id
string | title
string | description
string | cpes
list | cvss_v4_0
float64 | cvss_v3_1
float64 | cvss_v3_0
float64 | cvss_v2_0
float64 | patch_commit_url
string |
---|---|---|---|---|---|---|---|---|
CVE-2019-5153
|
An exploitable remote code execution vulnerability exists in the iw_webs configuration parsing functionality of the Moxa AWK-3131A firmware version 1.13. A specially crafted user name entry can cause an overflow of an error message buffer, resulting in remote code execution. An attacker can send commands while authenticated as a low privilege user to trigger this vulnerability.
|
[
"cpe:2.3:o:moxa:awk-3131a_firmware:1.13:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:awk-3131a:-:*:*:*:*:*:*:*"
] | null | null | 9.9 | null | null |
|
GHSA-g2cg-w6jr-q5x2
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in TechMix Event Countdown Timer Plugin by TechMix allows Reflected XSS.This issue affects Event Countdown Timer Plugin by TechMix: from n/a through 1.4.
|
[] | null | 7.1 | null | null | null |
|
RHSA-2024:2289
|
Red Hat Security Advisory: libtiff security update
|
libtiff: infinite loop via a crafted TIFF file libtiff: segmentation fault in Fax3Encode in libtiff/tif_fax3.c libtiff: heap-based buffer overflow in cpStripToTile() in tools/tiffcp.c libtiff: integer overflow in tiffcp.c libtiff: potential integer overflow in raw2tiff.c
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 6.5 | null | null | null |
RHSA-2008:0897
|
Red Hat Security Advisory: ruby security update
|
ruby: webrick directory traversal ruby: Memory allocation failure in Ruby regex engine (remotely exploitable DoS) ruby: multiple insufficient safe mode restrictions ruby: WEBrick DoS vulnerability (CPU consumption) ruby: missing "taintness" checks in dl module ruby: DoS vulnerability in the REXML module ruby: use of predictable source port and transaction id in DNS requests done by resolv.rb module
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null | null |
CVE-2018-6511
|
XSS Vulnerability in Puppet Enterprise Console
|
A cross-site scripting vulnerability in Puppet Enterprise Console of Puppet Enterprise allows a user to inject scripts into the Puppet Enterprise Console when using the Puppet Enterprise Console. Affected releases are Puppet Puppet Enterprise: 2017.3.x versions prior to 2017.3.6.
|
[
"cpe:2.3:a:puppet:puppet_enterprise:*:*:*:*:*:*:*:*"
] | null | null | 5.4 | null | null |
CVE-2011-4186
|
Heap-based buffer overflow in nipplib.dll in Novell iPrint Client before 5.78 on Windows allows remote attackers to execute arbitrary code via a crafted client-file-name parameter in a printer-url, a different vulnerability than CVE-2011-1705.
|
[
"cpe:2.3:a:novell:iprint:*:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:iprint:4.26:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:iprint:4.27:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:iprint:4.28:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:iprint:4.30:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:iprint:4.32:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:iprint:4.34:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:iprint:4.36:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:iprint:4.38:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:iprint:5.04:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:iprint:5.12:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:iprint:5.20b:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:iprint:5.30:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:iprint:5.32:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:iprint:5.40:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:iprint:5.42:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:iprint:5.44:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:iprint:5.50:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:iprint:5.52:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:iprint:5.56:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:iprint:5.60:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:iprint:5.64:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:iprint:5.68:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:iprint:5.72:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*"
] | null | null | null | 9.3 | null |
|
GHSA-7vq2-2qgq-38gf
|
Unspecified vulnerability in the Siebel Public Sector component in Oracle Siebel CRM 8.1.1 and 8.2.2 allows remote authenticated users to affect integrity via unknown vectors related to Public Sector Portal.
|
[] | null | null | null | null | null |
|
CVE-2020-22079
|
Stack-based buffer overflow in Tenda AC-10U AC1200 Router US_AC10UV1.0RTL_V15.03.06.48_multi_TDE01 allows remote attackers to execute arbitrary code via the timeZone parameter to goform/SetSysTimeCfg.
|
[
"cpe:2.3:o:tendacn:ac10u_firmware:15.03.06.48_multi_tde01:*:*:*:*:*:*:*",
"cpe:2.3:h:tendacn:ac10u:1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:tendacn:ac9_firmware:15.03.05.19\\(6318\\):*:*:*:*:*:*:*",
"cpe:2.3:h:tendacn:ac9:1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:tendacn:ac9_firmware:15.03.06.42_multi:*:*:*:*:*:*:*",
"cpe:2.3:h:tendacn:ac9:3.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 | null |
|
GHSA-6p3c-4j57-9prp
|
A null pointer dereference in Ivanti Avalanche before 6.4.6 allows a remote unauthenticated attacker to cause a denial of service.
|
[] | null | 7.5 | null | null | null |
|
GHSA-cx5f-75fv-w3c7
|
IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 10.5, 11.1, and 11.5 is vulnerable to a denial of service as the server may crash under certain conditions with a specially crafted query.
|
[] | null | 5.3 | null | null | null |
|
CVE-2023-30197
|
Incorrect Access Control in the module "My inventory" (myinventory) <= 1.6.6 from Webbax for PrestaShop, allows a guest to download personal information without restriction by performing a path traversal attack.
|
[
"cpe:2.3:a:webbax:myinventory:*:*:*:*:*:prestashop:*:*"
] | null | 7.5 | null | null | null |
|
CVE-2016-9973
|
IBM Jazz Foundation is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 120209.
