id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 36
232
⌀ |
---|---|---|---|---|---|---|---|---|
RHSA-2022:0074
|
Red Hat Security Advisory: samba security update
|
samba: SMB1 client connections can be downgraded to plaintext authentication samba: Active Directory (AD) domain user could become root on domain members
|
[
"cpe:/a:redhat:rhel_eus:8.2::crb",
"cpe:/o:redhat:rhel_eus:8.2::baseos"
] | null | 8.1 | null | null | null |
CVE-2024-47645
|
WordPress WPOptin plugin <= 2.0.1 - Local File Inclusion vulnerability
|
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Sajid Javed Top Bar – PopUps – by WPOptin allows PHP Local File Inclusion.This issue affects Top Bar – PopUps – by WPOptin: from n/a through 2.0.1.
|
[
"cpe:2.3:a:sajidjaved:top_bar-popups-by_wpoptin:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
GHSA-f68g-4p63-5wh7
|
A keystroke logging issue was discovered in Virtual Keyboard in Qt 5.7.x, 5.8.x, 5.9.x, 5.10.x, and 5.11.x before 5.11.3.
|
[] | null | null | 7.5 | null | null |
|
GHSA-j5fm-79jj-cwpj
|
SQL injection vulnerability in all versions prior to V4.01.01 of the ZTE ZXCDN-SNS product allows remote attackers to execute arbitrary SQL commands via the aoData parameter, resulting in the disclosure of database information.
|
[] | null | null | 7.5 | null | null |
|
RHSA-2025:8980
|
Red Hat Security Advisory: gstreamer1-plugins-bad-free security update
|
GStreamer: GStreamer H265 Codec Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability
|
[
"cpe:/a:redhat:rhel_aus:8.4::appstream"
] | null | 8.8 | null | null | null |
CVE-2019-3718
|
Dell SupportAssist Client versions prior to 3.2.0.90 contain an improper origin validation vulnerability. An unauthenticated remote attacker could potentially exploit this vulnerability to attempt CSRF attacks on users of the impacted systems.
|
[
"cpe:2.3:a:dell:supportassist:*:*:*:*:*:*:*:*"
] | null | null | 7.6 | null | null |
|
GHSA-pmjf-334r-5j9j
|
The web server used by MikroTik RouterOS version 6 is affected by a heap memory corruption issue. A remote and unauthenticated attacker can corrupt the server's heap memory by sending a crafted HTTP request. As a result, the web interface crashes and is immediately restarted. The issue was fixed in RouterOS 6.49.10 stable. RouterOS version 7 is not affected.
|
[] | null | 7.5 | null | null | null |
|
GHSA-h689-32cr-m2v5
|
Multiple cross-site scripting (XSS) vulnerabilities in the login application in vBook 4.2.17 allow remote attackers to inject arbitrary web script or HTML via the (1) title and (2) message parameters.
|
[] | null | null | null | null | null |
|
CVE-2014-7048
|
The Bear ID Lock (aka com.wBearIDLock) application 0.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
|
[
"cpe:2.3:a:bearidlock:bear_id_lock:0.1:*:*:*:*:android:*:*"
] | null | null | null | 5.4 | null |
|
GHSA-9x8w-jj9g-vgv3
|
The Bello - Directory & Listing WordPress theme before 1.6.0 did not properly sanitise and escape its listing_list_view, bt_bb_listing_field_my_lat, bt_bb_listing_field_my_lng, bt_bb_listing_field_distance_value, bt_bb_listing_field_my_lat_default, bt_bb_listing_field_keyword, bt_bb_listing_field_location_autocomplete, bt_bb_listing_field_price_range_from and bt_bb_listing_field_price_range_to parameter in ints listing page, leading to reflected Cross-Site Scripting issues.
|
[] | null | null | null | null | null |
|
GHSA-6rhx-w4jr-jr58
|
SQL injection vulnerability in index.php in EACOMM DO-CMS 3.0 allows remote attackers to execute arbitrary SQL commands via the p parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
|
[] | null | null | null | null | null |
|
CVE-2018-13726
|
The mintToken function of a smart contract implementation for ISeeVoiceToken, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value.
|
[
"cpe:2.3:a:iseevoicetoken_project:iseevoicetoken:-:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 | null |
|
CVE-2019-6957
|
Buffer Overflow for Bosch Video Systems, PSIM and Access Control Systems
|
A recently discovered security vulnerability affects all Bosch Video Management System (BVMS) versions 9.0 and below, DIVAR IP 2000, 3000, 5000 and 7000, Video Recording Manager (VRM), Video Streaming Gateway (VSG), Configuration Manager, Building Integration System (BIS) with Video Engine, Access Professional Edition (APE), Access Easy Controller (AEC), Bosch Video Client (BVC) and Video SDK (VSDK). The vulnerability potentially allows the unauthorized execution of code in the system via the network interface.
|
[
"cpe:2.3:a:bosch:access_professional_edition:*:*:*:*:*:*:*:*",
"cpe:2.3:a:bosch:bosch_video_client:*:*:*:*:*:*:*:*",
"cpe:2.3:a:bosch:bosch_video_management_system:*:*:*:*:*:*:*:*",
"cpe:2.3:a:bosch:building_integration_system:*:*:*:*:*:*:*:*",
"cpe:2.3:a:bosch:building_integration_system:4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:bosch:building_integration_system:4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:bosch:building_integration_system:4.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:bosch:configuration_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:bosch:video_recording_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:bosch:video_sdk:*:*:*:*:*:*:*:*",
"cpe:2.3:a:bosch:video_streaming_gateway:*:*:*:*:*:*:*:*",
"cpe:2.3:o:bosch:dip_2000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:dip_2000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:bosch:dip_3000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:dip_3000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:bosch:dip_5000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:dip_5000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:bosch:dip_7000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:dip_7000:gen1:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:dip_7000:gen2:*:*:*:*:*:*:*",
"cpe:2.3:o:bosch:access_easy_controller_firmware:2.1.8.5:*:*:*:*:*:*:*",
"cpe:2.3:o:bosch:access_easy_controller_firmware:2.1.9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:bosch:access_easy_controller_firmware:2.1.9.1:*:*:*:*:*:*:*",
"cpe:2.3:o:bosch:access_easy_controller_firmware:2.1.9.3:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:access_easy_controller:-:*:*:*:*:*:*:*"
] | null | null | 9.8 | null | null |
GHSA-gm9h-jqqh-9434
|
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley MicroStation CONNECT 10.16.02.34. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of IFC files. Crafted data in an IFC file can trigger a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-16392.
