id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 36
232
⌀ |
---|---|---|---|---|---|---|---|---|
CVE-2022-46059
|
AeroCMS v0.0.1 is vulnerable to Cross Site Request Forgery (CSRF).
|
[
"cpe:2.3:a:aerocms_project:aerocms:0.0.1:*:*:*:*:*:*:*"
] | null | 6.5 | null | null | null |
|
GHSA-qjqj-4cq6-6f2f
|
A remote code execution vulnerability was found in Shim. The Shim boot support trusts attacker-controlled values when parsing an HTTP response. This flaw allows an attacker to craft a specific malicious HTTP request, leading to a completely controlled out-of-bounds write primitive and complete system compromise.
|
[] | null | 8.3 | null | null | null |
|
GHSA-42m5-rf78-8h9x
|
Potential Cross-Site Scripting in ArcSight Logger versions prior to 7.3.0
|
[] | null | 6.1 | null | null | null |
|
CVE-2021-42365
|
Asgaros Forums <= 1.15.13 Authenticated Stored XSS
|
The Asgaros Forums WordPress plugin is vulnerable to Stored Cross-Site Scripting due to insufficient escaping via the name parameter found in the ~/admin/tables/admin-structure-table.php file which allowed attackers with administrative user access to inject arbitrary web scripts, in versions up to and including 1.15.13. This affects multi-site installations where unfiltered_html is disabled for administrators, and sites where unfiltered_html is disabled.
|
[
"cpe:2.3:a:asgaros:asgaros_forum:*:*:*:*:*:wordpress:*:*"
] | null | 4.8 | null | null | null |
CVE-2025-2765
|
CarlinKit CPC200-CCPA Wireless Hotspot Hard-Coded Credentials Authentication Bypass Vulnerability
|
CarlinKit CPC200-CCPA Wireless Hotspot Hard-Coded Credentials Authentication Bypass Vulnerability. This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of CarlinKit CPC200-CCPA devices. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the configuration of the wireless hotspot. The issue results from the use of hard-coded credentials. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-24349.
|
[] | null | null | 7.6 | null | null |
CVE-2023-40009
|
WordPress WP Pipes Plugin <= 1.4.0 is vulnerable to Cross Site Request Forgery (CSRF)
|
Cross-Site Request Forgery (CSRF) vulnerability in ThimPress WP Pipes plugin <= 1.4.0 versions.
|
[
"cpe:2.3:a:thimpress:wp_pipes:*:*:*:*:*:wordpress:*:*"
] | null | 5.4 | null | null | null |
CVE-2019-0204
|
A specifically crafted Docker image running under the root user can overwrite the init helper binary of the container runtime and/or the command executor in Apache Mesos versions pre-1.4.x, 1.4.0 to 1.4.2, 1.5.0 to 1.5.2, 1.6.0 to 1.6.1, and 1.7.0 to 1.7.1. A malicious actor can therefore gain root-level code execution on the host.
|
[
"cpe:2.3:a:apache:mesos:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:mesos:1.8.0:dev:*:*:*:*:*:*",
"cpe:2.3:a:redhat:fuse:7.5.0:*:*:*:*:*:*:*"
] | null | 7.8 | null | 9.3 | null |
|
GHSA-m7qq-ch2w-w47w
|
Unspecified vulnerability in the update feature in Toolbar Uninstaller 1.0.2 allows remote attackers to force the download and execution of arbitrary files via attack vectors related to a "malformed update url and a malformed update website."
|
[] | null | null | null | null | null |
|
CVE-2018-20987
|
The newsletters-lite plugin before 4.6.8.6 for WordPress has PHP object injection.
|
[
"cpe:2.3:a:tribulant:newsletters:*:*:*:*:*:wordpress:*:*"
] | null | null | 9.8 | 7.5 | null |
|
GHSA-wm4r-97wr-6vw2
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Mark kStats Reloaded allows Reflected XSS. This issue affects kStats Reloaded: from n/a through 0.7.4.
|
[] | null | 7.1 | null | null | null |
|
GHSA-h98x-wq59-p366
|
Adobe Bridge versions 13.0.4 (and earlier) and 14.0.0 (and earlier) are affected by an Access of Uninitialized Pointer vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[] | null | 3.3 | null | null | null |
|
GHSA-v45r-rj5x-hpg2
|
Cleartext Transmission of Sensitive Information in Apache CXF
|
The SymmetricBinding in Apache CXF before 2.6.13 and 2.7.x before 2.7.10, when EncryptBeforeSigning is enabled and the UsernameToken policy is set to an EncryptedSupportingToken, transmits the UsernameToken in cleartext, which allows remote attackers to obtain sensitive information by sniffing the network.
|
[] | null | null | null | null | null |
GHSA-c5qm-hvv2-h2gp
|
simple-php-captcha before commit 9d65a945029c7be7bb6bc893759e74c5636be694 allows remote attackers to automatically generate the captcha response by running the same code on the client-side.
|
[] | null | null | 5.3 | null | null |
|
GHSA-rg93-gvp9-mv6g
|
The WebLaunch functionality of Cisco AnyConnect Secure Mobility Client Software contains a vulnerability that could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the affected software. The vulnerability is due to insufficient input validation of some parameters that are passed to the WebLaunch function of the affected software. An attacker could exploit this vulnerability by convincing a user to access a malicious link or by intercepting a user request and injecting malicious code into the request. Cisco Bug IDs: CSCvf12055. Known Affected Releases: 98.89(40).
|
[] | null | null | 6.1 | null | null |
|
CVE-2024-21372
|
Windows OLE Remote Code Execution Vulnerability
|
Windows OLE Remote Code Execution Vulnerability
|
[
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | null | null |
GHSA-x4wg-qwmf-2p36
|
Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in WP Darko Responsive Pricing Table plugin <= 5.1.6 versions.
|
[] | null | 5.4 | null | null | null |
|
GHSA-jw5r-h8gx-vxc9
|
IBM QRadar 7.2 and 7.3 does not require that users should have strong passwords by default, which makes it easier for attackers to compromise user accounts. IBM X-Force ID: 119783.
|
[] | null | null | 7.5 | null | null |
|
GHSA-g75v-mhrr-qmm9
|
In the Linux kernel, the following vulnerability has been resolved:tcp_bpf: fix return value of tcp_bpf_sendmsg()When we cork messages in psock->cork, the last message triggers the
flushing will result in sending a sk_msg larger than the current
message size. In this case, in tcp_bpf_send_verdict(), 'copied' becomes
negative at least in the following case:468 case __SK_DROP:
469 default:
470 sk_msg_free_partial(sk, msg, tosend);
471 sk_msg_apply_bytes(psock, tosend);
472 *copied -= (tosend + delta); // <==== HERE
473 return -EACCES;Therefore, it could lead to the following BUG with a proper value of
'copied' (thanks to syzbot). We should not use negative 'copied' as a
return value here.------------[ cut here ]------------
kernel BUG at net/socket.c:733!
