id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 36
232
⌀ |
---|---|---|---|---|---|---|---|---|
CVE-2023-22326
|
iControl REST and tmsh vulnerability
|
In BIG-IP versions 17.0.x before 17.0.0.2, 16.1.x before 16.1.3.3, 15.1.x before 15.1.8.1, 14.1.x before 14.1.5.3, and all versions of 13.1.x, and all versions of BIG-IQ 8.x and 7.1.x, incorrect permission assignment vulnerabilities exist in the iControl REST and TMOS shell (tmsh) dig command which may allow an authenticated attacker with resource administrator or administrator role privileges to view sensitive information. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
|
[
"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*"
] | null | 4.9 | null | null | null |
CVE-2000-0772
|
The installation of Tumbleweed Messaging Management System (MMS) 4.6 and earlier (formerly Worldtalk Worldsecure) creates a default account "sa" with no password.
|
[
"cpe:2.3:a:tumbleweed:messaging_management_system:4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:tumbleweed:messaging_management_system:4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:tumbleweed:messaging_management_system:4.6:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2006-6148
|
Multiple cross-site scripting (XSS) vulnerabilities in submitlink.asp in JiRos Links Manager allow remote attackers to inject arbitrary web script or HTML via the (1) lName, (2) lURL, (3) lImage, and (4) lDescription parameters. NOTE: some of these details are obtained from third party information.
|
[
"cpe:2.3:a:jiros:links_manager:1.0:*:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
CVE-2008-1351
|
SQL injection vulnerability in the Tutorials 2.1b module for XOOPS allows remote attackers to execute arbitrary SQL commands via the tid parameter to printpage.php, which is accessible directly or through a printpage action to index.php.
|
[
"cpe:2.3:a:xoops:tutoriais_module:2.1b:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2020-13320
|
An issue has been discovered in GitLab before version 12.10.13 that allowed a project member with limited permissions to view the project security dashboard.
|
[
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | null | null |
|
GHSA-8rr9-98f9-jfm4
|
Missing Authorization vulnerability in miniOrange WordPress Social Login and Register (Discord, Google, Twitter, LinkedIn) allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WordPress Social Login and Register (Discord, Google, Twitter, LinkedIn): from n/a through 7.5.14.
|
[] | null | 3.5 | null | null | null |
|
CVE-2024-8220
|
itsourcecode Tailoring Management System staffedit.php sql injection
|
A vulnerability was found in itsourcecode Tailoring Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file staffedit.php. The manipulation of the argument id/stafftype/address/fullname/phonenumber/salary leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
|
[
"cpe:2.3:a:itsourcecode:tailoring_management_system:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:angeljudesuarez:tailoring_management_system:1.0:*:*:*:*:*:*:*"
] | 5.3 | 6.3 | 6.3 | 6.5 | null |
PYSEC-2017-86
| null |
There is a cross-site scripting vulnerability in django-epiceditor 0.2.3 via crafted content in a form field.
|
[] | null | null | null | null | null |
RHSA-2013:0695
|
Red Hat Security Advisory: kernel security update
|
kernel: race condition with PTRACE_SETREGS
|
[
"cpe:/o:redhat:rhel_eus:5.6"
] | null | null | null | null | null |
GHSA-44qf-8mxq-79c8
|
Authorization Bypass Through User-Controlled Key vulnerability in Salesforce Tableau Server on Windows, Linux (tab-doc api modules) allows Interface Manipulation (data access to the production database cluster).This issue affects Tableau Server: before 2025.1.3, before 2024.2.12, before 2023.3.19.
|
[] | null | 8 | null | null | null |
|
CVE-2024-52879
|
An issue was discovered in Insyde InsydeH2O kernel 5.2 before version 05.29.50, kernel 5.3 before version 05.38.50, kernel 5.4 before version 05.46.50, kernel 5.5 before version 05.54.50, kernel 5.6 before version 05.61.50, and kernel 5.7 before version 05.70.50. In VariableRuntimeDxe driver, SmmUpdateVariablePropertySmi () is a SMM callback function and it uses StrCmp () to compare variable names. This action may cause a buffer over-read.
|
[] | null | 7.5 | null | null | null |
|
CVE-2018-16174
|
Open redirect vulnerability in LearnPress prior to version 3.1.0 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors.
|
[
"cpe:2.3:a:thimpress:learnpress:*:*:*:*:*:wordpress:*:*"
] | null | null | 6.1 | 5.8 | null |
|
CVE-2019-19048
|
A memory leak in the crypto_reportstat() function in drivers/virt/vboxguest/vboxguest_utils.c in the Linux kernel before 5.3.9 allows attackers to cause a denial of service (memory consumption) by triggering copy_form_user() failures, aka CID-e0b0cb938864.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"
] | null | 7.5 | null | 7.8 | null |
|
CVE-2019-19387
|
A cross-site scripting (XSS) vulnerability in app/fifo_list/fifo_interactive.php in FusionPBX 4.4.1 allows remote attackers to inject arbitrary web script or HTML via the c parameter.
