id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 36
232
⌀ |
---|---|---|---|---|---|---|---|---|
GHSA-fmjh-vg9p-v4cg
|
A vulnerability has been found in Fujian Kelixin Communication Command and Dispatch Platform up to 20240318 and classified as critical. Affected by this vulnerability is an unknown functionality of the file api/client/down_file.php. The manipulation of the argument uuid leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-257197 was assigned to this vulnerability.
|
[] | null | 6.3 | null | null | null |
|
CVE-2022-47163
|
WordPress WP CSV to Database Plugin <= 2.6 is vulnerable to Cross Site Request Forgery (CSRF)
|
Cross-Site Request Forgery (CSRF) vulnerability in Tips and Tricks HQ, josh401 WP CSV to Database – Insert CSV file content into WordPress plugin <= 2.6 versions.
|
[
"cpe:2.3:a:wp_csv_to_database_project:wp_csv_to_database:*:*:*:*:*:wordpress:*:*"
] | null | 3.1 | null | null | null |
GHSA-j7rw-j57q-hgf4
|
Firejail uses 0777 permissions when mounting /tmp, which allows local users to gain privileges.
|
[] | null | null | 7.8 | null | null |
|
CVE-2025-0151
|
Zoom Apps - Use After Free
|
Use after free in some Zoom Workplace Apps may allow an authenticated user to conduct an escalation of privilege via network access.
|
[] | null | 8.5 | null | null | null |
CVE-2023-0699
|
Use after free in GPU in Google Chrome prior to 110.0.5481.77 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page and browser shutdown. (Chromium security severity: Medium)
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | null | null |
|
CVE-2019-11419
|
vcodec2_hls_filter in libvoipCodec_v7a.so in the WeChat application through 7.0.3 for Android allows attackers to cause a denial of service (application crash) by replacing an emoji file (under the /sdcard/tencent/MicroMsg directory) with a crafted .wxgf file. The content of the replacement must be derived from the phone's IMEI. The crash occurs upon receiving a message that contains the replaced emoji.
|
[
"cpe:2.3:a:tencent:wechat:*:*:*:*:*:android:*:*"
] | null | 5.5 | null | 4.3 | null |
|
CVE-2017-18137
|
In Android before security patch level 2018-04-05 on Qualcomm Snapdragon Mobile MDM9640, MDM9645, MDM9650, MDM9655, SD 450, SD 625, SD 650/52, SD 810, SD 820, SD 835, while processing the IPv6 pdp address of the pdp context, a buffer overflow can occur.
|
[
"cpe:2.3:o:qualcomm:mdm9640_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9640:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9645_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9645:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9650:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9655_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9655:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_450_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_450:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_625_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_625:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_650_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_650:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_652_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_652:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_810_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_810:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_820_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_820:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_835_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_835:-:*:*:*:*:*:*:*"
] | null | null | 9.8 | 10 | null |
|
CVE-2021-32837
|
mechanize vulnerable to ReDoS
|
mechanize, a library for automatically interacting with HTTP web servers, contains a regular expression that is vulnerable to regular expression denial of service (ReDoS) prior to version 0.4.6. If a web server responds in a malicious way, then mechanize could crash. Version 0.4.6 has a patch for the issue.
|
[
"cpe:2.3:a:mechanize_project:mechanize:*:*:*:*:*:python:*:*"
] | null | 7.5 | null | null | null |
CVE-2018-20438
|
Technicolor TC7110.AR STD3.38.03 devices allow remote attackers to discover Wi-Fi credentials via iso.3.6.1.4.1.2863.205.10.1.30.4.1.14.1.3.32 and iso.3.6.1.4.1.2863.205.10.1.30.4.2.4.1.2.32 SNMP requests.
|
[
"cpe:2.3:o:technicolor:tc7110.ar_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:technicolor:tc7110.ar:-:*:*:*:*:*:*:*"
] | null | null | 9.8 | 5 | null |
|
CVE-2020-6344
|
SAP 3D Visual Enterprise Viewer, version - 9, allows a user to open manipulated PDF file received from untrusted sources which results in crashing of the application and becoming temporarily unavailable until the user restarts the application, this is caused due to Improper Input Validation.
|
[
"cpe:2.3:a:sap:3d_visual_enterprise_viewer:9:*:*:*:*:*:*:*"
] | null | null | 4.3 | null | null |
|
GHSA-cc7g-59jw-rfxv
|
Multiple cross-site scripting (XSS) vulnerabilities in index.php in FileRun 1.0 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) page, (2) module, or (3) section parameter.
|
[] | null | null | null | null | null |
|
CVE-2024-34928
|
A SQL injection vulnerability in /model/update_subject_routing.php in Campcodes Complete Web-Based School Management System 1.0 allows an attacker to execute arbitrary SQL commands via the grade parameter.
|
[
"cpe:2.3:a:campcodes:complete_web-based_school_management_system:1.0:*:*:*:*:*:*:*"
] | null | 7.3 | null | null | null |
|
GHSA-5jc5-hr93-gqvq
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in RumbleTalk RumbleTalk Live Group Chat allows Stored XSS. This issue affects RumbleTalk Live Group Chat: from n/a through 6.3.5.
|
[] | null | 6.5 | null | null | null |
|
CVE-2012-3289
|
VMware Workstation 8.x before 8.0.4, VMware Player 4.x before 4.0.4, VMware ESXi 3.5 through 5.0, and VMware ESX 3.5 through 4.1 allow remote attackers to cause a denial of service (guest OS crash) via crafted traffic from a remote virtual device.
|
[
"cpe:2.3:a:vmware:workstation:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workstation:8.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workstation:8.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workstation:8.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:player:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:player:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:player:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:player:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esx:3.5:*:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esx:3.5:update1:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esx:3.5:update2:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esx:3.5:update3:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esx:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esx:4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:3.5:*:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:3.5:1:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:4.0:1:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:4.0:2:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:4.0:3:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:4.0:4:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:4.1:1:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:4.1:2:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.0:*:*:*:*:*:*:*"
] | null | null | null | 7.8 | null |
|
CVE-2023-29014
|
Goobi viewer Core Reflected Cross-Site Scripting Vulnerability Using LOGID Parameter
|
The Goobi viewer is a web application that allows digitised material to be displayed in a web browser. A reflected cross-site scripting vulnerability has been identified in Goobi viewer core prior to version 23.03 when evaluating the LOGID parameter. An attacker could trick a user into following a specially crafted link to a Goobi viewer installation, resulting in the execution of malicious script code in the user's browser. The vulnerability has been fixed in version 23.03.
