id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 36
232
⌀ |
---|---|---|---|---|---|---|---|---|
GHSA-qq7p-4pp5-vpwx
|
Multiple PHP remote file inclusion vulnerabilities in Valdersoft Shopping Cart 3.0 and earlier allow remote attackers to execute arbitrary PHP code via a URL in the commonIncludePath parameter to (1) admin/include/common.php, (2) include/common.php, or (3) common_include/common.php.
|
[] | null | null | null | null | null |
|
CVE-2024-7916
|
nafisulbari/itsourcecode Insurance Management System Add Nominee Page addNominee.php cross site scripting
|
A vulnerability classified as problematic was found in nafisulbari/itsourcecode Insurance Management System 1.0. Affected by this vulnerability is an unknown functionality of the file addNominee.php of the component Add Nominee Page. The manipulation of the argument Nominee-Client ID leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
|
[
"cpe:2.3:a:sourcecodester:insurance_management_system:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:insurance_management_system_project:insurance_management_system:1.0:*:*:*:*:*:*:*"
] | 5.3 | 3.5 | 3.5 | 4 | null |
GHSA-hmcq-66vp-c2gv
|
LAME 3.99, 3.99.1, 3.99.2, 3.99.3, 3.99.4, 3.99.5, 3.98.4, 3.98.2 and 3.98 has a heap-based buffer over-read in fill_buffer in libmp3lame/util.c, related to lame_encode_buffer_sample_t in libmp3lame/lame.c, a different vulnerability than CVE-2017-9410.
|
[] | null | null | 5.5 | null | null |
|
CVE-2020-22987
|
Cross-Site Scripting (XSS) vulnerability in MicroStrategy Web SDK 10.11 and earlier, allows remote unauthenticated attackers to execute arbitrary code via the fileToUpload parameter to the uploadFile task.
|
[
"cpe:2.3:a:microstrategy:microstrategy_web_sdk:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 | null |
|
CVE-2017-8222
|
Wireless IP Camera (P2P) WIFICAM devices have an "Apple Production IOS Push Services" private RSA key and certificate stored in /system/www/pem/ck.pem inside the firmware, which allows attackers to obtain sensitive information.
|
[
"cpe:2.3:o:wificam:wireless_ip_camera_\\(p2p\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:wificam:wireless_ip_camera_\\(p2p\\):-:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 | null |
|
CVE-2024-37208
|
WordPress WP Scraper plugin <= 5.7 - Server Side Request Forgery (SSRF) vulnerability
|
Server-Side Request Forgery (SSRF) vulnerability in Robert Macchi WP Scraper.This issue affects WP Scraper: from n/a through 5.7.
|
[] | null | 4.9 | null | null | null |
CVE-2012-2383
|
Integer overflow in the i915_gem_execbuffer2 function in drivers/gpu/drm/i915/i915_gem_execbuffer.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.3.5 on 32-bit platforms allows local users to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via a crafted ioctl call.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3:rc5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3:rc6:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3:rc7:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3.3:*:*:*:*:*:*:*"
] | null | null | null | 4.9 | null |
|
GHSA-x6r4-f94j-335g
|
A cross-site scripting (XSS) vulnerability in the component /framework/cron/action/humanize of Pleasant Solutions Pleasant Password Server v7.11.41.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the cronString parameter.
|
[] | null | 6.1 | null | null | null |
|
GHSA-538h-6rv2-wmj3
|
ChakraCore RCE Vulnerability
|
The Chakra JavaScript engine in Microsoft Edge allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Scripting Engine Memory Corruption Vulnerability," a different vulnerability than CVE-2016-3199.
|
[] | null | null | 8.8 | null | null |
CVE-2020-1160
|
An information disclosure vulnerability exists when the Microsoft Windows Graphics Component improperly handles objects in memory, aka 'Microsoft Graphics Component Information Disclosure Vulnerability'.
|
[
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
] | null | 5.5 | null | 2.1 | null |
|
CVE-2019-14028
|
Buffer overwrite during memcpy due to lack of check on SSID length validation in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking in APQ8009, APQ8017, APQ8053, APQ8064, APQ8096, APQ8096AU, APQ8098, IPQ6018, IPQ8074, MDM9206, MDM9207C, MDM9607, MDM9640, MDM9650, MSM8996AU, MSM8998, Nicobar, QCA4531, QCA6174A, QCA6564, QCA6574, QCA6574AU, QCA6584, QCA6584AU, QCA8081, QCA9377, QCA9379, QCA9886, QCN7605, QCS404, QCS405, QCS605, Rennell, SA6155P, SC8180X, SDA660, SDA845, SDM630, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, SDX20, SDX24, SM6150, SM7150, SM8150, SM8250, SXR1130, SXR2130
|
[
"cpe:2.3:o:qualcomm:apq8009_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:apq8009:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:apq8017_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:apq8017:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:apq8053_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:apq8053:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:apq8064_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:apq8064:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:apq8096_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:apq8096:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:apq8096au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:apq8096au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:apq8098_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:apq8098:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq6018_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq6018:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq8074_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq8074:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9206_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9206:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9207c_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9207c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9607_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9607:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9640_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9640:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9650:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8996au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8998_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8998:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:nicobar_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:nicobar:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca4531_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca4531:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6174a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6174a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6564_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6564:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6574_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6574:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6584_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6584:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6584au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca8081:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9377_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9377:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9379_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9379:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9886_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9886:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn7605_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn7605:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs404_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs404:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs405_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs405:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs605_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs605:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:rennell_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:rennell:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa6155p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sc8180x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sc8180x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sda660_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sda660:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sda845_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sda845:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm630_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm630:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm636_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm636:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm660_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm660:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm670_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm670:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm710_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm710:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm845_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm845:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm850_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm850:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx20_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx20:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx24_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx24:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm6150_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm6150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm7150_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm7150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm8150_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm8150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm8250_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm8250:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sxr1130_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sxr1130:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sxr2130_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sxr2130:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | 7.2 | null |
|
GHSA-383j-f5vg-3hcm
|
In the Linux kernel, the following vulnerability has been resolved:ext4: check stripe size compatibility on remount as wellWe disable stripe size in __ext4_fill_super if it is not a multiple of
the cluster ratio however this check is missed when trying to remount.