|
[
"cpe:2.3:a:fusionpbx:fusionpbx:4.4.1:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 | null |
|
CVE-2024-7022
|
Uninitialized Use in V8 in Google Chrome prior to 123.0.6312.58 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: Medium)
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | null | null |
|
CVE-2020-26178
|
In tangro Business Workflow before 1.18.1, knowing an attachment ID, it is possible to download workitem attachments without being authenticated.
|
[
"cpe:2.3:a:tangro:business_workflow:*:*:*:*:*:*:*:*"
] | null | 5.3 | null | null | null |
|
CVE-2017-6033
|
A DLL Hijacking issue was discovered in Schneider Electric Interactive Graphical SCADA System (IGSS) Software, Version 12 and previous versions. The software will execute a malicious file if it is named the same as a legitimate file and placed in a location that is earlier in the search path.
|
[
"cpe:2.3:a:schneider-electric:interactive_graphical_scada_system:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | 6.8 | null |
|
CVE-2017-2602
|
jenkins before versions 2.44, 2.32.2 is vulnerable to an improper blacklisting of the Pipeline metadata files in the agent-to-master security subsystem. This could allow metadata files to be written to by malicious agents (SECURITY-358).
|
[
"cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*",
"cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*"
] | null | null | 3.1 | null | null |
|
GHSA-qwhf-8wj5-jr35
|
Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Julien Crego Manager for Icomoon plugin <= 2.0 versions.
|
[] | null | 6.5 | null | null | null |
|
PYSEC-2023-46
| null |
redis-py through 4.5.3 leaves a connection open after canceling an async Redis command at an inopportune time (in the case of a non-pipeline operation), and can send response data to the client of an unrelated request. NOTE: this issue exists because of an incomplete fix for CVE-2023-28858.
|
[] | null | null | null | null | null |
GHSA-rvq6-hp8x-g4vq
|
Heap-based buffer overflow in Microsoft Windows Help winhlp32.exe allows user-assisted attackers to execute arbitrary code via crafted embedded image data in a .hlp file.
|
[] | null | null | null | null | null |
|
GHSA-v8g8-7xq6-7fpp
|
A vulnerability was found in Campcodes Online Shopping Portal 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /forgot-password.php. The manipulation of the argument email leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
|
[] | 6.9 | 7.3 | null | null | null |
|
CVE-2025-6743
|
WoodMart <= 8.2.3 - Authenticated (Contributor+) Stored Cross-Site Scripting
|
The Woodmart theme for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'multiple_markers' attribute in all versions up to, and including, 8.2.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] | null | 6.4 | null | null | null |
CVE-2001-0465
|
TurboTax saves passwords in a temporary file when a user imports investment tax information from a financial institution, which could allow local users to obtain sensitive information.
|
[
"cpe:2.3:a:intuit:turbo_tax:*:*:*:*:*:*:*:*"
] | null | null | null | 4.6 | null |
|
GHSA-qm6x-9j4m-3gq8
|
Cross-site scripting (XSS) vulnerability in MediaWiki 1.13.1, 1.12.0, and possibly other versions before 1.13.2 allows remote attackers to inject arbitrary web script or HTML via the useskin parameter to an unspecified component.
|
[] | null | null | null | null | null |
|
GHSA-v5cq-57h8-c596
|
Buffer overflow in virt/kvm/irq_comm.c in the KVM subsystem in the Linux kernel before 3.2.24 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to Message Signaled Interrupts (MSI), irq routing entries, and an incorrect check by the setup_routing_entry function before invoking the kvm_set_irq function.
|
[] | null | null | null | null | null |
|
GHSA-2r9m-wg35-rfvc
|
Moodle vulnerable to cache poisoning via injection into storage
|
To address a cache poisoning risk in Moodle, additional validation for local storage was required.
|
[] | 6 | 7.7 | null | null | null |
CVE-2024-24488
|
An issue in Shenzen Tenda Technology CP3V2.0 V11.10.00.2311090948 allows a local attacker to obtain sensitive information via the password component.
|
[
"cpe:2.3:o:tendacn:cp3_firmware:11.10.00.2311090948:*:*:*:*:*:*:*",
"cpe:2.3:h:tendacn:cp3:2.0:*:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
|
GHSA-xhhc-3m45-f6cf
|
The cross-site scripting (XSS) countermeasures in class.inputfilter.php in Joomla! 1.0.7 allow remote attackers to cause a denial of service via a crafted mosmsg parameter to index.php with a malformed sequence of multiple tags, as demonstrated using "<<>AAA<><>", possibly due to nested or empty tags.