|
[] | null | 7.8 | null | null | null |
|
CVE-2025-5302
|
Denial of Service (DOS) in JSONReader in run-llama/llama_index
|
A denial of service vulnerability exists in the JSONReader component of the run-llama/llama_index repository, specifically in version v0.12.37. The vulnerability is caused by uncontrolled recursion when parsing deeply nested JSON files, which can lead to Python hitting its maximum recursion depth limit. This results in high resource consumption and potential crashes of the Python process. The issue is resolved in version 0.12.38.
|
[] | null | null | 8.6 | null | null |
CVE-2025-47040
|
Adobe Experience Manager | Cross-site Scripting (DOM-based XSS) (CWE-79)
|
Adobe Experience Manager versions 6.5.22 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
|
[] | null | 5.4 | null | null | null |
CVE-2024-48459
|
A command execution vulnerability exists in the AX2 Pro home router produced by Shenzhen Tenda Technology Co., Ltd. (Jixiang Tenda) v.DI_7003G-19.12.24A1V16.03.29.50;V16.03.29.50;V16.03.29.50. An attacker can exploit this vulnerability by constructing a malicious payload to execute commands and further obtain shell access to the router's file system with the highest privileges.
|
[
"cpe:2.3:o:tenda:ax2_pro_firmware:*:*:*:*:*:*:*:*"
] | null | 7.3 | null | null | null |
|
GHSA-m9gr-8xj6-cq2p
|
phpcart.php in PHPCart 3.2 allows remote attackers to change product price information by modifying the (1) price or (2) postage parameters. NOTE: it was later reported that 3.4 through 4.6.4 are also affected.
|
[] | null | null | null | null | null |
|
GHSA-9x4x-qwhq-g8f7
|
In the Linux kernel, the following vulnerability has been resolved:net: fix use-after-free in tw_timer_handlerA real world panic issue was found as follow in Linux 5.4.This issue was also reported since 2017 in the thread [1],
unfortunately, the issue was still can be reproduced after fixing
DCCP.The ipv4_mib_exit_net is called before tcp_sk_exit_batch when a net
namespace is destroyed since tcp_sk_ops is registered befrore
ipv4_mib_ops, which means tcp_sk_ops is in the front of ipv4_mib_ops
in the list of pernet_list. There will be a use-after-free on
net->mib.net_statistics in tw_timer_handler after ipv4_mib_exit_net
if there are some inflight time-wait timers.This bug is not introduced by commit f2bf415cfed7 ("mib: add net to
NET_ADD_STATS_BH") since the net_statistics is a global variable
instead of dynamic allocation and freeing. Actually, commit
61a7e26028b9 ("mib: put net statistics on struct net") introduces
the bug since it put net statistics on struct net and free it when
net namespace is destroyed.Moving init_ipv4_mibs() to the front of tcp_init() to fix this bug
and replace pr_crit() with panic() since continuing is meaningless
when init_ipv4_mibs() fails.[1] https://groups.google.com/g/syzkaller/c/p1tn-_Kc6l4/m/smuL_FMAAgAJ?pli=1
|
[] | null | 7.8 | null | null | null |
|
GHSA-9hv9-87gp-7pw8
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in markkinchin Beds24 Online Booking allows Stored XSS. This issue affects Beds24 Online Booking: from n/a through 2.0.29.
|
[] | null | 6.5 | null | null | null |
|
CVE-2020-1172
|
Scripting Engine Memory Corruption Vulnerability
|
<p>A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user.</p>
<p>If the current user is logged on with administrative user rights, an attacker who successfully exploited the vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.</p>
<p>The security update addresses the vulnerability by modifying how the ChakraCore scripting engine handles objects in memory.</p>
|
[
"cpe:2.3:a:microsoft:chakracore:*:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
] | null | 4.2 | null | null | null |
GHSA-v3gv-gj4m-f92w
|
An Insecure Direct Object Reference (IDOR) vulnerability in OpenEMR 6.0.0 allows any authenticated attacker to access and modify unauthorized areas via a crafted POST request to /modules/zend_modules/public/Installer/register.
|
[] | null | 8.1 | null | null | null |
|
GHSA-5gp5-jqc5-m4v7
|
Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in Safari 13.0.1, iOS 13.1 and iPadOS 13.1, iCloud for Windows 10.7, iCloud for Windows 7.14, tvOS 13, watchOS 6, iTunes 12.10.1 for Windows. Processing maliciously crafted web content may lead to arbitrary code execution.
|
[] | null | null | null | null | null |
|
RHEA-2024:11005
|
Red Hat Enhancement Advisory: Errata Advisory for Red Hat OpenShift GitOps v1.15.0
|
word-wrap: ReDoS
|
[
"cpe:/a:redhat:openshift_gitops:1.15::el8",
"cpe:/a:redhat:openshift_gitops:1.15::el9"
] | null | 7.5 | null | null | null |
CVE-2022-0118
|
Inappropriate implementation in WebShare in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to potentially hide the contents of the Omnibox (URL bar) via a crafted HTML page.
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*"
] | null | 4.3 | null | 4.3 | null |
|
CVE-2025-21592
|
Junos OS: SRX Series: Low privileged user able to access highly sensitive information on file system
|
An Exposure of Sensitive Information to an Unauthorized Actor vulnerability in the command-line interface (CLI) of Juniper Networks Junos OS on SRX Series devices allows a local, low-privileged user with access to the Junos CLI to view the contents of sensitive files on the file system.
Through the execution of either 'show services advanced-anti-malware' or 'show services security-intelligence' command, a user with limited permissions (e.g., a low privilege login class user) can access protected files that should not be accessible to the user. These files may contain sensitive information that can be used to cause further impact to the system.