This can leave us with cases where stripe < cluster_ratio after
remount:set making EXT4_B2C(sbi->s_stripe) become 0 that can cause some
unforeseen bugs like divide by 0.Fix that by adding the check in remount path as well.
|
[] | null | 5.5 | null | null | null |
|
GHSA-p48h-366j-m3qx
|
Multiple SQL injection vulnerabilities in SergiDs Top Music module 3.0 PR3 and earlier for PHP-Nuke allow remote attackers to execute arbitrary SQL commands via the (1) idartist, (2) idsong, and (3) idalbum parameters to modules.php.
|
[] | null | null | null | null | null |
|
GHSA-36pc-jp6h-c84c
|
Multiple cross-site scripting (XSS) vulnerabilities submit.asp in ASPScriptz Guest Book 2.0 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) GBOOK_UNAME, (2) GBOOK_EMAIL, (3) GBOOK_CITY, (4) GBOOK_COU, (5) GBOOK_WWW, and (6) GBOOK_MESS form fields.
|
[] | null | null | null | null | null |
|
GHSA-v5q7-9q8w-8w86
|
A vulnerability classified as critical has been found in code-projects Blood Bank Management System 1.0. Affected is an unknown function of the file /admin/blood/update/B+.php. The manipulation of the argument Bloodname leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
|
[] | 5.3 | 6.3 | null | null | null |
|
CVE-2018-12366
|
An invalid grid size during QCMS (color profile) transformations can result in the out-of-bounds read interpreted as a float value. This could leak private data into the output. This vulnerability affects Thunderbird < 60, Thunderbird < 52.9, Firefox ESR < 60.1, Firefox ESR < 52.9, and Firefox < 61.
|
[
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*"
] | null | null | 6.5 | 4.3 | null |
|
CVE-2021-31836
|
Improper Privilege Management in MA for Windows
|
Improper privilege management vulnerability in maconfig for McAfee Agent for Windows prior to 5.7.4 allows a local user to gain access to sensitive information. The utility was able to be run from any location on the file system and by a low privileged user.
|
[
"cpe:2.3:a:mcafee:mcafee_agent:*:*:*:*:*:windows:*:*"
] | null | 5.6 | null | null | null |
GHSA-m54w-9xr6-4jg3
|
Photo Organizer 2.32b and earlier does not properly check the ownership of certain objects, which allows remote attackers to gain unauthorized access via vectors related to (1) camera del, (2) camera edit, (3) folder/album deletion, (4) photo.move, (5) content.indexer, (6) folder.content, and possibly other operations.
|
[] | null | null | null | null | null |
|
CVE-2022-1474
|
WP Event Manager < 3.1.28 - Reflected Cross-Site Scripting
|
The WP Event Manager WordPress plugin before 3.1.28 does not sanitise and escape its search before outputting it back in an attribute on the event dashboard, leading to a Reflected Cross-Site Scripting
|
[
"cpe:2.3:a:wp-eventmanager:wp_event_manager:*:*:*:*:*:wordpress:*:*"
] | null | 6.1 | null | 4.3 | null |
CVE-2021-42977
|
NoMachine Enterprise Desktop is affected by Integer Overflow. IOCTL Handler 0x22001B in the NoMachine Enterprise Desktop above 4.0.346 and below 7.7.4 allow local attackers to execute arbitrary code in kernel mode or cause a denial of service (memory corruption and OS crash) via specially crafted I/O Request Packet.
|
[
"cpe:2.3:a:nomachine:enterprise_desktop:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | 7.2 | null |
|
CVE-2018-10694
|
An issue was discovered on Moxa AWK-3121 1.14 devices. The device provides a Wi-Fi connection that is open and does not use any encryption mechanism by default. An administrator who uses the open wireless connection to set up the device can allow an attacker to sniff the traffic passing between the user's computer and the device. This can allow an attacker to steal the credentials passing over the HTTP connection as well as TELNET traffic. Also an attacker can MITM the response and infect a user's computer very easily as well.
|
[
"cpe:2.3:o:moxa:awk-3121_firmware:1.14:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:awk-3121:-:*:*:*:*:*:*:*"
] | null | 8.1 | null | 4.3 | null |
|
CVE-2023-23991
|
WordPress Booking Calendar plugin <= 9.4.3 - SQL Injection
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in WPdevelop / Oplugins Booking Calendar allows SQL Injection.This issue affects Booking Calendar: from n/a through 9.4.3.
|
[] | null | 7.6 | null | null | null |
CVE-2007-4089
|
Vikingboard 0.1.2 allows remote attackers to obtain sensitive information via the debug parameter to (1) forum.php, (2) cp.php, and possibly other unspecified components.
|
[
"cpe:2.3:a:vikingboard:vikingboard:0.1.2:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
CVE-2018-9139
|
On Samsung mobile devices with N(7.x) software, a buffer overflow in the vision service allows code execution in a privileged process via a large frame size, aka SVE-2017-11165.
|
[
"cpe:2.3:o:samsung:samsung_mobile:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:samsung:samsung_mobile:7.1:*:*:*:*:*:*:*",
"cpe:2.3:o:samsung:samsung_mobile:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:samsung:samsung_mobile:7.1.2:*:*:*:*:*:*:*"
] | null | null | 9.8 | 10 | null |
|
CVE-2014-2080
|
Cross-site scripting (XSS) vulnerability in manager/templates/default/header.tpl in ModX Revolution before 2.2.11 allows remote attackers to inject arbitrary web script or HTML via the "a" parameter.
|
[
"cpe:2.3:a:modx:modx_revolution:*:*:*:*:*:*:*:*",
"cpe:2.3:a:modx:modx_revolution:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:modx:modx_revolution:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:modx:modx_revolution:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:modx:modx_revolution:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:modx:modx_revolution:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:modx:modx_revolution:2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:modx:modx_revolution:2.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:modx:modx_revolution:2.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:modx:modx_revolution:2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:modx:modx_revolution:2.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:modx:modx_revolution:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:modx:modx_revolution:2.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:modx:modx_revolution:2.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:modx:modx_revolution:2.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:modx:modx_revolution:2.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:modx:modx_revolution:2.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:modx:modx_revolution:2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:modx:modx_revolution:2.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:modx:modx_revolution:2.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:modx:modx_revolution:2.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:modx:modx_revolution:2.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:modx:modx_revolution:2.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:modx:modx_revolution:2.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:modx:modx_revolution:2.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:modx:modx_revolution:2.2.9:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
CVE-2024-43229
|
WordPress WP Search Analytics plugin <= 1.4.9 - Broken Access Control vulnerability
|
Missing Authorization vulnerability in Cornel Raiu WP Search Analytics allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP Search Analytics: from n/a through 1.4.9.
|
[] | null | 4.3 | null | null | null |
GHSA-v8fp-cfw6-2j9w
|
An issue was discovered in FIS GT.M through V7.0-000 (related to the YottaDB code base). Using crafted input, an attacker can control the size of a memset that occurs in calls to util_format in sr_unix/util_output.c.
|
[] | null | 7.5 | null | null | null |
|
CVE-2023-37520
|
HCL BigFix Platform is affected by Unathenticated Stored Cross-Site Scripting (XSS)
|
Unauthenticated Stored Cross-Site Scripting (XSS) vulnerability identified in BigFix Server version 9.5.12.68, allowing for potential data exfiltration. This XSS vulnerability is in the Gather Status Report, which is served by the BigFix Relay.