|
[] | null | null | null | null | null |
|
CVE-2024-0848
|
The AA Cash Calculator plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘invoice’ parameter in all versions up to, and including, 1.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
|
[] | null | 6.1 | null | null | null |
|
CVE-2024-12658
|
IObit Advanced SystemCare Utimate IOCTL AscRegistryFilter.sys 0x8001E01C null pointer dereference
|
A vulnerability was found in IObit Advanced SystemCare Utimate up to 17.0.0 and classified as problematic. This issue affects the function 0x8001E01C in the library AscRegistryFilter.sys of the component IOCTL Handler. The manipulation leads to null pointer dereference. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
|
[
"cpe:2.3:a:iobit:advanced_systemcare_ultimate:*:*:*:*:*:*:*:*"
] | 6.8 | 5.5 | 5.5 | 4.6 | null |
CVE-2007-0497
|
PHP remote file inclusion vulnerability in upload/top.php in Upload-Service 1.0, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the maindir parameter.
|
[
"cpe:2.3:a:upload-service:upload-service:1.0:*:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
RHSA-2024:8329
|
Red Hat Security Advisory: Red Hat build of Cryostat security update
|
go/parser: golang: Calling any of the Parse functions containing deeply nested literals can cause a panic/stack exhaustion encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion go/build/constraint: golang: Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion graphql-java: Allocation of Resources Without Limits or Throttling in GraphQL Java
|
[
"cpe:/a:redhat:cryostat:3::el8"
] | null | 7.5 | null | null | null |
CVE-2019-2250
|
Kernel can write to arbitrary memory address passed by user while freeing/stopping a thread in Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile in QCS605, SD 675, SD 712 / SD 710 / SD 670, SD 835, SD 845 / SD 850, SD 855, SD 8CX, SM7150, SXR1130
|
[
"cpe:2.3:o:qualcomm:qcs605_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs605:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_675_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_675:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_712_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_712:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_710_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_710:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_670_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_670:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_835_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_835:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_845_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_845:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_850_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_850:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_855_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_855:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_8cx_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_8cx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm7150_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm7150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sxr1130_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sxr1130:-:*:*:*:*:*:*:*"
] | null | null | 7.8 | 7.2 | null |
|
CVE-2021-28623
|
Adobe Premiere Elements Privilege Escalation Vulnerability
|
Adobe Premiere Elements version 5.2 (and earlier) is affected by an insecure temporary file creation vulnerability. An unauthenticated attacker could leverage this vulnerability to call functions against the installer to perform high privileged actions. Exploitation of this issue does not require user interaction.
|
[
"cpe:2.3:a:adobe:premiere_elements:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | null | 6.2 | null | null |
CVE-2019-4306
|
IBM Security Guardium Big Data Intelligence (SonarG) 4.0 specifies permissions for a security-critical resource which could lead to the exposure of sensitive information or the modification of that resource by unintended parties. IBM X-Force ID: 160986.
|
[
"cpe:2.3:a:ibm:security_guardium_big_data_intelligence:4.0:*:*:*:*:*:*:*"
] | null | null | 6.5 | null | null |
|
GHSA-82jc-48wv-v8xc
|
Online Banking System Protect v1.0 was discovered to contain a local file inclusion (LFI) vulnerability via the pages parameter.
|
[] | null | 9.8 | null | null | null |
|
GHSA-vm5p-w959-c36r
|
Crestron AM-100 with firmware 1.6.0.2 and AM-101 with firmware 2.7.0.2 is vulnerable to denial of service via a crafted request to TCP port 389. The request will force the slideshow to transition into a "stopped" state. A remote, unauthenticated attacker can use this vulnerability to stop an active slideshow.
|
[] | null | null | null | null | null |
|
GHSA-2xhq-835p-4pg5
|
Double free vulnerability in Esi.cc in Squid 3.x before 3.5.18 and 4.x before 4.0.10 allows remote servers to cause a denial of service (crash) via a crafted Edge Side Includes (ESI) response.
|
[] | null | null | 7.5 | null | null |
|
GHSA-6g47-63mv-qpgh
|
Prototype Pollution in dotty
|
This affects the package dotty before 0.1.2. A type confusion vulnerability can lead to a bypass of CVE-2021-25912 when the user-provided keys used in the path parameter are arrays.
|
[] | null | 5.6 | null | null | null |
GHSA-4f29-7vh8-c46f
|
The Telnet listener for Novell iChain Server before 2.2 Field Patch 3b 2.2.116 does not have a password by default, which allows remote attackers to gain access.