This issue affects Junos OS SRX Series:
* All versions before 21.4R3-S8,
* from 22.2 before 22.2R3-S5,
* from 22.3 before 22.3R3-S3,
* from 22.4 before 22.4R3-S2,
* from 23.2 before 23.2R2-S1,
* from 23.4 before 23.4R2.
|
[] | 6.8 | 5.5 | null | null | null |
CVE-2022-36885
|
Jenkins GitHub Plugin 1.34.4 and earlier uses a non-constant time comparison function when checking whether the provided and computed webhook signatures are equal, allowing attackers to use statistical methods to obtain a valid webhook signature.
|
[
"cpe:2.3:a:jenkins:github:*:*:*:*:*:jenkins:*:*"
] | null | 5.3 | null | null | null |
|
GHSA-jjgp-jxfq-2w96
|
The Bdat driver of Prague smart phones with software versions earlier than Prague-AL00AC00B211, versions earlier than Prague-AL00BC00B211, versions earlier than Prague-AL00CC00B211, versions earlier than Prague-TL00AC01B211, versions earlier than Prague-TL10AC01B211 has integer overflow vulnerability due to the lack of parameter validation. An attacker tricks a user into installing a malicious APP and execute it as a specific privilege; the APP can then send a specific parameter to the driver of the smart phone, causing arbitrary code execution.
|
[] | null | null | 7.8 | null | null |
|
CVE-2015-3280
|
OpenStack Compute (nova) before 2014.2.4 (juno) and 2015.1.x before 2015.1.2 (kilo) does not properly delete instances from compute nodes, which allows remote authenticated users to cause a denial of service (disk consumption) by deleting instances while in the resize state.
|
[
"cpe:2.3:a:openstack:nova:*:*:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
CVE-2019-3462
|
Incorrect sanitation of the 302 redirect field in HTTP transport method of apt versions 1.4.8 and earlier can lead to content injection by a MITM attacker, potentially leading to remote code execution on the target machine.
|
[
"cpe:2.3:a:debian:advanced_package_tool:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:active_iq:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*"
] | null | 8.1 | null | 9.3 | null |
|
GHSA-2hgm-fhfg-mc3p
|
Tenda AC6V1.0 V15.03.05.19 was discovered to contain a buffer overflow via the limitSpeed parameter in the formSetClientState function.
|
[] | null | 7.5 | null | null | null |
|
GHSA-5m62-c8gp-6qqv
|
A state machine transition flaw in the Bluetooth Low Energy (BLE) stack of Cypress PSoC4 v3.66 allows attackers to bypass the pairing process and authentication via a crafted pairing_failed packet.
|
[] | null | 8.1 | null | null | null |
|
GHSA-8hg7-p3vv-gx38
|
The pdf-print plugin before 2.0.3 for WordPress has multiple XSS issues.
|
[] | null | null | 6.1 | null | null |
|
CVE-2019-6833
|
A CWE-754 – Improper Check for Unusual or Exceptional Conditions vulnerability exists in Magelis HMI Panels (all versions of - HMIGTO, HMISTO, XBTGH, HMIGTU, HMIGTUX, HMISCU, HMISTU, XBTGT, XBTGT, HMIGXO, HMIGXU), which could cause a temporary freeze of the HMI when a high rate of frames is received. When the attack stops, the buffered commands are processed by the HMI panel.
|
[
"cpe:2.3:o:schneider-electric:hmigto_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:hmigto1300:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:hmigto1310:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:hmigto2300:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:hmigto2310:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:hmigto2315:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:hmigto3510:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:hmigto4310:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:hmigto5310:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:hmigto5315:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:hmigto6310:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:hmigto6315:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:hmisto_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:hmisto501:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:hmisto511:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:hmisto512:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:hmisto531:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:hmisto532:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:hmisto705:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:hmisto715:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:hmisto735:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:xbtgh_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:xbtgh2460:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:hmigtu_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:hmig2u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:hmig3u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:hmig3ufc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:hmig5u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:hmig5u2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:hmig5ufc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:hmig5ul8a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:hmiscu_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:hmiscu6a5:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:hmiscu6b5:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:hmiscu8a5:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:hmiscu8b5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:hmistu_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:hmistu655:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:hmistu655w:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:hmistu855:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:hmistu855w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:xbtgt_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:xbtgt2430:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:xbtgt2930:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:hmigxo_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:hmigxo:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:hmigxu_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:hmigxu35:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:hmigxu55:-:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4.3 | null |
|
CVE-2020-22403
|
Cross Site Request Forgery (CSRF) vulnerability in Express cart v1.1.16 allows attackers to add an administrator account, add discount code or other unspecified impacts.
|
[
"cpe:2.3:a:express-cart_project:express-cart:*:*:*:*:*:node.js:*:*"
] | null | 8.8 | null | 6.8 | null |
|
CVE-2022-24046
|
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Sonos One Speaker prior to 3.4.1 (S2 systems) and 11.2.13 build 57923290 (S1 systems). Authentication is not required to exploit this vulnerability. The specific flaw exists within the anacapd daemon. The issue results from the lack of proper validation of user-supplied data, which can result in an integer underflow before writing to memory. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-15828.
|
[
"cpe:2.3:a:sonos:s1:*:*:*:*:*:*:*:*",
"cpe:2.3:a:sonos:s2:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sonos:one:-:*:*:*:*:*:*:*"
] | null | null | 9.8 | null | null |
|
CVE-2016-1486
|
A vulnerability in the email attachment scanning functionality of the Advanced Malware Protection (AMP) feature of Cisco AsyncOS Software for Cisco Email Security Appliances could allow an unauthenticated, remote attacker to cause an affected device to stop scanning and forwarding email messages due to a denial of service (DoS) condition. Affected Products: This vulnerability affects Cisco AsyncOS Software releases 9.7.1 and later, prior to the first fixed release, for both virtual and hardware Cisco Email Security Appliances, if the AMP feature is configured to scan incoming email attachments. More Information: CSCuy99453. Known Affected Releases: 9.7.1-066. Known Fixed Releases: 10.0.0-125 9.7.1-207 9.7.2-047.