|
[
"cpe:2.3:a:intranda:goobi_viewer_core:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | null | null |
CVE-2016-4392
|
A remote cross site scripting vulnerability has been identified in HP Business Service Management software v9.1x, v9.20 - v9.25IP1.
|
[
"cpe:2.3:a:hp:business_service_management:*:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:business_service_management:9.10:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:business_service_management:9.25:ip1:*:*:*:*:*:*"
] | null | null | 5.4 | 3.5 | null |
|
GHSA-fqp8-8492-8xcg
|
A Remote Denial of Service vulnerability in HPE Intelligent Management Center (iMC) PLAT version iMC Plat 7.3 E0504P2 was found.
|
[] | null | null | 6.5 | null | null |
|
CVE-2025-52471
|
ESP-NOW Integer Underflow Vulnerability Advisory
|
ESF-IDF is the Espressif Internet of Things (IOT) Development Framework. An integer underflow vulnerability has been identified in the ESP-NOW protocol implementation within the ESP Wi-Fi component of versions 5.4.1, 5.3.3, 5.2.5, and 5.1.6 of the ESP-IDF framework. This issue stems from insufficient validation of user-supplied data length in the packet receive function. Under certain conditions, this may lead to out-of-bounds memory access and may allow arbitrary memory write operations. On systems without a memory protection scheme, this behavior could potentially be used to achieve remote code execution (RCE) on the target device. In versions 5.4.2, 5.3.4, 5.2.6, and 5.1.6, ESP-NOW has added more comprehensive validation logic on user-supplied data length during packet reception to prevent integer underflow caused by negative value calculations. For ESP-IDF v5.3 and earlier, a workaround can be applied by validating that the `data_len` parameter received in the RX callback (registered via `esp_now_register_recv_cb()`) is a positive value before further processing. For ESP-IDF v5.4 and later, no application-level workaround is available. Users are advised to upgrade to a patched version of ESP-IDF to take advantage of the built-in mitigation.
|
[] | 7.2 | null | null | null | null |
CVE-2023-0667
|
Wireshark MSMMS parsing buffer overflow
|
Due to failure in validating the length provided by an attacker-crafted MSMMS packet, Wireshark version 4.0.5 and prior, in an unusual configuration, is susceptible to a heap-based buffer overflow, and possibly code execution in the context of the process running Wireshark
|
[
"cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | null | null |
GHSA-4ppf-rv9c-6qjq
|
A buffer over-read vulnerability was reported in the ThinkPadX13s BIOS LenovoSetupConfigDxe driver that could allow a local attacker with elevated privileges to cause information disclosure.
|
[] | null | 4.4 | null | null | null |
|
CVE-2024-20041
|
In da, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08541746; Issue ID: ALPS08541746.
|
[
"cpe:2.3:h:mediatek:mt2713:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8676:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*"
] | null | 4.4 | null | null | null |
|
CVE-2008-0573
|
IPSecDrv.sys 10.4.0.12 in SafeNET HighAssurance Remote and SoftRemote allows local users to gain privileges via a crafted IPSECDRV_IOCTL IOCTL request.
|
[
"cpe:2.3:a:safenet:ipsecdrv.sys:10.4.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:safenet:safenet_highassurance_remote:1.4.12:*:*:*:*:*:*:*",
"cpe:2.3:a:safenet:softremote_vpn_client:1.4.12:*:*:*:*:*:*:*"
] | null | null | null | 7.2 | null |
|
GHSA-rr66-pqp9-7m9f
|
Cross-site scripting (XSS) vulnerability in Craig Knudsen WebCalendar 1.2.4 allows remote attackers to inject arbitrary web script or HTML via the Location variable.
|
[] | null | null | null | null | null |
|
CVE-2017-4977
|
EMC RSA Archer Security Operations Management with RSA Unified Collector Framework versions prior to 1.3.1.52 contain a sensitive information disclosure vulnerability that could potentially be exploited by malicious users to compromise an affected system.
|
[
"cpe:2.3:a:emc:rsa_archer_security_operations_management:*:*:*:*:*:*:*:*"
] | null | null | 7 | 1.9 | null |
|
GHSA-639q-4j2p-pfqv
|
On the QFX3500 and QFX3600 platforms, the number of bytes collected from the RANDOM_INTERRUPT entropy source when the device boots up is insufficient, possibly leading to weak or duplicate SSH keys or self-signed SSL/TLS certificates. Entropy increases after the system has been up and running for some time, but immediately after boot, the entropy is very low. This issue only affects the QFX3500 and QFX3600 switches. No other Juniper Networks products or platforms are affected by this weak entropy vulnerability.
|
[] | null | null | null | null | null |
|
CVE-2019-17386
|
The animate-it plugin before 2.3.6 for WordPress has CSRF in edsanimate.php.
|
[
"cpe:2.3:a:eleopard:animate_it\\!:*:*:*:*:*:wordpress:*:*"
] | null | 8.8 | null | 6.8 | null |
|
GHSA-4x4r-ggv9-cw99
|
The mintToken function of a smart contract implementation for VITToken, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value.
|
[] | null | 7.5 | null | null | null |
|
CVE-2018-6508
|
Puppet Enterprise 2017.3.x prior to 2017.3.3 are vulnerable to a remote execution bug when a specially crafted string was passed into the facter_task or puppet_conf tasks. This vulnerability only affects tasks in the affected modules, if you are not using puppet tasks you are not affected by this vulnerability.
|
[
"cpe:2.3:a:puppet:puppet_enterprise:*:*:*:*:*:*:*:*"
] | null | null | 8 | 6 | null |
|
CVE-2005-1299
|
The inserter.cgi script allows remote attackers to execute arbitrary commands via shell metacharacters in the argument.
|
[
"cpe:2.3:a:inserter.cgi:inserter.cgi:*:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
CVE-2024-49912
|
drm/amd/display: Handle null 'stream_status' in 'planes_changed_for_existing_stream'
|
In the Linux kernel, the following vulnerability has been resolved:
drm/amd/display: Handle null 'stream_status' in 'planes_changed_for_existing_stream'
This commit adds a null check for 'stream_status' in the function
'planes_changed_for_existing_stream'. Previously, the code assumed
'stream_status' could be null, but did not handle the case where it was
actually null. This could lead to a null pointer dereference.
