id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-j279-9hf3-534v | Hospital Management System in PHP with Source Code (HMS) 1.0 was discovered to contain a SQL injection vulnerability via the editid parameter in room.php. | [] | null | 9.8 | null | null |
|
RHSA-2021:3436 | Red Hat Security Advisory: kpatch-patch security update | kernel: powerpc: KVM guest OS users can cause host OS memory corruption | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.8 | null | null |
GHSA-242h-9g3g-w3fx | GreenCMS 2.3.0603 has an arbitrary file download vulnerability via an index.php?m=admin&c=media&a=downfile URI. | [] | null | null | 7.5 | null |
|
CVE-2024-11656 | EnGenius ENH1350EXT/ENS500-AC/ENS620EXT diag_ping6 command injection | A vulnerability, which was classified as critical, has been found in EnGenius ENH1350EXT, ENS500-AC and ENS620EXT up to 20241118. This issue affects some unknown processing of the file /admin/network/diag_ping6. The manipulation of the argument diag_ping6 leads to command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | [
"cpe:2.3:a:engenius:enh1350ext:20241118:*:*:*:*:*:*:*",
"cpe:2.3:a:engenius:ens500-ac:20241118:*:*:*:*:*:*:*",
"cpe:2.3:a:engenius:ens620ext:20241118:*:*:*:*:*:*:*",
"cpe:2.3:o:engeniustech:enh1350ext_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:engeniustech:enh1350ext:-:*:*:*:*:*:*:*",
"cpe:2.3:o:engeniustech:ens500-ac_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:engeniustech:eens500-ac:-:*:*:*:*:*:*:*",
"cpe:2.3:o:engeniustech:ens620ext_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:engeniustech:ens620ext:-:*:*:*:*:*:*:*"
] | 5.1 | 4.7 | 4.7 | 5.8 |
CVE-2009-4135 | The distcheck rule in dist-check.mk in GNU coreutils 5.2.1 through 8.1 allows local users to gain privileges via a symlink attack on a file in a directory tree under /tmp. | [
"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:a:gnu:coreutils:5.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:coreutils:5.91:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:coreutils:5.92:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:coreutils:5.93:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:coreutils:5.94:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:coreutils:5.95:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:coreutils:5.96:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:coreutils:5.97:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:coreutils:6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:coreutils:6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:coreutils:6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:coreutils:6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:coreutils:6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:coreutils:6.7:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:coreutils:6.8:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:coreutils:6.9:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:coreutils:6.10:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:coreutils:6.11:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:coreutils:6.12:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:coreutils:7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:coreutils:7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:coreutils:7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:coreutils:7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:coreutils:7.5:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:coreutils:7.6:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:coreutils:8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:11:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:12:*:*:*:*:*:*:*"
] | null | null | null | 4.4 |
|
CVE-2022-48199 | SoftPerfect NetWorx 7.1.1 on Windows allows an attacker to execute a malicious binary with potentially higher privileges via a low-privileged user account that abuses the Notifications function. The Notifications function allows for arbitrary binary execution and can be modified by any user. The resulting binary execution will occur in the context of any user running NetWorx. If an attacker modifies the Notifications function to execute a malicious binary, the binary will be executed by every user running NetWorx on that system. | [
"cpe:2.3:a:softperfect:networx:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
|
GHSA-47cw-xf65-434r | Memory leak in Cisco IOS 12.4, 15.0, and 15.1, and IOS XE 2.5.x through 3.2.x, allows remote attackers to cause a denial of service (memory consumption) via a crafted SIP message, aka Bug ID CSCti48504. | [] | null | null | null | null |
|
CVE-2019-9536 | Apple iPhone 3GS bootrom malloc implementation returns a non-NULL pointer when unable to allocate memory, aka 'alloc8'. An attacker with physical access to the device can install arbitrary firmware. | [
"cpe:2.3:h:apple:iphone_3gs:-:*:*:*:*:*:*:*"
] | null | 6.1 | null | null |
|
CVE-2020-2924 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.19 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | [
"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*"
] | null | null | 4.9 | null |
|
GHSA-h459-7mrx-8pvc | rubygem-hammer_cli_foreman: File /etc/hammer/cli.modules.d/foreman.yml world readable | [] | null | 5.5 | null | null |
|
RHSA-2020:1344 | Red Hat Security Advisory: virt:rhel security update | QEMU: slirp: OOB buffer access while emulating tcp protocols in tcp_emu() | [
"cpe:/a:redhat:rhel_e4s:8.0::appstream"
] | null | 5.6 | null | null |
RHBA-2024:2862 | Red Hat Bug Fix Advisory: Multicluster Engine for Kubernetes 2.5.3 bug fixes and container updates | follow-redirects: Possible credential leak | [
"cpe:/a:redhat:multicluster_engine:2.5::el8"
] | null | 6.5 | null | null |
GHSA-28q4-j765-rwrg | Cross-site scripting (XSS) vulnerability in the Terminal PHP Shell (terminal) extension 0.3.2 and earlier for TYPO3 allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors. | [] | null | null | null | null |
|
GHSA-7vmv-mpx6-985j | Baicells Nova436Q and Neutrino 430 devices with firmware through QRTB 2.7.8 have hardcoded credentials that are easily discovered, and can be used by remote attackers to authenticate via ssh. (The credentials are stored in the firmware, encrypted by the crypt function.) | [] | null | 9.8 | null | null |
|
CVE-2019-6692 | A malicious DLL preload vulnerability in Fortinet FortiClient for Windows 6.2.0 and below allows a privileged attacker to perform arbitrary code execution via forging that DLL. | [
"cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:windows:*:*"
] | null | 7.8 | null | 4.4 |
|
GHSA-wg55-v4qx-w8g3 | In net/socket.c in the Linux kernel through 4.17.1, there is a race condition between fchownat and close in cases where they target the same socket file descriptor, related to the sock_close and sockfs_setattr functions. fchownat does not increment the file descriptor reference count, which allows close to set the socket to NULL during fchownat's execution, leading to a NULL pointer dereference and system crash. | [] | null | null | 5.9 | null |
|
CVE-2022-32749 | Apache Traffic Server: Improperly handled requests can cause crashes in specific plugins |
Improper Check for Unusual or Exceptional Conditions vulnerability handling requests in Apache Traffic Server allows an attacker to crash the server under certain conditions.