Internal error: Oops - BUG: 00000000f2000800 [#1] PREEMPT SMP
Modules linked in:
CPU: 0 UID: 0 PID: 3265 Comm: syz-executor510 Not tainted 6.11.0-rc3-syzkaller-00060-gd07b43284ab3 #0
Hardware name: linux,dummy-virt (DT)
pstate: 61400009 (nZCv daif +PAN -UAO -TCO +DIT -SSBS BTYPE=--)
pc : sock_sendmsg_nosec net/socket.c:733 [inline]
pc : sock_sendmsg_nosec net/socket.c:728 [inline]
pc : __sock_sendmsg+0x5c/0x60 net/socket.c:745
lr : sock_sendmsg_nosec net/socket.c:730 [inline]
lr : __sock_sendmsg+0x54/0x60 net/socket.c:745
sp : ffff800088ea3b30
x29: ffff800088ea3b30 x28: fbf00000062bc900 x27: 0000000000000000
x26: ffff800088ea3bc0 x25: ffff800088ea3bc0 x24: 0000000000000000
x23: f9f00000048dc000 x22: 0000000000000000 x21: ffff800088ea3d90
x20: f9f00000048dc000 x19: ffff800088ea3d90 x18: 0000000000000001
x17: 0000000000000000 x16: 0000000000000000 x15: 000000002002ffaf
x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
x11: 0000000000000000 x10: ffff8000815849c0 x9 : ffff8000815b49c0
x8 : 0000000000000000 x7 : 000000000000003f x6 : 0000000000000000
x5 : 00000000000007e0 x4 : fff07ffffd239000 x3 : fbf00000062bc900
x2 : 0000000000000000 x1 : 0000000000000000 x0 : 00000000fffffdef
Call trace:
sock_sendmsg_nosec net/socket.c:733 [inline]
__sock_sendmsg+0x5c/0x60 net/socket.c:745
____sys_sendmsg+0x274/0x2ac net/socket.c:2597
___sys_sendmsg+0xac/0x100 net/socket.c:2651
__sys_sendmsg+0x84/0xe0 net/socket.c:2680
__do_sys_sendmsg net/socket.c:2689 [inline]
__se_sys_sendmsg net/socket.c:2687 [inline]
__arm64_sys_sendmsg+0x24/0x30 net/socket.c:2687
__invoke_syscall arch/arm64/kernel/syscall.c:35 [inline]
invoke_syscall+0x48/0x110 arch/arm64/kernel/syscall.c:49
el0_svc_common.constprop.0+0x40/0xe0 arch/arm64/kernel/syscall.c:132
do_el0_svc+0x1c/0x28 arch/arm64/kernel/syscall.c:151
el0_svc+0x34/0xec arch/arm64/kernel/entry-common.c:712
el0t_64_sync_handler+0x100/0x12c arch/arm64/kernel/entry-common.c:730
el0t_64_sync+0x19c/0x1a0 arch/arm64/kernel/entry.S:598
Code: f9404463 d63f0060 3108441f 54fffe81 (d4210000)
---[ end trace 0000000000000000 ]---
|
[] | null | 5.5 | null | null | null |
|
GHSA-8f93-437m-m53h
|
SQL injection vulnerability in Cacti 0.8.6i and earlier, when register_argc_argv is enabled, allows remote attackers to execute arbitrary SQL commands via the (1) second or (2) third arguments to cmd.php. NOTE: this issue can be leveraged to execute arbitrary commands since the SQL query results are later used in the polling_items array and popen function.
|
[] | null | null | null | null | null |
|
CVE-2013-10044
|
OpenEMR ≤ 4.1.1 SQL Injection Privilege Escalation and RCE
|
An authenticated SQL injection vulnerability exists in OpenEMR ≤ 4.1.1 Patch 14 that allows a low-privileged attacker to extract administrator credentials and subsequently escalate privileges. Once elevated, the attacker can exploit an unrestricted file upload flaw to achieve remote code execution, resulting in full compromise of the application and its host system.
|
[] | 8.7 | null | null | null | null |
GHSA-3jfr-j9w4-px6x
|
In ImageMagick before 7.0.8-25, a memory leak exists in WritePSDChannel in coders/psd.c.
|
[] | null | 7.5 | null | null | null |
|
CVE-2023-32981
|
An arbitrary file write vulnerability in Jenkins Pipeline Utility Steps Plugin 2.15.2 and earlier allows attackers able to provide crafted archives as parameters to create or replace arbitrary files on the agent file system with attacker-specified content.
|
[
"cpe:2.3:a:jenkins:pipeline_utility_steps:*:*:*:*:*:jenkins:*:*"
] | null | 8.8 | null | null | null |
|
CVE-2023-37900
|
Crossplane vulnerable to denial of service from large image
|
Crossplane is a framework for building cloud native control planes without needing to write code. In versions prior to 1.11.5, 1.12.3, and 1.13.0, a high-privileged user could create a Package referencing an arbitrarily large image containing that Crossplane would then parse, possibly resulting in exhausting all the available memory and therefore in the container being OOMKilled. The impact is limited due to the high privileges required to be able to create the Package and the eventually consistency nature of controller. This issue is fixed in versions 1.11.5, 1.12.3, and 1.13.0.
|
[
"cpe:2.3:a:cncf:crossplane:*:*:*:*:*:*:*:*"
] | null | 3.4 | null | null | null |
GHSA-7m84-rrgp-r594
|
Adobe Flash Player before 10.3.183.86 and 11.x before 11.7.700.202 on Windows and Mac OS X, before 10.3.183.86 and 11.x before 11.2.202.285 on Linux, before 11.1.111.54 on Android 2.x and 3.x, and before 11.1.115.58 on Android 4.x; Adobe AIR before 3.7.0.1860; and Adobe AIR SDK & Compiler before 3.7.0.1860 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-2728, CVE-2013-3324, CVE-2013-3325, CVE-2013-3326, CVE-2013-3327, CVE-2013-3328, CVE-2013-3329, CVE-2013-3330, CVE-2013-3332, CVE-2013-3333, CVE-2013-3334, and CVE-2013-3335.
|
[] | null | null | null | null | null |
|
GHSA-vcrj-h233-mj6m
|
The AXN-NET Ethernet module accessory 3.04 for the Accuenergy Acuvim II allows remote attackers to discover passwords and modify settings via vectors involving JavaScript.
|
[] | null | null | null | null | null |
|
GHSA-7w34-327x-439v
|
Unspecified vulnerability in the Drag Drop Mass Upload (ameos_dragndropupload) extension 2.0.2 and earlier for TYPO3 allows remote attackers to upload arbitrary files via unknown vectors.
|
[] | null | null | null | null | null |
|
CVE-2021-26589
|
A potential security vulnerability has been identified in HPE Superdome Flex Servers. The vulnerability could be remotely exploited to allow Cross Site Scripting (XSS) because the Session Cookie is missing an HttpOnly Attribute. HPE has provided a firmware update to resolve the vulnerability in HPE Superdome Flex Servers.
|
[
"cpe:2.3:o:hpe:superdome_flex_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:superdome_flex:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hpe:superdome_flex_280_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:superdome_flex_280:-:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 | null |
|
CVE-2025-0223
|
IObit Protected Folder IOCTL IURegistryFilter.sys 0x8001E010 null pointer dereference
|
A vulnerability was found in IObit Protected Folder up to 13.6.0.5. It has been classified as problematic. Affected is the function 0x8001E000/0x8001E00C/0x8001E004/0x8001E010 in the library IURegistryFilter.sys of the component IOCTL Handler. The manipulation leads to null pointer dereference. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
|
[] | 6.8 | 5.5 | 5.5 | 4.6 | null |
CVE-2021-33945
|
RICOH Printer series SP products 320DN, SP 325DNw, SP 320SN, SP 320SFN, SP 325SNw, SP 325SFNw, SP 330SN, Aficio SP 3500SF, SP 221S, SP 220SNw, SP 221SNw, SP 221SF, SP 220SFNw, SP 221SFNw v1.06 were discovered to contain a stack buffer overflow in the file /etc/wpa_supplicant.conf. This vulnerability allows attackers to cause a Denial of Service (DoS) via crafted overflow data.