|
[
"cpe:2.3:a:hcltech:bigfix_platform:*:*:*:*:*:*:*:*",
"cpe:2.3:a:hcltech:bigfix_platform:11.0.0:*:*:*:*:*:*:*"
] | null | 7.7 | null | null | null |
GHSA-fmjx-hmcg-x6hg
|
FactoryTalk Linx versions 6.00, 6.10, and 6.11, RSLinx Classic v4.11.00 and prior,Connected Components Workbench: Version 12 and prior, ControlFLASH: Version 14 and later, ControlFLASH Plus: Version 1 and later, FactoryTalk Asset Centre: Version 9 and later, FactoryTalk Linx CommDTM: Version 1 and later, Studio 5000 Launcher: Version 31 and later Stud, 5000 Logix Designer software: Version 32 and prior is vulnerable. An exposed API call allows users to provide files to be processed without sanitation. This may allow an attacker to use specially crafted requests to traverse the file system and expose sensitive data on the local hard drive.
|
[] | null | null | null | null | null |
|
GHSA-h9f2-jxcx-f5wh
|
Unspecified vulnerability in Oracle MySQL Server 5.5.42 and earlier, and 5.6.23 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : Federated.
|
[] | null | null | null | null | null |
|
GHSA-ch7x-55jf-9fgx
|
libxml2, as used in Red Hat JBoss Core Services and when in recovery mode, allows context-dependent attackers to cause a denial of service (stack consumption) via a crafted XML document. NOTE: this vulnerability exists because of an incorrect fix for CVE-2016-3627.
|
[] | null | 6.5 | null | null | null |
|
GHSA-c787-p47f-ccwq
|
Deserialization of Untrusted Data vulnerability in Phan An AJAX Random Posts allows Object Injection.This issue affects AJAX Random Posts: from n/a through 0.3.3.
|
[] | null | 9.8 | null | null | null |
|
GHSA-hh6r-xc8x-f53f
|
In the Linux kernel 6.0.8, there is a use-after-free in run_unpack in fs/ntfs3/run.c, related to a difference between NTFS sector size and media sector size.
|
[] | null | 7.8 | null | null | null |
|
CVE-2020-28715
|
An issue was discovered in kdmserver service in LeEco LeTV X43 version V2401RCN02C080080B04121S, allows attackers to execute arbitrary code, escalate privileges, and cause a denial of service (DoS).
|
[
"cpe:2.3:h:leeco:letv_x43:-:*:*:*:*:*:*:*",
"cpe:2.3:o:leeco:letv_x43_firmware:v2401rcn02c080080b04121s:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
|
GHSA-r75v-8c97-7xvm
|
openflights commit 5234b5b is vulnerable to Cross-Site Scripting (XSS) via php/submit.php
|
[] | null | 6.1 | null | null | null |
|
GHSA-87jv-77j5-g3gv
|
IBM Tivoli Storage Manager discloses unencrypted login credentials to Vmware vCenter that could be obtained by a local user.
|
[] | null | null | 6.5 | null | null |
|
CVE-2024-20884
|
Incorrect use of privileged API vulnerability in getSemBatteryUsageStats in BatteryStatsService prior to SMR Jun-2024 Release 1 allows local attackers to use privileged API.
|
[] | null | 6.2 | null | null | null |
|
CVE-2015-6946
|
Multiple stack-based buffer overflows in the Reprise License Manager service in Borland AccuRev allow remote attackers to execute arbitrary code via the (1) akey or (2) actserver parameter to the activate_doit function or (3) licfile parameter to the service_startup_doit functionality.
|
[
"cpe:2.3:a:microfocus:accurev:-:*:*:*:*:*:*:*"
] | null | null | null | 9.3 | null |
|
GHSA-c5q5-64hr-5mwm
|
Remote Code
Execution has been discovered in
OpenText™ iManager 3.2.6.0200. The vulnerability can
trigger remote code execution using custom file upload task.
|
[] | null | 7.8 | null | null | null |
|
CVE-2023-6110
|
Openstack: deleting a non existing access rule deletes another existing access rule in it's scope
|
A flaw was found in OpenStack. When a user tries to delete a non-existing access rule in it's scope, it deletes other existing access rules which are not associated with any application credentials.
|
[
"cpe:/a:redhat:openstack:17.1::el8",
"cpe:/a:redhat:openstack:17.1::el9",
"cpe:/a:redhat:openstack:16.1",
"cpe:/a:redhat:openstack:16.2",
"cpe:/a:redhat:openstack:17.0",
"cpe:/a:redhat:openstack:18.0"
] | null | 5.5 | null | null | null |
RHSA-2017:1390
|
Red Hat Security Advisory: samba security update
|
samba: Loading shared modules from any path in the system leading to RCE (SambaCry)
|
[
"cpe:/o:redhat:rhel_aus:6.4::server",
"cpe:/o:redhat:rhel_aus:6.5::server",
"cpe:/o:redhat:rhel_aus:6.6::server",
"cpe:/o:redhat:rhel_eus:6.7::computenode",
"cpe:/o:redhat:rhel_eus:6.7::server",
"cpe:/o:redhat:rhel_eus:7.1::server",
"cpe:/o:redhat:rhel_eus:7.2::computenode",
"cpe:/o:redhat:rhel_eus:7.2::server",
"cpe:/o:redhat:rhel_mission_critical:6.2::server",
"cpe:/o:redhat:rhel_tus:6.5::server",
"cpe:/o:redhat:rhel_tus:6.6::server"
] | null | null | 7.5 | null | null |
GHSA-8q58-8vm2-mf3q
|
A vulnerability was found in Samba's "rpcecho" development server, a non-Windows RPC server used to test Samba's DCE/RPC stack elements. This vulnerability stems from an RPC function that can be blocked indefinitely. The issue arises because the "rpcecho" service operates with only one worker in the main RPC task, allowing calls to the "rpcecho" server to be blocked for a specified time, causing service disruptions. This disruption is triggered by a "sleep()" call in the "dcesrv_echo_TestSleep()" function under specific conditions. Authenticated users or attackers can exploit this vulnerability to make calls to the "rpcecho" server, requesting it to block for a specified duration, effectively disrupting most services and leading to a complete denial of service on the AD DC. The DoS affects all other services as "rpcecho" runs in the main RPC task.
|
[] | null | 6.5 | null | null | null |
|
CVE-2002-2240
|
Directory traversal vulnerability in MyServer 0.11 and 0.2 allows remote attackers to read arbitrary files via a ".." (dot dot) in an HTTP GET request.