This issue affects Apache Traffic Server: from 8.0.0 through 9.1.3.
| [
"cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
GHSA-wrvj-wm63-g44c | The My Mobile Day (aka com.mymobileday) application 1.3 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [] | null | null | null | null |
|
CVE-2007-6083 | SQL injection vulnerability in admin/index.php in IceBB 1.0-rc6 allows remote attackers to execute arbitrary SQL commands via the X-Forwarded-For HTTP header. | [
"cpe:2.3:a:icebb:icebb:1.0-rc6:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-3p86-xgrq-m6p6 | Improper Neutralization of Input During Web Page Generation in Apache Tomcat | Multiple cross-site scripting (XSS) vulnerabilities in the HTML Manager Interface in Apache Tomcat 5.5 before 5.5.32, 6.0 before 6.0.30, and 7.0 before 7.0.6 allow remote attackers to inject arbitrary web script or HTML, as demonstrated via the display-name tag. | [] | null | null | null | null |
GHSA-xg8v-4hxj-rcfg | String handling functions in Mozilla 1.7.3, Firefox 1.0, and Thunderbird before 1.0.2, such as the nsTSubstring_CharT::Replace function, do not properly check the return values of other functions that resize the string, which allows remote attackers to cause a denial of service and possibly execute arbitrary code by forcing an out-of-memory state that causes a reallocation to fail and return a pointer to a fixed address, which leads to heap corruption. | [] | null | null | null | null |
|
GHSA-2m4h-74g6-655h | Adobe Flash Player before 13.0.0.269 and 14.x through 16.x before 16.0.0.305 on Windows and OS X and before 11.2.202.442 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0314, CVE-2015-0316, CVE-2015-0318, CVE-2015-0321, and CVE-2015-0330. | [] | null | null | null | null |
|
CVE-2020-0247 | In Threshold::getHistogram of ImageProcessHelper.java, there is a possible crash loop due to an uncaught exception. This could lead to local denial of service with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-8.0 Android-8.1Android ID: A-156087409 | [
"cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*"
] | null | 5.5 | null | 4.9 |
|
CVE-2003-1375 | Buffer overflow in wall for HP-UX 10.20 through 11.11 may allow local users to execute arbitrary code by calling wall with a large file as an argument. | [
"cpe:2.3:o:hp:hp-ux:10.20:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:11.04:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:11.11:*:*:*:*:*:*:*"
] | null | null | null | 7.2 |
|
RHSA-2021:2543 | Red Hat Security Advisory: Red Hat OpenShift Jaeger 1.20.4 security update | libthrift: potential DoS when processing untrusted payloads golang: math/big: panic during recursive division of very large numbers nodejs-lodash: ReDoS via the toNumber, trim and trimEnd functions golang: crypto/elliptic: incorrect operations on the P-224 curve nodejs-lodash: command injection via template golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header | [
"cpe:/a:redhat:jaeger:1.20::el8"
] | null | 5.9 | null | null |
GHSA-gf92-cf44-4238 | In the Linux kernel, the following vulnerability has been resolved:ocfs2: add bounds checking to ocfs2_check_dir_entry()This adds sanity checks for ocfs2_dir_entry to make sure all members of
ocfs2_dir_entry don't stray beyond valid memory region. | [] | null | null | null | null |
|
GHSA-9j36-jg73-vfcw | The d8s-domains for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-networking package. The affected version is 0.1.0 | [] | null | 9.8 | null | null |
|
GHSA-r7fv-7h5m-jcwv | Multiple vulnerabilities in the API of Cisco DNA Center Software could allow an authenticated, remote attacker to read information from a restricted container, enumerate user information, or execute arbitrary commands in a restricted container as the root user. For more information about these vulnerabilities, see the Details section of this advisory. | [] | null | null | 5.4 | null |
|
CVE-2017-8513 | A remote code execution vulnerability exists in Microsoft PowerPoint when the software fails to properly handle objects in memory, aka "Microsoft PowerPoint Remote Code Execution Vulnerability". | [
"cpe:2.3:a:microsoft:powerpoint:2007:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_server:2007:sp3:*:*:*:*:*:*"
] | null | null | 7.8 | 9.3 |
|
GHSA-82mv-g2x6-p4mx | In the Linux kernel, the following vulnerability has been resolved:iio: adc: adi-axi-adc: Fix refcount leak in adi_axi_adc_attach_clientof_parse_phandle() returns a node pointer with refcount
incremented, we should use of_node_put() on it when not need anymore.