|
[
"cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:4.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:4.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:4.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:6.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_quality_manager:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_quality_manager:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_quality_manager:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_quality_manager:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_quality_manager:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_quality_manager:4.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_quality_manager:4.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_quality_manager:4.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_quality_manager:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_quality_manager:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_quality_manager:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_quality_manager:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_quality_manager:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_quality_manager:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_quality_manager:6.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_team_concert:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_team_concert:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_team_concert:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_team_concert:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_team_concert:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_team_concert:4.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_team_concert:4.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_team_concert:4.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_team_concert:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_team_concert:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_team_concert:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_team_concert:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_team_concert:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_team_concert:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_team_concert:6.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_doors_next_generation:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_doors_next_generation:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_doors_next_generation:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_doors_next_generation:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_doors_next_generation:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_doors_next_generation:4.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_doors_next_generation:4.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_doors_next_generation:4.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_doors_next_generation:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_doors_next_generation:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_doors_next_generation:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_doors_next_generation:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_doors_next_generation:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_doors_next_generation:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_doors_next_generation:6.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_engineering_lifecycle_manager:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_engineering_lifecycle_manager:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_engineering_lifecycle_manager:4.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_engineering_lifecycle_manager:4.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_engineering_lifecycle_manager:4.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_engineering_lifecycle_manager:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_engineering_lifecycle_manager:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_engineering_lifecycle_manager:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_engineering_lifecycle_manager:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_engineering_lifecycle_manager:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_engineering_lifecycle_manager:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_engineering_lifecycle_manager:6.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_rhapsody_design_manager:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_rhapsody_design_manager:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_rhapsody_design_manager:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_rhapsody_design_manager:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_rhapsody_design_manager:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_rhapsody_design_manager:4.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_rhapsody_design_manager:4.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_rhapsody_design_manager:4.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_rhapsody_design_manager:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_rhapsody_design_manager:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_rhapsody_design_manager:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_rhapsody_design_manager:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_rhapsody_design_manager:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_rhapsody_design_manager:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_rhapsody_design_manager:6.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_software_architect_design_manager:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_software_architect_design_manager:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_software_architect_design_manager:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_software_architect_design_manager:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_software_architect_design_manager:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_software_architect_design_manager:4.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_software_architect_design_manager:4.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_software_architect_design_manager:4.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_software_architect_design_manager:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_software_architect_design_manager:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_software_architect_design_manager:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_software_architect_design_manager:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_software_architect_design_manager:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_software_architect_design_manager:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_software_architect_design_manager:6.0.3:*:*:*:*:*:*:*"
] | null | null | 5.4 | 3.5 | null |
|
CVE-2024-38807
|
CVE-2024-38807: Signature Forgery Vulnerability in Spring Boot's Loader
|
Applications that use spring-boot-loader or spring-boot-loader-classic and contain custom code that performs signature verification of nested jar files may be vulnerable to signature forgery where content that appears to have been signed by one signer has, in fact, been signed by another.
|
[] | null | 6.3 | null | null | null |
CVE-2018-13658
|
The mintToken function of a smart contract implementation for TheGoDgital, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value.
|
[
"cpe:2.3:a:thegodgital_project:thegodgital:-:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 | null |
|
RHSA-2018:2949
|
Red Hat Security Advisory: rh-nodejs8-nodejs security update
|
nodejs: HTTP parser allowed for spaces inside Content-Length header values nodejs: Inspector DNS rebinding vulnerability nodejs: denial of service (DoS) by causing a node server providing an http2 server to crash nodejs: Denial of Service by calling Buffer.fill() or Buffer.alloc() with specially crafted parameters nodejs: Out of bounds (OOB) write via UCS-2 encoding
|
[
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | null | 8.1 | null | null |
CVE-2003-0363
|
Format string vulnerability in LICQ 1.2.6, 1.0.3 and possibly other versions allows remote attackers to perform unknown actions via format string specifiers.
|
[
"cpe:2.3:a:licq:licq:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:licq:licq:1.2.6:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-5pc9-jc94-9295
|
Race condition in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges, and consequently read the contents of arbitrary kernel memory locations, via a crafted application, a different vulnerability than other CVEs listed in MS13-016.
|
[] | null | null | null | null | null |
|
CVE-2024-31616
|
An issue discovered in RG-RSR10-01G-T(W)-S and RG-RSR10-01G-T(WA)-S routers with firmware version RSR10-01G-T-S_RSR_3.0(1)B9P2, Release(07150910) allows attackers to execute arbitrary code via the common_quick_config.lua file.
|
[
"cpe:2.3:a:ruijienetworks:rg-rsr10-01g-t:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ruijienetworks:rg-rsr10-01g-t_firmware:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | null | null |
|
CVE-2013-3248
|
Untrusted search path vulnerability in Corel PDF Fusion 1.11 allows local users to gain privileges via a Trojan horse wintab32.dll file in the current working directory, as demonstrated by a directory that contains a .pdf or .xps file.
|
[
"cpe:2.3:a:corel:pdf_fusion:1.11:*:*:*:*:*:*:*"
] | null | null | null | 9.3 | null |
|
CVE-2020-7167
|
A quicktemplateselect expression language injection remote code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07).
|
[
"cpe:2.3:a:hp:intelligent_management_center:*:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:-:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0501:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0503:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0503p02:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0504:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0504p02:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0504p04:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0504p2:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0504p4:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0506:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0506p02:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0506p03:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0506p07:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0506p09:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0605:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0605h02:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0605h05:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0605p04:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0605p06:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0705:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0705p02:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0705p04:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0705p06:*:*:*:*:*:*"
] | null | 9.8 | null | 10 | null |
|
CVE-2011-1420
|
EMC Data Protection Advisor Collector 5.7 and 5.7.1 on Solaris SPARC platforms uses weak permissions for unspecified files, which allows local users to gain privileges via unknown vectors.
|
[
"cpe:2.3:a:emc:data_protection_advisor_collector:5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:data_protection_advisor_collector:5.7.1:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:solaris_sparc:*:*:*:*:*:*:*:*"
] | null | null | null | 7.2 | null |
|
GHSA-3whw-wqrp-r5hq
|
The LifterLMS – WP LMS for eLearning, Online Courses, & Quizzes plugin for WordPress is vulnerable to blind SQL Injection via the 'order' parameter in all versions up to, and including, 7.7.5 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
|
[] | null | 7.2 | null | null | null |
|
CVE-2009-0453
|
Online Grades 3.2.4 allows remote attackers to obtain configuration information via a direct request to phpinfo.php, which calls the phpinfo function.
|
[
"cpe:2.3:a:onlinegrades:online_grades:3.2.4:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-7xvw-hgxx-gmhh
|
An issue was discovered in CommScope Ruckus Unleashed prior to 200.15.6.212.14 and 200.17.7.0.139, where the authenticated diagnostics API endpoint `/admin/_cmdstat.jsp` passes attacker-controlled input to the shell without adequate validation, enabling a remote attacker to specify a target by MAC address and execute arbitrary commands as root.
|
[] | null | 5.4 | null | null | null |
|
GHSA-vccm-j6gc-23vh
|
TG Soft Vir.IT eXplorer Lite 8.5.42 allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact via a \\.\Viragtlt DeviceIoControl request of 0x82732140.