|
[
"cpe:2.3:a:cisco:email_security_appliance:8.5.0-000:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:email_security_appliance:8.5.0-er1-198:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:email_security_appliance:8.5.6-052:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:email_security_appliance:8.5.6-073:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:email_security_appliance:8.5.6-074:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:email_security_appliance:8.5.6-106:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:email_security_appliance:8.5.6-113:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:email_security_appliance:8.5.7-042:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:email_security_appliance:8.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:email_security_appliance:8.6.0-011:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:email_security_appliance:8.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:email_security_appliance:8.9.1-000:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:email_security_appliance:8.9.2-032:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:email_security_appliance:9.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:email_security_appliance:9.0.0-212:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:email_security_appliance:9.0.0-461:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:email_security_appliance:9.0.5-000:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:email_security_appliance:9.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:email_security_appliance:9.1.0-011:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:email_security_appliance:9.1.0-032:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:email_security_appliance:9.1.0-101:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:email_security_appliance:9.1.1-000:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:email_security_appliance:9.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:email_security_appliance:9.4.4-000:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:email_security_appliance:9.5.0-000:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:email_security_appliance:9.5.0-201:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:email_security_appliance:9.6.0-000:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:email_security_appliance:9.6.0-042:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:email_security_appliance:9.6.0-051:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:email_security_appliance:9.7.0-125:*:*:*:*:*:*:*"
] | null | null | 7.5 | 7.8 | null |
|
CVE-2014-0157
|
Cross-site scripting (XSS) vulnerability in the Horizon Orchestration dashboard in OpenStack Dashboard (aka Horizon) 2013.2 before 2013.2.4 and icehouse before icehouse-rc2 allows remote attackers to inject arbitrary web script or HTML via the description field of a Heat template.
|
[
"cpe:2.3:a:openstack:horizon:2013.2:*:*:*:*:*:*:*",
"cpe:2.3:a:openstack:horizon:2013.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:openstack:horizon:2013.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:openstack:horizon:2013.2.3:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
CVE-2009-0956
|
Apple QuickTime before 7.6.2 does not properly initialize memory before use in handling movie files, which allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a movie containing a user data atom of size zero.
|
[
"cpe:2.3:a:apple:quicktime:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:-:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:4.1.2:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:4.1.2:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:5.0.1:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:5.0.1:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:5.0.2:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:5.0.2:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.0:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.0.0:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.0.0:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.0.1:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.0.1:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.0.2:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.0.2:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.1.0:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.1.0:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.1.1:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.1.1:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.2.0:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.2.0:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.3.0:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.3.0:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.4.0:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.4.0:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.5.0:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.5.0:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.5.1:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.5.1:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.5.2:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.5.2:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.0:*:windows:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.0:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.0.0:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.0.0:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.0.1:*:windows:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.0.1:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.0.1:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.0.2:*:windows:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.0.2:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.0.2:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.0.3:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.0.3:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.0.4:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.0.4:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.1.0:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.1.0:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.1.1:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.1.1:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.1.2:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.1.2:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.1.3:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.1.3:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.1.4:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.1.4:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.1.5:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.1.5:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.1.6:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.1.6:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.2:*:vista:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.2.0:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.2.0:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.2.1:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.2.1:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.3.0:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.3.0:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.3.1:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.3.1:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.3.1.70:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.4.0:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.4.0:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.4.1:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.4.1:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.4.5:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.4.5:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.5.0:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.5.0:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.5.5:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.5.5:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.6.0:*:*:*:*:*:*:*"
] | null | null | null | 9.3 | null |
|
CVE-2006-3959
|
SQL injection vulnerability in protect.php in X-Scripts X-Protection 1.10, with magic_quotes_gpc disabled, allows remote attackers to execute arbitrary SQL commands via the (1) username and (2) password parameter.
|
[
"cpe:2.3:a:x-scripts:x-statistics:1.10:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-h733-wxxx-34v2
|
Adobe Experience Manager versions 6.5 and earlier have a cross-site scripting (dom-based) vulnerability. Successful exploitation could lead to arbitrary javascript execution in the browser.
|
[] | null | null | null | null | null |
|
CVE-2017-10699
|
avcodec 2.2.x, as used in VideoLAN VLC media player 2.2.7-x before 2017-06-29, allows out-of-bounds heap memory write due to calling memcpy() with a wrong size, leading to a denial of service (application crash) or possibly code execution.
|
[
"cpe:2.3:a:videolan:vlc_media_player:2.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:2.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:2.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:2.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:2.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:2.2.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:2.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc_media_player:2.2.7:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 | null |
|
GHSA-rm8v-mxj3-5rmq
|
github.com/lestrrat-go/jwx vulnerable to Potential Padding Oracle Attack
|
SummaryDecrypting AES-CBC encrypted JWE has Potential Padding Oracle Attack Vulnerability.DetailsOn [v2.0.10](https://github.com/lestrrat-go/jwx/releases/tag/v2.0.10), decrypting AES-CBC encrypted JWE may return an error "failed to generate plaintext from decrypted blocks: invalid padding":https://github.com/lestrrat-go/jwx/blob/8840ffd4afc5839f591ff0e9ba9034af52b1643e/jwe/internal/aescbc/aescbc.go#L210-L213Reporting padding error causes [Padding Oracle Attack](https://en.wikipedia.org/wiki/Padding_oracle_attack) Vulnerability.
RFC 7516 JSON Web Encryption (JWE) says that we **MUST NOT** do this.11.5. Timing Attacks
To mitigate the attacks described in RFC 3218 [RFC3218], the
recipient MUST NOT distinguish between format, padding, and length
errors of encrypted keys. It is strongly recommended, in the event
of receiving an improperly formatted key, that the recipient
substitute a randomly generated CEK and proceed to the next step, to
mitigate timing attacks.In addition, the time to remove padding depends on the length of the padding.
It may leak the length of the padding by Timing Attacks.https://github.com/lestrrat-go/jwx/blob/796b2a9101cf7e7cb66455e4d97f3c158ee10904/jwe/internal/aescbc/aescbc.go#L33-L66To mitigate Timing Attacks, it MUST be done in constant time.ImpactThe authentication tag is verified, so it is not an immediate attack.
|
[] | null | null | null | null | null |
RHSA-2024:6197
|
Red Hat Security Advisory: ghostscript security update
|
ghostscript: format string injection leads to shell command execution (SAFER bypass) ghostscript: path traversal and command execution due to path reduction ghostscript: path traversal to arbitrary files if the current directory is in the permitted paths
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 6.8 | null | null | null |
GHSA-jgff-87j3-r73h
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in pozzad Global Translator allows Stored XSS. This issue affects Global Translator: from n/a through 2.0.2.
|
[] | null | 5.9 | null | null | null |
|
CVE-2009-4180
|
Stack-based buffer overflow in snmpviewer.exe in HP OpenView Network Node Manager (OV NNM) 7.01, 7.51, and 7.53 allows remote attackers to execute arbitrary code via a long HTTP Host header.
