-facing sign of their regulation ban being visible either via timing or via API responses, it's effectively impossible to determine if a failure occurs due to a bad username password combination, or a effective ban blocking the attempt which heavily mitigates any form of brute-force. This occurs because the records and counting process for this system uses the method utilized for sign in rather than the effective username attribute. This has a minimal impact on account security, this impact is increased naturally in scenarios when there is no two-factor authentication required and weak passwords are used. This makes it a bit easier to brute-force a password. A patch for this issue has been applied to versions 4.38.19, and 4.39.0. Users are advised to upgrade. Users unable to upgrade should 1. Not heavily modify the default settings in a way that ends up with shorter or less frequent regulation bans. The default settings effectively mitigate any potential for this issue to be exploited. and 2. Disable the ability for users to login via an email address.
[]
2.3
null
null
null
null
GHSA-jfpm-rpx4-72wc
adbyby v2.7 allows external users to make connections via port 8118. This can cause a program logic error and lead to a Denial of Service (DoS) via high CPU usage due to a large number of connections.
[]
null
6.5
null
null
null
CVE-2024-40801
A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Sonoma 14.7, macOS Sequoia 15. An app may be able to access protected user data.
[ "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*" ]
null
5.5
null
null
null
GHSA-c82h-4vv7-76g8
A stored Cross-site Scripting (XSS) vulnerability affecting ENOVIA Collaborative Industry Innovator from Release 3DEXPERIENCE R2022x through Release 3DEXPERIENCE R2024x allows an attacker to execute arbitrary script code in user's browser session.
[]
null
8.7
null
null
null
CVE-2025-43739
Liferay Portal 7.4.0 through 7.4.3.132, and Liferay DXP 2025.Q1.0 through 2025.Q1.6, 2024.Q4.0 through 2024.Q4.7, 2024.Q3.1 through 2024.Q3.13, 2024.Q2.0 through 2024.Q2.13, 2024.Q1.1 through 2024.Q1.16 and 7.4 GA through update 92 allow any authenticated user to modify the content of emails sent through the calendar portlet, allowing an attacker to send phishing emails to any other user in the same organization.
[]
5.3
null
null
null
null
CVE-2024-35724
WordPress Bosa Elementor Addons and Templates for WooCommerce plugin <= 1.0.12 - Broken Access Control vulnerability
Missing Authorization vulnerability in Bosa Themes Bosa Elementor Addons and Templates for WooCommerce.This issue affects Bosa Elementor Addons and Templates for WooCommerce: from n/a through 1.0.12.
[ "cpe:2.3:a:bosathemes:bosa_elementor_addons_and_templates_for_woocommerce:*:*:*:*:*:wordpress:*:*" ]
null
4.3
null
null
null
GHSA-r6pf-3j3c-px2j
In libstagefright, there is a possible dead loop due to an uncaught exception. This could lead to remote denial of service with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-124783982
[]
null
null
null
null
null
CVE-2021-22719
A CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability exists in C-Bus Toolkit (V1.15.7 and prior) that could allow a remote code execution when a file is uploaded.
[ "cpe:2.3:a:schneider-electric:c-bus_toolkit:*:*:*:*:*:*:*:*" ]
null
8.8
null
6.5
null
CVE-2022-23119
A directory traversal vulnerability in Trend Micro Deep Security and Cloud One - Workload Security Agent for Linux version 20 and below could allow an attacker to read arbitrary files from the file system. Please note: an attacker must first obtain compromised access to the target Deep Security Manager (DSM) or the target agent must be not yet activated or configured in order to exploit this vulnerability.
[ "cpe:2.3:a:trendmicro:deep_security_agent:*:*:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:10.0:-:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:10.0:update1:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:10.0:update10:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:10.0:update11:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:10.0:update12:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:10.0:update13:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:10.0:update14:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:10.0:update15:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:10.0:update16:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:10.0:update17:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:10.0:update18:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:10.0:update19:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:10.0:update2:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:10.0:update20:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:10.0:update21:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:10.0:update22:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:10.0:update23:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:10.0:update24:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:10.0:update25:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:10.0:update26:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:10.0:update27:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:10.0:update28:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:10.0:update29:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:10.0:update3:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:10.0:update30:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:10.0:update31:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:10.0:update4:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:10.0:update5:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:10.0:update6:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:10.0:update7:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:10.0:update8:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:10.0:update9:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:11.0:-:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:11.0:update1:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:11.0:update10:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:11.0:update11:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:11.0:update12:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:11.0:update13:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:11.0:update14:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:11.0:update15:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:11.0:update16:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:11.0:update17:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:11.0:update18:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:11.0:update19:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:11.0:update2:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:11.0:update20:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:11.0:update21:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:11.0:update22:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:11.0:update23:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:11.0:update24:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:11.0:update25:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:11.0:update26:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:11.0:update27:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:11.0:update3:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:11.0:update4:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:11.0:update5:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:11.0:update6:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:11.0:update7:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:11.0:update8:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:11.0:update9:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:12.0:-:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:12.0:update1:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:12.0:update10:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:12.0:update11:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:12.0:update12:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:12.0:update13:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:12.0:update14:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:12.0:update15:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:12.0:update16:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:12.0:update17:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:12.0:update18:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:12.0:update19:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:12.0:update2:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:12.0:update20:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:12.0:update21:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:12.0:update3:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:12.0:update4:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:12.0:update5:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:12.0:update6:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:12.0:update7:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:12.0:update8:*:*:long_term_support:*:*:*", "cpe:2.3:a:trendmicro:deep_security_agent:12.0:update9:*:*:long_term_support:*:*:*", "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*" ]
null
7.5
null
4.3
null
CVE-2023-31138
DHIS2 Core vulnerable to Improper Access Control with PATCH requests
DHIS2 Core contains the service layer and Web API for DHIS2, an information system for data capture. Starting in the 2.36 branch and prior to versions 2.37.9.1, 2.38.3.1, and 2.39.1.2, using object model traversal in the payload of a PATCH request, authenticated users with write access to an object may be able to modify related objects that they should not have access to. DHIS2 implementers should upgrade to a supported version of DHIS2 to receive a patch: 2.37.9.1, 2.38.3.1, or 2.39.1.2. It is possible to work around this issue by blocking all PATCH requests on a reverse proxy, but this may cause some issues with the functionality of built-in applications using legacy PATCH requests.