|
[
"cpe:2.3:o:ricoh:sp_320dn_firmware:1.06:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:sp_320dn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:sp_325dnw_firmware:1.06:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:sp_325dnw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:sp_320sn_firmware:1.06:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:sp_320sn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:sp_320sfn_firmware:1.06:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:sp_320sfn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:sp_325snw_firmware:1.06:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:sp_325snw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:sp_325sfnw_firmware:1.06:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:sp_325sfnw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:sp_330sn_firmware:1.06:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:sp_330sn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:aficio_sp_3500sf_firmware:1.06:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:aficio_sp_3500sf:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:sp_221s_firmware:1.06:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:sp_221s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:sp_220snw_firmware:1.06:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:sp_220snw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:sp_221snw_firmware:1.06:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:sp_221snw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:sp_221sf_firmware:1.06:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:sp_221sf:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:sp_220sfnw_firmware:1.06:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:sp_220sfnw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:sp_221sfnw_firmware:1.06:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:sp_221sfnw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:m_c2000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:m_c2000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:m_c250fwb_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:m_c250fwb:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:m_c250fw_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:m_c250fw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:sp_c260sfnw_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:sp_c260sfnw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:sp_c262sfnw_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:sp_c262sfnw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:sp_c261sfnw_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:sp_c261sfnw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:sp_c250sf_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:sp_c250sf:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:sp_c252sf_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:sp_c252sf:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:p_c300w_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:p_c300w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:p_c301w_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:p_c301w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:sp_c260dnw_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:sp_c260dnw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:sp_c262dnw_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:sp_c262dnw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:sp_c261dnw_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:sp_c261dnw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:sp_c250dn_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:sp_c250dn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:sp_c252dn_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:sp_c252dn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:m_320_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:m_320:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:m_320fb_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:m_320fb:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:m_320f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:m_320f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:m_2700_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:m_2700:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:m_2701_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:m_2701:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:sp_330sn_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:sp_330sfn_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:sp_330sfn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:sp_3710sf_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:sp_3710sf:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:sp_220snw_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:sp_221snw_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:sp_220sfnw_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:sp_221sfnw_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:sp_277snwx_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:sp_277snwx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:sp_277sfnwx_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:sp_277sfnwx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:sp_325snw_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:sp_325sfnw_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:sp_377snwx_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:sp_377snwx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:sp_377sfnwx_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:sp_377sfnwx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:sp_212sfnw_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:sp_212sfnw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:sp_212sfw_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:sp_212sfw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:sp_212snw_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:sp_212snw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:sp_212suw_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:sp_212suw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:sp_213sfnw_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:sp_213sfnw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:sp_213sfw_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:sp_213sfw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:sp_213snw_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:sp_213snw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:sp_213suw_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:sp_213suw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:sp_311sfnw_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:sp_311sfnw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:sp_310sfnw_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:sp_310sfnw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:sp_312sfnw_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:sp_312sfnw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:p_310_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:p_310:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:p_311_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:p_311:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:sp_330dn_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:sp_330dn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:sp_3710dn_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:sp_3710dn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:sp_220nw_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:sp_220nw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:sp_221nw_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:sp_221nw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:sp_277nwx_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:sp_277nwx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:sp_325dnw_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:sp_377dnwx_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:sp_377dnwx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:sp_212nw_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:sp_212nw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:sp_212w_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:sp_212w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:sp_213nw_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:sp_213nw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:sp_213w_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:sp_213w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:sp_311dnw_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:sp_311dnw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:sp_310dnw_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:sp_310dnw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ricoh:sp_312dnw_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ricoh:sp_312dnw:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 | null |
|
RHSA-2025:12525
|
Red Hat Security Advisory: kernel-rt security update
|
kernel: writeback: avoid use-after-free after removing device kernel: media: uvcvideo: Fix double free in error path kernel: wifi: iwlwifi: limit printed string from FW file kernel: ext4: avoid journaling sb update on error if journal is destroying kernel: ext4: fix off-by-one error in do_split kernel: mm/huge_memory: fix dereferencing invalid pmd migration entry
|
[
"cpe:/a:redhat:rhel_e4s:9.0::nfv",
"cpe:/a:redhat:rhel_e4s:9.0::realtime"
] | null | 4.7 | null | null | null |
GHSA-2xg4-3vp8-p43f
|
upload_template() in system/changeskin.php in DocCms 2016.5.12 allows remote attackers to execute arbitrary PHP code via a template file.
|
[] | null | null | 9.8 | null | null |
|
CVE-2013-6171
|
checkpassword-reply in Dovecot before 2.2.7 performs setuid operations to a user who is authenticating, which allows local users to bypass authentication and access virtual email accounts by attaching to the process and using a restricted file descriptor to modify account information in the response to the dovecot-auth server.
|
[
"cpe:2.3:a:dovecot:dovecot:*:*:*:*:*:*:*:*",
"cpe:2.3:a:dovecot:dovecot:2.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:dovecot:dovecot:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:dovecot:dovecot:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:dovecot:dovecot:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:dovecot:dovecot:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:dovecot:dovecot:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:dovecot:dovecot:2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:dovecot:dovecot:2.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:dovecot:dovecot:2.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:dovecot:dovecot:2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:dovecot:dovecot:2.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:dovecot:dovecot:2.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:dovecot:dovecot:2.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:dovecot:dovecot:2.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:dovecot:dovecot:2.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:dovecot:dovecot:2.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:dovecot:dovecot:2.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:dovecot:dovecot:2.1:rc1:*:*:*:*:*:*",
"cpe:2.3:a:dovecot:dovecot:2.1:rc2:*:*:*:*:*:*",
"cpe:2.3:a:dovecot:dovecot:2.1:rc3:*:*:*:*:*:*",
"cpe:2.3:a:dovecot:dovecot:2.1:rc5:*:*:*:*:*:*",
"cpe:2.3:a:dovecot:dovecot:2.1:rc6:*:*:*:*:*:*",
"cpe:2.3:a:dovecot:dovecot:2.1:rc7:*:*:*:*:*:*",
"cpe:2.3:a:dovecot:dovecot:2.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:dovecot:dovecot:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:dovecot:dovecot:2.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:dovecot:dovecot:2.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:dovecot:dovecot:2.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:dovecot:dovecot:2.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:dovecot:dovecot:2.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:dovecot:dovecot:2.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:dovecot:dovecot:2.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:dovecot:dovecot:2.1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:dovecot:dovecot:2.1.12:*:*:*:*:*:*:*",
"cpe:2.3:a:dovecot:dovecot:2.1.13:*:*:*:*:*:*:*",
"cpe:2.3:a:dovecot:dovecot:2.1.14:*:*:*:*:*:*:*",
"cpe:2.3:a:dovecot:dovecot:2.1.15:*:*:*:*:*:*:*",
"cpe:2.3:a:dovecot:dovecot:2.2:rc1:*:*:*:*:*:*",
"cpe:2.3:a:dovecot:dovecot:2.2:rc2:*:*:*:*:*:*",
"cpe:2.3:a:dovecot:dovecot:2.2:rc3:*:*:*:*:*:*",
"cpe:2.3:a:dovecot:dovecot:2.2:rc4:*:*:*:*:*:*",
"cpe:2.3:a:dovecot:dovecot:2.2:rc5:*:*:*:*:*:*",
"cpe:2.3:a:dovecot:dovecot:2.2:rc6:*:*:*:*:*:*",
"cpe:2.3:a:dovecot:dovecot:2.2:rc7:*:*:*:*:*:*",
"cpe:2.3:a:dovecot:dovecot:2.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:dovecot:dovecot:2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:dovecot:dovecot:2.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:dovecot:dovecot:2.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:dovecot:dovecot:2.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:dovecot:dovecot:2.2.5:*:*:*:*:*:*:*"
] | null | null | null | 5.8 | null |
|
CVE-2020-4039
|
Directory Traversal Vulnerability in SUSI.AI Server
|
SUSI.AI is an intelligent Open Source personal assistant. SUSI.AI Server before version d27ed0f has a directory traversal vulnerability due to insufficient input validation. Any admin config and file readable by the app can be retrieved by the attacker. Furthermore, some files can also be moved or deleted.