|
[
"cpe:2.3:a:myserver:myserver:0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:myserver:myserver:0.11:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-m95q-pxcq-5m5r
|
phpList 3.6.0 allows CSV injection, related to the email parameter, and /lists/admin/ exports.
|
[] | null | null | null | null | null |
|
GHSA-q6xm-78fh-vq57
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Emraan Cheema CubeWP Framework allows DOM-Based XSS. This issue affects CubeWP Framework: from n/a through 1.1.23.
|
[] | null | 6.5 | null | null | null |
|
GHSA-5x63-mggh-9qxw
|
Vulnerability in the Oracle GraalVM Enterprise Edition product of Oracle GraalVM (component: GraalVM Compiler). Supported versions that are affected are 19.3.1 and 20.0.0. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise Oracle GraalVM Enterprise Edition. While the vulnerability is in Oracle GraalVM Enterprise Edition, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle GraalVM Enterprise Edition. CVSS 3.0 Base Score 7.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H).
|
[] | null | null | null | null | null |
|
GHSA-w2j3-vrwq-vgh5
|
The SHA-2 digest support in the sudoers plugin in sudo after 1.8.7 allows local users with write permissions to parts of the called command to replace them before it is executed.
|
[] | null | null | 7 | null | null |
|
CVE-2023-25212
|
Tenda AC5 US_AC5V1.0RTL_V15.03.06.28 was discovered to contain a stack overflow via the fromSetWirelessRepeat function. This vulnerability allows attackers to cause a Denial of Service (DoS) or execute arbitrary code via a crafted payload.
|
[
"cpe:2.3:o:tenda:ac5_firmware:15.03.06.28:*:*:*:*:*:*:*",
"cpe:2.3:h:tenda:ac5:1.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
|
GHSA-mh56-vfvr-8vx4
|
SQL injection vulnerability in directory.php in Scripts for Sites (SFS) SFS EZ Affiliate allows remote attackers to execute arbitrary SQL commands via the cat_id parameter in a list action.
|
[] | null | null | null | null | null |
|
CVE-2024-30000
|
Windows Mobile Broadband Driver Remote Code Execution Vulnerability
|
Windows Mobile Broadband Driver Remote Code Execution Vulnerability
|
[
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*"
] | null | 6.8 | null | null | null |
CVE-2024-30493
|
WordPress Church Admin plugin <= 4.1.7 - Cross Site Request Forgery (CSRF) vulnerability
|
Cross-Site Request Forgery (CSRF) vulnerability in Andy Moyle Church Admin.This issue affects Church Admin: from n/a through 4.1.7.
|
[] | null | 4.3 | null | null | null |
ICSA-16-231-01
|
Navis WebAccess SQL Injection Vulnerability
|
SQL injection vulnerability in news pages in Cargotec Navis WebAccess before 2016-08-10 allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
|
[] | null | null | 7.3 | null | null |
CVE-2022-32560
|
An issue was discovered in Couchbase Server before 7.0.4. XDCR lacks role checking when changing internal settings.
|
[
"cpe:2.3:a:couchbase:couchbase_server:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null |
|
CVE-2016-2833
|
Mozilla Firefox before 47.0 ignores Content Security Policy (CSP) directives for cross-domain Java applets, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via a crafted applet.
|
[
"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"
] | null | null | 6.1 | 4.3 | null |
|
GHSA-rx9x-86vg-h4cr
|
An issue was discovered in Delta RM 1.2. The /risque/risque/workflow/reset endpoint is lacking access controls, and it is possible for an unprivileged user to reopen a risk with a POST request, using the risqueID parameter to identify the risk to be re-opened.
|
[] | null | 4.3 | null | null | null |
|
CVE-2020-25219
|
url::recvline in url.cpp in libproxy 0.4.x through 0.4.15 allows a remote HTTP server to trigger uncontrolled recursion via a response composed of an infinite stream that lacks a newline character. This leads to stack exhaustion.
|
[
"cpe:2.3:a:libproxy_project:libproxy:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*"
] | null | 7.5 | null | 5 | null |
|
CVE-2022-31836
|
The leafInfo.match() function in Beego v2.0.3 and below uses path.join() to deal with wildcardvalues which can lead to cross directory risk.
|
[
"cpe:2.3:a:beego:beego:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 | null |
|
CVE-2019-9703
|
Symantec Endpoint Encryption, prior to SEE 11.3.0, may be susceptible to a privilege escalation vulnerability, which is a type of issue that allows a user to gain elevated access to resources that are normally protected at lower access levels.
|
[
"cpe:2.3:a:symantec:endpoint_encryption:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | 4.6 | null |
|
CVE-2022-1242
|
Apport can be tricked into connecting to arbitrary sockets as the root user
|
[] | null | 7.8 | null | null | null |
|
CVE-2024-6307
|
WordPress Core < 6.5.5 - Authenticated (Contributor+) Stored Cross-Site Scripting via HTML API
|
WordPress Core is vulnerable to Stored Cross-Site Scripting via the HTML API in various versions prior to 6.5.5 due to insufficient input sanitization and output escaping on URLs. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] | null | 6.4 | null | null | null |
CVE-2024-38567
|
wifi: carl9170: add a proper sanity check for endpoints
|
In the Linux kernel, the following vulnerability has been resolved:
wifi: carl9170: add a proper sanity check for endpoints
Syzkaller reports [1] hitting a warning which is caused by presence
of a wrong endpoint type at the URB sumbitting stage. While there
was a check for a specific 4th endpoint, since it can switch types
between bulk and interrupt, other endpoints are trusted implicitly.
Similar warning is triggered in a couple of other syzbot issues [2].
Fix the issue by doing a comprehensive check of all endpoints
taking into account difference between high- and full-speed
configuration.
[1] Syzkaller report:
...
WARNING: CPU: 0 PID: 4721 at drivers/usb/core/urb.c:504 usb_submit_urb+0xed6/0x1880 drivers/usb/core/urb.c:504
...
