id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 36
232
⌀ |
---|---|---|---|---|---|---|---|---|
CVE-2025-39575
|
WordPress WPCasa <= 1.3.2 - Cross Site Scripting (XSS) Vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WPSight WPCasa allows Stored XSS. This issue affects WPCasa: from n/a through 1.3.2.
|
[] | null | 6.5 | null | null | null |
RHSA-2022:1199
|
Red Hat Security Advisory: kernel-rt security and bug fix update
|
kernel: use-after-free in RDMA listen() kernel: fget: check that the fd still exists after getting a ref to it
|
[
"cpe:/a:redhat:rhel_extras_rt:7"
] | null | 7.4 | null | null | null |
GHSA-j6q4-xcch-955f
|
An information leakage vulnerability in ArcSight ESM and ArcSight ESM Express, any 6.x version prior to 6.9.1c Patch 4 or 6.11.0 Patch 1, allows disclosure of Apache Tomcat application server version.
|
[] | null | null | 5.3 | null | null |
|
GHSA-wpqm-xjc6-mj5p
|
WordPress allows remote attackers to obtain sensitive information via a direct request for wp-admin/admin-functions.php, which reveals the path in an error message.
|
[] | null | null | null | null | null |
|
CVE-2021-38578
|
Existing CommBuffer checks in SmmEntryPoint will not catch underflow when computing BufferSize.
|
[
"cpe:2.3:a:tianocore:edk2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:insyde:kernel:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:insyde:kernel:5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:insyde:kernel:5.2:*:*:*:*:*:*:*",
"cpe:2.3:o:insyde:kernel:5.3:*:*:*:*:*:*:*",
"cpe:2.3:o:insyde:kernel:5.4:*:*:*:*:*:*:*",
"cpe:2.3:o:insyde:kernel:5.5:*:*:*:*:*:*:*"
] | null | 7.4 | null | null | null |
|
GHSA-fq7q-rch4-j8hq
|
The tcp_cwnd_reduction function in net/ipv4/tcp_input.c in the Linux kernel before 4.3.5 allows remote attackers to cause a denial of service (divide-by-zero error and system crash) via crafted TCP traffic.
|
[] | null | null | 7.5 | null | null |
|
cisco-sa-ikev2-ebFrwMPr
|
Cisco IOS and IOS XE Software IKEv2 AutoReconnect Feature Denial of Service Vulnerability
|
A vulnerability in the Internet Key Exchange Version 2 (IKEv2) support for the AutoReconnect feature of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, remote attacker to exhaust the free IP addresses from the assigned local pool.
This vulnerability occurs because the code does not release the allocated IP address under certain failure conditions. An attacker could exploit this vulnerability by trying to connect to the device with a non-AnyConnect client. A successful exploit could allow the attacker to exhaust the IP addresses from the assigned local pool, which prevents users from logging in and leads to a denial of service (DoS) condition.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is part of the September 2021 release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: September 2021 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication. ["https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-74581"]
|
[] | null | 7.7 | null | null | null |
GHSA-x8f4-23rr-fcpq
|
A vulnerability classified as critical was found in PHPGurukul Emergency Ambulance Hiring Portal 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/add-ambulance.php. The manipulation of the argument ambregnum leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
|
[] | 2.1 | 6.3 | null | null | null |
|
CVE-2024-38016
|
Microsoft Office Visio Remote Code Execution Vulnerability
|
Microsoft Office Visio Remote Code Execution Vulnerability
|
[
"cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:visio:2016:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
CVE-2022-47663
|
GPAC MP4box 2.1-DEV-rev649-ga8f438d20 is vulnerable to buffer overflow in h263dmx_process filters/reframe_h263.c:609
|
[
"cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
|
GHSA-6377-hfv9-hqf6
|
Twig has unguarded calls to `__toString()` when nesting an object into an array
|
DescriptionIn a sandbox, an attacker can call `__toString()` on an object even if the `__toString()` method is not allowed by the security policy when the object is part of an array or an argument list (arguments to a function or a filter for instance).ResolutionThe sandbox mode now checks the `__toString()` method call on all objects.The patch for this issue is available [here](https://github.com/twigphp/Twig/commit/cafc608ece310e62a35a76f17e25c04ab9ed05cc) for the 3.11.x branch, and [here](https://github.com/twigphp/Twig/commit/d4a302681bca9f7c6ce2835470d53609cdf3e23e) for the 3.x branch.CreditsWe would like to thank Jamie Schouten for reporting the issue and Fabien Potencier for providing the fix.
|
[] | 2.1 | 2.2 | null | null | null |
CVE-2012-1907
|
The scanner engine in PrivaWall Antivirus 5.6 and earlier does not recognize the Office XML (aka Open Document XML) file format, which allows remote attackers to bypass malware detection via a crafted file embedded in a WordML document.
|
[
"cpe:2.3:a:privawall:privawall_antivirus:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-c2v8-9mcv-h42j
|
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 8.3.1.21155. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of references to the app object from FormCalc. The issue results from the lack of proper validation of user-supplied data, which can result in a type confusion condition. An attacker can leverage this to execute code in the context of the current process. Was ZDI-CAN-5072.
|
[] | null | null | 8.8 | null | null |
|
RHSA-2022:5531
|
Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.5.1 security updates and bug fixes
|
nats-server: misusing the "dynamically provisioned sandbox accounts" feature authenticated user can obtain the privileges of the System account
|
[
"cpe:/a:redhat:acm:2.5::el8"
] | null | 8.8 | null | null | null |
CVE-2009-2408
|
Mozilla Network Security Services (NSS) before 3.12.3, Firefox before 3.0.13, Thunderbird before 2.0.0.23, and SeaMonkey before 1.1.18 do not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority. NOTE: this was originally reported for Firefox before 3.5.
|
[
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:*:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise:10.0:-:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise:11.0:-:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*"
] | null | 5.9 | null | 6.8 | null |
|
GHSA-42qm-c3cf-9wv2
|
Code injection in dolibarr/dolibarr
|
Improper php function sanitization, lead to an ability to inject arbitrary PHP code and run arbitrary commands on file system. In the function "dol_eval" in file "dolibarr/htdocs/core/lib/functions.lib.php" dangerous PHP functions are sanitized using "str_replace" and can be bypassed using following code in $s parameter
|
[] | null | 8.8 | null | null | null |
RHSA-2022:0332
|
Red Hat Security Advisory: samba security and bug fix update
|
samba: Out-of-bounds heap read/write vulnerability in VFS module vfs_fruit allows code execution
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 9.9 | null | null | null |
GHSA-x56c-grq3-w2x8
|
SQL injection vulnerability found in WUZHICMS v.4.1.0 allows a remote attacker to execute arbitrary code via the checktitle() function in admin/content.php.