|
[
"cpe:2.3:a:fossasia:susi.ai:*:*:*:*:*:*:*:*"
] | null | 8.6 | null | null | null |
CVE-2024-33939
|
WordPress LMS by Masteriyo plugin <= 1.7.3 - Broken Authentication vulnerability
|
Authentication Bypass Using an Alternate Path or Channel vulnerability in Masteriyo Masteriyo - LMS. Unauth access to course progress.This issue affects Masteriyo - LMS: from n/a through 1.7.3.
|
[] | null | 5.3 | null | null | null |
GHSA-hr7p-jmcg-rv72
|
The Sugar Calendar – Simple Event Management plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg & remove_query_arg without appropriate escaping on the URL in all versions up to, and including, 3.3.0. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
|
[] | null | 6.1 | null | null | null |
|
CVE-2005-3569
|
INSO service in IBM DB2 Content Manager before 8.2 Fix Pack 10 on AIX allows attackers to cause a denial of service (application crash) via unknown attack vectors involving LZH files.
|
[
"cpe:2.3:a:ibm:db2_content_manager:8.2:*:fp1:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_content_manager:8.2:*:fp2:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_content_manager:8.2:*:fp3:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_content_manager:8.2:*:fp4:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_content_manager:8.2:*:fp5:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_content_manager:8.2:*:fp6:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_content_manager:8.2:*:fp7:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_content_manager:8.2:*:fp8:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_content_manager:8.2:*:fp9:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-7xpj-h3mq-wxqm
|
Missing Authorization vulnerability in czater Czater.pl – live chat i telefon allows Cross Site Request Forgery. This issue affects Czater.pl – live chat i telefon: from n/a through 1.0.5.
|
[] | null | 7.1 | null | null | null |
|
GHSA-xj7w-r753-vj8v
|
Exposure of vSphere's CPI and CSI credentials in Rancher
|
ImpactA vulnerability has been identified in the way that Rancher stores vSphere's CPI (Cloud Provider Interface) and CSI (Container Storage Interface) credentials used to deploy clusters through the vSphere cloud provider. This issue leads to the vSphere CPI and CSI passwords being stored in a plaintext object inside Rancher. This vulnerability is only applicable to users that deploy clusters in vSphere environments.The exposed passwords were accessible in the following objects:Can be accessed by users that are cluster members of the provisioned clusters:When provisioning a new cluster with the vSphere cloud provider through Rancher's UI (user interface), Cluster Templates and Terraform on the object `provisioning.cattle.io` in `spec.rkeConfig.chartValues.rancher-vsphere-cpi` and `spec.rkeConfig.chartValues.rancher-vsphere-csi`.On the object `rke.cattle.io.rkecontrolplane` in `spec.chartValues.rancher-vsphere-cpi` and `spec.chartValues.rancher-vsphere-csi`.Can be accessed by users with privileged access to the clusters' infrastructure (host OS):Inside the `plan` files in the provisioned downstream clusters' filesystems.**Note:** if you believe that the vSphere credentials might have been accessed by unauthorized users, it's highly recommended to change them, after updating Rancher to a patched version.Please consult the associated [MITRE ATT&CK - Technique - Credential Access](https://attack.mitre.org/tactics/TA0006/) for further information about this category of attack.PatchesPatched versions include Rancher releases **2.8.9 and 2.9.3**.After updating your environment to one of the patched Rancher's versions, it's mandatory to execute [this script](https://github.com/rancherlabs/support-tools/tree/master/migrate-vsphere-clusters) that provides an automated way to mitigate any vulnerable leftover vSphere clusters' credentials within Rancher's local cluster. This script doesn't need to be executed in case you are installing a fresh and new environment.The script will fetch all objects in Rancher's local cluster, loops through them, if the affected vSphere charts are present, then it extracts the `username` and `password` parameters into a secret in the `fleet-default` namespace for both with the appropriate annotation to synchronize them to the downstream clusters. Finally, it updates the cluster's `chartValues` to reference those secrets rather than existing plaintext values.The script confirms on write operations, as well as backs up configurations of the cluster objects before operating so rolling back is simple.To run the script, fetch the `kubeconfig` for your local cluster and run with `KUBECONFIG=/path/to/kubeconfig.yml bash migrate.sh`. The script is idempotent and can be run multiple times safely if you want to validate just one at a time.**Notes:**The [feature flag](https://ranchermanager.docs.rancher.com/getting-started/installation-and-upgrade/installation-references/feature-flags) `provisioningprebootstrap` must be enabled after updating to one of the patched versions. This feature flag is also mandatory when installing a new cluster.**Rancher 2.7 release line is not receiving a backport security patch for this vulnerability.** For users running Rancher 2.7 with vSphere provisioning and that are concerned with this security issue, the recommendation is to update Rancher to one of the patched versions by following the standard update procedure based on the 2.7 version that is being used. Refer to the release notes for the proper update process for [2.8.9](https://github.com/rancher/rancher/releases/tag/v2.8.9) and [2.9.3](https://github.com/rancher/rancher/releases/tag/v2.9.3).WorkaroundsBesides only granting access to Rancher to trusted users and not allowing direct access to untrusted users to the clusters' infrastructure, there is no direct workaround for this security issue, except updating Rancher to one of the patched versions.ReferencesIf you have any questions or comments about this advisory:Reach out to the [SUSE Rancher Security team](https://github.com/rancher/rancher/security/policy) for security related inquiries.Open an issue in the [Rancher](https://github.com/rancher/rancher/issues/new/choose) repository.Verify with our [support matrix](https://www.suse.com/suse-rancher/support-matrix/all-supported-versions/) and [product support lifecycle](https://www.suse.com/lifecycle/).
|
[] | 8.5 | 9.1 | null | null | null |
GHSA-p3w4-g6w7-3v89
|
Tungsten Automation Power PDF JPF File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Tungsten Automation Power PDF. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of JPF files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-25560.
|
[] | null | null | 7.8 | null | null |
|
GHSA-xx49-72mm-f757
|
Windows NT 4.0 beta allows users to read and delete shares.
|
[] | null | null | null | null | null |
|
GHSA-pggf-4mfg-vr7g
|
HTTP File Server (HFS) before 2.2c allows remote attackers to append arbitrary text to the log file by using the base64 representation of this text during HTTP Basic Authentication.
|
[] | null | null | null | null | null |
|
CVE-2014-3015
|
Cross-site request forgery (CSRF) vulnerability in the Web player in IBM Sametime Proxy Server and Web Client 9.0 through 9.0.0.1 allows remote attackers to hijack the authentication of arbitrary users for requests that insert XSS sequences.