|
[
"cpe:2.3:a:hp:openview_network_node_manager:7.0.1:*:hp_ux:*:*:*:*:*",
"cpe:2.3:a:hp:openview_network_node_manager:7.0.1:*:linux:*:*:*:*:*",
"cpe:2.3:a:hp:openview_network_node_manager:7.0.1:*:solaris:*:*:*:*:*",
"cpe:2.3:a:hp:openview_network_node_manager:7.0.1:*:windows:*:*:*:*:*",
"cpe:2.3:a:hp:openview_network_node_manager:7.51:-:hp-ux:*:*:*:*:*",
"cpe:2.3:a:hp:openview_network_node_manager:7.51:-:linux:*:*:*:*:*",
"cpe:2.3:a:hp:openview_network_node_manager:7.51:-:solaris:*:*:*:*:*",
"cpe:2.3:a:hp:openview_network_node_manager:7.51:-:windows:*:*:*:*:*",
"cpe:2.3:a:hp:openview_network_node_manager:7.53:-:hp-ux:*:*:*:*:*",
"cpe:2.3:a:hp:openview_network_node_manager:7.53:-:linux:*:*:*:*:*",
"cpe:2.3:a:hp:openview_network_node_manager:7.53:-:solaris:*:*:*:*:*",
"cpe:2.3:a:hp:openview_network_node_manager:7.53:-:windows:*:*:*:*:*"
] | null | null | null | 10 | null |
|
GHSA-7v79-m7r5-h737
|
The AppCacheUpdateJob::URLFetcher::OnResponseStarted function in content/browser/appcache/appcache_update_job.cc in Google Chrome before 40.0.2214.91 proceeds with AppCache caching for SSL sessions even if there is an X.509 certificate error, which allows man-in-the-middle attackers to spoof HTML5 application content via a crafted certificate.
|
[] | null | null | null | null | null |
|
GHSA-vghf-7644-rgvm
|
MSFM before 2025.01.01 was discovered to contain a SQL injection vulnerability via the s_name parameter at table/list.
|
[] | null | 7.5 | null | null | null |
|
CVE-2015-1449
|
Buffer overflow in the integrated web server on Siemens Ruggedcom WIN51xx devices with firmware before SS4.4.4624.35, WIN52xx devices with firmware before SS4.4.4624.35, WIN70xx devices with firmware before BS4.4.4621.32, and WIN72xx devices with firmware before BS4.4.4621.32 allows remote attackers to execute arbitrary code via unspecified vectors.
|
[
"cpe:2.3:o:siemens:ruggedcom_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:ruggedcom_win7000:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:ruggedcom_win7200:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:ruggedcom_win5100:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:ruggedcom_win5200:*:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
GHSA-pr2f-gqh3-f57w
|
The Tickera – WordPress Event Ticketing plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 3.5.4.4. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes.
|
[] | null | 7.3 | null | null | null |
|
CVE-2018-13084
|
The mintToken function of a smart contract implementation for Good Time Coin (GTY), an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value.
|
[
"cpe:2.3:a:goodtimecoin_project:goodtimecoin:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null |
|
RHSA-2008:0201
|
Red Hat Security Advisory: redhat-ds-admin security update
|
Server: shell command injection in CGI replication monitor Server: unrestricted access to CGI scripts
|
[
"cpe:/a:redhat:directory_server:8::el4",
"cpe:/a:redhat:directory_server:8::el5"
] | null | null | null | null | null |
RHSA-2025:15057
|
Red Hat Security Advisory: postgresql:13 security update
|
postgresql: PostgreSQL code execution in restore operation postgresql: PostgreSQL executes arbitrary code in restore operation
|
[
"cpe:/a:redhat:rhel_aus:8.4::appstream"
] | null | 8.8 | null | null | null |
CVE-2021-30139
|
In Alpine Linux apk-tools before 2.12.5, the tarball parser allows a buffer overflow and crash.
|
[
"cpe:2.3:o:alpinelinux:apk-tools:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null |
|
CVE-2023-2712
|
Malicious File Upload vulnerability in "Rental Module" developed by third-party for Ideasoft's E-commerce Platform.
|
Unrestricted Upload of File with Dangerous Type vulnerability in "Rental Module" developed by third-party for Ideasoft's E-commerce Platform allows Command Injection, Using Malicious Files, Upload a Web Shell to a Web Server.This issue affects Rental Module: before 23.05.15.
|
[
"cpe:2.3:a:rental_module_project:rental_module:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
GHSA-h93v-m49q-355g
|
Pegasus e-mail client 3.0 and earlier uses weak encryption to store POP3 passwords in the pmail.ini file, which allows local users to easily decrypt the passwords and read e-mail.
|
[] | null | null | null | null | null |
|
GHSA-5j7g-2499-22jg
|
The xo-security plugin before 1.5.3 for WordPress has XSS.
|
[] | null | null | 6.1 | null | null |
|
GHSA-9gm2-7mpc-rwc6
|
Remote Code Execution in the following products Hybrid Cloud Management Containerized Suite HCM2017.11, HCM2018.02, HCM2018.05, Operations Bridge Containerized Suite 2017.11, 2018.02, 2018.05, Data Center Automation Containerized Suite 2017.01 until 2018.05, Service Management Automation Suite 2017.11, 2018.02, 2018.05, Service Virtualization (SV) with floating licenses using Any version using APLS older than 10.7, Unified Functional Testing (UFT) with floating licenses using Any version using APLS older than 10.7, Network Virtualization (NV) with floating licenses using Any version using APLS older than 10.7 and Network Operations Management (NOM) Suite CDF 2017.11, 2018.02, 2018.05 will allow Remote Code Execution.
|
[] | null | null | 9.8 | null | null |
|
GHSA-65p6-f2x3-5fgg
|
A Microsoft ActiveX control allows a remote attacker to execute a malicious cabinet file via an attachment and an embedded script in an HTML mail, aka the "Active Setup Control" vulnerability.
|
[] | null | null | null | null | null |
|
CVE-2023-25949
|
Uncontrolled resource consumption in some Intel(R) Aptio* V UEFI Firmware Integrator Tools may allow an authenticated user to potentially enable denial of service via local access.