|
[] | null | null | null | null | null |
|
GHSA-g7hm-82x6-p838
|
Compiler removal of buffer clearing in sli_cryptoacc_transparent_key_agreement in Silicon Labs Gecko Platform SDK v4.2.1 and earlier results in key material duplication to RAM.
|
[] | null | 3.1 | null | null | null |
|
GHSA-rpr6-8769-j952
|
Directory traversal vulnerability in index.php for CubeCart 2.0.4 allows remote attackers to read arbitrary files via the language parameter.
|
[] | null | null | null | null | null |
|
GHSA-qxg7-cvq5-m7w7
|
The WP Quick FrontEnd Editor plugin for WordPress is vulnerable to Stored Cross-Site Scripting in versions up to, and including, 5.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with minimal permissions like subscribers, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] | null | 6.4 | null | null | null |
|
GHSA-vx72-c8cv-7pvq
|
NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager (vGPU plugin), where it can double-free a pointer, which may lead to denial of service. This flaw may result in a write-what-where condition, allowing an attacker to execute arbitrary code impacting integrity and availability.
|
[] | null | null | null | null | null |
|
CVE-2013-2405
|
Unspecified vulnerability in the Primavera P6 Enterprise Project Portfolio Management component in Oracle Primavera Products Suite 7.0, 8.1, and 8.2 allows remote authenticated users to affect confidentiality and integrity via unknown vectors related to Web Access.
|
[
"cpe:2.3:a:oracle:primavera_products_suite:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:primavera_products_suite:8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:primavera_products_suite:8.2:*:*:*:*:*:*:*"
] | null | null | null | 5.5 | null |
|
RHSA-2025:8634
|
Red Hat Security Advisory: podman security update
|
net/http: Request smuggling due to acceptance of invalid chunked data in net/http
|
[
"cpe:/a:redhat:rhel_eus:9.4::appstream"
] | null | 5.4 | null | null | null |
CVE-2024-43643
|
Windows USB Video Class System Driver Elevation of Privilege Vulnerability
|
Windows USB Video Class System Driver Elevation of Privilege Vulnerability
|
[
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*"
] | null | 6.8 | null | null | null |
GHSA-w2cj-qmqg-2gwx
|
Cross-site request forgery (CSRF) vulnerability in VMware vRealize Log Insight 2.x and 3.x before 3.3.2 allows remote attackers to hijack the authentication of unspecified victims via unknown vectors.
|
[] | null | null | 8.8 | null | null |
|
CVE-2022-33639
|
Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability
|
Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability
|
[
"cpe:2.3:a:microsoft:edge_chromium:*:*:*:*:*:*:*:*"
] | null | 8.3 | null | null | null |
CVE-2023-52504
|
x86/alternatives: Disable KASAN in apply_alternatives()
|
In the Linux kernel, the following vulnerability has been resolved:
x86/alternatives: Disable KASAN in apply_alternatives()
Fei has reported that KASAN triggers during apply_alternatives() on
a 5-level paging machine:
BUG: KASAN: out-of-bounds in rcu_is_watching()
Read of size 4 at addr ff110003ee6419a0 by task swapper/0/0
...
__asan_load4()
rcu_is_watching()
trace_hardirqs_on()
text_poke_early()
apply_alternatives()
...
On machines with 5-level paging, cpu_feature_enabled(X86_FEATURE_LA57)
gets patched. It includes KASAN code, where KASAN_SHADOW_START depends on
__VIRTUAL_MASK_SHIFT, which is defined with cpu_feature_enabled().
KASAN gets confused when apply_alternatives() patches the
KASAN_SHADOW_START users. A test patch that makes KASAN_SHADOW_START
static, by replacing __VIRTUAL_MASK_SHIFT with 56, works around the issue.
Fix it for real by disabling KASAN while the kernel is patching alternatives.
[ mingo: updated the changelog ]
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.6:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.6:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.6:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.6:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.6:rc5:*:*:*:*:*:*"
] | null | 7.1 | null | null | null |
CVE-2025-24624
|
WordPress HT Event – WordPress Event Manager Plugin for Elementor Plugin <= 1.4.6 - Reflected Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in HasTech HT Event allows Reflected XSS. This issue affects HT Event: from n/a through 1.4.6.
|
[] | null | 7.1 | null | null | null |
GHSA-rv9f-9w9v-4x2w
|
Snap One Wattbox WB-300-IP-3 versions WB10.9a17 and prior could bypass the brute force protection, allowing multiple attempts to force a login.