Add missing of_node_put() to avoid refcount leak. | [] | null | 5.5 | null | null |
|
CVE-2023-27347 | G DATA Total Security Link Following Local Privilege Escalation Vulnerability | G DATA Total Security Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of G Data Total Security. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
The specific flaw exists within the G DATA Backup Service. By creating a symbolic link, an attacker can abuse the service to create arbitrary files. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-18749. | [
"cpe:2.3:a:gdata-software:total_security:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | null |
CVE-2023-22243 | Adobe Animate SVG file Stack-based Buffer Overflow Arbitrary code execution | Adobe Animate versions 22.0.8 (and earlier) and 23.0.0 (and earlier) are affected by a Stack-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [
"cpe:2.3:a:adobe:animate:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:animate:23.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
RHSA-2019:0544 | Red Hat Security Advisory: .NET Core on Red Hat Enterprise Linux security update for March 2019 | dotnet: NuGet Tampering Vulnerability | [
"cpe:/a:redhat:rhel_dotnet:1.0::el7",
"cpe:/a:redhat:rhel_dotnet:1.1::el7",
"cpe:/a:redhat:rhel_dotnet:2.1::el7",
"cpe:/a:redhat:rhel_dotnet:2.2::el7"
] | null | null | 7.8 | null |
CVE-2015-8578 | AVG Internet Security 2015 allocates memory with Read, Write, Execute (RWX) permissions at predictable addresses when protecting user-mode processes, which allows attackers to bypass the DEP and ASLR protection mechanisms via unspecified vectors. | [
"cpe:2.3:a:avg:internet_security:2015:*:*:*:*:*:*:*"
] | null | null | null | 6.4 |
|
GHSA-5x58-gqg4-wfvq | SOGo 2.x before 2.4.1 and 3.x through 5.x before 5.1.1 does not validate the signatures of any SAML assertions it receives. Any actor with network access to the deployment could impersonate users when SAML is the authentication method. (Only versions after 2.0.5a are affected.) | [] | null | 7.5 | null | null |
|
GHSA-r73h-f7r4-p3vq | Unspecified vulnerability in the AirPcap support in Wireshark (formerly Ethereal) 0.99.3 has unspecified attack vectors related to WEP key parsing. | [] | null | null | null | null |
|
RHSA-2016:2039 | Red Hat Security Advisory: python-django security update | python-django: CSRF protection bypass on a site with Google Analytics | [
"cpe:/a:redhat:openstack:5::el7"
] | null | null | 6.1 | null |
GHSA-r24r-896x-hrvr | The WP Quick FrontEnd Editor plugin for WordPress is vulnerable to Setting Changs in versions up to, and including, 5.5. This is due to lacking both a security nonce and a capabilities check. This makes it possible for low-authenticated attackers to change plugin settings even when they do not have the capabilities to do so. | [] | null | 4.3 | null | null |
|
RHSA-2009:1426 | Red Hat Security Advisory: openoffice.org security update | OpenOffice.org Word document Integer Underflow OpenOffice.org Word document buffer overflow | [
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation"
] | null | null | null | null |
GHSA-9w28-c8g5-whmh | An information disclosure vulnerability in meeting of Pulse Connect Secure <9.1R8 allowed an authenticated end-users to find meeting details, if they know the Meeting ID. | [] | null | 4.3 | null | null |
|
CVE-2018-13902 | Out of bounds memory read and access due to improper array index validation may lead to unexpected behavior while decoding XTRA file in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in MDM9150, MDM9206, MDM9607, MDM9615, MDM9635M, MDM9640, MDM9650, MDM9655, MSM8909W, MSM8996AU, QCS605, Qualcomm 215, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 625, SD 632, SD 636, SD 650/52, SD 675, SD 712 / SD 710 / SD 670, SD 730, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SD 8CX, SDA660, SDM439, SDM630, SDM660, SDX20, Snapdragon_High_Med_2016, SXR1130 | [
"cpe:2.3:o:qualcomm:mdm9150_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9206_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9206:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9607_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9607:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9615_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9615:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9635m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9635m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9640_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9640:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9650:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9655_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9655:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8909w_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8909w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8996au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs605_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs605:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qc_215_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qc_215:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_210_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_210:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_212_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_212:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_205_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_205:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_425_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_425:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_427_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_427:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_430_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_430:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_435_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_435:