Reported by smatch:
drivers/gpu/drm/amd/amdgpu/../display/dc/core/dc_resource.c:3784 planes_changed_for_existing_stream() error: we previously assumed 'stream_status' could be null (see line 3774)
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
CVE-2022-28424
|
Baby Care System v1.0 was discovered to contain a SQL injection vulnerability via /admin/posts.php&find=.
|
[
"cpe:2.3:a:baby_care_system_project:baby_care_system:1.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 | null |
|
CVE-2021-31207
|
Microsoft Exchange Server Security Feature Bypass Vulnerability
|
Microsoft Exchange Server Security Feature Bypass Vulnerability
|
[
"cpe:2.3:a:microsoft:exchange_server:2013:cumulative_update_23:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_9:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_20:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_19:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_8:*:*:*:*:*:*"
] | null | 6.6 | null | null | null |
CVE-2020-1334
|
An elevation of privilege vulnerability exists when the Windows Runtime improperly handles objects in memory, aka 'Windows Runtime Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1231, CVE-2020-1233, CVE-2020-1235, CVE-2020-1265, CVE-2020-1282, CVE-2020-1304, CVE-2020-1306.
|
[
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | 4.6 | null |
|
GHSA-2gfg-vm36-6mvj
|
The Kommbox component in Rangee GmbH RangeeOS 8.0.4 is vulnerable to Remote Code Execution due to untrusted user supplied input being passed to the command line without sanitization.
|
[] | null | null | null | null | null |
|
GHSA-xffw-v379-pm86
|
Multiple directory traversal vulnerabilities in index.php in FOG Forum 0.8.1 allow remote attackers to include and execute arbitrary local files via a .. (dot dot) in the (1) fog_lang and (2) fog_skin parameters, probably related to libs/required/share.inc; and possibly the (3) fog_pseudo, (4) fog_posted, (5) fog_password, and (6) fog_cook parameters.
|
[] | null | null | null | null | null |
|
GHSA-2hq2-46wf-3mhv
|
In the Linux kernel, the following vulnerability has been resolved:net: qcom/emac: fix UAF in emac_removeadpt is netdev private data and it cannot be
used after free_netdev() call. Using adpt after free_netdev()
can cause UAF bug. Fix it by moving free_netdev() at the end of the
function.
|
[] | null | 7.8 | null | null | null |
|
RHSA-2019:0367
|
Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.29 security update
|
httpd: Out of bounds write in mod_authnz_ldap when using too small Accept-Language values httpd: <FilesMatch> bypass with a trailing newline in the file name openssl: Handling of crafted recursive ASN.1 structures can cause a stack overflow and resulting denial of service httpd: Improper handling of headers in mod_session can allow a remote user to modify session data for CGI applications httpd: Out of bounds access after failure in reading the HTTP request httpd: Use-after-free on HTTP/2 stream shutdown httpd: Out of bounds read in mod_cache_socache can allow a remote attacker to cause DoS httpd: Weak Digest auth nonce generation in mod_auth_digest httpd: mod_http2: Too much time allocated to workers, possibly leading to DoS mod_jk: connector path traversal due to mishandled HTTP requests in httpd httpd: DoS for HTTP/2 connections by continuous SETTINGS frames nghttp2: Null pointer dereference when too large ALTSVC frame is received
|
[
"cpe:/a:redhat:jboss_core_services:1::el6",
"cpe:/a:redhat:jboss_core_services:1::el7"
] | null | null | 5.9 | null | null |
CVE-2025-45055
|
Silverpeas 6.4.2 contains a stored cross-site scripting (XSS) vulnerability in the event management module. An authenticated user can upload a malicious SVG file as an event attachment, which, when viewed by an administrator, executes embedded JavaScript in the admin's session. This allows attackers to escalate privileges by creating a new administrator account. The vulnerability arises from insufficient sanitization of SVG files and weak CSRF protections.
|
[] | null | 5.4 | null | null | null |
|
GHSA-9fmc-c356-2vr9
|
A vulnerability classified as problematic has been found in SourceCodester Comment System 1.0. Affected is an unknown function of the file index.php of the component GET Parameter Handler. The manipulation of the argument msg leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-230076.
|
[] | null | null | 3.5 | null | null |
|
RHSA-2015:1674
|
Red Hat Security Advisory: qemu-kvm-rhev security update
|
Qemu: rtl8139 uninitialized heap memory information leakage to guest (XSA-140)
|
[
"cpe:/a:redhat:openstack:6::el7"
] | null | null | null | null | null |
CVE-2017-6961
|
An issue was discovered in apng2gif 1.7. There is improper sanitization of user input causing huge memory allocations, resulting in a crash. This is related to the read_chunk function using the pChunk->size value (within the PNG file) to determine the amount of memory to allocate.
|
[
"cpe:2.3:a:apng2gif_project:apng2gif:1.7:*:*:*:*:*:*:*"
] | null | null | 5.5 | 4.3 | null |
|
GHSA-ccg6-gvwm-fgpg
|
ppc64-diag 2.6.1 uses 0775 permissions for /tmp/diagSEsnap and does not properly restrict permissions for /tmp/diagSEsnap/snapH.tar.gz, which allows local users to obtain sensitive information by reading files in this archive, as demonstrated by /var/log/messages and /etc/yaboot.conf.
|
[] | null | null | null | null | null |
|
CVE-2015-0327
|
Heap-based buffer overflow in Adobe Flash Player before 13.0.0.269 and 14.x through 16.x before 16.0.0.305 on Windows and OS X and before 11.2.202.442 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-0323.