|
[] | null | 9.8 | null | null | null |
|
CVE-2019-3012
|
Vulnerability in the Oracle Business Intelligence Enterprise Edition product of Oracle Fusion Middleware (component: BI Platform Security). Supported versions that are affected are 11.1.1.9.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Business Intelligence Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Business Intelligence Enterprise Edition accessible data. CVSS 3.0 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).
|
[
"cpe:2.3:a:oracle:business_intelligence:11.1.1.9.0:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:oracle:business_intelligence:12.2.1.3.0:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:oracle:business_intelligence:12.2.1.4.0:*:*:*:enterprise:*:*:*"
] | null | 5.3 | null | 5 | null |
|
CVE-2012-0705
|
InfoSphere Import Export Manager in InfoSphere Information Server MetaBrokers & Bridges (MBB) in IBM InfoSphere Information Server 8.1, 8.5 before FP3, 8.7, and 9.1 does not validate unspecified input data, which allows remote authenticated users to execute arbitrary commands via unknown vectors.
|
[
"cpe:2.3:a:ibm:infosphere_information_server:8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:infosphere_information_server:8.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:infosphere_information_server:8.5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:infosphere_information_server:8.5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:infosphere_information_server:8.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:infosphere_information_server:9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:infosphere_information_server_metabrokers_\\&_bridges:-:*:*:*:*:*:*:*"
] | null | null | null | 7.1 | null |
|
GHSA-hw2c-7w6f-7v7f
|
A flaw was found in djvulibre-3.5.28 and earlier. An out of bounds read in function DJVU::DataPool::has_data() via crafted djvu file may lead to application crash and other consequences.
|
[] | null | 7.8 | null | null | null |
|
CVE-2023-37922
|
Multiple arbitrary write vulnerabilities exist in the VCD sorted bsearch functionality of GTKWave 3.3.115. A specially crafted .vcd file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the arbitrary write when triggered via the vcd2lxt2 conversion utility.
|
[
"cpe:2.3:a:tonybybell:gtkwave:3.3.115:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
|
CVE-2015-5104
|
Adobe Reader and Acrobat 10.x before 10.1.15 and 11.x before 11.0.12, Acrobat and Acrobat Reader DC Classic before 2015.006.30060, and Acrobat and Acrobat Reader DC Continuous before 2015.008.20082 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-3095, CVE-2015-5087, CVE-2015-5094, CVE-2015-5100, CVE-2015-5102, CVE-2015-5103, and CVE-2015-5115.
|
[
"cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
RHSA-2017:2913
|
Red Hat Security Advisory: rh-nodejs6-nodejs-tough-cookie security update
|
nodejs-tough-cookie: Regular expression denial of service
|
[
"cpe:/a:redhat:rhel_software_collections:2::el6",
"cpe:/a:redhat:rhel_software_collections:2::el7"
] | null | null | 5.3 | null | null |
GHSA-64q9-f38h-9mwx
|
Protection Mechanism Failure in Jenkins Doktor Plugin
|
Jenkins Doktor Plugin 0.4.1 and earlier implements functionality that allows agent processes to render files on the controller as Markdown or Asciidoc, and error messages allow attackers able to control agent processes to determine whether a file with a given name exists.
|
[] | null | 5.4 | null | null | null |
CVE-2024-9375
|
WordPress Captcha Plugin by Captcha Bank <= 4.0.36 - Reflected Cross-Site Scripting
|
The WordPress Captcha Plugin by Captcha Bank plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 4.0.36. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
|
[
"cpe:2.3:a:techbanker:captcha_bank:*:*:*:*:*:wordpress:*:*"
] | null | 6.1 | null | null | null |
GHSA-c7p4-qvpp-vjjq
|
N6854A Geolocation Server versions 2.4.2 are vulnerable to untrusted data deserialization, which may allow a malicious actor to escalate privileges in the affected device’s default configuration and achieve remote code execution.
|
[] | null | 9.8 | null | null | null |
|
GHSA-pw24-xh85-3q7g
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Sebastian Zaha Magic the Gathering Card Tooltips allows Stored XSS. This issue affects Magic the Gathering Card Tooltips: from n/a through 3.4.0.
|
[] | null | 6.5 | null | null | null |
|
GHSA-8r83-8crf-cqcw
|
includes/database.php in ZoneMinder before 1.32.3 has XSS in the construction of SQL-ERR messages.
|
[] | null | null | 6.1 | null | null |
|
GHSA-mcxh-3pw2-4rmg
|
VMware Workstation and Fusion contain a use-after-free vulnerability in the vbluetooth device. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host.
|
[] | null | 9.3 | null | null | null |
|
GHSA-cqvx-38cj-qhw7
|
Cross-Site Request Forgery (CSRF) vulnerability in Daniel Mores, A. Huizinga Resize at Upload Plus plugin <= 1.3 versions.