|
[] | null | 9.8 | null | null | null |
|
GHSA-rc67-8m73-xwp7
|
Multiple untrusted search path vulnerabilities in Autodesk AutoCAD 2010 allow local users to gain privileges via a Trojan horse (1) dwmapi.dll or (2) IBFS32.DLL file in the current working directory, as demonstrated by a directory that contains a .dwg file. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
|
[] | null | null | null | null | null |
|
CVE-2024-21255
|
Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: XMLPublisher). Supported versions that are affected are 8.59, 8.60 and 8.61. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks of this vulnerability can result in takeover of PeopleSoft Enterprise PeopleTools. CVSS 3.1 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).
|
[
"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.59:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.60:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.61:*:*:*:*:*:*:*"
] | null | 8.8 | null | null | null |
|
GHSA-2wff-jj2f-98c4
|
A security vulnerability has been identified in the cryptlib cryptographic library when cryptlib is compiled with the support for RSA key exchange ciphersuites in TLS (by setting the USE_RSA_SUITES define), it will be vulnerable to the timing variant of the Bleichenbacher attack. An attacker that is able to perform a large number of connections to the server will be able to decrypt RSA ciphertexts or forge signatures using server's certificate.
|
[] | null | 5.9 | null | null | null |
|
GHSA-qw5m-84qm-7f97
|
Suzuki Connect v1.0.15 allows attackers to tamper with displayed messages via spoofed CAN messages.
|
[] | null | 4.6 | null | null | null |
|
GHSA-q75j-9wc8-vjg7
|
A buffer overflow was addressed with improved bounds checking. This issue is fixed in macOS Mojave 10.14.4. Mounting a maliciously crafted NFS network share may lead to arbitrary code execution with system privileges.
|
[] | null | null | null | null | null |
|
CVE-2021-44717
|
Go before 1.16.12 and 1.17.x before 1.17.5 on UNIX allows write operations to an unintended file or unintended network connection as a consequence of erroneous closing of file descriptor 0 after file-descriptor exhaustion.
|
[
"cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*",
"cpe:2.3:o:opengroup:unix:-:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] | null | 4.8 | null | 5.8 | null |
|
CVE-2006-3962
|
PHP remote file inclusion vulnerability in administrator/components/com_bayesiannaivefilter/lang.php in the bayesiannaivefilter component (com_bayesiannaivefilter) 1.1 for Mambo allows remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter.
|
[
"cpe:2.3:a:mambo:bayesiannaivefilter:1.1:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2021-0330
|
In add_user_ce and remove_user_ce of storaged.cpp, there is a possible use-after-free due to improper locking. This could lead to local escalation of privilege in storaged with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11Android ID: A-170732441
|
[
"cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*"
] | null | 7.8 | null | 7.2 | null |
|
GHSA-g7q6-hf7c-74p8
|
Microsoft ODBC Driver Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-41048.
|
[] | null | 8.8 | null | null | null |
|
GHSA-xx8v-9cvf-fc7h
|
Directory traversal vulnerability in lib/filemanager/imagemanager/images.php in CMS Made Simple (CMSMS) before 1.11.2.1 allows remote authenticated administrators to delete arbitrary files via a .. (dot dot) in the deld parameter. NOTE: this can be leveraged using CSRF (CVE-2012-5450) to allow remote attackers to delete arbitrary files.
|
[] | null | null | null | null | null |
|
GHSA-3qc4-32h5-3h38
|
An issue was discovered in mjs (mJS: Restricted JavaScript engine), ES6 (JavaScript version 6). There is NULL pointer dereference in mjs_bcode_part_get_by_offset() in mjs.c.
|
[] | null | 5.5 | null | null | null |
|
CVE-2024-43900
|
media: xc2028: avoid use-after-free in load_firmware_cb()
|
In the Linux kernel, the following vulnerability has been resolved:
media: xc2028: avoid use-after-free in load_firmware_cb()
syzkaller reported use-after-free in load_firmware_cb() [1].
The reason is because the module allocated a struct tuner in tuner_probe(),
and then the module initialization failed, the struct tuner was released.
A worker which created during module initialization accesses this struct
tuner later, it caused use-after-free.
The process is as follows:
task-6504 worker_thread
tuner_probe <= alloc dvb_frontend [2]
...
request_firmware_nowait <= create a worker
...
tuner_remove <= free dvb_frontend
...
request_firmware_work_func <= the firmware is ready
load_firmware_cb <= but now the dvb_frontend has been freed
To fix the issue, check the dvd_frontend in load_firmware_cb(), if it is
null, report a warning and just return.