|
[] | null | null | 7.8 | null | null |
|
GHSA-6mq4-3rch-23gx
|
jpress v4.2.0 allows users to register an account by default. With the account, user can upload arbitrary files to the server.
|
[] | null | null | null | null | null |
|
GHSA-47jw-gpgj-9ccg
|
A potential security vulnerability has been identified for HP LaserJet Solution Software (for certain HP LaserJet Printers) which may lead to unauthorized elevation of privilege on the client.
|
[] | null | null | null | null | null |
|
CVE-2025-8974
|
linlinjava litemall JSON Web Token JwtHelper.java hard-coded credentials
|
A vulnerability was determined in linlinjava litemall up to 1.8.0. Affected by this issue is some unknown functionality of the file litemall-wx-api/src/main/java/org/linlinjava/litemall/wx/util/JwtHelper.java of the component JSON Web Token Handler. The manipulation of the argument SECRET with the input X-Litemall-Token leads to hard-coded credentials. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used.
|
[] | 6.3 | 3.7 | 3.7 | 2.6 | null |
GHSA-434x-x8hh-23x9
|
Type confusion in V8 in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
|
[] | null | null | null | null | null |
|
GHSA-vp43-58mq-7r78
|
SQL injection vulnerability in wall.php in Picture-Engine 1.2.0 and earlier allows remote attackers to execute arbitrary SQL commands via the cat parameter.
|
[] | null | null | null | null | null |
|
CVE-2017-1000237
|
I, Librarian version <=4.6 & 4.7 is vulnerable to Server-Side Request Forgery in the ajaxsupplement.php resulting in the attacker being able to reset any user's password.
|
[
"cpe:2.3:a:i-librarian:i_librarian:*:*:*:*:*:*:*:*",
"cpe:2.3:a:i-librarian:i_librarian:4.7:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 | null |
|
CVE-2024-32213
|
The LoMag WareHouse Management application version 1.0.20.120 and older were found to allow weak passwords. By default, hard-coded passwords of 10 characters with little or no complexity are allowed.
|
[
"cpe:2.3:a:lomag:warehouse_management:*:*:*:*:*:*:*:*"
] | null | 5.3 | null | null | null |
|
CVE-2021-3643
|
A flaw was found in sox 14.4.1. The lsx_adpcm_init function within libsox leads to a global-buffer-overflow. This flaw allows an attacker to input a malicious file, leading to the disclosure of sensitive information.
|
[
"cpe:2.3:a:sox_project:sox:14.4.1:*:*:*:*:*:*:*"
] | null | 9.1 | null | 6.4 | null |
|
GHSA-c8c6-pq7v-7987
|
A remote code execution vulnerability in libhevc in Mediaserver could enable an attacker using a specially crafted file to cause memory corruption during media file and data processing. This issue is rated as Critical due to the possibility of remote code execution within the context of the Mediaserver process. Product: Android. Versions: 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1. Android ID: A-33864300.
|
[] | null | null | 7.8 | null | null |
|
GHSA-pm77-vj97-hfv8
|
HTML injection vulnerabilities in OpenCart versions prior to 4.1.0. These vulnerabilities could allow an attacker to modify the HTML of the victim's browser by sending a malicious URL and modifying the parameter name in /account/register.
|
[] | null | 4.7 | null | null | null |
|
GHSA-mgp7-42mx-57gj
|
In the Linux kernel, the following vulnerability has been resolved:RDMA/siw: Fix duplicated reported IW_CM_EVENT_CONNECT_REPLY eventIf siw_recv_mpa_rr returns -EAGAIN, it means that the MPA reply hasn't
been received completely, and should not report IW_CM_EVENT_CONNECT_REPLY
in this case. This may trigger a call trace in iw_cm. A simple way to
trigger this:
server: ib_send_lat
client: ib_send_lat -R <server_ip>The call trace looks like this:kernel BUG at drivers/infiniband/core/iwcm.c:894!
invalid opcode: 0000 [#1] PREEMPT SMP NOPTI
<...>
Workqueue: iw_cm_wq cm_work_handler [iw_cm]
Call Trace:
<TASK>
cm_work_handler+0x1dd/0x370 [iw_cm]
process_one_work+0x1e2/0x3b0
worker_thread+0x49/0x2e0
? rescuer_thread+0x370/0x370
kthread+0xe5/0x110
? kthread_complete_and_exit+0x20/0x20
ret_from_fork+0x1f/0x30
</TASK>
|
[] | null | null | null | null | null |
|
CVE-2023-37258
|
DataEase has a SQL injection vulnerability that can bypass blacklists
|
DataEase is an open source data visualization analysis tool. Prior to version 1.18.9, DataEase has a SQL injection vulnerability that can bypass blacklists. The vulnerability has been fixed in v1.18.9. There are no known workarounds.
|
[
"cpe:2.3:a:dataease:dataease:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | null | null |
GHSA-v86j-m4px-cfmv
|
Remote Procedure Call Runtime Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-28327, CVE-2021-28329, CVE-2021-28330, CVE-2021-28331, CVE-2021-28332, CVE-2021-28333, CVE-2021-28334, CVE-2021-28335, CVE-2021-28336, CVE-2021-28337, CVE-2021-28338, CVE-2021-28339, CVE-2021-28340, CVE-2021-28342, CVE-2021-28343, CVE-2021-28344, CVE-2021-28345, CVE-2021-28346, CVE-2021-28352, CVE-2021-28353, CVE-2021-28354, CVE-2021-28355, CVE-2021-28356, CVE-2021-28357, CVE-2021-28358, CVE-2021-28434.
|
[] | null | 8.8 | null | null | null |
|
GHSA-qcfp-f4pj-544f
|
In Jiangmin Antivirus 16.0.0.100, the driver file (KSysCall.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x9A008264.
|
[] | null | null | 7.8 | null | null |
|
GHSA-4v8h-848g-f6xh
|
PC Protect Antivirus v4.14.31 installs by default to %PROGRAMFILES(X86)%\PCProtect with very weak folder permissions, granting any user full permission "Everyone: (F)" to the contents of the directory and its subfolders. In addition, the program installs a service called SecurityService that runs as LocalSystem. This allows any user to escalate privileges to "NT AUTHORITY\SYSTEM" by substituting the service's binary with a Trojan horse.