|
[
"cpe:2.3:a:intel:aptio_v_uefi_firmware_integrator_tools:5.27.03.0003:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:a:intel:aptio_v_uefi_firmware_integrator_tools:5.27.06.0017:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
|
CVE-2008-2788
|
Cross-site scripting (XSS) vulnerability in index.php in OpenDocMan 1.2.5 allows remote attackers to inject arbitrary web script or HTML via the redirection parameter.
|
[
"cpe:2.3:a:opendocman:opendocman:1.2.5:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-crjg-m2r7-8q93
|
An XSS issue was discovered in SEMCMS 3.4 via admin/SEMCMS_Menu.php?lgid=1 during editing.
|
[] | null | null | 4.8 | null | null |
|
GHSA-hj8g-f5gh-vqmq
|
NEXTU FLETA AX1500 WIFI6 Router v1.0.3 was discovered to contain a stack overflow via the url parameter at /boafrm/formFilter. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request.
|
[] | null | 7.3 | null | null | null |
|
CVE-2019-19912
|
In Intland codeBeamer ALM 9.5 and earlier, a cross-site scripting (XSS) vulnerability in the Upload Flash File feature allows authenticated remote attackers to inject arbitrary scripts via an active script embedded in an SWF file.
|
[
"cpe:2.3:a:intland:codebeamer:*:*:*:*:*:*:*:*"
] | null | 4.8 | null | 3.5 | null |
|
CVE-2020-1299
|
A remote code execution vulnerability exists in Microsoft Windows that could allow remote code execution if a .LNK file is processed.An attacker who successfully exploited this vulnerability could gain the same user rights as the local user, aka 'LNK Remote Code Execution Vulnerability'.
|
[
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
] | null | 8.8 | null | 9.3 | null |
|
GHSA-rprc-6487-2q3v
|
In the Linux kernel, the following vulnerability has been resolved:net/smc: fix lacks of icsk_syn_mss with IPPROTO_SMCEric report a panic on IPPROTO_SMC, and give the facts
that when INET_PROTOSW_ICSK was set, icsk->icsk_sync_mss must be set too.Bug: Unable to handle kernel NULL pointer dereference at virtual address
0000000000000000
Mem abort info:
ESR = 0x0000000086000005
EC = 0x21: IABT (current EL), IL = 32 bits
SET = 0, FnV = 0
EA = 0, S1PTW = 0
FSC = 0x05: level 1 translation fault
user pgtable: 4k pages, 48-bit VAs, pgdp=00000001195d1000
[0000000000000000] pgd=0800000109c46003, p4d=0800000109c46003,
pud=0000000000000000
Internal error: Oops: 0000000086000005 [#1] PREEMPT SMP
Modules linked in:
CPU: 1 UID: 0 PID: 8037 Comm: syz.3.265 Not tainted
6.11.0-rc7-syzkaller-g5f5673607153 #0
Hardware name: Google Google Compute Engine/Google Compute Engine,
BIOS Google 08/06/2024
pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : 0x0
lr : cipso_v4_sock_setattr+0x2a8/0x3c0 net/ipv4/cipso_ipv4.c:1910
sp : ffff80009b887a90
x29: ffff80009b887aa0 x28: ffff80008db94050 x27: 0000000000000000
x26: 1fffe0001aa6f5b3 x25: dfff800000000000 x24: ffff0000db75da00
x23: 0000000000000000 x22: ffff0000d8b78518 x21: 0000000000000000
x20: ffff0000d537ad80 x19: ffff0000d8b78000 x18: 1fffe000366d79ee
x17: ffff8000800614a8 x16: ffff800080569b84 x15: 0000000000000001
x14: 000000008b336894 x13: 00000000cd96feaa x12: 0000000000000003
x11: 0000000000040000 x10: 00000000000020a3 x9 : 1fffe0001b16f0f1
x8 : 0000000000000000 x7 : 0000000000000000 x6 : 000000000000003f
x5 : 0000000000000040 x4 : 0000000000000001 x3 : 0000000000000000
x2 : 0000000000000002 x1 : 0000000000000000 x0 : ffff0000d8b78000
Call trace:
0x0
netlbl_sock_setattr+0x2e4/0x338 net/netlabel/netlabel_kapi.c:1000
smack_netlbl_add+0xa4/0x154 security/smack/smack_lsm.c:2593
smack_socket_post_create+0xa8/0x14c security/smack/smack_lsm.c:2973
security_socket_post_create+0x94/0xd4 security/security.c:4425
__sock_create+0x4c8/0x884 net/socket.c:1587
sock_create net/socket.c:1622 [inline]
__sys_socket_create net/socket.c:1659 [inline]
__sys_socket+0x134/0x340 net/socket.c:1706
__do_sys_socket net/socket.c:1720 [inline]
__se_sys_socket net/socket.c:1718 [inline]
__arm64_sys_socket+0x7c/0x94 net/socket.c:1718
__invoke_syscall arch/arm64/kernel/syscall.c:35 [inline]
invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49
el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132
do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151
el0_svc+0x54/0x168 arch/arm64/kernel/entry-common.c:712
el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:730
el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:598
Code: ???????? ???????? ???????? ???????? (????????)
---[ end trace 0000000000000000 ]---This patch add a toy implementation that performs a simple return to
prevent such panic. This is because MSS can be set in sock_create_kern
or smc_setsockopt, similar to how it's done in AF_SMC. However, for
AF_SMC, there is currently no way to synchronize MSS within
__sys_connect_file. This toy implementation lays the groundwork for us
to support such feature for IPPROTO_SMC in the future.
|
[] | null | 5.5 | null | null | null |
|
GHSA-w6mc-6grg-6x9m
|
A flaw was found in djvulibre-3.5.28 and earlier. An integer overflow in function render() in tools/ddjvu via crafted djvu file may lead to application crash and other consequences.
|
[] | null | 7.8 | null | null | null |
|
GHSA-x6xx-q6w3-8m4c
|
A vulnerability was found in TOTOLINK AC1200 T8 4.1.5cu.862_B20230228. It has been rated as critical. This issue affects the function exportOvpn. The manipulation leads to buffer overflow. The attack may be initiated remotely. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
|
[] | 8.7 | 8.8 | null | null | null |
|
GHSA-wh65-53hg-mxpv
|
In the Linux kernel, the following vulnerability has been resolved:Revert "fs/ntfs3: Replace inode_trylock with inode_lock"This reverts commit 69505fe98f198ee813898cbcaf6770949636430b.Initially, conditional lock acquisition was removed to fix an xfstest bug
that was observed during internal testing. The deadlock reported by syzbot
is resolved by reintroducing conditional acquisition. The xfstest bug no
longer occurs on kernel version 6.16-rc1 during internal testing. I
assume that changes in other modules may have contributed to this.