|
[
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:14.0.0.125:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:14.0.0.145:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:14.0.0.176:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:14.0.0.179:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.152:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.167:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.189:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.223:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.239:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.246:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:16.0.0.235:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:16.0.0.257:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:16.0.0.287:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:16.0.0.296:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
CVE-2017-15255
|
IrfanView version 4.44 (32bit) with PDF plugin version 4.43 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .pdf file, related to a "Read Access Violation starting at PDF!xmlParserInputRead+0x00000000001601b0."
|
[
"cpe:2.3:a:irfanview:pdf:4.43:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:4.44:*:*:*:*:*:x86:*"
] | null | null | 7.8 | 6.8 | null |
|
CVE-2005-3546
|
suid.cgi scripts in F-Secure (1) Internet Gatekeeper for Linux before 2.15.484 and (2) Anti-Virus Linux Gateway before 2.16 are installed SUID with world-executable permissions, which allows local users to gain privilege.
|
[
"cpe:2.3:a:f-secure:f-secure_anti-virus:*:*:linux_gateways:*:*:*:*:*",
"cpe:2.3:a:f-secure:internet_gatekeeper:*:*:linux:*:*:*:*:*"
] | null | null | null | 7.2 | null |
|
GHSA-gx34-4qhf-jgr6
|
Access control vulnerability in the camera framework module
Impact: Successful exploitation of this vulnerability may affect service confidentiality.
|
[] | null | 4.4 | null | null | null |
|
CVE-2025-57754
|
eslint-ban-moment exposed a sensitive Supabase URI in .env (Credential leak)
|
eslint-ban-moment is an Eslint plugin for final assignment in VIHU. In 3.0.0 and earlier, a sensitive Supabase URI is exposed in .env. A valid Supabase URI with embedded username and password will allow an attacker complete unauthorized access and control over database and user data. This could lead to data exfiltration, modification or deletion.
|
[] | null | 9.8 | null | null | null |
CVE-2014-1512
|
Use-after-free vulnerability in the TypeObject class in the JavaScript engine in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 allows remote attackers to execute arbitrary code by triggering extensive memory consumption while garbage collection is occurring, as demonstrated by improper handling of BumpChunk objects.
|
[
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:6.5:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:6.5:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:6.5:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:suse:suse_linux_enterprise_software_development_kit:11.0:sp3:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux_enterprise_desktop:11:sp3:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp3:*:*:*:-:*:*",
"cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp3:*:*:*:vmware:*:*"
] | null | null | null | 10 | null |
|
CVE-2023-51710
|
EMS SQL Manager 3.6.2 (build 55333) for Oracle allows DLL hijacking: a user can trigger the execution of arbitrary code every time the product is executed.
|
[
"cpe:2.3:a:oracle:ens_sql_manager:-:*:*:*:*:*:*:*"
] | null | 4.2 | null | null | null |
|
GHSA-qmw9-j9cf-fc9w
|
An issue was discovered in Open Design Alliance
Drawings SDK before 2024.12. A corrupted value of number
of sectors used by the Fat structure in a crafted DGN file leads to an
out-of-bounds write. An attacker can leverage this vulnerability to execute
code in the context of the current process.
|
[] | null | 7.8 | null | null | null |
|
GHSA-x8x5-h6pv-r9vg
|
The sock_setsockopt function in net/core/sock.c in the Linux kernel before 3.5.7 does not ensure that a keepalive action is associated with a stream socket, which allows local users to cause a denial of service (system crash) by leveraging the ability to create a raw socket.
|
[] | null | null | null | null | null |
|
CVE-2020-28215
|
A CWE-862: Missing Authorization vulnerability exists in Easergy T300 (firmware 2.7 and older), that could cause a wide range of problems, including information exposures, denial of service, and arbitrary code execution when access control checks are not applied consistently.
|
[
"cpe:2.3:o:schneider-electric:easergy_t300_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:easergy_t300:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 | null |
|
CVE-2006-4262
|
Multiple buffer overflows in cscope 15.5 and earlier allow user-assisted attackers to cause a denial of service (crash) and possibly execute arbitrary code via multiple vectors including (1) a long pathname that is not properly handled during file list parsing, (2) long pathnames that result from path variable expansion such as tilde expansion for the HOME environment variable, and (3) a long -f (aka reffile) command line argument.
|
[
"cpe:2.3:a:cscope:cscope:*:*:*:*:*:*:*:*"
] | null | null | null | 5.1 | null |
|
CVE-2014-0011
|
Multiple heap-based buffer overflows in the ZRLE_DECODE function in common/rfb/zrleDecode.h in TigerVNC before 1.3.1, when NDEBUG is enabled, allow remote VNC servers to cause a denial of service (vncviewer crash) and possibly execute arbitrary code via vectors related to screen image rendering.
|
[
"cpe:2.3:a:tigervnc:tigervnc:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 | null |
|
CVE-2008-2914
|
SQL injection vulnerability in jobseekers/JobSearch3.php (aka the search module) in PHP JOBWEBSITE PRO allows remote attackers to execute arbitrary SQL commands via the (1) kw or (2) position parameter. NOTE: some of these details are obtained from third party information.
|
[
"cpe:2.3:a:preprojects:php_jobwebsite_pro:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-qwfr-wxv4-wpf7
|
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Netgain Enterprise Manager. Authentication is not required to exploit this vulnerability. The specific flaw exists within exec.jsp. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code under the context of the current user. Was ZDI-CAN-4749.
|
[] | null | null | 9.8 | null | null |
|
CVE-2010-0263
|
Microsoft Office Excel 2007 SP1 and SP2; Office 2008 for Mac; Open XML File Format Converter for Mac; Office Excel Viewer SP1 and SP2; Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP1 and SP2; and Office SharePoint Server 2007 SP1 and SP2 do not validate ZIP headers during decompression of Open XML (.XLSX) documents, which allows remote attackers to execute arbitrary code via a crafted document that triggers access to uninitialized memory locations, aka "Microsoft Office Excel XLSX File Parsing Code Execution Vulnerability."