|
[] | null | 7.8 | null | null | null |
|
GHSA-xh6m-92pm-858v
|
The Java Naming and Directory Interface (JNDI) implementation in IBM WebSphere Application Server (WAS) 6.0 before 6.0.2.39, 6.1 before 6.1.0.29, and 7.0 before 7.0.0.7 does not properly restrict access to UserRegistry object methods, which allows remote attackers to obtain sensitive information via a crafted method call.
|
[] | null | null | null | null | null |
|
CVE-2018-4153
|
An injection issue was addressed with improved validation. This issue affected versions prior to macOS Mojave 10.14.
|
[
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
] | null | null | 5.9 | 4.3 | null |
|
GHSA-mr46-3995-mfjf
|
In the Linux kernel, the following vulnerability has been resolved:tty: Fix a possible resource leak in icom_probeWhen pci_read_config_dword failed, call pci_release_regions() and
pci_disable_device() to recycle the resource previously allocated.
|
[] | null | 5.5 | null | null | null |
|
CVE-2017-2982
|
Adobe Flash Player versions 24.0.0.194 and earlier have an exploitable use after free vulnerability in a routine related to player shutdown. Successful exploitation could lead to arbitrary code execution.
|
[
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:chrome:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:edge:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:internet_explorer:*:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player_desktop_runtime:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | 9.3 | null |
|
GHSA-8h2c-4857-vvxf
|
Stack-based buffer overflow in the PrecisionID Barcode 1.9 ActiveX control in PrecisionID_Barcode.dll allows remote attackers to cause a denial of service (Internet Explorer 6 crash), and possibly execute arbitrary code, via a long argument to the SaveBarCode method. NOTE: this issue might overlap CVE-2007-2657.
|
[] | null | null | null | null | null |
|
CVE-2020-5929
|
In versions 13.0.0-13.0.0 HF2, 12.1.0-12.1.2 HF1, and 11.6.1-11.6.2, BIG-IP platforms with Cavium Nitrox SSL hardware acceleration cards, a Virtual Server configured with a Client SSL profile, and using Anonymous (ADH) or Ephemeral (DHE) Diffie-Hellman key exchange and Single DH use option not enabled in the options list may be vulnerable to crafted SSL/TLS Handshakes that may result with a PMS (Pre-Master Secret) that starts in a 0 byte and may lead to a recovery of plaintext messages as BIG-IP TLS/SSL ADH/DHE sends different error messages acting as an oracle. Similar error messages when PMS starts with 0 byte coupled with very precise timing measurement observation may also expose this vulnerability.
|
[
"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_access_policy_manager:11.6.2:-:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_access_policy_manager:12.1.2:-:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_access_policy_manager:12.1.2:hotfix1:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_access_policy_manager:13.0.0:-:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_access_policy_manager:13.0.0:hotfix1:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_access_policy_manager:13.0.0:hotfix2:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.6.2:-:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:12.1.2:-:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:12.1.2:hotfix1:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:13.0.0:-:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:13.0.0:hotfix1:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:13.0.0:hotfix2:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:11.6.2:-:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:12.1.2:-:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:12.1.2:hotfix1:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:13.0.0:-:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:13.0.0:hotfix1:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:13.0.0:hotfix2:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_analytics:11.6.2:-:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_analytics:12.1.2:-:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_analytics:12.1.2:hotfix1:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_analytics:13.0.0:-:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_analytics:13.0.0:hotfix1:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_analytics:13.0.0:hotfix2:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.6.2:-:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_acceleration_manager:12.1.2:-:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_acceleration_manager:12.1.2:hotfix1:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_acceleration_manager:13.0.0:-:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_acceleration_manager:13.0.0:hotfix1:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_acceleration_manager:13.0.0:hotfix2:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:11.6.2:-:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:12.1.2:-:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:12.1.2:hotfix1:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:13.0.0:-:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:13.0.0:hotfix1:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:13.0.0:hotfix2:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:11.6.2:-:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:12.1.2:-:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:12.1.2:hotfix1:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:13.0.0:-:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:13.0.0:hotfix1:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:13.0.0:hotfix2:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_domain_name_system:11.6.2:-:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_domain_name_system:12.1.2:-:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_domain_name_system:12.1.2:hotfix1:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_domain_name_system:13.0.0:-:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_domain_name_system:13.0.0:hotfix1:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_domain_name_system:13.0.0:hotfix2:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_fraud_protection_service:11.6.2:-:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_fraud_protection_service:12.1.2:-:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_fraud_protection_service:12.1.2:hotfix1:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_fraud_protection_service:13.0.0:-:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_fraud_protection_service:13.0.0:hotfix1:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_fraud_protection_service:13.0.0:hotfix2:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_global_traffic_manager:11.6.2:-:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_global_traffic_manager:12.1.2:-:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_global_traffic_manager:12.1.2:hotfix1:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_global_traffic_manager:13.0.0:-:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_global_traffic_manager:13.0.0:hotfix1:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_global_traffic_manager:13.0.0:hotfix2:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_link_controller:11.6.2:-:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_link_controller:12.1.2:-:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_link_controller:12.1.2:hotfix1:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_link_controller:13.0.0:-:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_link_controller:13.0.0:hotfix1:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_link_controller:13.0.0:hotfix2:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_local_traffic_manager:11.6.2:-:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_local_traffic_manager:12.1.2:-:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_local_traffic_manager:12.1.2:hotfix1:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_local_traffic_manager:13.0.0:-:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_local_traffic_manager:13.0.0:hotfix1:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_local_traffic_manager:13.0.0:hotfix2:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.6.2:-:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:12.1.2:-:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:12.1.2:hotfix1:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:13.0.0:-:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:13.0.0:hotfix1:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:13.0.0:hotfix2:*:*:*:*:*:*",
"cpe:2.3:a:f5:ssl_orchestrator:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:ssl_orchestrator:11.6.2:-:*:*:*:*:*:*",
"cpe:2.3:a:f5:ssl_orchestrator:12.1.2:-:*:*:*:*:*:*",
"cpe:2.3:a:f5:ssl_orchestrator:12.1.2:hotfix1:*:*:*:*:*:*",
"cpe:2.3:a:f5:ssl_orchestrator:13.0.0:-:*:*:*:*:*:*",
"cpe:2.3:a:f5:ssl_orchestrator:13.0.0:hotfix1:*:*:*:*:*:*",
"cpe:2.3:a:f5:ssl_orchestrator:13.0.0:hotfix2:*:*:*:*:*:*"
] | null | 5.9 | null | 2.6 | null |
|
CVE-2016-5126
|
Heap-based buffer overflow in the iscsi_aio_ioctl function in block/iscsi.c in QEMU allows local guest OS users to cause a denial of service (QEMU process crash) or possibly execute arbitrary code via a crafted iSCSI asynchronous I/O ioctl call.