|
[] | null | 5.4 | null | null | null |
|
CVE-2007-6275
|
SQL injection vulnerability in modules/adresses/ratefile.php in bcoos 1.0.10 and earlier allows remote attackers to execute arbitrary SQL commands via the lid parameter, a different vector than CVE-2007-6266.
|
[
"cpe:2.3:a:bcoos:bcoos:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-2pp8-cqff-m6w4
|
Open redirect vulnerability in PowerCMS (6 Series, 5 Series, and 4 Series) allows a remote unauthenticated attacker to redirect users to arbitrary web sites via a specially crafted URL. Note that all versions of PowerCMS 3 Series and earlier which are unsupported (End-of-Life, EOL) are also affected by this vulnerability.
|
[] | null | 6.1 | null | null | null |
|
CVE-2019-3681
|
osc: stores downloaded (supposed) RPM in network-controlled filesystem paths
|
A External Control of File Name or Path vulnerability in osc of SUSE Linux Enterprise Module for Development Tools 15, SUSE Linux Enterprise Software Development Kit 12-SP5, SUSE Linux Enterprise Software Development Kit 12-SP4; openSUSE Leap 15.1, openSUSE Factory allowed remote attackers that can change downloaded packages to overwrite arbitrary files. This issue affects: SUSE Linux Enterprise Module for Development Tools 15 osc versions prior to 0.169.1-3.20.1. SUSE Linux Enterprise Software Development Kit 12-SP5 osc versions prior to 0.162.1-15.9.1. SUSE Linux Enterprise Software Development Kit 12-SP4 osc versions prior to 0.162.1-15.9.1. openSUSE Leap 15.1 osc versions prior to 0.169.1-lp151.2.15.1. openSUSE Factory osc versions prior to 0.169.0 .
|
[
"cpe:2.3:a:opensuse:osc:*:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:15:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp5:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp4:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"cpe:2.3:a:opensuse:factory:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
GHSA-fg6h-6867-7xrg
|
SQL injection vulnerability in user logon authentication request handling in Cool_CoolD.exe in Cool Manager 5.0 (5,60,90,28) and Cool Messenger Office/School Server 5.5 (5,65,12,13) allows remote attackers to execute arbitrary SQL commands via the username field.
|
[] | null | null | null | null | null |
|
RHSA-2024:2944
|
Red Hat Security Advisory: AMQ Broker 7.12.0.OPR.1.GA Container Images release and security update
|
golang.org/x/crypto: empty plaintext packet causes panic golang: archive/tar: github.com/vbatts/tar-split: unbounded memory consumption when reading headers golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters prometheus/client_golang: Denial of service using InstrumentHandlerCounter golang: net/http: handle server errors after sending GOAWAY golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service ActiveMQ: Deserialization vulnerability on Jolokia that allows authenticated users to perform RCE golang: regexp/syntax: limit memory used by parsing regexps golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding golang: crypto/tls: large handshake records may cause panics golang: net/http, mime/multipart: denial of service from excessive resource consumption golang: net/http, net/textproto: denial of service from excessive memory allocation golang: net/http, net/textproto, mime/multipart: denial of service from excessive resource consumption golang: go/parser: Infinite loop in parsing golang: html/template: backticks not treated as string delimiters golang: html/template: improper sanitization of CSS values golang: html/template: improper handling of JavaScript whitespace golang: html/template: improper handling of empty HTML attributes
|
[
"cpe:/a:redhat:rhosemc:1.0::el8"
] | null | 7.3 | null | null | null |
CVE-2024-32697
|
WordPress HelloAsso plugin <= 1.1.5 - Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in HelloAsso allows Stored XSS.This issue affects HelloAsso: from n/a through 1.1.5.
|
[] | null | 6.5 | null | null | null |
GHSA-g9wf-393q-4w38
|
Malicious Package in only-test-not-install
|
All versions of `only-test-not-install` contain malicious code. The package deletes the folder `~/test` from the system as a postinstall script.RecommendationRemove the package from your environment. There are no further signs of compromise.
|
[] | null | 9.8 | null | null | null |
GHSA-52hw-j6hq-6qp4
|
PDF-XChange Editor U3D File Parsing Uninitialized Variable Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of U3D files. The issue results from the lack of proper initialization of memory prior to accessing it. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-20929.