|
[
"cpe:2.3:a:microsoft:excel:2002:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:excel:2003:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:excel:2007:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:excel:2007:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2004:*:mac:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2008:*:mac:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_compatibility_pack:2007:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_compatibility_pack:2007:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_excel_viewer:*:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_excel_viewer:*:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_sharepoint_server:2007:sp1:x32:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_sharepoint_server:2007:sp1:x64:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_sharepoint_server:2007:sp2:x32:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_sharepoint_server:2007:sp2:x64:*:*:*:*:*",
"cpe:2.3:a:microsoft:open_xml_file_format_converter:*:*:mac:*:*:*:*:*"
] | null | null | null | 9.3 | null |
|
GHSA-2mx9-jpq3-jxj6
|
Firejail before 0.9.44.6 and 0.9.38.x LTS before 0.9.38.10 LTS does not comprehensively address dotfile cases during its attempt to prevent accessing user files with an euid of zero, which allows local users to conduct sandbox-escape attacks via vectors involving a symlink and the --private option. NOTE: this vulnerability exists because of an incomplete fix for CVE-2017-5180.
|
[] | null | null | 8.8 | null | null |
|
CVE-2023-47890
|
pyLoad 0.5.0 is vulnerable to Unrestricted File Upload.
|
[
"cpe:2.3:a:pyload:pyload:0.5.0:*:*:*:*:*:*:*"
] | null | 8.8 | null | null | null |
|
GHSA-9wx3-pwm6-mxjc
|
** DISPUTED ** Glastopf 3.1.3-dev has SSRF, as demonstrated by the abc.php a parameter. NOTE: the vendor indicates that this is intentional behavior because the product is a web application honeypot, and modules/handlers/emulators/rfi.py supports Remote File Inclusion emulation.
|
[] | null | null | 8.8 | null | null |
|
CVE-2018-4104
|
An issue was discovered in certain Apple products. iOS before 11.3 is affected. macOS before 10.13.4 is affected. tvOS before 11.3 is affected. watchOS before 4.3 is affected. The issue involves the "Kernel" component. It allows attackers to bypass intended memory-read restrictions via a crafted app.
|
[
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] | null | null | 5.5 | 4.3 | null |
|
GHSA-j4fr-x79w-x7mp
|
osCommerce 2.3.4.1 has XSS vulnerability via the authenticated user entering the XSS payload into the title section of newsletters.
|
[] | null | null | null | null | null |
|
RHSA-2011:1167
|
Red Hat Security Advisory: seamonkey security update
|
Mozilla: Miscellaneous memory safety hazards Mozilla: Private data leakage using RegExp.input
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null | null |
CVE-2018-9331
|
An issue was discovered in zzcms 8.2. user/adv.php allows remote attackers to delete arbitrary files via directory traversal sequences in the oldimg parameter. This can be leveraged for database access by deleting install.lock.
|
[
"cpe:2.3:a:zzcms:zzcms:8.2:*:*:*:*:*:*:*"
] | null | 7.5 | null | 6.4 | null |
|
CVE-2007-1376
|
The shmop functions in PHP before 4.4.5, and before 5.2.1 in the 5.x series, do not verify that their arguments correspond to a shmop resource, which allows context-dependent attackers to read and write arbitrary memory locations via arguments associated with an inappropriate resource, as demonstrated by a GD Image resource.
|
[
"cpe:2.3:a:php:php:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0:beta_4_patch1:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0.1:patch1:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0.1:patch2:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0.3:patch1:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0.4:patch1:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0.7:rc1:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0.7:rc2:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0.7:rc3:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.2:*:dev:*:*:*:*:*",
"cpe:2.3:a:php:php:4.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.8:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.9:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.10:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.11:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.0:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2012-4872
|
Cross-site scripting (XSS) vulnerability in Tickets/Submit in Kayako Fusion before 4.40.985 allows remote attackers to inject arbitrary web script or HTML via certain vectors, possibly a crafted ticket description.
|
[
"cpe:2.3:a:kayako:kayako_fusion:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
CVE-2013-4306
|
Cross-site request forgery (CSRF) vulnerability in api/ApiQueryCheckUser.php in the CheckUser extension for MediaWiki, possibly Checkuser before 2.3, allows remote attackers to hijack the authentication of arbitrary users for requests that "perform sensitive write actions" via unspecified vectors.
|
[
"cpe:2.3:a:mediawiki:mediawiki:*:*:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
GHSA-wmj6-6jqm-gm7q
|
The photo-gallery plugin before 1.2.42 for WordPress has CSRF.
|
[] | null | null | 8.8 | null | null |
|
CVE-2010-4338
|
ocrodjvu 0.4.6-1 on Debian GNU/Linux allows local users to modify arbitrary files via a symlink attack on temporary files that are generated when Cuneiform is invoked as the OCR engine.
|
[
"cpe:2.3:a:jwilk:ocrodjvu:0.4.6-1:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:linux:*:*:*:*:*:*:*:*"
] | null | null | null | 6.2 | null |
|
GHSA-8v2h-4jpm-3wfm
|
ChakraCore RCE Vulnerability
|
A remote code execution vulnerability exists in the way that the Chakra JavaScript engine renders when handling objects in memory, aka "Scripting Engine Memory Corruption Vulnerability".
|
[] | null | null | 9.8 | null | null |
CVE-2024-55461
|
SeaCMS <=13.0 is vulnerable to command execution in phome.php via the function Ebak_RepPathFiletext().
|
[] | null | 9.8 | null | null | null |
|
GHSA-vv36-mwqg-q796
|
Cross-Site Request Forgery (CSRF) vulnerability in ReviewsTap ReviewsTap allows Stored XSS. This issue affects ReviewsTap: from n/a through 1.1.2.
|
[] | null | 7.1 | null | null | null |
|
GHSA-5h86-f8rg-c9qv
|
IBM/Tivoli OPC Tracker Agent version 2 release 1 creates files, directories, and IPC message queues with insecure permissions (world-readable and world-writable), which could allow local users to disrupt operations and possibly gain privileges by modifying or deleting files.