[1]:
==================================================================
BUG: KASAN: use-after-free in load_firmware_cb+0x1310/0x17a0
Read of size 8 at addr ffff8000d7ca2308 by task kworker/2:3/6504
Call trace:
load_firmware_cb+0x1310/0x17a0
request_firmware_work_func+0x128/0x220
process_one_work+0x770/0x1824
worker_thread+0x488/0xea0
kthread+0x300/0x430
ret_from_fork+0x10/0x20
Allocated by task 6504:
kzalloc
tuner_probe+0xb0/0x1430
i2c_device_probe+0x92c/0xaf0
really_probe+0x678/0xcd0
driver_probe_device+0x280/0x370
__device_attach_driver+0x220/0x330
bus_for_each_drv+0x134/0x1c0
__device_attach+0x1f4/0x410
device_initial_probe+0x20/0x30
bus_probe_device+0x184/0x200
device_add+0x924/0x12c0
device_register+0x24/0x30
i2c_new_device+0x4e0/0xc44
v4l2_i2c_new_subdev_board+0xbc/0x290
v4l2_i2c_new_subdev+0xc8/0x104
em28xx_v4l2_init+0x1dd0/0x3770
Freed by task 6504:
kfree+0x238/0x4e4
tuner_remove+0x144/0x1c0
i2c_device_remove+0xc8/0x290
__device_release_driver+0x314/0x5fc
device_release_driver+0x30/0x44
bus_remove_device+0x244/0x490
device_del+0x350/0x900
device_unregister+0x28/0xd0
i2c_unregister_device+0x174/0x1d0
v4l2_device_unregister+0x224/0x380
em28xx_v4l2_init+0x1d90/0x3770
The buggy address belongs to the object at ffff8000d7ca2000
which belongs to the cache kmalloc-2k of size 2048
The buggy address is located 776 bytes inside of
2048-byte region [ffff8000d7ca2000, ffff8000d7ca2800)
The buggy address belongs to the page:
page:ffff7fe00035f280 count:1 mapcount:0 mapping:ffff8000c001f000 index:0x0
flags: 0x7ff800000000100(slab)
raw: 07ff800000000100 ffff7fe00049d880 0000000300000003 ffff8000c001f000
raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
page dumped because: kasan: bad access detected
Memory state around the buggy address:
ffff8000d7ca2200: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
ffff8000d7ca2280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
>ffff8000d7ca2300: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
^
ffff8000d7ca2380: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
ffff8000d7ca2400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
==================================================================
[2]
Actually, it is allocated for struct tuner, and dvb_frontend is inside.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
RHSA-2020:2344
|
Red Hat Security Advisory: bind security update
|
bind: BIND does not sufficiently limit the number of fetches performed when processing referrals bind: A logic error in code which checks TSIG validity can be used to trigger an assertion failure in tsig.c
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7.5 | null | null | null |
CVE-2019-1258
|
Azure Active Directory Authentication Library Elevation of Privilege Vulnerability
|
An elevation of privilege vulnerability exists in Azure Active Directory Authentication Library On-Behalf-Of flow, in the way the library caches tokens. This vulnerability allows an authenticated attacker to perform actions in context of another user.
The authenticated attacker can exploit this vulneraiblity by accessing a service configured for On-Behalf-Of flow that assigns incorrect tokens.
This security update addresses the vulnerability by removing fallback cache look-up for On-Behalf-Of scenarios.
|
[
"cpe:2.3:a:microsoft:active_directory_authentication_library:*:*:*:*:*:.net:*:*",
"cpe:2.3:a:microsoft:active_directory_authentication_library:5.0.0:preview:*:*:*:.net:*:*",
"cpe:2.3:a:microsoft:active_directory_authentication_library:5.0.1:preview:*:*:*:.net:*:*",
"cpe:2.3:a:microsoft:active_directory_authentication_library:5.0.2:preview:*:*:*:.net:*:*",
"cpe:2.3:a:microsoft:active_directory_authentication_library:5.0.3:preview:*:*:*:.net:*:*",
"cpe:2.3:a:microsoft:nuget:5.2.0:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.5 | null |
CVE-2020-15256
|
Prototype pollution in object-path
|
A prototype pollution vulnerability has been found in `object-path` <= 0.11.4 affecting the `set()` method. The vulnerability is limited to the `includeInheritedProps` mode (if version >= 0.11.0 is used), which has to be explicitly enabled by creating a new instance of `object-path` and setting the option `includeInheritedProps: true`, or by using the default `withInheritedProps` instance. The default operating mode is not affected by the vulnerability if version >= 0.11.0 is used. Any usage of `set()` in versions < 0.11.0 is vulnerable. The issue is fixed in object-path version 0.11.5 As a workaround, don't use the `includeInheritedProps: true` options or the `withInheritedProps` instance if using a version >= 0.11.0.
|
[
"cpe:2.3:a:object-path_project:object-path:*:*:*:*:*:node.js:*:*"
] | null | 7.7 | null | null | null |
CVE-2023-37687
|
Online Nurse Hiring System v1.0 was discovered to contain a cross-site scripting (XSS) vulnerability in the View Request of Nurse Page in the Admin portal.
|
[
"cpe:2.3:a:phpgurukul:online_nurse_hiring_system:1.0:*:*:*:*:*:*:*"
] | null | 7.2 | null | null | null |
|
CVE-2023-45826
|
Authenticated SQL Injection in leantime
|
Leantime is an open source project management system. A 'userId' variable in `app/domain/files/repositories/class.files.php` is not parameterized. An authenticated attacker can send a carefully crafted POST request to `/api/jsonrpc` to exploit an SQL injection vulnerability. Confidentiality is impacted as it allows for dumping information from the database. This issue has been addressed in version 2.4-beta-4. Users are advised to upgrade. There are no known workarounds for this vulnerability.
|
[
"cpe:2.3:a:leantime:leantime:*:*:*:*:*:*:*:*",
"cpe:2.3:a:leantime:leantime:2.4:-:*:*:*:*:*:*",
"cpe:2.3:a:leantime:leantime:2.4:beta:*:*:*:*:*:*",
"cpe:2.3:a:leantime:leantime:2.4:beta2:*:*:*:*:*:*",
"cpe:2.3:a:leantime:leantime:2.4:beta3:*:*:*:*:*:*"
] | null | 6.5 | null | null | null |
CVE-2015-4849
|
Unspecified vulnerability in the Oracle Payments component in Oracle E-Business Suite 11.5.10.2, 12.0.6, 12.1.3, 12.2.3, and 12.2.4 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Punch-in. NOTE: the previous information is from the October 2015 CPU. Oracle has not commented on third-party claims that this issue is an XML External Entity (XXE) vulnerability, which allows remote attackers to cause a denial of service or conduct SMB Relay attacks via a crafted DTD in an XML request to OA_HTML/IspPunchInServlet.
|
[
"cpe:2.3:a:oracle:e-business_suite:11.5.10.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:e-business_suite:12.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:e-business_suite:12.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:e-business_suite:12.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:e-business_suite:12.2.4:*:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
GHSA-9f2f-wxmh-4h2q
|
prefs.php in SquirrelMail before 1.4.4, with register_globals enabled, allows remote attackers to inject local code into the SquirrelMail code via custom preference handlers.