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_439_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_439:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_429_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_429:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_450_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_450:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_625_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_625:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_632_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_632:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_636_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_636:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_650_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_650:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_652_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_652:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_675_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_675:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_712_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_712:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_710_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_710:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_670_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_670:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_730_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_730:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_820_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_820:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_820a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_820a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_835_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_835:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_845_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_845:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_850_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_850:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_855_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_855:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_8cx_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_8cx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sda660_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sda660:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm439_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm439:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm630_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm630:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm660_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm660:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx20_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx20:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_high_med_2016_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_high_med_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sxr1130_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sxr1130:-:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
GHSA-2m74-3m4w-28q3 | Microsoft Internet Explorer 6 through 11 allows remote attackers to gain privileges via a crafted web site, aka "Internet Explorer Elevation of Privilege Vulnerability." | [] | null | 8.8 | null | null |
|
GHSA-vh65-4p7f-vw9q | SQL injection vulnerability in soporte_derecha_w.php in PHP Webquest 2.5 and earlier allows remote attackers to execute arbitrary SQL commands via the id_actividad parameter. | [] | null | null | null | null |
|
CVE-2023-6901 | codelyfe Stupid Simple CMS HTTP POST Request handle-command.php os command injection | A vulnerability, which was classified as critical, was found in codelyfe Stupid Simple CMS up to 1.2.3. This affects an unknown part of the file /terminal/handle-command.php of the component HTTP POST Request Handler. The manipulation of the argument command with the input whoami leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-248259. | [
"cpe:2.3:a:codelyfe:stupid_simple_cms:*:*:*:*:*:*:*:*"
] | null | 7.3 | 7.3 | 7.5 |
CVE-2021-23452 | Prototype Pollution | This affects all versions of package x-assign. The global proto object can be polluted using the __proto__ object. | [
"cpe:2.3:a:binaryops:x-assign:*:*:*:*:*:node.js:*:*"
] | null | 8.6 | null | null |
GHSA-cjjr-h37f-5xw7 | An issue has been discovered in GitLab DAST scanner affecting all versions starting from 3.0.29 before 4.0.5, in which the DAST scanner leak cross site cookies on redirect during authorization. | [] | null | 5 | null | null |
|
CVE-2016-4391 | A remote code execution security vulnerability has been identified in all versions of the HP ArcSight WINC Connector prior to v7.3.0. | [
"cpe:2.3:a:hp:arcsight_winc_connector:*:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 |
|
CVE-2008-0298 | KHTML WebKit as used in Apple Safari 2.x allows remote attackers to cause a denial of service (browser crash) via a crafted web page, possibly involving a STYLE attribute of a DIV element. | [
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.4:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
RHSA-2024:2696 | Red Hat Security Advisory: unbound security update | bind9: KeyTrap - Extreme CPU consumption in DNSSEC validator bind9: Preparing an NSEC3 closest encloser proof can exhaust CPU resources unbound: unrestricted reconfiguration enabled to anyone that may lead to local privilege escalation | [
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
] | null | 8 | null | null |
RHSA-2016:0176 | Red Hat Security Advisory: glibc security and bug fix update | glibc: calloc may return non-zero memory glibc: getaddrinfo stack-based buffer overflow | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
CVE-2018-19993 | A reflected cross-site scripting (XSS) vulnerability in Dolibarr 8.0.2 allows remote attackers to inject arbitrary web script or HTML via the transphrase parameter to public/notice.php. | [