|
[] | null | null | null | null | null |
|
GHSA-q778-q498-8cqq
|
IBM UrbanCode Deploy (UCD) 6.2.7.0 through 6.2.7.17, 7.0.0.0 through 7.0.5.12, 7.1.0.0 through 7.1.2.8, and 7.2.0.0 through 7.2.3.1 could allow a user with administrative privileges including "Manage Security" permissions may be able to recover a credential previously saved for performing authenticated LDAP searches. IBM X-Force ID: 236601.
|
[] | null | 4.9 | null | null | null |
|
GHSA-h6qv-f5gf-8gcf
|
Missing Authorization in Jenkins P4 plugin
|
Jenkins P4 Plugin 1.11.4 and earlier does not perform permission checks in multiple HTTP endpoints, allowing attackers with Overall/Read permission to connect to an attacker-specified Perforce server using attacker-specified username and password.Jenkins P4 Plugin 1.11.5 requires Overall/Administer for the affected HTTP endpoints.
|
[] | null | 4.3 | null | null | null |
RHBA-2025:1597
|
Red Hat Bug Fix Advisory: Red Hat Quay v3.9.10 bug fix release
|
jquery: Untrusted code execution via <option> tag in HTML passed to DOM manipulation methods
|
[
"cpe:/a:redhat:quay:3::el8"
] | null | 6.1 | null | null | null |
CVE-2019-13685
|
Use after free in sharing view in Google Chrome prior to 77.0.3865.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.8 | null |
|
GHSA-qch9-x876-gmcw
|
Under specific circumstances, insecure permissions in Ivanti Application Control before version 2024.3 HF1, 2024.1 HF2, or 2023.3 HF3 allows a local authenticated attacker to achieve local privilege escalation.
|
[] | null | 7.8 | null | null | null |
|
RHSA-2020:2798
|
Red Hat Security Advisory: Red Hat OpenShift Service Mesh 1.1 servicemesh-proxy security update
|
envoy: Resource exhaustion when accepting too many connections envoy: Resource exhaustion when proxying HTTP/2 requests or responses with small data frames envoy: Resource exhaustion via HTTP/2 client requests with large payloads and improper stream windows envoy: Resource exhaustion when processing HTTP/1.1 headers with long field names
|
[
"cpe:/a:redhat:service_mesh:1.1::el8"
] | null | 7.5 | null | null | null |
CVE-2022-4145
|
Content spoofing
|
A content spoofing flaw was found in OpenShift's OAuth endpoint. This flaw allows a remote, unauthenticated attacker to inject text into a webpage, enabling the obfuscation of a phishing operation.
|
[
"cpe:/a:redhat:openshift:4",
"cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*"
] | null | 4.3 | null | null | null |
CVE-2017-11691
|
Cross-site scripting (XSS) vulnerability in auth_profile.php in Cacti 1.1.13 allows remote attackers to inject arbitrary web script or HTML via specially crafted HTTP Referer headers.
|
[
"cpe:2.3:a:cacti:cacti:1.1.13:*:*:*:*:*:*:*"
] | null | null | 5.4 | 3.5 | null |
|
CVE-2018-17138
|
The Jibu Pro plugin through 1.7 for WordPress is prone to Stored XSS via the wp-content/plugins/jibu-pro/quiz_action.php name (aka Quiz Name) field.
|
[
"cpe:2.3:a:nickelpro:jibu_pro:*:*:*:*:*:wordpress:*:*"
] | null | null | 5.4 | 3.5 | null |
|
CVE-2024-8000
|
On affected platforms running Arista EOS with 802.1X configured, certain conditions may occur where a dynamic ACL is received from the AAA server resulting in only the first line of the ACL being installed after an Accelerated Software Upgrade (ASU) restar
|
On affected platforms running Arista EOS with 802.1X configured, certain conditions may occur where a dynamic ACL is received from the AAA server resulting in only the first line of the ACL being installed after an Accelerated Software Upgrade (ASU) restart.
Note: supplicants with pending captive-portal authentication during ASU would be impacted with this bug.
|
[] | null | 5.3 | null | null | null |
CVE-2009-0557
|
Excel in Microsoft Office 2000 SP3, Office XP SP3, Office 2003 SP3, and Office 2004 and 2008 for Mac; Excel in 2007 Microsoft Office System SP1 and SP2; Open XML File Format Converter for Mac; Microsoft Office Excel Viewer 2003 SP3; Microsoft Office Excel Viewer; and Microsoft Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP1 and SP2 allow remote attackers to execute arbitrary code via a crafted Excel file with a malformed record object, aka "Object Record Corruption Vulnerability."
|
[
"cpe:2.3:a:microsoft:office:2000:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2003:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2004:*:*:*:*:macos:*:*",
"cpe:2.3:a:microsoft:office:2007:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2007:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2008:*:*:*:*:macos:*:*",
"cpe:2.3:a:microsoft:office:xp:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_excel_viewer:-:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_excel_viewer:2003:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_sharepoint_server:2007:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_sharepoint_server:2007:sp2:*:*:*:*:*:*"
] | null | 7.8 | null | 9.3 | null |
|
CVE-2002-0280
|
Buffer overflow in CodeBlue 4 and earlier, and possibly other versions, allows remote attackers to execute arbitrary code via a long string in an SMTP reply.
|
[
"cpe:2.3:a:codeblue:codeblue:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2016-9006
|
IBM UrbanCode Deploy 6.1 and 6.2 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM Reference #: C1000264.
|
[
"cpe:2.3:a:ibm:urbancode_deploy:6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.1.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.1.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.1.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.1.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.1.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.1.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.2.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.2.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.2.3.1:*:*:*:*:*:*:*"
] | null | null | 5.4 | 3.5 | null |
|
CVE-2024-4843
|
ePO doesn't allow a regular privileged user to delete tasks or assignments. Insecure direct object references that allow a least privileged user to manipulate the client task and client task assignments, hence escalating his/her privilege.
|
[] | null | 4.3 | null | null | null |
|
CVE-2021-20184
|
It was found in Moodle before version 3.10.1, 3.9.4 and 3.8.7 that a insufficient capability checks in some grade related web services meant students were able to view other students grades.