Call Trace:
<TASK>
carl9170_usb_send_rx_irq_urb+0x273/0x340 drivers/net/wireless/ath/carl9170/usb.c:504
carl9170_usb_init_device drivers/net/wireless/ath/carl9170/usb.c:939 [inline]
carl9170_usb_firmware_finish drivers/net/wireless/ath/carl9170/usb.c:999 [inline]
carl9170_usb_firmware_step2+0x175/0x240 drivers/net/wireless/ath/carl9170/usb.c:1028
request_firmware_work_func+0x130/0x240 drivers/base/firmware_loader/main.c:1107
process_one_work+0x9bf/0x1710 kernel/workqueue.c:2289
worker_thread+0x669/0x1090 kernel/workqueue.c:2436
kthread+0x2e8/0x3a0 kernel/kthread.c:376
ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:308
</TASK>
[2] Related syzkaller crashes:
|
[] | null | null | null | null | null |
CVE-2023-1563
|
SourceCodester Student Study Center Desk Management System assign.php sql injection
|
A vulnerability has been found in SourceCodester Student Study Center Desk Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /admin/assign/assign.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-223555.
|
[
"cpe:2.3:a:oretnom23:student_study_center_desk_management_system:1.0:*:*:*:*:*:*:*"
] | null | 6.3 | 6.3 | 6.5 | null |
CVE-2020-14185
|
Affected versions of Jira Server allow remote unauthenticated attackers to enumerate issue keys via a missing permissions check in the ActionsAndOperations resource. The affected versions are before 7.13.18, from version 8.0.0 before 8.5.9, and from version 8.6.0 before version 8.12.2.
|
[
"cpe:2.3:a:atlassian:jira:*:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:jira_server:*:*:*:*:*:*:*:*"
] | null | 5.3 | null | 5 | null |
|
CVE-2020-10799
|
The svglib package through 0.9.3 for Python allows XXE attacks via an svg2rlg call.
|
[
"cpe:2.3:a:svglib_project:svglib:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 | null |
|
CVE-2020-5555
|
Shihonkanri Plus GOOUT Ver1.5.8 and Ver2.2.10 allows remote attackers to read and write data of the files placed in the same directory where it is placed via unspecified vector due to the improper input validation issue.
|
[
"cpe:2.3:a:shihonkanri_plus_goout_project:shihonkanri_plus_goout:1.5.8:*:*:*:*:*:*:*",
"cpe:2.3:a:shihonkanri_plus_goout_project:shihonkanri_plus_goout:2.2.10:*:*:*:*:*:*:*"
] | null | 9.1 | null | 6.4 | null |
|
CVE-2022-47144
|
WordPress Mediamatic – Media Library Folders Plugin <= 2.8.1 is vulnerable to Cross Site Request Forgery (CSRF)
|
Cross-Site Request Forgery (CSRF) vulnerability in Plugincraft Mediamatic – Media Library Folders plugin <= 2.8.1 versions.
|
[
"cpe:2.3:a:frenify:mediamatic:*:*:*:*:*:wordpress:*:*"
] | null | 4.3 | null | null | null |
CVE-2021-29563
|
CHECK-fail in `tf.raw_ops.RFFT`
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can cause a denial of service by exploiting a `CHECK`-failure coming from the implementation of `tf.raw_ops.RFFT`. Eigen code operating on an empty matrix can trigger on an assertion and will cause program termination. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
|
[
"cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*"
] | null | 2.5 | null | null | null |
ICSA-23-222-12
|
Siemens RUGGEDCOM ROS
|
The affected products insufficiently block data from being forwarded over the mirror port into the mirrored network.
An attacker could use this behavior to transmit malicious packets to systems in the mirrored network, possibly influencing their configuration and runtime behavior.
|
[] | null | 9.1 | null | null | null |
CVE-2025-4707
|
Campcodes Sales and Inventory System transaction_add.php sql injection
|
A vulnerability was found in Campcodes Sales and Inventory System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /pages/transaction_add.php. The manipulation of the argument prod_name leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
|
[] | 6.9 | 7.3 | 7.3 | 7.5 | null |
CVE-2008-6716
|
homeadmin/adminhome.php in Pre ADS Portal 2.0 and earlier does not require administrative authentication, which allows remote attackers to have an unspecified impact via a direct request.
|
[
"cpe:2.3:a:preprojects:pre_ads_portal:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2016-10449
|
In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Mobile and Snapdragon Wear MDM9206, MDM9607, MDM9640, MDM9650, MSM8909W, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 430, SD 450, SD 615/16/SD 415, SD 625, SD 650/52, SD 800, SD 810, SD 820, and SD 835, in a GNSS API function, a NULL pointer dereference can occur.
|
[
"cpe:2.3:o:qualcomm:mdm9206_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9206:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9607_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9607:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9640_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9640:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9650:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8909w_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8909w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_210_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_210:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_212_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_212:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_205_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_205:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_400_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_400:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_410_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_410:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_412_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_412:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_425_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_425:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_430_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_430:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_450_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_450:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_615_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_615:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_616_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_616:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_415_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_415:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_625_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_625:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_650_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_650:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_652_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_652:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_800_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_800:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_810_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_810:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_820_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_820:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_835_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_835:-:*:*:*:*:*:*:*"
] | null | null | 9.8 | 10 | null |
|
GHSA-8pjh-cf85-78cc
|
Transient DOS due to uncontrolled resource consumption in Linux kernel when malformed messages are sent from the Gunyah Resource Manager message queue.
|
[] | null | 5.5 | null | null | null |
|
CVE-2024-0571
|
Totolink LR1200GB cstecgi.cgi setSmsCfg stack-based overflow
|
A vulnerability, which was classified as critical, has been found in Totolink LR1200GB 9.1.0u.6619_B20230130. This issue affects the function setSmsCfg of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument text leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-250787. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
|
[
"cpe:2.3:o:totolink:lr1200gb_firmware:9.1.0u.6619_b20230130:*:*:*:*:*:*:*",
"cpe:2.3:h:totolink:lr1200gb:-:*:*:*:*:*:*:*"
] | null | 8.8 | 8.8 | 9 | null |
CVE-2008-1382
|
libpng 1.0.6 through 1.0.32, 1.2.0 through 1.2.26, and 1.4.0beta01 through 1.4.0beta19 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a PNG file with zero length "unknown" chunks, which trigger an access of uninitialized memory.