|
[
"cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openstack:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openstack:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openstack:8:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openstack:9:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openstack:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:virtualization:3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*"
] | null | 7.8 | null | 4.6 | null |
|
CVE-1999-1444
|
genkey utility in Alibaba 2.0 generates RSA key pairs with an exponent of 1, which results in transactions that are sent in cleartext.
|
[
"cpe:2.3:a:computer_software_manufaktur:alibaba:2.0:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
CVE-2024-3704
|
SQL Injection vulnerability in OpenGnsys
|
SQL Injection Vulnerability has been found on OpenGnsys product affecting version 1.1.1d (Espeto). This vulnerability allows an attacker to inject malicious SQL code into login page to bypass it or even retrieve all the information stored in the database.
|
[
"cpe:2.3:a:opengnsys:opengnsys:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
CVE-2025-50061
|
Vulnerability in the Primavera P6 Enterprise Project Portfolio Management product of Oracle Construction and Engineering (component: Web Access). Supported versions that are affected are 20.12.0-20.12.21, 21.12.0-21.12.21, 22.12.0-22.12.19, 23.12.0-23.12.13 and 24.12.0-24.12.4. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Primavera P6 Enterprise Project Portfolio Management. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Primavera P6 Enterprise Project Portfolio Management, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Primavera P6 Enterprise Project Portfolio Management accessible data as well as unauthorized read access to a subset of Primavera P6 Enterprise Project Portfolio Management accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N).
|
[] | null | 5.4 | null | null | null |
|
RHSA-2022:8886
|
Red Hat Security Advisory: redhat-ds:11 security, bug fix, and enhancement update
|
389-ds-base: SIGSEGV in sync_repl
|
[
"cpe:/a:redhat:directory_server:11.5::el8"
] | null | 6.5 | null | null | null |
GHSA-w3rf-qv39-2j3m
|
Incorrect Access Control in the FileEditor (/Admin/Views/FileEditor/) in FlexDotnetCMS before v1.5.11 allows an authenticated remote attacker to read and write to existing files outside the web root. The files can be accessed via directory traversal, i.e., by entering a .. (dot dot) path such as ..\..\..\..\..\<file> in the input field of the FileEditor. In FlexDotnetCMS before v1.5.8, it is also possible to access files by specifying the full path (e.g., C:\<file>). The files can then be edited via the FileEditor.
|
[] | null | null | null | null | null |
|
CVE-2019-16681
|
The Traveloka application 3.14.0 for Android exports com.traveloka.android.activity.common.WebViewActivity, leading to the opening of arbitrary URLs, which can inject deceptive content into the UI. (When in physical possession of the device, opening local files is also possible.) NOTE: As of 2019-09-23, the vendor has not agreed that this issue has serious impact. The vendor states that the issue is not critical because it does not allow Elevation of Privilege, Sensitive Data Leakage, or any critical unauthorized activity from a malicious user. The vendor also states that a victim must first install a malicious APK to their application.
|
[
"cpe:2.3:a:traveloka:traveloka:3.14.0:*:*:*:*:android:*:*"
] | null | 4.7 | null | 2.6 | null |
|
CVE-2025-54531
|
In JetBrains TeamCity before 2025.07 path traversal was possible via plugin unpacking on Windows
|
[] | null | 7.7 | null | null | null |
|
GHSA-mg62-v9cm-mwvj
|
The ApowerManager application through 3.1.7 for Android allows remote attackers to cause a denial of service via many simultaneous /?Key=PhoneRequestAuthorization requests.
|
[] | null | null | 7.5 | null | null |
|
CVE-2021-29846
|
IBM Security Guardium Insights 3.0 could allow an authenticated user to obtain sensitive information due to insufficient session expiration. IBM X-Force ID: 205256.
|
[
"cpe:2.3:a:ibm:security_guardium_insights:3.0.0:*:*:*:*:*:*:*"
] | null | null | 2.2 | null | null |
|
CVE-2010-4762
|
Cross-site scripting (XSS) vulnerability in the rich-text-editor component in Open Ticket Request System (OTRS) before 3.0.0-beta2 allows remote authenticated users to inject arbitrary web script or HTML by using the "source code" feature in the customer interface.
|
[
"cpe:2.3:a:otrs:otrs:*:beta1:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:0.5:beta1:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:0.5:beta2:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:0.5:beta3:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:0.5:beta4:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:0.5:beta5:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:0.5:beta6:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:0.5:beta7:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:0.5:beta8:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:1.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:1.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:1.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:1.1:rc1:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:1.1.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:1.1.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:1.2.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:1.2.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:1.2.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:1.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:1.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:1.3.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:1.3.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:1.3.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:1.3.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:1.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:1.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:1.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.0.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.0.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.0.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.0.0:beta5:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.0.0:beta6:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.1.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.1.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.2.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.2.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.2.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.2.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.2.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.3.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.3.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.3.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.3.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.3.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.4.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.4.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.4.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.4.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.4.0:beta5:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.4.0:beta6:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.4.9:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.4.10:*:*:*:*:*:*:*"
] | null | null | null | 3.5 | null |
|
GHSA-wm5j-7vrw-x2hq
|
FFmpeg in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, failed to perform proper bounds checking, which allowed a remote attacker to potentially exploit heap corruption via a crafted video file.
|
[] | null | null | 5.5 | null | null |
|
RHSA-2020:3958
|
Red Hat Security Advisory: httpd security, bug fix, and enhancement update
|
httpd: <FilesMatch> bypass with a trailing newline in the file name httpd: Improper handling of headers in mod_session can allow a remote user to modify session data for CGI applications httpd: Out of bounds read in mod_cache_socache can allow a remote attacker to cause DoS httpd: mod_rewrite potential open redirect httpd: mod_rewrite configurations vulnerable to open redirect httpd: mod_proxy_ftp use of uninitialized value
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 3.7 | 3.7 | null | null |
CVE-2014-7508
|
The Help For Doc (aka com.childrens.physician.relations) application 1.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
|
[
"cpe:2.3:a:childrens:help_for_doc:1:*:*:*:*:android:*:*"
] | null | null | null | 5.4 | null |
|
GHSA-cc3v-c5j9-63p5
|
The issue was addressed with improved memory handling. This issue is fixed in macOS Sonoma 14.2, iOS 17.2 and iPadOS 17.2, watchOS 10.2, macOS Ventura 13.6.3, tvOS 17.2, iOS 16.7.3 and iPadOS 16.7.3, macOS Monterey 12.7.2. An app may be able to break out of its sandbox.