|
[] | null | null | 3.3 | null | null |
|
CVE-2024-34099
|
ZDI-CAN-XXXX: [Pwn2Own] Acrobat sandbox bypass part 2 of 2
|
Acrobat Reader versions 20.005.30574, 24.002.20736 and earlier are affected by an Improper Access Control vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[
"cpe:2.3:a:adobe:acrobat_dc:-:*:*:*:pro:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:-:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat:2020:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:2020:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*"
] | null | 7.8 | null | null | null |
GHSA-62gw-xjm3-hcgw
|
Vulnerability in the Oracle FLEXCUBE Universal Banking product of Oracle Financial Services Applications (component: Loans And Deposits). Supported versions that are affected are 12.0-12.4, 14.0-14.4 and . Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle FLEXCUBE Universal Banking. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle FLEXCUBE Universal Banking accessible data as well as unauthorized read access to a subset of Oracle FLEXCUBE Universal Banking accessible data. CVSS 3.1 Base Score 4.6 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N).
|
[] | null | null | null | null | null |
|
CVE-2022-38723
|
Gravitee API Management before 3.15.13 allows path traversal through HTML injection.
|
[
"cpe:2.3:a:gravitee:api_management:*:*:*:*:*:*:*:*"
] | null | 8.6 | null | null | null |
|
GHSA-65xc-7r86-gxj9
|
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.
|
[] | null | 7.8 | null | null | null |
|
CVE-2024-52464
|
WordPress amr shortcodes plugin <= 1.7 - Reflected Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in anmari amr shortcodes allows Reflected XSS.This issue affects amr shortcodes: from n/a through 1.7.
|
[] | null | 7.1 | null | null | null |
CVE-2013-7113
|
epan/dissectors/packet-bssgp.c in the BSSGP dissector in Wireshark 1.10.x before 1.10.4 incorrectly relies on a global variable, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
|
[
"cpe:2.3:a:wireshark:wireshark:1.10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.10.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.10.3:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-9mr3-3wcj-ff3w
|
Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK & Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
|
[] | null | null | null | null | null |
|
RHSA-2005:373
|
Red Hat Security Advisory: net-snmp security update
|
security flaw security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null | null |
GHSA-5qrf-ppm5-fx4r
|
An issue was discovered in Skybox Platform before 7.5.201. SQL Injection exists in /skyboxview/webservice/services/VersionWebService via a soapenv:Body element.
|
[] | null | null | 9.8 | null | null |
|
CVE-2015-6810
|
Cross-site scripting (XSS) vulnerability in Invision Power Services IPS Community Suite (aka Invision Power Board, IPB, or Power Board) 4.x before 4.0.12.1 allows remote authenticated users to inject arbitrary web script or HTML via the event_location[address] array parameter to calendar/submit/.
|
[
"cpe:2.3:a:invisionpower:invision_power_board:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:invisionpower:invision_power_board:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:invisionpower:invision_power_board:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:invisionpower:invision_power_board:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:invisionpower:invision_power_board:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:invisionpower:invision_power_board:4.0.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:invisionpower:invision_power_board:4.0.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:invisionpower:invision_power_board:4.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:invisionpower:invision_power_board:4.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:invisionpower:invision_power_board:4.0.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:invisionpower:invision_power_board:4.0.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:invisionpower:invision_power_board:4.0.10.2:*:*:*:*:*:*:*",
"cpe:2.3:a:invisionpower:invision_power_board:4.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:invisionpower:invision_power_board:4.0.12:*:*:*:*:*:*:*"
] | null | null | null | 3.5 | null |
|
GHSA-h6jm-ghq6-38cg
|
File upload vulnerability in CMS Made Simple through 2.2.15 allows remote authenticated attackers to gain a webshell via a crafted phar file.
|
[] | null | 7.2 | null | null | null |
|
GHSA-9p57-xx42-3mx3
|
Multiple cross-site scripting (XSS) vulnerabilities in IBM TRIRIGA Application Platform 2.x and 3.x before 3.3, and 8, allow remote attackers to inject content, and conduct phishing attacks, via vectors involving (1) the html/en/default/ directory, (2) birt/frameset, (3) WebProcess.srv, (4) sqa/html/en/default/reportTemplate/reportTemplateOrderCols.jsp, or (5) a/html/en/default/om2/omObjectFinder.jsp.
|
[] | null | null | null | null | null |
|
RHSA-2023:0191
|
Red Hat Security Advisory: java-17-openjdk security and bug fix update
|
OpenJDK: handshake DoS attack against DTLS connections (JSSE, 8287411) OpenJDK: soundbank URL remote loading (Sound, 8293742)
|
[
"cpe:/a:redhat:rhel_eus:8.4::appstream",
"cpe:/a:redhat:rhel_eus:8.4::crb"
] | null | 3.7 | null | null | null |
CVE-2005-2267
|
Firefox before 1.0.5 allows remote attackers to steal information and possibly execute arbitrary code by using standalone applications such as Flash and QuickTime to open a javascript: URL, which is run in the context of the previous page, and may lead to code execution if the standalone application loads a privileged chrome: URL.