|
[] | null | null | null | null | null |
|
GHSA-358q-vf8c-9vqr
|
EnGenius ENH1350EXT A8J-ENH1350EXT devices through 3.9.3.2_c1.9.51 allow (blind) OS Command Injection via shell metacharacters to the Ping or Speed Test utility. During the time of initial setup, the device creates an open unsecured network whose admin panel is configured with the default credentials of admin/admin. An unauthorized attacker in proximity to the Wi-Fi network can exploit this window of time to execute arbitrary OS commands with root-level permissions.
|
[] | null | 7.8 | null | null | null |
|
CVE-2006-7226
|
Perl-Compatible Regular Expression (PCRE) library before 6.7 does not properly calculate the compiled memory allocation for regular expressions that involve a quantified "subpattern containing a named recursion or subroutine reference," which allows context-dependent attackers to cause a denial of service (error or crash).
|
[
"cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:4.0:*:as:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:4.0:*:es:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:4.0:*:ws:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
CVE-2025-1744
|
Out-of-bounds Write in radare2
|
Out-of-bounds Write vulnerability in radareorg radare2 allows
heap-based buffer over-read or buffer overflow.This issue affects radare2: before <5.9.9.
|
[] | 10 | null | null | null |
https://github.com/radareorg/radare2/pull/23969
|
GHSA-8c63-c298-4546
|
libming v0.4.8 was discovered to contain a memory leak via the parseSWF_MORPHFILLSTYLES function.
|
[] | null | 6.5 | null | null | null |
|
CVE-2020-14145
|
The client side in OpenSSH 5.7 through 8.4 has an Observable Discrepancy leading to an information leak in the algorithm negotiation. This allows man-in-the-middle attackers to target initial connection attempts (where no host key for the server has been cached by the client). NOTE: some reports state that 8.5 and 8.6 are also affected.
|
[
"cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:8.4:-:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:8.5:-:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:8.6:-:*:*:*:*:*:*",
"cpe:2.3:o:netapp:aff_a700s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:aff_a700s:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
"cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:hci_storage_node:-:*:*:*:*:*:*:*"
] | null | 5.9 | null | 4.3 | null |
|
CVE-2015-0997
|
Schneider Electric InduSoft Web Studio before 7.1.3.4 SP3 Patch 4 and InTouch Machine Edition 2014 before 7.1.3.4 SP3 Patch 4 provide an HMI user interface that lists all valid usernames, which makes it easier for remote attackers to obtain access via a brute-force password-guessing attack.
|
[
"cpe:2.3:a:aveva:aveva_edge:*:*:*:*:*:*:*:*",
"cpe:2.3:a:schneider-electric:wonderware_intouch_2014:*:*:*:*:machine:*:*:*"
] | null | null | null | 5 | null |
|
CVE-2023-23426
|
Some Honor products are affected by file writing vulnerability, successful exploitation could cause information disclosure.
|
[
"cpe:2.3:o:hihonor:fri-an00_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hihonor:fri-an00:-:*:*:*:*:*:*:*"
] | null | 6.6 | null | null | null |
|
CVE-2017-10153
|
Vulnerability in the Oracle Communications WebRTC Session Controller component of Oracle Communications Applications (subcomponent: Security (Gson)). Supported versions that are affected are 7.0, 7.1 and 7.2. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise Oracle Communications WebRTC Session Controller. While the vulnerability is in Oracle Communications WebRTC Session Controller, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Communications WebRTC Session Controller. CVSS 3.0 Base Score 6.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H).
|
[
"cpe:2.3:a:oracle:communications_webrtc_session_controller:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_webrtc_session_controller:7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_webrtc_session_controller:7.2:*:*:*:*:*:*:*"
] | null | null | 6.3 | 3.5 | null |
|
CVE-2021-40180
|
In the WeChat application 8.0.10 for Android and iOS, a mini program can obtain sensitive information from a user's address book via wx.searchContacts.
|
[
"cpe:2.3:a:tencent:wechat:8.0.10:*:*:*:*:android:*:*",
"cpe:2.3:a:tencent:wechat:8.0.10:*:*:*:*:iphone_os:*:*"
] | null | 7.5 | null | null | null |
|
CVE-2022-38370
|
No authorization of DatabaseConnectController in grafana-connector.
|
Apache IoTDB grafana-connector version 0.13.0 contains an interface without authorization, which may expose the internal structure of database. Users should upgrade to version 0.13.1 which addresses this issue.
|
[
"cpe:2.3:a:apache:iotdb:0.13.0:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
CVE-2020-0530
|
Improper buffer restrictions in firmware for Intel(R) NUC may allow an authenticated user to potentially enable escalation of privilege via local access. The list of affected products is provided in intel-sa-00343: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00343.html
|
[
"cpe:2.3:o:intel:nuc_kit_nuc8i7bek_firmware:becfl357.86a.0077:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_kit_nuc8i7bek:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_8_enthusiast_pc_nuc8i7bekqa_firmware:becfl357.86a.0077:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_8_enthusiast_pc_nuc8i7bekqa:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_kit_nuc8i7hnk_firmware:hnkbli70.86a.0059:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_kit_nuc8i7hnk:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_8_business_pc_nuc8i7hnkqc_firmware:hnkbli70.86a.0059:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_8_business_pc_nuc8i7hnkqc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_8_mainstream-g_kit_nuc8i7inh_firmware:inwhl357.0036:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_8_mainstream-g_kit_nuc8i7inh:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_8_mainstream-g_kit_nuc8i5inh_firmware:inwhl357.0036:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_8_mainstream-g_kit_nuc8i5inh:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_8_mainstream-g_mini_pc_nuc8i7inh_firmware:inwhl357.0036:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_8_mainstream-g_mini_pc_nuc8i7inh:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_8_rugged_kit_nuc8cchkr_firmware:chaplcel.0047:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_8_rugged_kit_nuc8cchkr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_board_nuc8cchb_firmware:chaplcel.0047:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_board_nuc8cchb:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_8_home_pc_nuc8i3cysm_firmware:cycnli35.86a.0044:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_8_home_pc_nuc8i3cysm:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_kit_nuc7i7dnke_firmware:dnkbli7v.86a.0067:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_kit_nuc7i7dnke:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_kit_nuc7i7dnhe_firmware:dnkbli7v.86a.0067:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_kit_nuc7i7dnhe:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_kit_nuc7i5dnke_firmware:dnkbli5v.86a.0067:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_kit_nuc7i5dnke:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_kit_nuc7i5dnhe_firmware:dnkbli5v.86a.0067:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_kit_nuc7i5dnhe:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_kit_nuc7i3dnke_firmware:dnkbli30.86a.0067:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_kit_nuc7i3dnke:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_kit_nuc7i3dnhe_firmware:dnkbli30.86a.0067:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_kit_nuc7i3dnhe:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_board_nuc7i7dnbe_firmware:dnkbli7v.86a.0067:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_board_nuc7i7dnbe:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_board_nuc7i5dnbe_firmware:dnkbli5v.86a.0067:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_board_nuc7i5dnbe:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_board_nuc7i3dnbe_firmware:dnkbli30.86a.0067:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_board_nuc7i3dnbe:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:compute_stick_stk2m3w64cc_firmware:ccsklm30.86a.0062:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:compute_stick_stk2m3w64cc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:compute_stick_stk2m364cc_firmware:ccsklm30