|
[] | null | 6.3 | null | null | null |
|
CVE-2023-45232
|
Infinite loop in EDK II Network Package
|
EDK2's Network Package is susceptible to an infinite loop vulnerability when parsing unknown options in the Destination Options header of IPv6. This
vulnerability can be exploited by an attacker to gain unauthorized
access and potentially lead to a loss of Availability.
|
[
"cpe:2.3:a:tianocore:edk2:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
CVE-2023-31472
|
An issue was discovered on GL.iNet devices before 3.216. There is an arbitrary file write in which an empty file can be created anywhere on the filesystem. This is caused by a command injection vulnerability with a filter applied.
|
[
"cpe:2.3:o:gl-inet:gl-s20_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:gl-inet:gl-s20:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-x3000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:gl-inet:gl-x3000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-mt3000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:gl-inet:gl-mt3000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-mt2500_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:gl-inet:gl-mt2500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-mt2500a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:gl-inet:gl-mt2500a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-axt1800_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:gl-inet:gl-axt1800:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-a1300_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:gl-inet:gl-a1300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-ax1800_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:gl-inet:gl-ax1800:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-sft1200_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:gl-inet:gl-sft1200:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-mt1300_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:gl-inet:gl-mt1300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-e750_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:gl-inet:gl-e750:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-mv1000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:gl-inet:gl-mv1000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-mv1000w_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:gl-inet:gl-mv1000w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-s10_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:gl-inet:gl-s10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-s200_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:gl-inet:gl-s200:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-s1300_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:gl-inet:gl-s1300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-sf1200_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:gl-inet:gl-sf1200:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-b1300_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:gl-inet:gl-b1300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-b2200_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:gl-inet:gl-b2200:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-ap1300_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:gl-inet:gl-ap1300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-ap1300lte_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:gl-inet:gl-ap1300lte:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-x1200_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:gl-inet:gl-x1200:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-x750_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:gl-inet:gl-x750:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-x300b_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:gl-inet:gl-x300b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-xe300_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:gl-inet:gl-xe300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-ar750s_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:gl-inet:gl-ar750s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-ar750_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:gl-inet:gl-ar750:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-mifi_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:gl-inet:gl-mifi:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-mt300n-v2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:gl-inet:gl-mt300n-v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-ar300m_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:gl-inet:gl-ar300m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-usb150_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:gl-inet:gl-usb150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:microuter-n300_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:gl-inet:microuter-n300:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
|
GHSA-677f-c75x-79m2
|
In the Linux kernel, the following vulnerability has been resolved:net_sched: Flush gso_skb list too during ->change()Previously, when reducing a qdisc's limit via the ->change() operation, only
the main skb queue was trimmed, potentially leaving packets in the gso_skb
list. This could result in NULL pointer dereference when we only check
sch->limit against sch->q.qlen.This patch introduces a new helper, qdisc_dequeue_internal(), which ensures
both the gso_skb list and the main queue are properly flushed when trimming
excess packets. All relevant qdiscs (codel, fq, fq_codel, fq_pie, hhf, pie)
are updated to use this helper in their ->change() routines.
|
[] | null | null | null | null | null |
|
CVE-2013-10051
|
InstantCMS <= 1.6 Remote PHP Code Execution
|
A remote PHP code execution vulnerability exists in InstantCMS version 1.6 and earlier due to unsafe use of eval() within the search view handler. Specifically, user-supplied input passed via the look parameter is concatenated into a PHP expression and executed without proper sanitation. A remote attacker can exploit this flaw by sending a crafted HTTP GET request with a base64-encoded payload in the Cmd header, resulting in arbitrary PHP code execution within the context of the web server.
|
[] | 9.3 | null | null | null | null |
CVE-2020-2907
|
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.40, prior to 6.0.20 and prior to 6.1.6. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H).
|
[
"cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"
] | null | null | 7.5 | null | null |
|
GHSA-h7m4-7633-2r42
|
Adobe Reader and Acrobat before 11.0.18, Acrobat and Acrobat Reader DC Classic before 15.006.30243, and Acrobat and Acrobat Reader DC Continuous before 15.020.20039 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-6940, CVE-2016-6941, CVE-2016-6942, CVE-2016-6943, CVE-2016-6947, CVE-2016-6948, CVE-2016-6950, CVE-2016-6951, CVE-2016-6954, CVE-2016-6955, CVE-2016-6956, CVE-2016-6959, CVE-2016-6960, CVE-2016-6966, CVE-2016-6970, CVE-2016-6972, CVE-2016-6973, CVE-2016-6974, CVE-2016-6975, CVE-2016-6976, CVE-2016-6977, CVE-2016-6978, CVE-2016-6995, CVE-2016-6996, CVE-2016-6997, CVE-2016-6998, CVE-2016-7000, CVE-2016-7001, CVE-2016-7002, CVE-2016-7003, CVE-2016-7004, CVE-2016-7005, CVE-2016-7006, CVE-2016-7007, CVE-2016-7008, CVE-2016-7009, CVE-2016-7010, CVE-2016-7011, CVE-2016-7012, CVE-2016-7013, CVE-2016-7014, CVE-2016-7015, CVE-2016-7016, CVE-2016-7017, and CVE-2016-7018.
|
[] | null | null | 9.8 | null | null |
|
GHSA-j7rq-227r-98j4
|
In the Linux kernel, the following vulnerability has been resolved:netfilter: complete validation of user inputIn my recent commit, I missed that do_replace() handlers
use copy_from_sockptr() (which I fixed), followed
by unsafe copy_from_sockptr_offset() calls.In all functions, we can perform the @optlen validation
before even calling xt_alloc_table_info() with the following
check:if ((u64)optlen < (u64)tmp.size + sizeof(tmp))
return -EINVAL;
|
[] | null | null | null | null | null |
|
GHSA-q4ch-f363-6x69
|
Integer overflow in the archive_read_format_tar_skip function in archive_read_support_format_tar.c in libarchive before 3.2.0 allows remote attackers to cause a denial of service (crash) via a crafted tar file.