|
[] | null | null | null | null | null |
|
CVE-2023-48129
|
An issue in kimono-oldnew mini-app on Line v13.6.1 allows attackers to send crafted malicious notifications via leakage of the channel access token.
|
[
"cpe:2.3:a:linecorp:line:13.6.1:*:*:*:*:*:*:*"
] | null | 5.4 | null | null | null |
|
CVE-2021-40420
|
A use-after-free vulnerability exists in the JavaScript engine of Foxit Software’s PDF Reader, version 11.1.0.52543. A specially-crafted PDF document can trigger the reuse of previously freed memory, which can lead to arbitrary code execution. An attacker needs to trick the user to open the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially-crafted, malicious site if the browser plugin extension is enabled.
|
[
"cpe:2.3:a:foxit:pdf_reader:11.1.0.52543:*:*:*:*:*:*:*"
] | null | null | 8.8 | null | null |
|
CVE-2022-49136
|
Bluetooth: hci_sync: Fix queuing commands when HCI_UNREGISTER is set
|
In the Linux kernel, the following vulnerability has been resolved:
Bluetooth: hci_sync: Fix queuing commands when HCI_UNREGISTER is set
hci_cmd_sync_queue shall return an error if HCI_UNREGISTER flag has
been set as that means hci_unregister_dev has been called so it will
likely cause a uaf after the timeout as the hdev will be freed.
|
[] | null | 7.8 | null | null | null |
GHSA-4h8q-jm55-4xg5
|
BigFix Web Reports authorized users may perform HTML injection for the email administrative configuration page.
|
[] | null | 5.4 | null | null | null |
|
GHSA-4rvp-mxg2-gwpf
|
Race condition in Google Chrome before 19.0.1084.46 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to worker processes.
|
[] | null | null | null | null | null |
|
CVE-2012-0573
|
Unspecified vulnerability in the Oracle FLEXCUBE Universal Banking component in Oracle Financial Services Software 10.0.0 through 10.5.0 and 11.0.0 through 11.4.0 allows remote authenticated users to affect confidentiality and integrity via unknown vectors related to Core.
|
[
"cpe:2.3:a:oracle:financial_services_software:10.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:financial_services_software:10.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:financial_services_software:11.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:financial_services_software:11.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:financial_services_software:11.4.0:*:*:*:*:*:*:*"
] | null | null | null | 4.9 | null |
|
GHSA-xx5x-v9g7-78fj
|
IML32.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2111 and CVE-2011-2115.
|
[] | null | null | null | null | null |
|
GHSA-9vc7-fvqc-rx92
|
NVIDIA Windows GPU Display Driver, all versions, contains a vulnerability in NVIDIA Control Panel in which it incorrectly loads Windows system DLLs without validating the path or signature (also known as a binary planting or DLL preloading attack), which may lead to denial of service or information disclosure through code execution. The attacker requires local system access.
|
[] | null | null | null | null | null |
|
CVE-2025-7683
|
LatestCheckins <= 1 - Cross-Site Request Forgery to Stored Cross-Site Scripting
|
The LatestCheckins plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1. This is due to missing or incorrect nonce validation on the 'LatestCheckins' page. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
|
[] | null | 6.1 | null | null | null |
GHSA-rfj5-j343-wwwp
|
Internet Explorer 5.01 SP4 up to 6 on various Windows operating systems, including IE 6.0.2900.2180 on Windows XP, allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a web page with embedded CLSIDs that reference certain COM objects that are not ActiveX controls, as demonstrated using the JVIEW Profiler (Javaprxy.dll). NOTE: the researcher says that the vendor could not reproduce this problem.
|
[] | null | null | null | null | null |
|
CVE-2018-13472
|
The mint function of a smart contract implementation for CloutToken, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value.
|
[
"cpe:2.3:a:clouttoken_project:clouttoken:-:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 | null |
|
CVE-2014-3170
|
extensions/common/url_pattern.cc in Google Chrome before 37.0.2062.94 does not prevent use of a '\0' character in a host name, which allows remote attackers to spoof the extension permission dialog by relying on truncation after this character.
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.3:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.4:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.5:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.6:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.7:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.8:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.9:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.10:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.11:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.12:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.13:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.14:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.15:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.16:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.17:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.18:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.19:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.20:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.21:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.22:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.23:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.24:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.25:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.26:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.27:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.28:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.29:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.30:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.31:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.32:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.33:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.34:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.35:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.36:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.37:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.39:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.43:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.44:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.45:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.46:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.47:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.48:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.49:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.50:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.51:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.52:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.53:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.54:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.55:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.56:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.57:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.58:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.59:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.60:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.61:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.62:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.63:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.64:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.65:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.66:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.67:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.68:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.69:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.70:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.71:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.72:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.73:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.74:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.75:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.76:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.77:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.78:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.80:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.81:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.89:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.90:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.91:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:37.0.2062.92:*:*:*:*:*:*:*"
] | null | null | null | 6.4 | null |
|
RHSA-2024:4641
|
Red Hat Security Advisory: libndp security update
|
libndp: buffer overflow in route information length field
|
[
"cpe:/o:redhat:rhel_eus:8.8::baseos"
] | null | 8.1 | null | null | null |
CVE-2019-5522
|
VMware Tools for Windows update addresses an out of bounds read vulnerability in vm3dmp driver which is installed with vmtools in Windows guest machines. This issue is present in versions 10.2.x and 10.3.x prior to 10.3.10. A local attacker with non-administrative access to a Windows guest with VMware Tools installed may be able to leak kernel information or create a denial of service attack on the same Windows guest machine.
|
[
"cpe:2.3:a:vmware:tools:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | null | 7.1 | 3.6 | null |
|
CVE-2021-31005
|
Description: A logic issue was addressed with improved state management. This issue is fixed in iOS 15 and iPadOS 15, macOS Monterey 12.0.1. Turning off "Block all remote content" may not apply to all remote content types.