|
[
"cpe:2.3:a:ibm:sametime_proxy_server_and_web_client:9.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:sametime_proxy_server_and_web_client:9.0.0.1:*:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
CVE-2017-17635
|
MLM Forex Market Plan Script 2.0.4 has SQL Injection via the news_detail.php newid parameter or the event_detail.php eventid parameter.
|
[
"cpe:2.3:a:mlm_forex_market_plan_script_project:mlm_forex_market_plan_script:2.0.4:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 | null |
|
ICSA-19-225-01
|
Delta Industrial Automation DOPSoft
|
Processing a specially crafted project file may trigger multiple out-of-bounds read vulnerabilities, which may allow information disclosure, remote code execution, or crash of the application.CVE-2019-13513 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). Processing a specially crafted project file may trigger a use-after-free vulnerability, which may allow information disclosure, remote code execution, or crash of the application.CVE-2019-13514 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).
|
[] | null | null | 7.8 | null | null |
CVE-2012-6147
|
Cross-site scripting (XSS) vulnerability in the tree render API (TCA-Tree) in the Backend API in TYPO3 4.5.x before 4.5.21, 4.6.x before 4.6.14, and 4.7.x before 4.7.6 allows remote authenticated backend users to inject arbitrary web script or HTML via unspecified vectors.
|
[
"cpe:2.3:a:typo3:typo3:4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.5.8:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.5.9:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.5.10:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.5.11:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.5.12:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.5.13:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.5.14:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.5.15:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.5.16:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.5.17:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.5.18:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.5.19:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.5.20:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.6.7:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.6.8:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.6.9:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.6.10:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.6.11:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.6.12:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.6.13:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.7.5:*:*:*:*:*:*:*"
] | null | null | null | 3.5 | null |
|
CVE-2007-1863
|
cache_util.c in the mod_cache module in Apache HTTP Server (httpd), when caching is enabled and a threaded Multi-Processing Module (MPM) is used, allows remote attackers to cause a denial of service (child processing handler crash) via a request with the (1) s-maxage, (2) max-age, (3) min-fresh, or (4) max-stale Cache-Control headers without a value.
|
[
"cpe:2.3:o:apple:mac_os_x_server:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.1.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.1.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.2.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.2.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.2.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.2.6:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.2.7:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.2.8:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.3.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.3.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.3.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.3.6:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.3.7:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.3.8:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.3.9:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.6:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.7:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.8:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.9:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
CVE-2013-1872
|
The Intel drivers in Mesa 8.0.x and 9.0.x allow context-dependent attackers to cause a denial of service (reachable assertion and crash) and possibly execute arbitrary code via vectors involving 3d graphics that trigger an out-of-bounds array access, related to the fs_visitor::remove_dead_constants function. NOTE: this issue might be related to CVE-2013-0796.
|
[
"cpe:2.3:a:mesa3d:mesa:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mesa3d:mesa:9.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mesa3d:mesa:9.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mesa3d:mesa:9.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mesa3d:mesa:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mesa3d:mesa:8.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mesa3d:mesa:8.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mesa3d:mesa:8.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mesa3d:mesa:8.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mesa3d:mesa:8.0.5:*:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
GHSA-hmm6-p5gh-p2h9
|
Microsoft SQL Server Integration Service (VS extension) Remote Code Execution Vulnerability
|
[] | null | 7.3 | null | null | null |
|
CVE-2020-9006
|
The Popup Builder plugin 2.2.8 through 2.6.7.6 for WordPress is vulnerable to SQL injection (in the sgImportPopups function in sg_popup_ajax.php) via PHP Deserialization on attacker-controlled data with the attachmentUrl POST variable. This allows creation of an arbitrary WordPress Administrator account, leading to possible Remote Code Execution because Administrators can run PHP code on Wordpress instances. (This issue has been fixed in the 3.x branch of popup-builder.)
|
[
"cpe:2.3:a:sygnoos:popup_builder:*:*:*:*:*:wordpress:*:*"
] | null | 9.8 | null | 7.5 | null |
|
CVE-2024-49665
|
WordPress Web Bricks Addons for Elementor plugin <= 1.1.1 - Stored Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Web Bricks Web Bricks Addons for Elementor allows Stored XSS.This issue affects Web Bricks Addons for Elementor: from n/a through 1.1.1.
|
[
"cpe:2.3:a:webbricks:web_bricks_addons:*:*:*:*:*:wordpress:*:*"
] | null | 6.5 | null | null | null |
GHSA-p88h-866g-7w72
|
ecrire/public/assembler.php in SPIP before 4.1.3 and 4.2.x before 4.2.7 allows XSS because input from _request() is not restricted to safe characters such as alphanumerics.
|
[] | null | 6.1 | null | null | null |
|
GHSA-5qrx-9vpc-57pm
|
The Bluetooth subsystem in QEMU mishandles negative values for length variables, leading to memory corruption.
|
[] | null | 5.7 | null | null | null |
|
GHSA-jvhm-gjrh-3h93
|
Nuxt allows DOS via cache poisoning with payload rendering response
|
SummaryBy sending a crafted HTTP request to a server behind an CDN, it is possible in some circumstances to poison the CDN cache and highly impacts the availability of a site.It is possible to craft a request, such as `https://mysite.com/?/_payload.json` which will be rendered as JSON. If the CDN in front of a Nuxt site ignores the query string when determining whether to cache a route, then this JSON response could be served to future visitors to the site.ImpactAn attacker can perform this attack to a vulnerable site in order to make a site unavailable indefinitely. It is also possible in the case where the cache will be reset to make a small script to send a request each X seconds (=caching duration) so that the cache is permanently poisoned making the site completely unavailable.Conclusion :This is similar to a vulnerability in Next.js that resulted in CVE-2024-46982 (and see [this article](https://zhero-web-sec.github.io/research-and-things/nextjs-cache-and-chains-the-stale-elixir), in particular the "Internal URL parameter and pageProps" part, the latter being very similar to the one concerning us here.)
|
[] | null | 7.5 | null | null | null |
GHSA-9q5f-7fh4-3hgx
|
PHP remote file inclusion vulnerability in koesubmit.php in the koeSubmit (com_koesubmit) component 1.0 for Mambo allows remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter.
|
[] | null | null | null | null | null |
|
CVE-2022-27874
|
Improper authentication in some Intel(R) XMM(TM) 7560 Modem software before version M2_7560_R_01.2146.00 may allow a privileged user to potentially enable escalation of privilege via physical access.
|
[
"cpe:2.3:o:intel:xmm_7560_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xmm_7560:m.2:*:*:*:*:*:*:*"
] | null | 6.8 | null | null | null |
|
GHSA-f9wh-r74m-7mrv
|
IBM Lenovo firmware 7CETB5WW 2.05 stores pre-boot authentication passwords in the BIOS Keyboard buffer and does not clear this buffer after use, which allows local users to obtain sensitive information by reading the physical memory locations associated with this buffer.
|
[] | null | null | null | null | null |
|
CVE-2020-7126
|
A remote server-side request forgery (ssrf) vulnerability was discovered in Aruba Airwave Software version(s): Prior to 1.3.2.
|
[
"cpe:2.3:a:arubanetworks:airwave_glass:*:*:*:*:*:*:*:*"
] | null | 5.8 | null | 5 | null |
|
GHSA-fgm5-wx7c-v696
|
Search Guard versions before 24.3 had an issue when Cross Cluster Search (CCS) was enabled, authenticated users are always authorized on the local cluster ignoring their roles on the remote cluster(s).