|
[] | null | null | 5.5 | null | null |
|
GHSA-f4c7-5p8v-p7jh
|
In KeePass 2.x before 2.54, it is possible to recover the cleartext master password from a memory dump, even when a workspace is locked or no longer running. The memory dump can be a KeePass process dump, swap file (pagefile.sys), hibernation file (hiberfil.sys), or RAM dump of the entire system. The first character cannot be recovered. In 2.54, there is different API usage and/or random string insertion for mitigation.
|
[] | null | 7.5 | null | null | null |
|
CVE-2024-52537
|
Dell Client Platform Firmware Update Utility contains an Improper Link Resolution vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of Privileges.
|
[] | null | 6.3 | null | null | null |
|
CVE-2022-39257
|
Matrix iOS SDK vulnerable to impersonation via forwarded Megolm sessions
|
Matrix iOS SDK allows developers to build iOS apps compatible with Matrix. Prior to version 0.23.19, an attacker cooperating with a malicious homeserver can construct messages appearing to have come from another person. Such messages will be marked with a grey shield on some platforms, but this may be missing in others. This attack is possible due to the matrix-ios-sdk implementing a too permissive key forwarding strategy. The default policy for accepting key forwards has been made more strict in the matrix-ios-sdk version 0.23.19. matrix-ios-sdk will now only accept forwarded keys in response to previously issued requests and only from own, verified devices. The SDK now sets a `trusted` flag on the decrypted message upon decryption, based on whether the key used to decrypt the message was received from a trusted source. Clients need to ensure that messages decrypted with a key with `trusted = false` are decorated appropriately (for example, by showing a warning for such messages). This attack requires coordination between a malicious home server and an attacker, so those who trust their home servers do not need a workaround.
|
[
"cpe:2.3:a:matrix:software_development_kit:*:*:*:*:*:iphone_os:*:*"
] | null | 7.5 | null | null | null |
GHSA-wmwg-vmx2-qg37
|
In Source of ZipFile.java, there is a possible way for an attacker to execute arbitrary code by manipulating Dynamic Code Loading due to improper input validation. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.
|
[] | null | 6.5 | null | null | null |
|
GHSA-qvxr-389g-385v
|
PHP remote file inclusion vulnerability in resources/includes/class.Smarty.php in Pixaria Gallery before 1.4.3 allows remote attackers to execute arbitrary PHP code via a URL in the cfg[sys][base_path] parameter.
|
[] | null | null | null | null | null |
|
RHSA-2008:0834
|
Red Hat Security Advisory: JBoss Enterprise Application Platform 4.2.0CP04 security update
|
Apache Tomcat's default security policy is too open JBossEAP allows download of non-EJB class files
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0::el5"
] | null | null | null | null | null |
GHSA-xf27-2797-g5jw
|
The dynamic-widgets plugin before 1.5.11 for WordPress has CSRF with resultant XSS via the wp-admin/themes.php?page=dynwid-config page_limit parameter.
|
[] | null | 6.5 | null | null | null |
|
CVE-2024-51801
|
WordPress Brand my Footer plugin <= 1.1 - Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Jake Brown Brand my Footer allows DOM-Based XSS.This issue affects Brand my Footer: from n/a through 1.1.
|
[] | null | 6.5 | null | null | null |
CVE-2022-30726
|
Unprotected component vulnerability in DeviceSearchTrampoline in SecSettingsIntelligence prior to SMR Jun-2022 Release 1 allows local attackers to launch activities of SecSettingsIntelligence.
|
[
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*"
] | null | 6.2 | null | null | null |
|
GHSA-5v7c-9xxg-p4h3
|
The HTTPAuthorized function in bitcoinrpc.cpp in bitcoind 0.8.1 provides information about authentication failure upon detecting the first incorrect byte of a password, which makes it easier for remote attackers to determine passwords via a timing side-channel attack.
|
[] | null | null | null | null | null |
|
CVE-2018-11150
|
Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 8 of 46).
|
[
"cpe:2.3:a:quest:disk_backup:*:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.5 | null |
|
CVE-2025-1800
|
D-Link DAR-7000 HTTP POST Request sxh_vpnlic.php get_ip_addr_details command injection
|
A vulnerability has been found in D-Link DAR-7000 3.2 and classified as critical. This vulnerability affects the function get_ip_addr_details of the file /view/vpn/sxh_vpn/sxh_vpnlic.php of the component HTTP POST Request Handler. The manipulation of the argument ethname leads to command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
|
[] | 5.3 | 6.3 | 6.3 | 6.5 | null |
CVE-2012-0054
|
libs/updater.py in GoLismero 0.6.3, and other versions before Git revision 2b3bb43d6867, as used in backtrack and possibly other products, allows local users to overwrite arbitrary files via a symlink attack on GoLismero-controlled files, as demonstrated using Admin/changes.dat.
|
[
"cpe:2.3:a:golismero:golismero:0.6.3:*:*:*:*:*:*:*"
] | null | null | null | 3.3 | null |
|
CVE-2024-3298
|
Out-Of-Bounds Write and Type Confusion vulnerabilities exist in the DWG and DXF file reading procedure in eDrawings from Release SOLIDWORKS 2023 through Release SOLIDWORKS 2024
|
Out-Of-Bounds Write and Type Confusion vulnerabilities exist in the file reading procedure in eDrawings from Release SOLIDWORKS 2023 through Release SOLIDWORKS 2024. These vulnerabilities could allow an attacker to execute arbitrary code while opening a specially crafted DWG or DXF. NOTE: this vulnerability was SPLIT from CVE-2024-1847.
|
[
"cpe:2.3:a:3ds:edrawings:2023:sp0:*:*:*:*:*:*",
"cpe:2.3:a:3ds:edrawings:2024:sp0:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
CVE-2021-31969
|
Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
|
Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
|
[
"cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.1999:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.1999:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.1999:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.1999:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1621:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1621:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.18363.1621:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1052:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1052:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1052:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.19041.1052:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2004:10.0.19041.1052:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_20h2:10.0.19042.1052:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_20h2:10.0.19042.1052:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_20h2:10.0.19042.1052:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
GHSA-xvh5-7qcw-cj6q
|
Vulnerability in /bin/mail in SunOS 4.1.1 and earlier allows local users to gain root privileges via certain command line arguments.