|
[
"cpe:2.3:a:mozilla:firefox:0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.9:rc:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.4:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-w6cp-c6jj-qr8x
|
Unspecified vulnerability in the PeopleSoft Enterprise HRMS component in Oracle PeopleSoft Products 9.1, Bundle, and #6 allows remote authenticated users to affect confidentiality and integrity via unknown vectors related to Talent Acquisition Manager.
|
[] | null | null | null | null | null |
|
GHSA-5c6j-4cmg-9vw5
|
Ingres 2.5 and 2.6 on Windows, as used in multiple CA products and possibly other products, assigns the privileges and identity of users to be the same as the first user, which allows remote attackers to gain privileges.
|
[] | null | null | null | null | null |
|
CVE-2022-46869
|
Local privilege escalation during installation due to improper soft link handling. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 40278.
|
[
"cpe:2.3:a:acronis:cyber_protect_home_office:-:*:*:*:*:*:*:*",
"cpe:2.3:a:acronis:cyber_protect_home_office:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | null | 7.3 | null | null |
|
RHSA-2018:2575
|
Red Hat Security Advisory: java-1.8.0-ibm security update
|
OpenSSL: Double-free in DSA code openssl: BN_mod_exp may produce incorrect results on x86_64 openssl: bn_sqrx8x_internal carry bug on x86_64 JDK: DoS in the java.math component JDK: path traversal flaw in the Diagnostic Tooling Framework JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (Libraries) OpenJDK: insufficient index validation in PatternSyntaxException getMessage() (Concurrency, 8199547) JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (JSSE) JDK: privilege escalation via insufficiently restricted access to Attach API
|
[
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 8.4 | null | null |
GHSA-282m-cc46-hh73
|
An unauthenticated command injection vulnerability exists in the parameters of operation 10 in the controller_server service on Gryphon Tower routers. An unauthenticated remote attacker on the same network can execute commands as root on the device by sending a specially crafted malicious packet to the controller_server service on port 9999.
|
[] | null | null | null | null | null |
|
CVE-2008-4332
|
SQL injection vulnerability in the showjavatopic function in func.php in PHP infoBoard V.7 Plus allows remote attackers to execute arbitrary SQL commands via the idcat parameter to showtopic.php.
|
[
"cpe:2.3:a:cannot:php_infoboard:v.7:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2017-3811
|
An XML External Entity vulnerability in Cisco WebEx Meetings Server could allow an authenticated, remote attacker to have read access to part of the information stored in the affected system. More Information: CSCvc39165. Known Affected Releases: 2.6. Known Fixed Releases: 2.7.1.2054.
|
[
"cpe:2.3:a:cisco:webex_meetings_server:2.6:*:*:*:*:*:*:*"
] | null | null | 6.5 | 4 | null |
|
GHSA-4p7h-q24r-h439
|
A partial authentication bypass vulnerability exists on Mediatek MT7620N 1.06 devices. The vulnerability allows sending an unencrypted data frame to a WPA2-protected WLAN router where the packet is routed through the network. If successful, a response is sent back as an encrypted frame, which would allow an attacker to discern information or potentially modify data.
|
[] | null | null | null | null | null |
|
CVE-2020-36171
|
The Elementor Website Builder plugin before 3.0.14 for WordPress does not properly restrict SVG uploads.
|
[
"cpe:2.3:a:elementor:website_builder:*:*:*:*:*:wordpress:*:*"
] | null | 6.1 | null | 4.3 | null |
|
GHSA-6gwc-q32q-63j2
|
The MStore API WordPress plugin before 3.9.7 does not secure most of its AJAX actions by implementing privilege checks, nonce checks, or a combination of both.
|
[] | null | 3.5 | null | null | null |
|
CVE-2025-23400
|
A vulnerability has been identified in Teamcenter Visualization V14.3 (All versions < V14.3.0.13), Teamcenter Visualization V2312 (All versions < V2312.0009), Teamcenter Visualization V2406 (All versions < V2406.0007), Teamcenter Visualization V2412 (All versions < V2412.0002), Tecnomatix Plant Simulation V2302 (All versions < V2302.0021), Tecnomatix Plant Simulation V2404 (All versions < V2404.0010). The affected application is vulnerable to memory corruption while parsing specially crafted WRL files. This could allow an attacker to execute code in the context of the current process.
|
[] | 7.3 | 7.8 | null | null | null |
|
CVE-2021-25213
|
SQL injection vulnerability in SourceCodester Travel Management System v 1.0 allows remote attackers to execute arbitrary SQL statements, via the catid parameter to subcat.php.
|
[
"cpe:2.3:a:travel_management_system_project:travel_management_system:1.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.