|
[
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:12.0.0:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null |
|
RHSA-2020:1021
|
Red Hat Security Advisory: GNOME security, bug fix, and enhancement update
|
gnome-shell: partial lock screen bypass
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 4.8 | null | null |
GHSA-rh3m-2p8j-6cf7
|
The issue was addressed with improved restriction of data container access. This issue is fixed in macOS Sonoma 14.7.5, iOS 18.4 and iPadOS 18.4, tvOS 18.4, macOS Sequoia 15.4. An app may be able to access sensitive user data.
|
[] | null | 9.8 | null | null | null |
|
CVE-2021-28571
|
Adobe After Effects improper neutralization of special elements could lead to remote code execution
|
Adobe After Effects version 18.1 (and earlier) is affected by a potential Command injection vulnerability when chained with a development and debugging tool for JavaScript scripts. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[
"cpe:2.3:a:adobe:after_effects:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 8.3 | null | null | null |
GHSA-fx2r-qhmq-3jjp
|
The read_multipart function in cgi.rb in Ruby before 1.8.5-p2 does not properly detect boundaries in MIME multipart content, which allows remote attackers to cause a denial of service (infinite loop) via crafted HTTP requests, a different issue than CVE-2006-5467.
|
[] | null | null | null | null | null |
|
GHSA-p34p-8w3x-9vqr
|
Billing Software v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'itemnameid' parameter of the material_bill.php?action=itemRelation resource does not validate the characters received and they are sent unfiltered to the database.
|
[] | null | 9.8 | null | null | null |
|
GHSA-f57v-gppg-633m
|
Cross-Site Request Forgery (CSRF) vulnerability in a1post A1POST.BG Shipping for Woo allows Privilege Escalation. This issue affects A1POST.BG Shipping for Woo: from n/a through 1.5.1.
|
[] | null | 8.8 | null | null | null |
|
CVE-2019-9557
|
Ability Mail Server 4.2.6 has Persistent Cross Site Scripting (XSS) via the body e-mail body. To exploit the vulnerability, the victim must open an email with malicious Javascript inserted into the body of the email as an iframe.
|
[
"cpe:2.3:a:codecrafters:ability_mail_server:4.2.6:*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 | null |
|
GHSA-mf66-hg2x-cq3r
|
Cross-site scripting vulnerability in Cybozu Garoon 4.0.0 to 4.10.1 allows remote attackers to inject arbitrary web script or HTML via the application 'Scheduler'.
|
[] | null | null | null | null | null |
|
GHSA-cq56-j359-2484
|
Xenstore: Cooperating guests can create arbitrary numbers of nodes T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Since the fix of XSA-322 any Xenstore node owned by a removed domain will be modified to be owned by Dom0. This will allow two malicious guests working together to create an arbitrary number of Xenstore nodes. This is possible by domain A letting domain B write into domain A's local Xenstore tree. Domain B can then create many nodes and reboot. The nodes created by domain B will now be owned by Dom0. By repeating this process over and over again an arbitrary number of nodes can be created, as Dom0's number of nodes isn't limited by Xenstore quota.
|
[] | null | 5.5 | null | null | null |
|
GHSA-f79g-9mrm-w496
|
In versions 14.1.0-14.1.3 and 13.1.0-13.1.3.4, a BIG-IP APM virtual server processing PingAccess requests may lead to a restart of the Traffic Management Microkernel (TMM) process.
|
[] | null | null | null | null | null |
|
GHSA-5xj2-2rf5-4f67
|
Heap-based buffer overflow in Apple QuickTime before 7.1 allows remote attackers to execute arbitrary code via a H.264 (M4V) video format file with a certain modified size value.
|
[] | null | null | null | null | null |
|
GHSA-hf3p-wrj3-r34r
|
Static code injection vulnerability in admin/admin_configuration.php in Monalbum 0.8.7 allows remote authenticated users to inject arbitrary PHP code into the conf/config.inc.php file via the (1) gadm_pass, (2) gadm_user, (3) gcfgHote, (4) gcfgPass, (5) gcfgUser, (6) gclassement_rep, (7) gcontour, (8) gfond, (9) ggd_version, (10) ghome, (11) ghor, (12) gimg_copyright, (13) glangage, (14) gmenu_visible, (15) gmini_hasard, (16) gordre_rep, (17) gpage, (18) gracine, (19) grech_inactive, (20) grep_mini, (21) grepertoire, (22) gsite, (23) gslide, (24) gtitre, (25) guse_copyright, (26) gversion, (27) gvert, or (28) gcfgBase parameter.
|
[] | null | null | null | null | null |
|
CVE-2019-12836
|
The Bobronix JEditor editor before 3.0.6 for Jira allows an attacker to add a URL/Link (to an existing issue) that can cause forgery of a request to an out-of-origin domain. This in turn may allow for a forged request that can be invoked in the context of an authenticated user, leading to stealing of session tokens and account takeover.
|
[
"cpe:2.3:a:bobronix:jeditor:*:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.8 | null |
|
CVE-2020-2747
|
Vulnerability in the Oracle Access Manager product of Oracle Fusion Middleware (component: SSO Engine). Supported versions that are affected are 11.1.2.3.0 and 12.2.1.3.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Access Manager. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Access Manager, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Access Manager accessible data as well as unauthorized read access to a subset of Oracle Access Manager accessible data. CVSS 3.0 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N).
|
[
"cpe:2.3:a:oracle:access_manager:11.1.2.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:access_manager:12.2.1.3.0:*:*:*:*:*:*:*"
] | null | null | 5.4 | null | null |
|
CVE-2024-9879
|
Website File Changes < 2.1.1 - Authenticated SQL Injection
|
The Melapress File Monitor WordPress plugin before 2.1.1 does not sanitize and escape a parameter before using it in a SQL statement, allowing admins to perform SQL injection attacks
|
[] | null | 5.4 | null | null | null |
CVE-2017-1509
|
IBM Jazz Foundation products could allow an authenticated user to obtain sensitive information from a stack trace that could be used to aid future attacks. IBM X-Force ID: 129719.
|
[
"cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_team_concert:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_team_concert:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_doors_next_generation:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_doors_next_generation:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_quality_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_quality_manager:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_rhapsody_design_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_rhapsody_design_manager:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_software_architect_design_manager:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_software_architect_design_manager:6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_software_architect_design_manager:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_engineering_lifecycle_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_engineering_lifecycle_manager:5.0.1:*:*:*:*:*:*:*"
] | null | null | 4.3 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.