|
[
"cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*"
] | null | 4.3 | null | 4 | null |
|
CVE-2013-6745
|
Cross-site scripting (XSS) vulnerability in the IMS server before Ifix 6 in IBM Security Access Manager for Enterprise Single Sign-On (ISAM ESSO) 8.2 allows remote authenticated users to inject arbitrary web script or HTML via crafted input to an unspecified dynamic web form.
|
[
"cpe:2.3:a:ibm:security_access_manager_for_enterprise_single_sign-on:8.2:*:*:*:*:*:*:*"
] | null | null | null | 3.5 | null |
|
CVE-2015-0302
|
Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK & Compiler before 16.0.0.272 allow attackers to obtain sensitive keystroke information via unspecified vectors.
|
[
"cpe:2.3:a:adobe:flash_player:11.2.202.425:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air_sdk:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:14.0.0.125:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:14.0.0.145:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:14.0.0.176:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:14.0.0.179:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.144:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.152:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.167:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.189:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.223:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.238:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.239:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.246:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:16.0.0.234:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:16.0.0.235:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:android:*:*",
"cpe:2.3:a:adobe:adobe_air_sdk_and_compiler:*:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
CVE-2025-44964
|
A lack of SSL certificate validation in BlueStacks v5.20 allows attackers to execute a man-it-the-middle attack and obtain sensitive information.
|
[] | null | 3.9 | null | null | null |
|
GHSA-7r7q-m69f-v7m3
|
There is a Service logic vulnerability in Smartphone.Successful exploitation of this vulnerability may cause WLAN DoS.
|
[] | null | null | null | null | null |
|
CVE-2021-4002
|
A memory leak flaw in the Linux kernel's hugetlbfs memory usage was found in the way the user maps some regions of memory twice using shmget() which are aligned to PUD alignment with the fault of some of the memory pages. A local user could use this flaw to get unauthorized access to some data.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.16:-:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.16:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.16:rc2:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:22.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_cloud_native_core_policy:22.2.0:*:*:*:*:*:*:*"
] | null | 4.4 | null | 3.6 | null |
|
GHSA-4mv3-grr2-3p4p
|
Linux kernel before 2.4.21 allows local users to cause a denial of service (kernel panic) via asynchronous input or output on a FIFO special file.
|
[] | null | null | null | null | null |
|
CVE-2008-3329
|
Unspecified vulnerability in Links before 2.1, when "only proxies" is enabled, has unknown impact and attack vectors related to providing "URLs to external programs."
|
[
"cpe:2.3:a:twibright:links:*:pre37:*:*:*:*:*:*",
"cpe:2.3:a:twibright:links:0.80:*:*:*:*:*:*:*",
"cpe:2.3:a:twibright:links:0.81:pre1:*:*:*:*:*:*",
"cpe:2.3:a:twibright:links:0.81:pre2:*:*:*:*:*:*",
"cpe:2.3:a:twibright:links:0.81:pre3:*:*:*:*:*:*",
"cpe:2.3:a:twibright:links:0.90:*:*:*:*:*:*:*",
"cpe:2.3:a:twibright:links:0.90:pre1:*:*:*:*:*:*",
"cpe:2.3:a:twibright:links:0.90:pre2:*:*:*:*:*:*",
"cpe:2.3:a:twibright:links:0.90:pre3:*:*:*:*:*:*",
"cpe:2.3:a:twibright:links:0.91:*:*:*:*:*:*:*",
"cpe:2.3:a:twibright:links:0.92:*:*:*:*:*:*:*",
"cpe:2.3:a:twibright:links:0.93:*:*:*:*:*:*:*",
"cpe:2.3:a:twibright:links:0.93:pre1:*:*:*:*:*:*",
"cpe:2.3:a:twibright:links:0.93:pre2:*:*:*:*:*:*",
"cpe:2.3:a:twibright:links:0.93:pre3:*:*:*:*:*:*",
"cpe:2.3:a:twibright:links:0.93:pre4:*:*:*:*:*:*",
"cpe:2.3:a:twibright:links:0.94:*:*:*:*:*:*:*",
"cpe:2.3:a:twibright:links:0.94:pre1:*:*:*:*:*:*",
"cpe:2.3:a:twibright:links:0.94:pre2:*:*:*:*:*:*",
"cpe:2.3:a:twibright:links:0.94:pre3:*:*:*:*:*:*",
"cpe:2.3:a:twibright:links:0.94:pre4:*:*:*:*:*:*",
"cpe:2.3:a:twibright:links:0.94:pre5:*:*:*:*:*:*",
"cpe:2.3:a:twibright:links:0.94:pre6:*:*:*:*:*:*",
"cpe:2.3:a:twibright:links:0.94:pre7:*:*:*:*:*:*",
"cpe:2.3:a:twibright:links:0.94:pre8:*:*:*:*:*:*",
"cpe:2.3:a:twibright:links:0.94:pre9:*:*:*:*:*:*",
"cpe:2.3:a:twibright:links:0.95:*:*:*:*:*:*:*",
"cpe:2.3:a:twibright:links:0.96:*:*:*:*:*:*:*",