|
[] | null | null | null | null | null |
|
CVE-2021-28963
|
Shibboleth Service Provider before 3.2.1 allows content injection because template generation uses attacker-controlled parameters.
|
[
"cpe:2.3:a:shibboleth:service_provider:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
] | null | 5.3 | null | 5 | null |
|
GHSA-gw44-f6p9-qmm4
|
Directory traversal vulnerability in AFP Server in Apple Mac OS X 10.5.8 and 10.6.x before 10.6.5 allows remote authenticated users to execute arbitrary code by creating files that are outside the bounds of a share.
|
[] | null | null | null | null | null |
|
CVE-2008-7198
|
Multiple unspecified vulnerabilities in phpns before 2.1.1beta1 have unknown impact and attack vectors.
|
[
"cpe:2.3:a:alecwh:phpns:*:*:*:*:*:*:*:*",
"cpe:2.3:a:alecwh:phpns:2.1.1_b1:*:*:*:*:*:*:*",
"cpe:2.3:a:alecwh:phpns:2.1.1alpha1_b1:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
CVE-2023-48710
|
iTop limit pages/exec.php script to PHP files
|
iTop is an IT service management platform. Files from the `env-production` folder can be retrieved even though they should have restricted access. Hopefully, there is no sensitive files stored in that folder natively, but there could be from a third-party module.
The `pages/exec.php` script as been fixed to limit execution of PHP files only. Other file types won't be retrieved and exposed. The vulnerability is fixed in 2.7.10, 3.0.4, 3.1.1, and 3.2.0.
|
[
"cpe:2.3:a:combodo:itop:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
CVE-2024-51377
|
An issue in Ladybird Web Solution Faveo Helpdesk & Servicedesk (On-Premise and Cloud) 9.2.0 allows a remote attacker to execute arbitrary code via the Subject and Identifier fields
|
[
"cpe:2.3:a:ladybirdweb:faveo_helpdesk:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ladybirdweb:faveo_helpdesk:9.2.0:*:*:*:*:*:*:*"
] | null | 8.8 | null | null | null |
|
GHSA-9ppr-hv62-39w2
|
Palo Alto Networks PAN-OS before 6.1.19, 7.0.x before 7.0.19, 7.1.x before 7.1.14, and 8.0.x before 8.0.6 allows remote attackers to execute arbitrary code via vectors involving the management interface.
|
[] | null | null | 9.8 | null | null |
|
GHSA-w58p-9fj9-w99w
|
admin/infolist_add.php in PHPMyWind 5.6 has stored XSS.
|
[] | null | null | null | null | null |
|
CVE-2016-8691
|
The jpc_dec_process_siz function in libjasper/jpc/jpc_dec.c in JasPer before 1.900.4 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted XRsiz value in a BMP image to the imginfo command.
|
[
"cpe:2.3:a:jasper_project:jasper:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:25:*:*:*:*:*:*:*"
] | null | null | 5.5 | 4.3 | null |
|
CVE-2023-1049
|
A CWE-94: Improper Control of Generation of Code ('Code Injection') vulnerability exists that
could cause execution of malicious code when an unsuspicious user loads a project file from the
local filesystem into the HMI.
|
[
"cpe:2.3:a:schneider-electric:ecostruxure_operator_terminal_expert:*:*:*:*:*:*:*:*",
"cpe:2.3:a:schneider-electric:ecostruxure_operator_terminal_expert:3.3:-:*:*:*:*:*:*",
"cpe:2.3:a:schneider-electric:ecostruxure_operator_terminal_expert:3.3:sp1:*:*:*:*:*:*",
"cpe:2.3:a:schneider-electric:pro-face_blue:*:*:*:*:*:*:*:*",
"cpe:2.3:a:schneider-electric:pro-face_blue:3.3:-:*:*:*:*:*:*",
"cpe:2.3:a:schneider-electric:pro-face_blue:3.3:sp1:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
|
ICSA-17-278-02
|
Siemens 7KT PAC1200 Data Manager
|
The integrated web server (Port 80/TCP) of the affected devices could allow an unauthenticated remote attacker to perform administrative operations over the network.CVE-2017-9944 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
|
[] | null | null | 9.8 | null | null |
GHSA-px9v-f56w-8qv4
|
The websimon-tables plugin through 1.3.4 for WordPress has wp-admin/tools.php edit_style id XSS.
|
[] | null | null | null | null | null |
|
GHSA-2hgm-xvx6-w372
|
Netwrix Password Secure through 9.2 allows command injection.
|
[] | null | 9.8 | null | null | null |
|
CVE-2001-0745
|
Netscape 4.7x allows remote attackers to obtain sensitive information such as the user's login, mailbox location and installation path via Javascript that accesses the mailbox: URL in the document.referrer property.
|
[
"cpe:2.3:a:netscape:messanger:4.7x:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-pj3p-g86x-695g
|
Multiple SQL injection vulnerabilities in photogallery.php in PHP-Fusion allow remote attackers to execute arbitrary SQL commands via the (1) album and (2) photo parameters.
|
[] | null | null | null | null | null |
|
CVE-2010-0248
|
Microsoft Internet Explorer 6, 6 SP1, 7, and 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, leading to memory corruption, aka "HTML Object Memory Corruption Vulnerability."
|
[
"cpe:2.3:a:microsoft:ie:6:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:ie:6:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:ie:7:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:ie:8:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:8.0.6001:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:*:x32:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:*:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:r2:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:r2:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x32:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:*:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:7.0.5730:unknown:gold:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:7.0.5730.11:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:7.00.5730.1100:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:7.00.6000.16386:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:7.00.6000.16441:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:6:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:6:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:6.00.2462.0000:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:6.00.2479.0006:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:6.0.2600:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:6.00.2600.0000:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:6.0.2800:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:6.0.2800.1106:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:6.00.2800.1106:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:6.0.2900:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:6.0.2900.2180:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:6.00.2900.2180:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:6.00.3663.0000:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:6.00.3718.0000:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:6.00.3790.0000:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:6.00.3790.1830:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:6.00.3790.3959:*:*:*:*:*:*:*"
] | null | 8.1 | null | 9.3 | null |
|
RHSA-2003:086
|
Red Hat Security Advisory: : : : Updated file packages fix vulnerability
|
security flaw
|
[
"cpe:/o:redhat:linux:6.2",
"cpe:/o:redhat:linux:7.0",
"cpe:/o:redhat:linux:7.1",
"cpe:/o:redhat:linux:7.2",
"cpe:/o:redhat:linux:7.3",
"cpe:/o:redhat:linux:8.0"
] | null | null | null | null | null |
CVE-2016-3375
|
The OLE Automation mechanism and VBScript scripting engine in Microsoft Internet Explorer 9 through 11, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold, 1511, and 1607 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Scripting Engine Memory Corruption Vulnerability."
|
[
"cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*"
] | null | null | 7.5 | 7.6 | null |
|
GHSA-mfv3-pwqp-278q
|
Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to a buffer overflow. An attacker can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the set_qos function with the dest variable.
|
[] | null | 7.2 | null | null | null |
|
PYSEC-2016-40
| null |
Tryton 3.x before 3.2.17, 3.4.x before 3.4.14, 3.6.x before 3.6.12, 3.8.x before 3.8.8, and 4.x before 4.0.4 allow remote authenticated users to discover user password hashes via unspecified vectors.
|
[] | null | null | 5.3 | null | null |
CVE-2017-3896
|
Unvalidated parameter vulnerability in the remote log viewing capability in Intel Security McAfee Agent 5.0.x versions prior to 5.0.4.449 allows remote attackers to pass unexpected input parameters via a URL that was not completely validated.