"cpe:2.3:a:dolibarr:dolibarr_erp\\/crm:8.0.2:*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 |
|
GHSA-hjc4-wr6f-p7xr | Multiple buffer overflows in Thomas Hauck Jana Server 2.x through 2.2.1, and 1.4.6 and earlier, allow remote attackers to cause a denial of service and possibly execute arbitrary code via (1) an HTTP GET request with a long major version number, (2) an HTTP GET request to the HTTP proxy on port 3128 with a long major version number, (3) a long OK reply from a POP3 server, and (4) a long SMTP server response. | [] | null | null | null | null |
|
CVE-2008-7197 | Multiple unspecified vulnerabilities in G15Daemon before 1.9.4 have unknown impact and attack vectors. | [
"cpe:2.3:a:g15tools:g15daemon:*:*:*:*:*:*:*:*",
"cpe:2.3:a:g15tools:g15daemon:1.1-2:*:*:*:*:*:*:*",
"cpe:2.3:a:g15tools:g15daemon:1.1-02:*:*:*:*:*:*:*",
"cpe:2.3:a:g15tools:g15daemon:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:g15tools:g15daemon:1.2-1:*:*:*:*:*:*:*",
"cpe:2.3:a:g15tools:g15daemon:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:g15tools:g15daemon:1.2.1-1:*:*:*:*:*:*:*",
"cpe:2.3:a:g15tools:g15daemon:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:g15tools:g15daemon:1.2.2-1:*:*:*:*:*:*:*",
"cpe:2.3:a:g15tools:g15daemon:1.2.3-1:*:*:*:*:*:*:*",
"cpe:2.3:a:g15tools:g15daemon:1.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:g15tools:g15daemon:1.2.4-1:*:*:*:*:*:*:*",
"cpe:2.3:a:g15tools:g15daemon:1.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:g15tools:g15daemon:1.2.5-1:*:*:*:*:*:*:*",
"cpe:2.3:a:g15tools:g15daemon:1.2.6a:*:*:*:*:*:*:*",
"cpe:2.3:a:g15tools:g15daemon:1.2.6a-1:*:*:*:*:*:*:*",
"cpe:2.3:a:g15tools:g15daemon:1.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:g15tools:g15daemon:1.2.7-1:*:*:*:*:*:*:*",
"cpe:2.3:a:g15tools:g15daemon:1.9.0:pre2.0:*:*:*:*:*:*",
"cpe:2.3:a:g15tools:g15daemon:1.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:g15tools:g15daemon:1.9.2:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
CVE-2017-7016 | An issue was discovered in certain Apple products. macOS before 10.12.6 is affected. The issue involves the "afclip" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted audio file. | [
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | 6.8 |
|
CVE-2021-25421 | Improper log management vulnerability in Galaxy Watch3 PlugIn prior to version 2.2.09.21033151 allows attacker with log permissions to leak Wi-Fi password connected to the user smartphone within log. | [
"cpe:2.3:a:samsung:galaxy_watch_3_plugin:*:*:*:*:*:android:*:*"
] | null | 5.5 | null | 2.1 |
|
CVE-2024-32077 | Apache Airflow: XSS vulnerability in Task Instance Log/Log Details | Apache Airflow version 2.9.0 has a vulnerability that allows an authenticated attacker to inject malicious data into the task instance logs.
Users are recommended to upgrade to version 2.9.1, which fixes this issue. | [
"cpe:2.3:a:apache:airflow:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:airflow:2.9.0:-:*:*:*:*:*:*",
"cpe:2.3:a:apache:airflow:2.9.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:apache:airflow:2.9.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:apache:airflow:2.9.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:apache:airflow:2.9.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:apache:airflow:2.9.0:rc3:*:*:*:*:*:*"
] | null | 5.4 | null | null |
CVE-2019-12472 | An Incorrect Access Control vulnerability was found in Wikimedia MediaWiki 1.18.0 through 1.32.1. It is possible to bypass the limits on IP range blocks ($wgBlockCIDRLimit) by using the API. Fixed in 1.32.2, 1.31.2, 1.30.2 and 1.27.6. | [
"cpe:2.3:a:mediawiki:mediawiki:*:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
CVE-2021-33695 | Potentially, SAP Cloud Connector, version - 2.0 communication with the backend is accepted without sufficient validation of the certificate. | [
"cpe:2.3:a:sap:cloud_connector:2.0:*:*:*:*:*:*:*"
] | null | null | 6.8 | null |
|
CVE-2024-50508 | WordPress Woocommerce Product Design plugin <= 1.0.0 - Arbitrary File Download vulnerability | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Chetan Khandla Woocommerce Product Design allows Path Traversal.This issue affects Woocommerce Product Design: from n/a through 1.0.0. | [] | null | 7.5 | null | null |
CVE-2024-24836 | WordPress GDPR Data Request Form Plugin <= 1.6 is vulnerable to Cross Site Scripting (XSS) | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Audrasjb GDPR Data Request Form allows Stored XSS.This issue affects GDPR Data Request Form: from n/a through 1.6.
| [
"cpe:2.3:a:whodunit:gdpr_data_request_form:*:*:*:*:*:wordpress:*:*"
] | null | 6.5 | null | null |
GHSA-7mv3-28xx-x4w6 | Unspecified vulnerability in EMC Avamar 4.1.x and 5.0 before SP1 allows remote attackers to cause a denial of service (gsan service hang) by sending a crafted message using TCP. | [] | null | null | null | null |
|
CVE-2024-2696 | Swift Framework < 2024.04.30 - Admin+ Stored XSS via Settings | The socialdriver-framework WordPress plugin before 2024.04.30 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) | [
"cpe:2.3:a:swift_ideas:socialdriver_framework:*:*:*:*:*:*:*:*"
] | null | 4.8 | null | null |
CVE-2023-28499 | WordPress Slide Anything Plugin <= 2.4.9 is vulnerable to Cross Site Scripting (XSS) | Auth. (author+) Stored Cross-Site Scripting (XSS) vulnerability in simonpedge Slide Anything – Responsive Content / HTML Slider and Carousel plugin <= 2.4.9 versions. | [
"cpe:2.3:a:simonpedge:slide_anything-responsive_content\\/html_slider_and_carousel:*:*:*:*:*:*:*:*"
] | null | 5.4 | null | null |
CVE-2008-1858 | SQL injection vulnerability in index.php in 724Networks 724CMS 4.01 and earlier allows remote attackers to execute arbitrary SQL commands via the ID parameter. | [