|
[
"cpe:2.3:a:libpng:libpng:1.0.6:a:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.6:d:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.6:e:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.6:f:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.6:g:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.6:h:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.6:i:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.6:j:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.7:beta11:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.7:beta12:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.7:beta13:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.7:beta14:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.7:beta15:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.7:beta16:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.7:beta17:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.7:beta18:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.7:rc1:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.7:rc2:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.8:beta1:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.8:beta2:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.8:beta3:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.8:beta4:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.8:rc1:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.9:beta1:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.9:beta10:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.9:beta2:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.9:beta3:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.9:beta4:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.9:beta5:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.9:beta6:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.9:beta7:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.9:beta8:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.9:beta9:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.9:rc1:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.9:rc2:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.10:beta1:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.10:rc1:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.11:beta1:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.11:beta2:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.11:beta3:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.11:rc1:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.12:beta1:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.12:rc1:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.15:rc1:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.15:rc2:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.15:rc3:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.19:rc1:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.19:rc2:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.19:rc3:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.19:rc5:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.21:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.21:rc1:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.21:rc2:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.22:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.22:rc1:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.23:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.23:rc1:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.23:rc2:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.23:rc3:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.23:rc4:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.23:rc5:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.24:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.24:rc1:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.25:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.25:rc1:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.25:rc2:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.26:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.27:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.27:rc1:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.27:rc2:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.27:rc3:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.27:rc4:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.27:rc5:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.27:rc6:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.28:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.28:rc2:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.28:rc3:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.28:rc4:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.28:rc5:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.28:rc6:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.29:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.29:beta1:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.29:rc1:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.29:rc2:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.29:rc3:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.30:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.30:rc1:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.31:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.31:rc01:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.0.32:*:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.0:beta5:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.1:beta1:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.1:beta2:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.1:beta3:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.1:beta4:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.1:rc1:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.1:rc2:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.2:beta1:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.2:beta2:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.2:beta3:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.2:beta4:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.2:beta5:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.2:beta6:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.2:rc1:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.3:rc1:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.3:rc2:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.3:rc3:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.3:rc4:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.3:rc5:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.3:rc6:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.4:beta1:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.4:beta2:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.4:beta3:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.4:rc1:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.5:beta1:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.5:beta2:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.5:rc1:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.5:rc2:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.5:rc3:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.6:beta1:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.6:beta2:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.6:beta3:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.6:beta4:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.6:rc1:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.6:rc2:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.6:rc3:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.6:rc4:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.6:rc5:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.7:beta1:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.7:beta2:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.8:beta1:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.8:beta2:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.8:beta3:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.8:beta4:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.8:beta5:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.8:rc1:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.8:rc2:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.8:rc3:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.8:rc4:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.8:rc5:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.9:beta1:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.9:beta10:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.9:beta2:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.9:beta3:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.9:beta4:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.9:beta5:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.9:beta6:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.9:beta7:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.9:beta8:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.9:beta9:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.9:rc1:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.10:beta1:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.10:beta2:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.10:beta3:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.10:beta4:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.10:beta5:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.10:beta6:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.10:beta7:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.10:rc1:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.10:rc2:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.10:rc3:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.11:beta1:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.11:beta2:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.11:beta3:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.11:beta4:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.11:rc1:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.11:rc2:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.11:rc3:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.11:rc5:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.13:beta1:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.13:rc1:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.13:rc2:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.14:beta1:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.14:beta2:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.14:rc1:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.15:beta1:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.15:beta2:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.15:beta3:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.15:beta4:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.15:beta5:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.15:beta6:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.15:rc1:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.15:rc2:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.15:rc3:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.15:rc4:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.15:rc5:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.16:beta1:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.16:beta2:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.16:rc1:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.17:beta1:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.17:beta2:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.17:rc1:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.17:rc2:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.17:rc3:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.17:rc4:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.19:beta1:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.19:beta10:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.19:beta11:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.19:beta12:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.19:beta13:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.19:beta14:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.19:beta15:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.19:beta16:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.19:beta17:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.19:beta18:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.19:beta19:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.19:beta2:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.19:beta20:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.19:beta21:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.19:beta22:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.19:beta23:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.19:beta24:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.19:beta25:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.19:beta26:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.19:beta27:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.19:beta28:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.19:beta29:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.19:beta3:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.19:beta30:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.19:beta31:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.19:beta4:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.19:beta5:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.19:beta6:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.19:beta7:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.19:beta8:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.19:beta9:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.19:rc1:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.19:rc2:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.19:rc3:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.19:rc4:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.19:rc5:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.19:rc6:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.20:beta01:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.20:beta02:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.20:beta03:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.20:beta04:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.20:rc1:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.20:rc2:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.20:rc3:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.20:rc4:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.20:rc5:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.20:rc6:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.21:rc3:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.22:beta1:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.22:beta2:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.22:beta2-1.2.21:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.22:beta3:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.22:beta3-1.2.21:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.22:beta4:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.22:beta4-1.2.21:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.22:rc1:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.22:rc1-1.2.21:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.23:beta01:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.23:beta02:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.23:beta03:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.23:beta04:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.23:beta05:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.23:rc01:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.24:beta01:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.24:beta02:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.24:beta03:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.24:rc01:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.25:beta01:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.25:beta02:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.25:beta03:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.25:beta04:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.25:beta05:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.25:beta06:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.25:rc01:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.25:rc02:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.26:beta01:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.26:beta02:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.26:beta03:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.26:beta04:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.26:beta05:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.26:beta06:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.2.26:rc01:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.4:beta1:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.4:beta10:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.4:beta11:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.4:beta12:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.4:beta13:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.4:beta14:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.4:beta15:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.4:beta16:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.4:beta17:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.4:beta18:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.4:beta19:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.4:beta2:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.4:beta3:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.4:beta4:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.4:beta5:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.4:beta6:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.4:beta7:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.4:beta8:*:*:*:*:*:*",
"cpe:2.3:a:libpng:libpng:1.4:beta9:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-99jx-6342-9vjm
|
Belong Software Site Builder 0.1 beta allows remote attackers to bypass intended access restrictions and perform administrative actions via a direct request to admin/home.php.
|
[] | null | null | null | null | null |
|
GHSA-wh76-4mjv-gqjw
|
The Websense V10000 appliance before 1.0.1 allows remote attackers to cause a denial of service (intermittent LDAP authentication outage) via a login attempt with an incorrect password.
|
[] | null | null | null | null | null |
|
CVE-2020-15423
|
This vulnerability allows remote attackers to execute arbitrary code on affected installations of CentOS Web Panel cwp-e17.0.9.8.923. Authentication is not required to exploit this vulnerability. The specific flaw exists within ajax_mod_security.php. When parsing the dominio parameter, the process does not properly validate a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-9732.
|
[
"cpe:2.3:a:control-webpanel:webpanel:0.9.8.923:*:*:*:*:*:*:*"
] | null | null | 9.8 | null | null |
|
GHSA-5993-2g85-9fjv
|
The xenmem_add_to_physmap_one function in arch/arm/mm.c in Xen 4.5.x, 4.4.x, and earlier does not limit the number of printk console messages when reporting a failure to retrieve a reference on a foreign page, which allows remote domains to cause a denial of service by leveraging permissions to map the memory of a foreign guest.
|
[] | null | null | null | null | null |
|
CVE-2022-22793
|
Cybonet - PineApp Mail Relay Local File Inclusion
|
Cybonet - PineApp Mail Relay Local File Inclusion. Attacker can send a request to : /manage/mailpolicymtm/log/eml_viewer/email.content.body.php?filesystem_path=ENCDODED PATH and by doing that, the attacker can read Local Files inside the server.
|
[
"cpe:2.3:a:cybonet:pineapp_mail_secure:-:*:*:*:*:*:*:*"
] | null | 6.1 | null | null | null |
GHSA-7qjr-qph2-rjqv
|
Cross-site scripting (XSS) vulnerability in unspecified administration pages in the Password Policy module 6.x-1.x before 6.x-1.11 and 7.x-1.x before 7.x-1.11 for Drupal, when a site has a policy that uses the username constraint, allows remote attackers to inject arbitrary web script or HTML via a crafted username that is imported from an external source.