.86a.0062:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:compute_stick_stk2m364cc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:compute_stick_stk1a32sc_firmware:sc0045:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:compute_stick_stk1a32sc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:compute_stick_stk1aw32sc_firmware:sc0045:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:compute_stick_stk1aw32sc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_kit_nuc6i7kyk_firmware:kyskli70.86a.0066:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_kit_nuc6i7kyk:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_7_essential_pc_nuc7cjysal_firmware:jyglkcpx.86a.0053:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_7_essential_pc_nuc7cjysal:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_kit_nuc7cjyh_firmware:jyglkcpx.86a.0053:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_kit_nuc7cjyh:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_kit_nuc7pjyh_firmware:jyglkcpx.86a.0053:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_kit_nuc7pjyh:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_kit_nuc7i7bnh_firmware:bnkbl357.86a.0081:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_kit_nuc7i7bnh:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_kit_nuc7i5bnk_firmware:bnkbl357.86a.0081:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_kit_nuc7i5bnk:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_kit_nuc7i3bnh_firmware:bnkbl357.86a.0081:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_kit_nuc7i3bnh:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_kit_nuc7i5bnh_firmware:bnkbl357.86a.0081:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_kit_nuc7i5bnh:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_kit_nuc7i3bnk_firmware:bnkbl357.86a.0081:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_kit_nuc7i3bnk:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_kit_nuc7i7bnhx1_firmware:bnkbl357.86a.0081:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_kit_nuc7i7bnhx1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_kit_nuc7i5bnhx1_firmware:bnkbl357.86a.0081:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_kit_nuc7i5bnhx1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_kit_nuc7i3bnhx1_firmware:bnkbl357.86a.0081:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_kit_nuc7i3bnhx1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_7_enthusiast_pc_nuc7i7bnhxg_firmware:bnkbl357.86a.0081:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_7_enthusiast_pc_nuc7i7bnhxg:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_7_home_a_mini_pc_nuc7i5bnhxf_firmware:bnkbl357.86a.0081:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_7_home_a_mini_pc_nuc7i5bnhxf:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_7_home_a_mini_pc_nuc7i3bnhxf_firmware:bnkbl357.86a.0081:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_7_home_a_mini_pc_nuc7i3bnhxf:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_7_home_a_mini_pc_nuc7i5bnkp_firmware:bnkbl357.86a.0081:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_7_home_a_mini_pc_nuc7i5bnkp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_kit_nuc6cays_firmware:ayaplcel.86a.0066:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_kit_nuc6cays:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_kit_nuc6cayh_firmware:ayaplcel.86a.0066:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_kit_nuc6cayh:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_kit_de3815tykhe_firmware:tybyt20h.86a.0024:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_kit_de3815tykhe:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_board_de3815tybe_firmware:tybyt20h.86a.0024:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_board_de3815tybe:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_kit_nuc6i3syh_firmware:syskli35.86a.0072:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_kit_nuc6i3syh:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_kit_nuc6i5syh_firmware:syskli35.86a.0072:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_kit_nuc6i5syh:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_kit_nuc6i3syk_firmware:syskli35.86a.0072:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_kit_nuc6i3syk:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_kit_nuc6i5syk_firmware:syskli35.86a.0072:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_kit_nuc6i5syk:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_kit_nuc5pgyh_firmware:pybswcel.86a.0078:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_kit_nuc5pgyh:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_kit_nuc5ppyh_firmware:pybswcel.86a.0078:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_kit_nuc5ppyh:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_kit_nuc5cpyh_firmware:pybswcel.86a.0078:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_kit_nuc5cpyh:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_kit_nuc5i5ryk_firmware:rybdwi35.86a.0383:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_kit_nuc5i5ryk:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_kit_nuc5i3ryh_firmware:rybdwi35.86a.0383:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_kit_nuc5i3ryh:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_kit_nuc5i3ryhs_firmware:rybdwi35.86a.0383:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_kit_nuc5i3ryhs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_kit_nuc5i3ryhsn_firmware:rybdwi35.86a.0383:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_kit_nuc5i3ryhsn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_kit_nuc5i3ryk_firmware:rybdwi35.86a.0383:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_kit_nuc5i3ryk:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_kit_nuc5i5ryh_firmware:rybdwi35.86a.0383:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_kit_nuc5i5ryh:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_kit_nuc5i5ryhs_firmware:rybdwi35.86a.0383:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_kit_nuc5i5ryhs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_kit_nuc5i7ryh_firmware:rybdwi35.86a.0383:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_kit_nuc5i7ryh:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_kit_nuc5i3myhe_firmware:mybdwi30.86a.0057:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_kit_nuc5i3myhe:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_kit_nuc5i5myhe_firmware:mybdwi5v.86a.0056:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_kit_nuc5i5myhe:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_board_nuc5i5mybe_firmware:mybdwi5v.86a.0056:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_board_nuc5i5mybe:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_board_nuc5i3mybe_firmware:mybdwi30.86a.0057:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_board_nuc5i3mybe:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_kit_d54250wyk_firmware:wylpt10h.86a.0054:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_kit_d54250wyk:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_board_d34010wyb_firmware:wylpt10h.86a.0054:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_board_d34010wyb:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_board_d54250wyb_firmware:wylpt10h.86a.0054:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_board_d54250wyb:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_kit_d34010wyk_firmware:wylpt10h.86a.0054:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_kit_d34010wyk:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_kit_d34010wykh_firmware:wylpt10h.86a.0054:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_kit_d34010wykh:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_kit_d54250wykh_firmware:wylpt10h.86a.0054:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_kit_d54250wykh:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:compute_stick_stck1a32wfc_firmware:stck1a32wfc:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:compute_stick_stck1a32wfc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:compute_stick_stck1a8lfc_firmware:stck1a8lfc:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:compute_stick_stck1a8lfc:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | 4.6 | null |
|
CVE-2009-4101
|
infoRSS 1.1.4.2 and earlier extension for Firefox performs certain operations with chrome privileges, which allows remote attackers to execute arbitrary commands and perform cross-domain scripting attacks via the description tag of an RSS feed.