"cpe:2.3:a:724cms:724cms:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2020-25272 | In SourceCodester Online Bus Booking System 1.0, there is XSS through the name parameter in book_now.php. | [
"cpe:2.3:a:online_bus_booking_system_project:online_bus_booking_system:1.0:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 |
|
CVE-2023-28613 | An issue was discovered in Samsung Exynos Mobile Processor and Baseband Modem Processor for Exynos 1280, Exynos 2200, and Exynos Modem 5300. An integer overflow in IPv4 fragment handling can occur due to insufficient parameter validation when reassembling these fragments. | [
"cpe:2.3:o:samsung:exynos_1280_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:samsung:exynos_1280:-:*:*:*:*:*:*:*",
"cpe:2.3:o:samsung:exynos_2200_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:samsung:exynos_2200:-:*:*:*:*:*:*:*",
"cpe:2.3:o:samsung:exynos_modem_5300_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:samsung:exynos_modem_5300:-:*:*:*:*:*:*:*"
] | null | 6.8 | null | null |
|
CVE-2024-56067 | WordPress WP SuperBackup plugin <= 2.3.3 - Unauthenticated Backup File Download Vulnerability | Missing Authorization vulnerability in Azzaroco WP SuperBackup allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP SuperBackup: from n/a through 2.3.3. | [] | null | 7.5 | null | null |
GHSA-jxxr-3crv-vmgr | A sanitization vulnerability exists in Rocket.Chat server versions <3.13.2, <3.12.4, <3.11.4 that allowed queries to an endpoint which could result in a NoSQL injection, potentially leading to RCE. | [] | null | 9.8 | null | null |
|
GHSA-fhp4-279c-9rhq | In GIFLIB before 2019-02-16, a malformed GIF file triggers a divide-by-zero exception in the decoder function DGifSlurp in dgif_lib.c if the height field of the ImageSize data structure is equal to zero. | [] | null | null | 6.5 | null |
|
CVE-2023-45171 | IBM AIX denial of service | IBM AIX 7.2, 7.3, and VIOS 3.1 could allow a non-privileged local user to exploit a vulnerability in the kernel to cause a denial of service. IBM X-Force ID: 267969. | [
"cpe:2.3:a:ibm:vios:3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:7.2:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:7.3:*:*:*:*:*:*:*"
] | null | 6.2 | null | null |
RHSA-2012:0387 | Red Hat Security Advisory: firefox security and bug fix update | Mozilla: XSS with multiple Content Security Policy headers (MFSA 2012-15) Mozilla: XSS with Drag and Drop and Javascript: URL (MFSA 2012-13) Mozilla: SVG issues found with Address Sanitizer (MFSA 2012-14) Mozilla: SVG issues found with Address Sanitizer (MFSA 2012-14) Mozilla: Escalation of privilege with Javascript: URL as home page (MFSA 2012-16) Mozilla: Crash when accessing keyframe cssText after dynamic modification (MFSA 2012-17) Mozilla: window.fullScreen writeable by untrusted content (MFSA 2012-18) Mozilla: Miscellaneous memory safety hazards (rv:11.0/ rv:10.0.3 / rv:1.9.2.28) (MFSA 2012-19) Mozilla: Miscellaneous memory safety hazards (rv:11.0/ rv:10.0.3 / rv:1.9.2.28) (MFSA 2012-19) Mozilla: Miscellaneous memory safety hazards (rv:11.0/ rv:10.0.3 / rv:1.9.2.28) (MFSA 2012-19) | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
PYSEC-2021-745 | null | TensorFlow is an end-to-end open source platform for machine learning. Passing invalid arguments (e.g., discovered via fuzzing) to `tf.raw_ops.SparseCountSparseOutput` results in segfault. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. | [] | null | null | null | null |
GHSA-58c5-9mqc-q73p | Apport can be tricked into connecting to arbitrary sockets as the root user | [] | null | null | null | null |
|
CVE-2019-16467 | Adobe Experience Manager versions 6.5, 6.4, 6.3, 6.2, 6.1, and 6.0 have a reflected cross-site scripting vulnerability. Successful exploitation could lead to sensitive information disclosure. | [
"cpe:2.3:a:adobe:experience_manager:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:experience_manager:6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:experience_manager:6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:experience_manager:6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:experience_manager:6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:experience_manager:6.5:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 |
|
CVE-2021-21642 | Jenkins Config File Provider Plugin 3.7.0 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. | [
"cpe:2.3:a:jenkins:config_file_provider:*:*:*:*:*:jenkins:*:*"
] | null | 8.1 | null | 5.5 |
|
CVE-2021-22948 | Vulnerability in the generation of session IDs in revive-adserver < 5.3.0, based on the cryptographically insecure uniqid() PHP function. Under some circumstances, an attacker could theoretically be able to brute force session IDs in order to take over a specific account. | [
"cpe:2.3:a:revive-adserver:revive_adserver:*:*:*:*:*:*:*:*",
"cpe:2.3:a:revive-adserver:revive_adserver:5.3.0:rc1:*:*:*:*:*:*"
] | null | 7.1 | null | 4.3 |
|
RHSA-2014:1939 | Red Hat Security Advisory: openstack-trove security update | Trove: potential leak of passwords into log files Trove: potential leak of passwords into log files | [
"cpe:/a:redhat:openstack:5::el7"
] | null | null | null | null |
GHSA-fwrg-m5rp-3q8j | A Command Injection issue was discovered in Nortek Linear eMerge E3 series Versions V0.32-07e and prior. A remote attacker may be able to execute arbitrary code on a target machine with elevated privileges. | [] | null | null | 9.8 | null |
|
GHSA-r58g-p5fc-5h6w | Gurux GXDLMS Director prior to 8.5.1905.1301 downloads updates to add-ins and OBIS code over an unencrypted HTTP connection. A man-in-the-middle attacker can prompt the user to download updates by modifying the contents of gurux.fi/obis/files.xml and gurux.fi/updates/updates.xml. Then, the attacker can modify the contents of downloaded files. In the case of add-ins (if the user is using those), this will lead to code execution. In case of OBIS codes (which the user is always using as they are needed to communicate with the energy meters), this can lead to code execution when combined with CVE-2020-8810. | [] | null | null | null | null |