"cpe:2.3:a:twibright:links:0.96:pre1:*:*:*:*:*:*",
"cpe:2.3:a:twibright:links:0.96:pre2:*:*:*:*:*:*",
"cpe:2.3:a:twibright:links:0.96:pre3:*:*:*:*:*:*",
"cpe:2.3:a:twibright:links:0.96:pre4:*:*:*:*:*:*",
"cpe:2.3:a:twibright:links:0.96:pre5:*:*:*:*:*:*",
"cpe:2.3:a:twibright:links:0.96:pre6:*:*:*:*:*:*",
"cpe:2.3:a:twibright:links:0.96:pre7:*:*:*:*:*:*",
"cpe:2.3:a:twibright:links:0.96:pre8:*:*:*:*:*:*",
"cpe:2.3:a:twibright:links:0.97:*:*:*:*:*:*:*",
"cpe:2.3:a:twibright:links:0.97:pre1:*:*:*:*:*:*",
"cpe:2.3:a:twibright:links:0.97:pre10:*:*:*:*:*:*",
"cpe:2.3:a:twibright:links:0.97:pre11:*:*:*:*:*:*",
"cpe:2.3:a:twibright:links:0.97:pre12:*:*:*:*:*:*",
"cpe:2.3:a:twibright:links:0.97:pre2:*:*:*:*:*:*",
"cpe:2.3:a:twibright:links:0.97:pre3:*:*:*:*:*:*",
"cpe:2.3:a:twibright:links:0.97:pre4:*:*:*:*:*:*",
"cpe:2.3:a:twibright:links:0.97:pre5:*:*:*:*:*:*",
"cpe:2.3:a:twibright:links:0.97:pre6:*:*:*:*:*:*",
"cpe:2.3:a:twibright:links:0.97:pre7:*:*:*:*:*:*",
"cpe:2.3:a:twibright:links:0.97:pre8:*:*:*:*:*:*",
"cpe:2.3:a:twibright:links:0.97:pre9:*:*:*:*:*:*",
"cpe:2.3:a:twibright:links:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:twibright:links:2.0:pre1:*:*:*:*:*:*",
"cpe:2.3:a:twibright:links:2.0:pre2:*:*:*:*:*:*",
"cpe:2.3:a:twibright:links:2.0:pre3:*:*:*:*:*:*",
"cpe:2.3:a:twibright:links:2.0:pre4:*:*:*:*:*:*",
"cpe:2.3:a:twibright:links:2.0:pre5:*:*:*:*:*:*",
"cpe:2.3:a:twibright:links:2.0:pre6:*:*:*:*:*:*",
"cpe:2.3:a:twibright:links:2.1:pre1:*:*:*:*:*:*",
"cpe:2.3:a:twibright:links:2.1:pre10:*:*:*:*:*:*",
"cpe:2.3:a:twibright:links:2.1:pre11:*:*:*:*:*:*",
"cpe:2.3:a:twibright:links:2.1:pre12:*:*:*:*:*:*",
"cpe:2.3:a:twibright:links:2.1:pre13:*:*:*:*:*:*",
"cpe:2.3:a:twibright:links:2.1:pre14:*:*:*:*:*:*",
"cpe:2.3:a:twibright:links:2.1:pre15:*:*:*:*:*:*",
"cpe:2.3:a:twibright:links:2.1:pre16:*:*:*:*:*:*",
"cpe:2.3:a:twibright:links:2.1:pre17:*:*:*:*:*:*",
"cpe:2.3:a:twibright:links:2.1:pre18:*:*:*:*:*:*",
"cpe:2.3:a:twibright:links:2.1:pre19:*:*:*:*:*:*",
"cpe:2.3:a:twibright:links:2.1:pre2:*:*:*:*:*:*",
"cpe:2.3:a:twibright:links:2.1:pre20:*:*:*:*:*:*",
"cpe:2.3:a:twibright:links:2.1:pre21:*:*:*:*:*:*",
"cpe:2.3:a:twibright:links:2.1:pre22:*:*:*:*:*:*",
"cpe:2.3:a:twibright:links:2.1:pre23:*:*:*:*:*:*",
"cpe:2.3:a:twibright:links:2.1:pre24:*:*:*:*:*:*",
"cpe:2.3:a:twibright:links:2.1:pre25:*:*:*:*:*:*",
"cpe:2.3:a:twibright:links:2.1:pre26:*:*:*:*:*:*",
"cpe:2.3:a:twibright:links:2.1:pre27:*:*:*:*:*:*",
"cpe:2.3:a:twibright:links:2.1:pre28:*:*:*:*:*:*",
"cpe:2.3:a:twibright:links:2.1:pre29:*:*:*:*:*:*",
"cpe:2.3:a:twibright:links:2.1:pre3:*:*:*:*:*:*",
"cpe:2.3:a:twibright:links:2.1:pre30:*:*:*:*:*:*",
"cpe:2.3:a:twibright:links:2.1:pre31:*:*:*:*:*:*",
"cpe:2.3:a:twibright:links:2.1:pre32:*:*:*:*:*:*",
"cpe:2.3:a:twibright:links:2.1:pre33:*:*:*:*:*:*",
"cpe:2.3:a:twibright:links:2.1:pre34:*:*:*:*:*:*",
"cpe:2.3:a:twibright:links:2.1:pre35:*:*:*:*:*:*",
"cpe:2.3:a:twibright:links:2.1:pre36:*:*:*:*:*:*",
"cpe:2.3:a:twibright:links:2.1:pre4:*:*:*:*:*:*",
"cpe:2.3:a:twibright:links:2.1:pre5:*:*:*:*:*:*",
"cpe:2.3:a:twibright:links:2.1:pre6:*:*:*:*:*:*",
"cpe:2.3:a:twibright:links:2.1:pre7:*:*:*:*:*:*",
"cpe:2.3:a:twibright:links:2.1:pre8:*:*:*:*:*:*",
"cpe:2.3:a:twibright:links:2.1:pre9:*:*:*:*:*:*"
] | null | null | null | 9.3 | null |
|
CVE-2019-15942
|
FFmpeg through 4.2 has a "Conditional jump or move depends on uninitialised value" issue in h2645_parse because alloc_rbsp_buffer in libavcodec/h2645_parse.c mishandles rbsp_buffer.
|
[
"cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.8 | null |
|
GHSA-wh9m-qrv8-6mfm
|
A SQL injection vulnerability exists in some configurations of ArcGIS Server versions 10.8.1 and earlier. Specially crafted web requests can expose information that is not intended to be disclosed (not customer datasets). Web Services that use file based data sources (file Geodatabase or Shape Files or tile cached services) are unaffected by this issue.
|
[] | null | 5.3 | null | null | null |
|
CVE-1999-0291
|
The WinGate proxy is installed without a password, which allows remote attackers to redirect connections without authentication.
|
[
"cpe:2.3:a:qbik:wingate:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-hfmh-5qwh-5g5h
|
The issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14.1, macOS Monterey 12.7.1, macOS Ventura 13.6.1. An app may be able to modify protected parts of the file system.
|
[] | null | 7.7 | null | null | null |
|
GHSA-83q9-jh53-rrr4
|
Cryptographic issue in HLOS as derived keys used to encrypt/decrypt information is present on stack after use.
|
[] | null | 7.7 | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.