|
[
"cpe:2.3:a:didier_ernotte:inforss:*:*:*:*:*:*:*:*",
"cpe:2.3:a:didier_ernotte:inforss:0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:didier_ernotte:inforss:0.7.7:*:*:*:*:*:*:*",
"cpe:2.3:a:didier_ernotte:inforss:0.8.4:*:*:*:*:*:*:*",
"cpe:2.3:a:didier_ernotte:inforss:0.8.7:*:*:*:*:*:*:*",
"cpe:2.3:a:didier_ernotte:inforss:0.8.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:didier_ernotte:inforss:0.8.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:didier_ernotte:inforss:0.8.9:*:*:*:*:*:*:*",
"cpe:2.3:a:didier_ernotte:inforss:0.8.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:didier_ernotte:inforss:0.8.9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:didier_ernotte:inforss:0.8.9.4:*:*:*:*:*:*:*",
"cpe:2.3:a:didier_ernotte:inforss:0.8.9.5:*:*:*:*:*:*:*",
"cpe:2.3:a:didier_ernotte:inforss:0.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:didier_ernotte:inforss:0.10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:didier_ernotte:inforss:0.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:didier_ernotte:inforss:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:didier_ernotte:inforss:1.1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:didier_ernotte:inforss:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:didier_ernotte:inforss:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:didier_ernotte:inforss:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:didier_ernotte:inforss:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:didier_ernotte:inforss:1.1.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"
] | null | null | null | 9.3 | null |
|
GHSA-mp73-9xr6-952m
|
Windows WebBrowser Control Remote Code Execution Vulnerability.
|
[] | null | 7.5 | null | null | null |
|
GHSA-4pjf-x44m-95hq
|
It was discovered that sos-collector does not properly set the default permissions of newly created files, making all files created by the tool readable by any local user. A local attacker may use this flaw by waiting for a legit user to run sos-collector and steal the collected data in the /var/tmp directory.
|
[] | null | null | 5 | null | null |
|
GHSA-33qg-r99w-m2x7
|
Multiple PHP remote file inclusion vulnerabilities in phpWCMS XT 0.0.7 BETA and earlier allow remote attackers to execute arbitrary PHP code via a URL in the HTML_MENU_DirPath parameter to (1) config_HTML_MENU.php and (2) config_PHPLM.php in phpwcms_template/inc_script/frontend_render/navigation/.
|
[] | null | null | null | null | null |
|
CVE-2017-3014
|
Adobe Acrobat Reader versions 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier have an exploitable use after free vulnerability in XML Forms Architecture (XFA) related to reset form functionality. Successful exploitation could lead to arbitrary code execution.
|
[
"cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:reader:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | 9.3 | null |
|
GHSA-3864-rp2m-2qfj
|
libre-chat Path Traversal vulnerability
|
An issue in the upload_documents method of libre-chat v0.0.6 allows attackers to execute a path traversal via supplying a crafted filename in an uploaded file.
|
[] | 6.6 | 9.1 | null | null | null |
CVE-2018-0765
|
A denial of service vulnerability exists when .NET and .NET Core improperly process XML documents, aka ".NET and .NET Core Denial of Service Vulnerability." This affects Microsoft .NET Framework 2.0, Microsoft .NET Framework 3.0, Microsoft .NET Framework 4.7.1, Microsoft .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1, Microsoft .NET Framework 4.5.2, Microsoft .NET Framework 4.7/4.7.1, Microsoft .NET Framework 4.6, Microsoft .NET Framework 3.5, Microsoft .NET Framework 3.5.1, Microsoft .NET Framework 4.6/4.6.1/4.6.2, Microsoft .NET Framework 4.6.2/4.7/4.7.1, .NET Core 2.0, Microsoft .NET Framework 4.7.2.
|
[
"cpe:2.3:a:microsoft:.net_core:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:.net_framework:2.0:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:.net_framework:3.0:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:.net_framework:3.5:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:.net_framework:3.5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:.net_framework:4.5.2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:.net_framework:4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:.net_framework:4.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:.net_framework:4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:.net_framework:4.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:.net_framework:4.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:.net_framework:4.7.2:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 | null |
|
CVE-2017-9953
|
There is an invalid free in Image::printIFDStructure that leads to a Segmentation fault in Exiv2 0.26. A crafted input will lead to a remote denial of service attack.
|
[
"cpe:2.3:a:exiv2:exiv2:0.26:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 | null |
|
CVE-2021-35938
|
A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
|
[
"cpe:2.3:a:rpm:rpm:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*"
] | null | 6.7 | null | null | null |
|
GHSA-fhrq-2vr4-f65r
|
Improper authorization in GitLab CE/EE affecting all versions since 13.0 allows guests in private projects to view CI/CD analytics
|
[] | null | null | null | null | null |
|
GHSA-w3vm-xcfj-p7gr
|
In JetBrains TeamCity before 2023.11.4 presigned URL generation requests in S3 Artifact Storage plugin were authorized improperly
|
[] | null | 5.8 | null | null | null |
|
GHSA-g86r-598c-7v9f
|
ELECOM wireless LAN routers WRC-1167GHBK3-A v1.24 and earlier, and WRC-1167FEBK-A v1.18 and earlier allow a network-adjacent authenticated attacker to execute an arbitrary command by sending a specially crafted request to the web management page.
|
[] | null | 8 | null | null | null |
|
CVE-2023-37700
|
Tenda FH1203 V2.0.1.6 was discovered to contain a stack overflow via the ssid parameter in the form_fast_setting_wifi_set function.