|
RHSA-2023:0625 | Red Hat Security Advisory: libksba security update | libksba: integer overflow to code execution | [
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 8.6 | null | null |
GHSA-4j35-7cr4-3mc8 | Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via TLS to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data as well as unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 7.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N). | [] | null | 7.4 | null | null |
|
CVE-2019-0765 | A remote code execution vulnerability exists in the way that comctl32.dll handles objects in memory, aka 'Comctl32 Remote Code Execution Vulnerability'. | [
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
] | null | null | 8.8 | 9.3 |
|
GHSA-r4vw-x7gf-4r43 | Integer overflow in Layout in Google Chrome prior to 129.0.6668.89 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) | [] | null | 8.8 | null | null |
|
CVE-2015-8077 | Integer overflow in the index_urlfetch function in imap/index.c in Cyrus IMAP 2.3.19, 2.4.18, and 2.5.6 allows remote attackers to have unspecified impact via vectors related to urlfetch range checks and the start_octet variable. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-8076. | [
"cpe:2.3:a:cyrus:imap:2.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.3.8:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.3.9:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.3.10:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.3.11:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.3.12:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.3.13:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.3.14:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.3.15:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.3.16:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.3.17:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.3.18:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.4.9:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.4.10:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.4.11:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.4.12:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.4.13:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.4.14:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.4.15:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.4.16:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.4.17:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.5.3:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-cw35-p78f-2qfc | Cistron RADIUS daemon (radiusd-cistron) 1.6.6 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code via a large value in an NAS-Port attribute, which is interpreted as a negative number and causes a buffer overflow. | [] | null | null | null | null |
|
GHSA-9gf3-h693-qh48 | Buffer overflow in asnsp.dll in Aventail Connect 4.1.2.13 allows remote attackers to cause a denial of service (application crash) or execute arbitrary code via a malformed DNS query. | [] | null | null | null | null |
|
CVE-2023-0096 | Happyforms < 1.22.0 - Contributor+ Stored XSS | The Happyforms WordPress plugin before 1.22.0 does not validate and escape some of its block options before outputting them back in a page/post where the block is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks. | [
"cpe:2.3:a:happyforms:happyforms:*:*:*:*:*:wordpress:*:*"
] | null | 5.4 | null | null |
GHSA-p2qq-c693-q53w | Restarting a run with revoked script approval allowed by Jenkins Pipeline: Declarative Plugin | Jenkins Pipeline: Declarative Plugin 2.2214.vb_b_34b_2ea_9b_83 and earlier does not check whether the main (Jenkinsfile) script used to restart a build from a specific stage is approved, allowing attackers with Item/Build permission to restart a previous build whose (Jenkinsfile) script is no longer approved. This allows attackers with Item/Build permission to restart a previous build whose (Jenkinsfile) script is no longer approved. Pipeline: Declarative Plugin 2.2218.v56d0cda_37c72 refuses to restart a build whose main (Jenkinsfile) script is unapproved. | [] | null | 8 | null | null |
CVE-2020-11545 | Project Worlds Official Car Rental System 1 is vulnerable to multiple SQL injection issues, as demonstrated by the email and parameters (account.php), uname and pass parameters (login.php), and id parameter (book_car.php) This allows an attacker to dump the MySQL database and to bypass the login authentication prompt. | [
"cpe:2.3:a:projectworlds:official_car_rental_system:1.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
|
CVE-2013-6141 | Unspecified vulnerability in op5 Monitor before 6.1.3 allows attackers to read arbitrary files via unknown vectors related to lack of authorization. | [
"cpe:2.3:a:op5:monitor:*:*:*:*:*:*:*:*",
"cpe:2.3:a:op5:monitor:5.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:op5:monitor:5.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:op5:monitor:5.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:op5:monitor:5.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:op5:monitor:5.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:op5:monitor:5.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:op5:monitor:5.5.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:op5:monitor:5.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:op5:monitor:5.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:op5:monitor:5.6.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:op5:monitor:5.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:op5:monitor:5.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:op5:monitor:5.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:op5:monitor:5.7.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:op5:monitor:5.7.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:op5:monitor:5.7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:op5:monitor:5.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:op5:monitor:5.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:op5:monitor:6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:op5:monitor:6.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:op5:monitor:6.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:op5:monitor:6.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:op5:monitor:6.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:op5:monitor:6.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:op5:monitor:6.1.0:beta6:*:*:*:*:*:*",