|
[
"cpe:2.3:a:mcafee:mcafee_agent:5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:mcafee_agent:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:mcafee_agent:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:mcafee_agent:5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:mcafee_agent:5.0.4:*:*:*:*:*:*:*"
] | null | null | 5.9 | 4.3 | null |
|
GHSA-546p-247r-9672
|
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in Bolt CMS 3.7.1. It has been rated as problematic. This issue affects some unknown processing of the file /preview/page of the component Entry Preview Handler. The manipulation of the argument body leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-273167. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed that the affected release tree is end-of-life.
|
[] | 5.3 | 3.5 | null | null | null |
|
GHSA-6c7w-5xfj-j2mc
|
heap-buffer-overflow in mrb_vm_exec in mruby/mruby in GitHub repository mruby/mruby prior to 3.2. Possible arbitrary code execution if being exploited.
|
[] | null | 9.8 | null | null | null |
|
GHSA-jm7r-f6v6-6cpx
|
The Duplicate Page WordPress plugin through 4.4.2 does not sanitise or escape the Duplicate Post Suffix settings before outputting it, which could allow high privilege users to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.
|
[] | null | null | null | null | null |
|
GHSA-92ww-86qp-x82q
|
Tinxy WiFi Lock Controller v1 RF was discovered to store users' sensitive information, including credentials and mobile phone numbers, in plaintext.
|
[] | null | 7.5 | null | null | null |
|
GHSA-h92q-7rp5-87xc
|
MiniTool Partition Wizard 12.8 contains an insecure installation mechanism that allows attackers to achieve remote code execution through a man in the middle attack.
|
[] | null | 8.1 | null | null | null |
|
GHSA-qpcp-22v6-2253
|
Heap-based buffer overflow in the SetConnectInfo function in the WESPPTZ.WESPPTZCtrl.1 ActiveX control in WebGate eDVR Manager allows remote attackers to execute arbitrary code via crafted arguments.
|
[] | null | null | null | null | null |
|
CVE-2024-24819
|
icingaweb2-module-incubator base implementation for HTML forms is susceptible to CSRF
|
icingaweb2-module-incubator is a working project of bleeding edge Icinga Web 2 libraries. In affected versions the class `gipfl\Web\Form` is the base for various concrete form implementations [1] and provides protection against cross site request forgery (CSRF) by default. This is done by automatically adding an element with a CSRF token to any form, unless explicitly disabled, but even if enabled, the CSRF token (sent during a client's submission of a form relying on it) is not validated. This enables attackers to perform changes on behalf of a user which, unknowingly, interacts with a prepared link or website. The version 0.22.0 is available to remedy this issue. Users are advised to upgrade. There are no known workarounds for this vulnerability.
|
[
"cpe:2.3:a:icinga:icingaweb2-module-incubator:*:*:*:*:*:*:*:*"
] | null | 5.3 | null | null | null |
GHSA-5837-3xvj-5g8r
|
A flaw was found in Undertow. A potential security issue in flow control handling by the browser over HTTP/2 may cause overhead or a denial of service in the server. This flaw exists because of an incomplete fix for CVE-2021-3629.
|
[] | null | 7.5 | null | null | null |
|
CVE-2021-29875
|
IBM InfoSphere Information Server 11.7 could allow an attacker to obtain sensitive information due to a insecure third party domain access vulnerability. IBM X-Force ID: 206572.
|
[
"cpe:2.3:a:ibm:infosphere_information_server:11.7:*:*:*:*:*:*:*"
] | null | null | 5.9 | null | null |
|
CVE-2018-15865
|
The Pulse Secure Desktop (macOS) has a Privilege Escalation Vulnerability.
|
[
"cpe:2.3:a:pulsesecure:pulse_secure_desktop_client:5.1r1.0:*:*:*:*:macos:*:*",
"cpe:2.3:a:pulsesecure:pulse_secure_desktop_client:5.1r1.1:*:*:*:*:macos:*:*",
"cpe:2.3:a:pulsesecure:pulse_secure_desktop_client:5.1r2.0:*:*:*:*:macos:*:*",
"cpe:2.3:a:pulsesecure:pulse_secure_desktop_client:5.1r3.0:*:*:*:*:macos:*:*",
"cpe:2.3:a:pulsesecure:pulse_secure_desktop_client:5.1r3.1:*:*:*:*:macos:*:*",
"cpe:2.3:a:pulsesecure:pulse_secure_desktop_client:5.1r3.2:*:*:*:*:macos:*:*",
"cpe:2.3:a:pulsesecure:pulse_secure_desktop_client:5.1r4.0:*:*:*:*:macos:*:*",
"cpe:2.3:a:pulsesecure:pulse_secure_desktop_client:5.1r5.0:*:*:*:*:macos:*:*",
"cpe:2.3:a:pulsesecure:pulse_secure_desktop_client:5.1r5.1:*:*:*:*:macos:*:*",
"cpe:2.3:a:pulsesecure:pulse_secure_desktop_client:5.1r6.0:*:*:*:*:macos:*:*",
"cpe:2.3:a:pulsesecure:pulse_secure_desktop_client:5.1r7.0:*:*:*:*:macos:*:*",
"cpe:2.3:a:pulsesecure:pulse_secure_desktop_client:5.1r8.0:*:*:*:*:macos:*:*",
"cpe:2.3:a:pulsesecure:pulse_secure_desktop_client:5.1r9.0:*:*:*:*:macos:*:*",
"cpe:2.3:a:pulsesecure:pulse_secure_desktop_client:5.1r9.1:*:*:*:*:macos:*:*",
"cpe:2.3:a:pulsesecure:pulse_secure_desktop_client:5.1r10.0:*:*:*:*:macos:*:*",
"cpe:2.3:a:pulsesecure:pulse_secure_desktop_client:5.1rx:*:*:*:*:mac_os_x:*:*",
"cpe:2.3:a:pulsesecure:pulse_secure_desktop_client:5.3r1:*:*:*:*:macos:*:*",
"cpe:2.3:a:pulsesecure:pulse_secure_desktop_client:5.3r1.1:*:*:*:*:macos:*:*",
"cpe:2.3:a:pulsesecure:pulse_secure_desktop_client:5.3r2:*:*:*:*:macos:*:*",
"cpe:2.3:a:pulsesecure:pulse_secure_desktop_client:5.3r3:*:*:*:*:macos:*:*",
"cpe:2.3:a:pulsesecure:pulse_secure_desktop_client:5.3r4:*:*:*:*:macos:*:*",
"cpe:2.3:a:pulsesecure:pulse_secure_desktop_client:5.3r4.1:*:*:*:*:macos:*:*",
"cpe:2.3:a:pulsesecure:pulse_secure_desktop_client:5.3r4.2:*:*:*:*:macos:*:*",
"cpe:2.3:a:pulsesecure:pulse_secure_desktop_client:5.3r5:*:*:*:*:macos:*:*",
"cpe:2.3:a:pulsesecure:pulse_secure_desktop_client:5.3r5.2:*:*:*:*:macos:*:*"
] | null | null | 7.8 | 4.6 | null |
|
CVE-2019-8072
|
ColdFusion 2018- update 4 and earlier and ColdFusion 2016- update 11 and earlier have a Security bypass vulnerability. Successful exploitation could lead to Information Disclosure in the context of the current user.
|
[
"cpe:2.3:a:adobe:coldfusion:2016:-:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2016:update1:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2016:update10:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2016:update11:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2016:update2:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2016:update3:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2016:update4:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2016:update5:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2016:update6:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2016:update7:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2016:update8:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2016:update9:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2018:-:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2018:update1:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2018:update2:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2018:update3:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2018:update4:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null |
|
GHSA-63h7-pm69-6v2j
|
React Native Bluetooth Scan in Bluezone 1.0.0 uses six-character alphanumeric IDs, which might make it easier for remote attackers to interfere with COVID-19 contact tracing by using many IDs.
|
[] | null | 6.5 | null | null | null |
|
cisco-sa-cucm-injection-g6MbwH2
|
Cisco Unified Communications Manager SQL Injection Vulnerability
|
A vulnerability in the web-based management interface of Cisco Unified Communications Manager (Unified CM) and Cisco Unified Communications Manager Session Management Edition (Unified CM SME) could allow an authenticated, remote attacker to conduct SQL injection attacks on an affected system.