|
[
"cpe:2.3:h:tenda:fh1203:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tenda:fh1203_firmware:2.0.1.6:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
|
RHSA-2010:0400
|
Red Hat Security Advisory: tetex security update
|
xpdf: Multiple buffer overflows in JBIG2 decoder (setBitmap, readSymbolDictSeg) (CVE-2009-0195) xpdf: Multiple integer overflows in JBIG2 decoder xpdf: Freeing of potentially uninitialized memory in JBIG2 decoder xpdf: Multiple buffer overflows in JBIG2 decoder (setBitmap, readSymbolDictSeg) (CVE-2009-0195) xpdf: multiple integer overflows PDF JBIG2 decoder OOB read PDF JBIG2 multiple input validation flaws PDF JBIG2 integer overflow PDF JBIG2 invalid free() PDF JBIG2 NULL dereference PDF JBIG2 MMR decoder buffer overflows PDF JBIG2 MMR infinite loop DoS xpdf/poppler: integer overflow in ObjectStream::ObjectStream (oCERT-2009-016) xpdf/poppler: ImageStream:: ImageStream integer overflow texlive: Integer overflow by processing special commands dvipng: Multiple array index errors during DVI-to-PNG translation texlive: Integer overflow by processing special commands
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null | null |
GHSA-hwvv-mqx6-gw83
|
wget 1.5.3 follows symlinks to change permissions of the target file instead of the symlink itself.
|
[] | null | null | null | null | null |
|
GHSA-9644-65gc-xrpq
|
Improper caller verification vulnerability in SemClipboard prior to SMR June-2024 Release 1 allows local attackers to access arbitrary files.
|
[] | null | 4 | null | null | null |
|
RHSA-2017:0630
|
Red Hat Security Advisory: tigervnc security and bug fix update
|
tigervnc: VNC server can crash when TLS handshake terminates early tigervnc: Buffer overflow in ModifiablePixelBuffer::fillRect
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 3.1 | null | null |
CVE-2022-22473
|
IBM WebSphere Application Server 7.0, 8.0, 8.5, and 9.0 could allow a remote attacker to obtain sensitive information caused by improper handling of Administrative Console data. This information could be used in further attacks against the system. IBM X-Force ID: 225347.
|
[
"cpe:2.3:a:ibm:websphere_application_server:*:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:i:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:z\\/os:-:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:solaris:-:*:*:*:*:*:-:*"
] | null | null | 3.7 | null | null |
|
CVE-2024-22529
|
TOTOLINK X2000R_V2 V2.0.0-B20230727.10434 has a command injection vulnerability in the sub_449040 (handle function of formUploadFile) of /bin/boa.
|
[
"cpe:2.3:h:totolink:x2000r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:totolink:x2000r_firmware:2.0.0-b20230727.10434:*:*:*:*:*:*:*",
"cpe:2.3:h:totolink:x2000r:v2:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
|
GHSA-vf3x-vf4x-gfqr
|
Unspecified vulnerability in the Oracle HCM Configuration Workbench component in Oracle E-Business Suite 12.1.1, 12.1.2, and 12.1.3 allows remote attackers to affect confidentiality via unknown vectors.
|
[] | null | null | null | null | null |
|
GHSA-97gc-gmf4-mv3j
|
Untrusted search path vulnerability in Lhasa 0.19 and earlier allows local users to gain privileges via a Trojan horse executable file in the current working directory.
|
[] | null | null | null | null | null |
|
GHSA-v43g-m96h-3578
|
IBM Security Identity Manager (ISIM) Virtual Appliance 7.0.0.0 through 7.0.1.0 before 7.0.1-ISS-SIM-FP0001 do not properly restrict failed login attempts, which makes it easier for remote attackers to obtain access via a brute-force approach. IBM X-Force ID: 111695.
|
[] | null | null | 9.8 | null | null |
|
CVE-2002-2078
|
Heap-based buffer overflow in Floositek (1) FTGate Pro 1.05 and (2) FTGate Office 1.05 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a long POP3 APOP USER command.
|
[
"cpe:2.3:a:floosietek:ftgateoffice:1.05:*:*:*:*:*:*:*",
"cpe:2.3:a:floosietek:ftgatepro:1.05:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2022-24820
|
Unauthenticated user can list hidden document from multiple velocity templates
|
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. A guest user without the right to view pages of the wiki can still list documents by rendering some velocity documents. The problem has been patched in XWiki versions 12.10.11, 13.4.4, and 13.9-rc-1. There is no known workaround for this problem.
|
[
"cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*",
"cpe:2.3:a:xwiki:xwiki:13.9:-:*:*:*:*:*:*"
] | null | 5.3 | null | null | null |
CVE-2004-1482
|
The sbuf_getmsg function in BNC incorrectly handles backspace characters, which could allow remote attackers to bypass authentication and gain access to arbitrary scripts.
|
[
"cpe:2.3:a:bnc:bnc:2.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:bnc:bnc:2.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:bnc:bnc:2.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:bnc:bnc:2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:bnc:bnc:2.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:bnc:bnc:2.8.8:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-6c4g-j5rf-mc73
|
A cross-site scripting (XSS) vulnerability in TotalJS commit 8c2c8909 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Website name text field under Main Settings.
|
[] | null | 5.4 | null | null | null |
|
RHSA-2015:2657
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Miscellaneous memory safety hazards (rv:38.5) (MFSA 2015-134) Mozilla: Underflow through code inspection (MFSA 2015-145) Mozilla: Use-after-free in WebRTC when datachannel is used after being destroyed (MFSA 2015-138) Mozilla: Integer overflow allocating extremely large textures (MFSA 2015-139) Mozilla: Integer overflow in MP4 playback in 64-bit versions (MFSA 2015-146) Mozilla: Cross-site reading attack through data: and view-source: URIs (MFSA 2015-149) Mozilla: Integer underflow and buffer overflow processing MP4 metadata in libstagefright (MFSA 2015-147)
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null | null |
RHSA-2020:5188
|
Red Hat Security Advisory: microcode_ctl security, bug fix and enhancement update
|
hw: Information disclosure issue in Intel SGX via RAPL interface hw: Vector Register Leakage-Active hw: Fast forward store predictor
|
[
"cpe:/o:redhat:rhel_aus:7.2::server"
] | null | 5.5 | null | null | null |
CVE-2004-1711
|
Cross-site scripting (XSS) vulnerability in post.php in Moodle before 1.3 allows remote attackers to inject arbitrary web script or HTML via the reply parameter.