|
[] | null | null | null | null | null |
|
CVE-2000-0507
|
Imate Webmail Server 2.5 allows remote attackers to cause a denial of service via a long HELO command.
|
[
"cpe:2.3:a:concatus:imate_webmail_server:2.5:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
CVE-2013-1667
|
The rehash mechanism in Perl 5.8.2 through 5.16.x allows context-dependent attackers to cause a denial of service (memory consumption and crash) via a crafted hash key.
|
[
"cpe:2.3:a:perl:perl:5.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.8.3:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.8.4:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.8.5:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.8.6:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.8.7:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.8.8:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.8.9:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.8.10:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.10:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.10.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.10.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.10.1:rc1:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.10.1:rc2:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.11.1:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.11.2:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.11.3:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.11.4:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.11.5:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.12.0:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.12.0:rc0:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.12.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.12.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.12.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.12.0:rc4:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.12.0:rc5:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.12.1:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.12.1:rc1:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.12.1:rc2:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.12.2:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.12.2:rc1:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.12.3:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.12.3:rc1:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.12.3:rc2:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.12.3:rc3:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.12.4:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.13.0:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.13.1:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.13.2:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.13.3:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.13.4:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.13.5:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.13.6:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.13.7:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.13.8:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.13.9:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.13.10:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.13.11:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.14.0:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.14.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.14.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.14.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.14.1:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.14.2:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.14.3:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.16.0:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.16.1:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.16.2:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2022-45768
|
Command Injection vulnerability in Edimax Technology Co., Ltd. Wireless Router N300 Firmware BR428nS v3 allows attacker to execute arbitrary code via the formWlanMP function.
|
[
"cpe:2.3:o:edimax:br-6428ns_firmware:1.20:*:*:*:*:*:*:*",
"cpe:2.3:h:edimax:br-6428ns:v3:*:*:*:*:*:*:*"
] | null | 8.8 | null | null | null |
|
GHSA-wq58-8783-f3c6
|
A vulnerability has been identified in Tecnomatix Plant Simulation V2201 (All versions < V2201.0009), Tecnomatix Plant Simulation V2302 (All versions < V2302.0003). The affected application contains an out of bounds write past the end of an allocated buffer while parsing a specially crafted SPP file. This could allow an attacker to execute code in the context of the current process.
|
[] | null | 7.8 | null | null | null |
|
CVE-2004-0393
|
Format string vulnerability in the msg function for rlpr daemon (rlprd) 2.0.4 allows remote attackers to execute arbitrary code via format string specifiers in a buffer that can not be resolved, which is provided to the syslog function.
|
[
"cpe:2.3:a:rlpr:rlpr:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:rlpr:rlpr:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:rlpr:rlpr:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:rlpr:rlpr:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:rlpr:rlpr:2.0.4:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
CVE-2021-37443
|
NCH IVM Attendant v5.12 and earlier allows path traversal via the logdeleteselected check0 parameter for file deletion.
|
[
"cpe:2.3:a:nchsoftware:ivm_attendant:*:*:*:*:*:*:*:*"
] | null | 8.1 | null | 5.5 | null |
|
CVE-2017-14459
|
An exploitable OS Command Injection vulnerability exists in the Telnet, SSH, and console login functionality of Moxa AWK-3131A Industrial IEEE 802.11a/b/g/n wireless AP/bridge/client in firmware versions 1.4 to 1.7 (current). An attacker can inject commands via the username parameter of several services (SSH, Telnet, console), resulting in remote, unauthenticated, root-level operating system command execution.
|
[
"cpe:2.3:o:moxa:awk-3131a_firmware:1.4:*:*:*:*:*:*:*",
"cpe:2.3:o:moxa:awk-3131a_firmware:1.5:*:*:*:*:*:*:*",
"cpe:2.3:o:moxa:awk-3131a_firmware:1.6:*:*:*:*:*:*:*",
"cpe:2.3:o:moxa:awk-3131a_firmware:1.7:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:awk-3131a:-:*:*:*:*:*:*:*"
] | null | null | 10 | null | null |
|
GHSA-3q59-83xj-cggf
|
A remote unauthorized read access to files vulnerability was discovered in Aruba Instant version(s): 6.4.x.x: 6.4.4.8-4.2.4.18 and below; Aruba Instant 6.5.x.x: 6.5.4.19 and below; Aruba Instant 8.5.x.x: 8.5.0.12 and below; Aruba Instant 8.6.x.x: 8.6.0.11 and below; Aruba Instant 8.7.x.x: 8.7.1.3 and below; Aruba Instant 8.8.x.x: 8.8.0.0 and below. Aruba has released patches for Aruba Instant (IAP) that address this security vulnerability.
|
[] | null | 6.5 | null | null | null |
|
GHSA-66vh-4g4j-7x2q
|
The administrative interface in the embedded web server on the BreakingPoint Storm appliance before 3.0 does not require authentication for the gwt/BugReport script, which allows remote attackers to obtain sensitive information by downloading a .tgz file.