[ "cpe:2.3:a:dhis2:dhis_2:*:*:*:*:*:*:*:*" ]
null
7.1
null
null
null
GHSA-2p25-rmjx-pfqv
In the Linux kernel, the following vulnerability has been resolved:clk: imx: Remove CLK_SET_PARENT_GATE for DRAM mux for i.MX7DFor i.MX7D DRAM related mux clock, the clock source change should ONLY be done done in low level asm code without accessing DRAM, and then calling clk API to sync the HW clock status with clk tree, it should never touch real clock source switch via clk API, so CLK_SET_PARENT_GATE flag should NOT be added, otherwise, DRAM's clock parent will be disabled when DRAM is active, and system will hang.
[]
null
5.5
null
null
null
GHSA-xcvf-58hp-27qh
Directory traversal vulnerability in the VulCore web service (WSVulnerabilityCore/VulCore.asmx) in Lenovo ThinkManagement Console 9.0.3 allows remote attackers to delete arbitrary files via a .. (dot dot) in the filename parameter in a SetTaskLogByFile SOAP request.
[]
null
null
null
null
null
GHSA-vm7v-r797-g9gr
Windows Kernel Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2023-21675, CVE-2023-21747, CVE-2023-21748, CVE-2023-21749, CVE-2023-21750, CVE-2023-21754, CVE-2023-21755, CVE-2023-21772, CVE-2023-21773.
[]
null
7.8
null
null
null
CVE-2022-33329
Multiple command injection vulnerabilities exist in the web_server ajax endpoints functionalities of Robustel R1510 3.3.0. A specially-crafted network packets can lead to arbitrary command execution. An attacker can send a sequence of requests to trigger these vulnerabilities.The `/ajax/set_sys_time/` API is affected by a command injection vulnerability.
[ "cpe:2.3:o:robustel:r1510_firmware:3.3.0:*:*:*:*:*:*:*", "cpe:2.3:h:robustel:r1510:-:*:*:*:*:*:*:*" ]
null
null
9.1
null
null
RHSA-2015:1947
Red Hat Security Advisory: Red Hat JBoss Operations Network 3.3.4 update
Cassandra: remote code execution via unauthenticated JMX/RMI interface
[ "cpe:/a:redhat:jboss_operations_network:3.3" ]
null
null
null
null
null
RHSA-2023:7257
Red Hat Security Advisory: dotnet6.0 security update
dotnet: Arbitrary File Write and Deletion Vulnerability: FormatFtpCommand dotnet: ASP.NET Security Feature Bypass Vulnerability in Blazor forms
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
5.5
null
null
null
CVE-2019-6244
An issue was discovered in UsualToolCMS 8.0. cmsadmin/a_sqlbackx.php?t=sql allows CSRF attacks that can execute SQL statements, and consequently execute arbitrary PHP code by writing that code into a .php file.
[ "cpe:2.3:a:usualtool:usualtoolcms:8.0:*:*:*:*:*:*:*" ]
null
null
8.8
6.8
null
GHSA-7wm2-j9cm-6464
PHP remote file inclusion vulnerability in mutant_functions.php in the Mutant 0.9.2 portal for phpBB 2.2 allows remote attackers to execute arbitrary PHP code via a URL in the phpbb_root_path parameter.
[]
null
null
null
null
null
GHSA-r3pg-4m7c-9pvw
XML external entity (XXE) vulnerability in the xmlStringLenDecodeEntities function in parser.c in libxml2 before 2.9.4, when not in validating mode, allows context-dependent attackers to read arbitrary files or cause a denial of service (resource consumption) via unspecified vectors.
[]
null
null
7.1
null
null