This vulnerability is due to improper validation of user-supplied input. An attacker could exploit this vulnerability by authenticating to the application as a user with read-only or higher privileges and sending crafted HTTP requests to an affected system. A successful exploit could allow the attacker to read or modify data in the underlying database or elevate their privileges.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
|
[] | null | 8.1 | null | null | null |
GHSA-6vwf-gj43-wr9h
|
Cross-site scripting (XSS) vulnerability in Novell Identity Manager (aka IDM) User Application 3.5.0, 3.5.1, 3.6.0, 3.6.1, 3.7.0, and 4.0.0, and Identity Manager Roles Based Provisioning Module 3.6.0, 3.6.1, 3.7.0, and 4.0.0, allows remote attackers to inject arbitrary web script or HTML via the apwaDetail (aka apwaDetailId) parameter, aka Bug 709603.
|
[] | null | null | null | null | null |
|
RHSA-2013:1508
|
Red Hat Security Advisory: java-1.6.0-ibm security update
|
OpenJDK: java.util.TimeZone does not restrict setting of default time zone (Libraries, 8001029) JDK: unspecified sandbox bypass (JVM) JDK: XML4J xml entity expansion excessive memory use (XML) JDK: unspecified sandbox bypass (XML) JDK: unspecified sandbox bypass (ORB) OpenJDK: insufficient html escaping in jhat (jhat, 8011081) OpenJDK: Inet6Address class IPv6 address processing errors (Libraries, 8015743) JDK: unspecified vulnerability fixed in 7u45 (Deployment) OpenJDK: image conversion out of bounds read (2D, 8014102) OpenJDK: key data leak via toString() methods (Libraries, 8011071) OpenJDK: Incorrect awt_getPixelByte/awt_getPixelShort/awt_setPixelByte/awt_setPixelShort image raster checks (2D, 8014093) OpenJDK: JTable not properly performing certain access checks (Swing, 8013744) OpenJDK: insufficient InterfaceImplementor security checks (Scripting, 8017299) JDK: unspecified vulnerability fixed in 7u45 (Deployment) JDK: unspecified vulnerability fixed in 7u45 (Deployment) OpenJDK: insufficient escaping of window title string (Javadoc, 8016675) JDK: unspecified vulnerability fixed in 7u45 (2D) OpenJDK: javax.xml.transform.TransformerFactory does not properly honor XMLConstants.FEATURE_SECURE_PROCESSING (JAXP, 8012425) OpenJDK: insufficient checks of KDC replies (JGSS, 8014341) OpenJDK: javac does not ignore certain ignorable characters (Javadoc, 8016653) OpenJDK: JPEGImageReader and JPEGImageWriter missing band size checks (2D, 8013510) JDK: unspecified vulnerability fixed in 7u45 (Deployment) OpenJDK: RMIConnection stub missing permission check (CORBA, 8011157) OpenJDK: VersionHelper12 does not honor modifyThreadGroup restriction (JNDI, 8013739) JDK: unspecified vulnerability fixed in 7u45 (Deployment) JDK: unspecified vulnerability fixed in 7u45 (Deployment) OpenJDK: insufficient security checks (JAXWS, 8017505) OpenJDK: com.sun.org.apache.xml.internal.security.utils.UnsyncByteArrayOutputStream Denial of Service (Security, 8021290) JDK: unspecified vulnerability fixed in 7u45 (Deployment) OpenJDK: XML parsing Denial of Service (JAXP, 8014530) OpenJDK: Java2d Disposer security bypass (2D, 8017287) OpenJDK: checkPackageAccess missing security check (Libraries, 8017291) JDK: unspecified vulnerability fixed in 7u45 (Deployment) JDK: unspecified vulnerability fixed in 7u45 (Deployment) OpenJDK: getDeclaringClass() information leak (Libraries, 8014349) OpenJDK: ObjectInputStream/ObjectOutputStream missing checks (Libraries, 8014987) JDK: unspecified vulnerability fixed in 7u45 (2D) JDK: unspecified vulnerability fixed in 7u45 (Deployment) OpenJDK: insufficient DataFlavor security checks (AWT, 8012277) OpenJDK: Missing CORBA security checks (Libraries, 8017196) OpenJDK: XML stream factory finder information leak (JAXP, 8013502)
|
[
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null | null |
RHSA-2021:0473
|
Red Hat Security Advisory: .NET 5.0 on Red Hat Enterprise Linux security and bugfix update
|
dotnet: certificate chain building recursion Denial of Service
|
[
"cpe:/a:redhat:rhel_dotnet:5.0::el7"
] | null | 6.5 | null | null | null |
PYSEC-2021-517
| null |
TensorFlow is an end-to-end open source platform for machine learning. The reference implementation of the `GatherNd` TFLite operator is vulnerable to a division by zero error(https://github.com/tensorflow/tensorflow/blob/0d45ea1ca641b21b73bcf9c00e0179cda284e7e7/tensorflow/lite/kernels/internal/reference/reference_ops.h#L966). An attacker can craft a model such that `params` input would be an empty tensor. In turn, `params_shape.Dims(.)` would be zero, in at least one dimension. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
|
[] | null | null | null | null | null |
GHSA-4f5x-9vpp-x3hw
|
Cross-site request forgery (CSRF) vulnerability in users_maint.html in KrisonAV CMS before 3.0.2 allows remote attackers to hijack the authentication of administrators for requests that create user accounts via a crafted request.
|
[] | null | null | null | null | null |
|
RHSA-2024:1444
|
Red Hat Security Advisory: nodejs:16 security update
|
HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) nodejs: reading unprocessed HTTP request with unbounded chunk extension allows DoS attacks
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null | null |
RHSA-2007:0310
|
Red Hat Security Advisory: openldap security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null | null |
GHSA-r2xx-gprx-q489
|
Authorization Bypass Through User-Controlled Key vulnerability in Molongui.This issue affects Molongui: from n/a through 4.7.7.
|
[] | null | 2.7 | null | null | null |
|
CVE-2021-32707
|
Bypass of image blocking in Nextcloud Mail
|
Nextcloud Mail is a mail app for Nextcloud. In versions prior to 1.9.6, the Nextcloud Mail application does not, by default, render images in emails to not leak the read state. The privacy filter failed to filter images with a `background-image` CSS attribute. Note that the images were still passed through the Nextcloud image proxy, and thus there was no IP leakage. The issue was patched in version 1.9.6 and 1.10.0. No workarounds are known to exist.
|
[
"cpe:2.3:a:nextcloud:mail:*:*:*:*:*:*:*:*"
] | null | 4.3 | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.