|
[] | null | null | null | null | null |
|
GHSA-x6xq-whh3-gg32
|
Apollo Router Coprocessors may cause Denial-of-Service when handling request bodies
|
ImpactInstances of the Apollo Router using either of the following may be impacted by a denial-of-service vulnerability.External Coprocessing with specific configurations; orNative Rust Plugins accessing the Router request body in the RouterService layerRouter customizations using Rhai scripts are **not** impacted.When using External Coprocessing:Instances of the Apollo Router running versions >=1.21.0 and <1.52.1 are impacted by a denial-of-service vulnerability if **all** of the following are true:Router has been configured to support External Coprocessing.Router has been configured to send request bodies to coprocessors. This is a non-default configuration and must be configured intentionally by administrators.You can identify if you are impacted by reviewing your router's configuration YAML for the following config:External Coprocessing was initially made available as an experimental feature with [Router version 1.21.0](https://github.com/apollographql/router/releases/tag/v1.21.0) on 2023-06-20 and was made generally available with [Router version 1.38.0](https://github.com/apollographql/router/releases/tag/v1.38.0) on 2024-01-19. More information about the Router’s [External Coprocessing feature is available here](https://www.apollographql.com/docs/router/customizations/coprocessor).When using Native Rust Plugins:Instances of the Apollo Router running versions >=1.7.0 and <1.52.1 are impacted by a denial-of-service vulnerability if **all** of the following are true:Router has been configured to use a custom-developed Native Rust PluginThe plugin accesses `Request.router_request` in the `RouterService` layerYou are accumulating the body from `Request.router_request` into memoryTo use a plugin, you need to be running a customized Router binary. Additionally, you need to have a `plugins` section with at least one plugin defined in your Router’s configuration YAML. That plugin would also need to define a custom `router_service` method.You can check for a defined plugin by reviewing for the following in your Router’s configuration YAML:You can check for a custom `router_service` method in a plugin, by reviewing for the following function signature in your plugin’s source:More information about the Router’s [Native Rust Plugin feature is available here](https://www.apollographql.com/docs/router/customizations/native).Impact DetailIf using an impacted configuration, the Router will load entire HTTP request bodies into memory without respect to other HTTP request size-limiting configurations like `limits.http_max_request_bytes`. This can cause the Router to be out-of-memory (OOM) terminated if a sufficiently large request is sent to the Router.By default, the Router sets `limits.http_max_request_bytes` to 2 MB. More information about the Router’s [request limiting features is available here](https://www.apollographql.com/docs/router/configuration/overview/#request-limits).Patches[Apollo Router 1.52.1](https://github.com/apollographql/router/releases/tag/v1.52.1)If you have an impacted configuration as defined above, please upgrade to at least Apollo Router 1.52.1.WorkaroundsIf you cannot upgrade, you can mitigate the denial-of-service opportunity impacting External Coprocessors by setting the `coprocessor.router.request.body` configuration option to `false`. Please note that changing this configuration option will change the information sent to any coprocessors you have configured and may impact functionality implemented by those coprocessors.If you have developed a Native Rust Plugin and cannot upgrade, you can update your plugin to either not accumulate the request body or enforce a maximum body size limit.You can also mitigate this issue by limiting HTTP body payload sizes prior to the Router (e.g., in a proxy or web application firewall appliance).References[Apollo Router 1.52.1 Release Notes](https://github.com/apollographql/router/releases/tag/v1.52.1)
[External Coprocessing documentation](https://www.apollographql.com/docs/router/customizations/coprocessor)
[HTTP Request Limiting documentation](https://www.apollographql.com/docs/router/configuration/overview/#request-limits)
[Native Rust Plugin documentation](https://www.apollographql.com/docs/router/customizations/native)
|
[] | 8.7 | 7.5 | null | null | null |
CVE-2015-8005
|
MediaWiki before 1.23.11, 1.24.x before 1.24.4, and 1.25.x before 1.25.3 uses the thumbnail ImageMagick command line argument, which allows remote attackers to obtain the installation path by reading the metadata of a PNG thumbnail file.
|
[
"cpe:2.3:a:mediawiki:mediawiki:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.24.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.24.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.24.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.24.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.25.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.25.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.25.2:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-m84v-pjjq-fhh8
|
Advantech WISE-PaaS/RMM, Versions 3.3.29 and prior. XXE vulnerabilities exist that may allow disclosure of sensitive data.
|
[] | null | 7.5 | null | null | null |
|
CVE-2006-3538
|
Multiple cross-site scripting (XSS) vulnerabilities in demo.php in BeatificFaith Eprayer Alpha allow remote attackers to inject arbitrary web script or HTML via the SRC attribute of a SCRIPT element in the (1) "Your name" field and (2) "Enter Prayer Request here" field.
|
[
"cpe:2.3:a:beatificfaith:eprayer:alpha:*:*:*:*:*:*:*"
] | null | null | null | 5.8 | null |
|
CVE-2020-5967
|
NVIDIA Linux GPU Display Driver, all versions, contains a vulnerability in the UVM driver, in which a race condition may lead to a denial of service.
|
[
"cpe:2.3:o:nvidia:quadro_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:quadro:-:*:*:*:*:*:*:*",
"cpe:2.3:o:nvidia:tesla_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:tesla:-:*:*:*:*:*:*:*",
"cpe:2.3:o:nvidia:geforce_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:geforce:-:*:*:*:*:*:*:*",
"cpe:2.3:o:nvidia:nvs_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:nvs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*"
] | null | 4.7 | null | 1.9 | null |
|
RHSA-2018:1350
|
Red Hat Security Advisory: kernel security and bug fix update
|
Kernel: error in exception handling leads to DoS
|
[
"cpe:/o:redhat:rhel_aus:6.5::server"
] | null | null | 6.5 | null | null |
CVE-2024-38320
|
IBM Storage Protect for Virtual Environments: Data Protection for VMware information disclosure
|
IBM Storage Protect for Virtual Environments: Data Protection for VMware and Storage Protect Backup-Archive Client 8.1.0.0 through 8.1.23.0 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information.
|
[
"cpe:2.3:a:ibm:storage_protect_for_virtual_enviornments_data_protection_for_vmware:8.1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:storage_protect_for_virtual_enviornments_data_protection_for_vmware:8.1.23.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:storage_protect_backup_archive_client:8.1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:storage_protect_backup_archive_client:8.1.23.0:*:*:*:*:*:*:*"
] | null | 5.9 | null | null | null |
CVE-2000-0386
|
FileMaker Pro 5 Web Companion allows remote attackers to send anonymous or forged email.
|
[
"cpe:2.3:a:filemaker:filemaker:5.0:*:pro:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2025-7644
|
Pixel Gallery Addons for Elementor – Easy Grid, Creative Gallery, Drag and Drop Grid, Custom Grid Layout, Portfolio Gallery <= 1.6.7 - Authenticated (Contributor+) Stored Cross-Site Scripting
|
The Pixel Gallery Addons for Elementor – Easy Grid, Creative Gallery, Drag and Drop Grid, Custom Grid Layout, Portfolio Gallery plugin for WordPress is vulnerable to Stored Cross-Site Scripting via URLs in all widgets in all versions up to, and including, 1.6.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] | null | 6.4 | null | null | null |
CVE-2013-3060
|
The web console in Apache ActiveMQ before 5.8.0 does not require authentication, which allows remote attackers to obtain sensitive information or cause a denial of service via HTTP requests.
|
[
"cpe:2.3:a:apache:activemq:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:activemq:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:activemq:4.0:m4:*:*:*:*:*:*",
"cpe:2.3:a:apache:activemq:4.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:apache:activemq:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:activemq:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:activemq:4.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:activemq:4.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:activemq:5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:activemq:5.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:activemq:5.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:activemq:5.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:activemq:5.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:activemq:5.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:activemq:5.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:activemq:5.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:activemq:5.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:activemq:5.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:activemq:5.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:activemq:5.6.0:*:*:*:*:*:*:*"
] | null | null | null | 6.4 | null |
|
CVE-2016-9840
|
inftrees.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact by leveraging improper pointer arithmetic.
|
[
"cpe:2.3:a:zlib:zlib:*:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:a:oracle:database_server:18c:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update161:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update151:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update161:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update151:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*",
"cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*"
] | null | 8.8 | null | 6.8 | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.