|
[] | null | null | null | null | null |
|
GHSA-r8fv-qm2f-vc68
|
OSRAM SYLVANIA Osram Lightify Pro before 2016-07-26 has XSS in the username field and Wireless Client Mode configuration page.
|
[] | null | null | 6.1 | null | null |
|
CVE-2024-36103
|
OS command injection vulnerability in WRC-X5400GS-B v1.0.10 and earlier, and WRC-X5400GSA-B v1.0.10 and earlier allows a network-adjacent attacker with an administrative privilege to execute arbitrary OS commands by sending a specially crafted request to the product.
|
[
"cpe:2.3:h:elecom:wrc-x5400gs-b:*:*:*:*:*:*:*:*",
"cpe:2.3:h:elecom:wrc-x5400gsa-b:*:*:*:*:*:*:*:*"
] | null | 6.8 | null | null | null |
|
GHSA-jc9x-wh9f-2xf3
|
BMC Track-It! GetData Missing Authorization Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of BMC Track-It!. Authentication is required to exploit this vulnerability.The specific flaw exists within the GetData endpoint. The issue results from the lack of authorization prior to allowing access to functionality. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise. Was ZDI-CAN-14527.
|
[] | null | null | 3.1 | null | null |
|
CVE-2019-13139
|
In Docker before 18.09.4, an attacker who is capable of supplying or manipulating the build path for the "docker build" command would be able to gain command execution. An issue exists in the way "docker build" processes remote git URLs, and results in command injection into the underlying "git clone" command, leading to code execution in the context of the user executing the "docker build" command. This occurs because git ref can be misinterpreted as a flag.
|
[
"cpe:2.3:a:docker:docker:*:*:*:*:enterprise:*:*:*"
] | null | null | 8.4 | 4.6 | null |
|
GHSA-xf3g-mfwq-4jvm
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Iqonic Design WPBookit allows SQL Injection.This issue affects WPBookit: from n/a through 1.6.0.
|
[] | null | 9.3 | null | null | null |
|
CVE-2025-29795
|
Microsoft Edge (Chromium-based) Update Elevation of Privilege Vulnerability
|
Improper link resolution before file access ('link following') in Microsoft Edge (Chromium-based) allows an authorized attacker to elevate privileges locally.
|
[] | null | 7.8 | null | null | null |
CVE-2008-0108
|
Stack-based buffer overflow in wkcvqd01.dll in Microsoft Works 6 File Converter, as used in Office 2003 SP2 and SP3, Works 8.0, and Works Suite 2005, allows remote attackers to execute arbitrary code via a .wps file with crafted field lengths, aka "Microsoft Works File Converter Field Length Vulnerability."
|
[
"cpe:2.3:a:microsoft:office:2003:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2003:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:works:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:works:2005:*:*:*:*:*:*:*"
] | null | null | null | 9.3 | null |
|
CVE-2019-18296
|
A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server could trigger a Denial-of-Service condition and potentially gain remote code execution by sending specifically crafted packets to port 5010/tcp. This vulnerability is independent from CVE-2019-18289, CVE-2019-18293, and CVE-2019-18295. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known.
|
[
"cpe:2.3:a:siemens:sppa-t3000_ms3000_migration_server:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 | null |
|
GHSA-29mx-gmwr-vhpf
|
Cross-site scripting (XSS) vulnerability in MyBB before 1.6.5 allows remote attackers to inject arbitrary web script or HTML via vectors related to "usernames via AJAX."
|
[] | null | null | null | null | null |
|
CVE-2011-4573
|
Red Hat JBoss Operations Network (JON) before 2.4.2 does not properly enforce "modify resource" permissions for remote authenticated users when deleting a plug-in configuration update from the group connection properties history, which prevents such activities from being recorded in the audit trail.
|
[
"cpe:2.3:a:redhat:jboss_operations_network:*:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:jboss_operations_network:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:jboss_operations_network:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:jboss_operations_network:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:jboss_operations_network:2.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:jboss_operations_network:2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:jboss_operations_network:2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:jboss_operations_network:2.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:jboss_operations_network:2.4:*:*:*:*:*:*:*"
] | null | null | null | 3.5 | null |
|
GHSA-5p4h-mjwj-j325
|
The hvm_set_callback_via function in arch/x86/hvm/irq.c in Xen 4.6 does not limit the number of printk console messages when logging the new callback method, which allows local HVM guest OS users to cause a denial of service via a large number of changes to the callback method (HVM_PARAM_CALLBACK_IRQ).
|
[] | null | null | 5 | null | null |
|
GHSA-52j5-fxf2-22cc
|
Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable memory corruption vulnerability in the image conversion engine when processing Enhanced Metafile Format (EMF) data related to drawing of Unicode text strings. Successful exploitation could lead to arbitrary code execution.
|
[] | null | null | 6.5 | null | null |
|
ICSA-17-250-01
|
SpiderControl SCADA Web Server
|
Authenticated, non-administrative local users are able to alter service executables with escalated privileges which could allow an attacker to execute arbitrary code under the context of the current system services.CVE-2017-12728 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been assigned; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L).
|
[] | null | null | 5.3 | null | null |
RHSA-2020:3616
|
Red Hat Security Advisory: OpenShift Container Platform 4.3.35 jenkins-2-plugins security update
|
jenkins-script-security-plugin: sandbox protection bypass leads to execute arbitrary code in sandboxed scripts jenkins-pipeline-groovy-plugin: sandbox protection bypass through default parameter expressions in CPS-transformed methods jenkins-script-security-plugin: sandbox protection bypass during script compilation phase by applying AST transforming annotations jenkins-subversion-plugin: XSS in project repository base url jenkins-script-security-plugin: sandbox protection bypass via crafted constructor calls and crafted constructor bodies jenkins-script-security-plugin: sandbox protection bypass leads to arbitrary code execution jenkins-git-plugin: stored cross-site scripting
|
[
"cpe:/a:redhat:openshift:4.3::el7"
] | null | 5.4 | null | null | null |
GHSA-2hhx-g28r-fqwv
|
Unrestricted file upload vulnerability in (1) wp-app.php and (2) app.php in WordPress 2.2.1 and WordPress MU 1.2.3 allows remote authenticated users to upload and execute arbitrary PHP code via unspecified vectors, possibly related to the wp_postmeta table and the use of custom fields in normal (non-attachment) posts. NOTE: this issue reportedly exists because of an incomplete fix for CVE-2007-3543.
|
[] | null | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.