"cpe:2.3:a:op5:monitor:6.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:op5:monitor:6.1.2:alpha:*:*:*:*:*:*",
"cpe:2.3:a:op5:monitor:6.1.2:beta4:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-c9w2-52x6-j7c4 | A remote code execution vulnerability exists when Windows Hyper-V on a host server fails to properly validate input from an authenticated user on a guest operating system, aka "Hyper-V Remote Code Execution Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. | [] | null | null | 7.6 | null |
|
CVE-2011-2593 | Integer overflow in the StartEpa method in the nsepacom ActiveX control (nsepa.exe) in Citrix Access Gateway Enterprise Edition Plug-in for Windows 9.x before 9.3-57.5 and 10.0 before 10.0-69.4 allows remote attackers to execute arbitrary code via a crafted Content-Length HTTP header, which triggers a heap-based buffer overflow. | [
"cpe:2.3:a:citrix:access_gateway_plug-in:*:49-5:*:*:enterprise:windows:*:*",
"cpe:2.3:a:citrix:access_gateway_plug-in:10.0:*:*:*:enterprise:windows:*:*"
] | null | null | null | 6.8 |
|
GHSA-8m82-fhxc-h2fw | Grand MA 300 allows retrieval of the access PIN from sniffed data. | [] | null | null | null | null |
|
CVE-2024-45416 | The HTTPD binary in multiple ZTE routers has a local file inclusion vulnerability in session_init function. The session -LUA- files are stored in the directory /var/lua_session, the function iterates on all files in this directory and executes them using the function dofile without any validation if it is a valid session file or not. An attacker who is able to write a malicious file in the sessions directory can get RCE as root. | [
"cpe:2.3:o:zte:zxhn_z500_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:zte:zxhn_e500_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:zte:zxhn_h108n_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:zte:zxhn_e2615_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:zte:zxhn_e2603_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:zte:zxhn_e2618_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:zte:zxhn_e1600_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:zte:zxhn_h338a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:zte:zxhn_h168n_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:zte:zxhn_h168a_firmware:*:*:*:*:*:*:*:*"
] | null | 8.1 | null | null |
|
CVE-2024-37047 | QTS, QuTS hero | A buffer copy without checking size of input vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers who have gained administrator access to execute code.
We have already fixed the vulnerability in the following versions:
QTS 5.2.1.2930 build 20241025 and later
QuTS hero h5.2.1.2929 build 20241025 and later | [] | 5.1 | null | null | null |
CVE-2018-2854 | Vulnerability in the Oracle Financial Services Basel Regulatory Capital Basic component of Oracle Financial Services Applications (subcomponent: Portfolio, Attribution). The supported version that is affected is 8.0.x. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Financial Services Basel Regulatory Capital Basic. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Financial Services Basel Regulatory Capital Basic, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Financial Services Basel Regulatory Capital Basic accessible data as well as unauthorized read access to a subset of Oracle Financial Services Basel Regulatory Capital Basic accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N). | [
"cpe:2.3:a:oracle:financial_services_basel_regulatory_capital_basic:8.0.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:financial_services_basel_regulatory_capital_basic:8.0.2.0.0:*:*:*:*:*:*:*"
] | null | null | 6.1 | 5.8 |
|
GHSA-6hjr-885q-f58r | An exploitable buffer overflow vulnerability exists in the Samsung WifiScan handler of video-core's HTTP server of Samsung SmartThings Hub STH-ETH-250 - Firmware version 0.20.17. The strcpy overflows the destination buffer, which has a size of 40 bytes. An attacker can send an arbitrarily long "cameraIp" value in order to exploit this vulnerability. | [] | null | null | 8.8 | null |
|
GHSA-vfxp-4fv7-7wjm | Heap-based buffer overflow in BOM BOMArchiveHelper 10.4 (6.3) Build 312, as used in Mac OS X 10.4.6 and earlier, allows user-assisted attackers to execute arbitrary code via a crafted archive (such as ZIP) that contains long path names, which triggers an error in the BOMStackPop function. | [] | null | null | null | null |
|
CVE-2005-4797 | Directory traversal vulnerability in printd line printer daemon (lpd) in Solaris 7 through 10 allows remote attackers to delete arbitrary files via ".." sequences in an "Unlink data file" command. | [
"cpe:2.3:o:sun:solaris:7.0:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:8.0:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:9.0:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:9.0:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:9.0:x86_update_2:*:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:10.0:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:10.0:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-5v6r-89x9-4q6j | Cross-site scripting (XSS) vulnerability in search.php in phpInv 0.8.0 allows remote attackers to inject arbitrary web script or HTML via the keyword parameter. | [] | null | null | null | null |
Subsets and Splits