|
[
"cpe:2.3:a:moodle:moodle:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.3.3:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-p4jh-rvp5-j37g
|
Transient DOS in Multi-Mode Call Processor while processing UE policy container.
|
[] | null | 7.5 | null | null | null |
|
GHSA-vwvw-v6rg-hjcx
|
In avrc_ctrl_pars_vendor_cmd of avrc_pars_ct.cc, there is a possible out of bounds read due to improper input validation. This could lead to remote information disclosure over Bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-205571133
|
[] | null | 6.5 | null | null | null |
|
GHSA-25fj-gxq4-4fv9
|
Certain NETGEAR devices are affected by command injection by an unauthenticated attacker. This affects RBK852 before 3.2.17.12, RBK853 before 3.2.17.12, RBK854 before 3.2.17.12, RBR850 before 3.2.17.12, and RBS850 before 3.2.17.12.
|
[] | null | null | null | null | null |
|
GHSA-f74h-p3m3-45g2
|
A memory consumption issue was addressed with improved memory handling. This issue is fixed in iOS 15 and iPadOS 15, watchOS 8, tvOS 15. An application may be able to execute arbitrary code with kernel privileges.
|
[] | null | null | null | null | null |
|
CVE-2022-36696
|
Ingredients Stock Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /classes/Master.php?f=delete_stockout.
|
[
"cpe:2.3:a:ingredients_stock_management_system_project:ingredients_stock_management_system:1.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
|
CVE-2015-0210
|
wpa_supplicant 2.0-16 does not properly check certificate subject name, which allows remote attackers to cause a man-in-the-middle attack.
|
[
"cpe:2.3:a:w1.fi:wpa_supplicant:2.0-16:*:*:*:*:*:*:*"
] | null | null | 5.9 | 4.3 | null |
|
CVE-2006-4939
|
backup/backup_scheduled.php in Moodle before 1.6.2 generates trace data with the full backup pathname even when debugging is disabled, which might allow attackers to obtain the pathname.
|
[
"cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.6.0:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
CVE-2023-48489
|
Adobe Experience Manager | Cross-site Scripting (DOM-based XSS) (CWE-79)
|
Adobe Experience Manager versions 6.5.18 and earlier are affected by a Cross-site Scripting (DOM-based XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
|
[
"cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:experience_manager_cloud_service:*:*:*:*:*:*:*:*"
] | null | 5.4 | null | null | null |
GHSA-23r3-wg3q-c3xm
|
A vulnerability was found in Emlog Pro 2.3.4 and classified as critical. Affected by this issue is some unknown functionality of the file admin/setting.php. The manipulation leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-264740. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
|
[] | null | 4.7 | null | null | null |
|
CVE-2009-3460
|
Adobe Acrobat 9.x before 9.2, 8.x before 8.1.7, and possibly 7.x through 7.1.4 allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors.
|
[
"cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.1.2:*:*:*:*:*:*:*"
] | null | null | null | 9.3 | null |
|
GHSA-jvcm-h57m-rqjp
|
The Steveas WP Live Chat Shoutbox WordPress plugin through 1.4.2 does not sanitise and escape a parameter before outputting it back in the Shoutbox, leading to Stored Cross-Site Scripting which could be used against high privilege users such as admins.
|
[] | null | 6.1 | null | null | null |
|
GHSA-fpp3-7h58-vv6g
|
A vulnerability was found in code-projects Responsive Hotel Site 1.0. It has been classified as critical. Affected is an unknown function of the file index.php. The manipulation of the argument name/phone/email leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
|
[] | 6.9 | 7.3 | null | null | null |
|
CVE-2025-1647
|
XSS in Bootstrap title attribute for Tooltip and Popover
|
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Bootstrap allows Cross-Site Scripting (XSS).This issue affects Bootstrap: from 3.4.1 before 4.0.0.
|
[] | null | 5.6 | null | null | null |
GHSA-6c5g-2g23-6f26
|
The Installer application in Apple Mac OS X 10.4.8 and earlier, when used by a user with Admin credentials, does not authenticate the user before installing certain software requiring system privileges.
|
[] | null | null | null | null | null |
|
GHSA-gp49-xhgq-399v
|
Rational ClearCase 4.1, 2002.05, and possibly other versions allows remote attackers to cause a denial of service (crash) via certain packets to port 371, e.g. via nmap.
|
[] | null | null | null | null | null |
|
CVE-2020-9274
|
An issue was discovered in Pure-FTPd 1.0.49. An uninitialized pointer vulnerability has been detected in the diraliases linked list. When the *lookup_alias(const char alias) or print_aliases(void) function is called, they fail to correctly detect the end of the linked list and try to access a non-existent list member. This is related to init_aliases in diraliases.c.
|
[
"cpe:2.3:a:pureftpd:pure-ftpd:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fedoraproject:extra_packages_for_enterprise_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fedoraproject:extra_packages_for_enterprise_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*"
] | null | 7.5 | null | 5 | null |
|
GHSA-wq7q-7vfh-2x3h
|
install-nw downloads Resources over HTTP
|
Affected versions of `install-nw` insecurely download an executable over an unencrypted HTTP connection.In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `install-nw`.RecommendationUpdate to version 1.1.5 or later.
|
[] | null | null | 8.1 | null | null |
CVE-2011-0594
|
Adobe Reader and Acrobat 10.x before 10.0.1, 9.x before 9.4.2, and 8.x before 8.2.6 on Windows and Mac OS X allow remote attackers to execute arbitrary code via a font.
|
[
"cpe:2.3:a:adobe:acrobat_reader:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.0:*:*:*:*:*:*:*"
] | null | null | null | 9.3 | null |
|
GHSA-qxgm-74qr-rjwg
|
Online Ordering System v2.3.2 was discovered to contain a SQL injection vulnerability via the user_email parameter at /admin/login.php.
|
[] | null | 7.5 | null | null | null |
|
CVE-2023-22340
|
BIG-IP SIP profile vulnerability
|
On BIG-IP versions 16.1.x before 16.1.3.3, 15.1.x before 15.1.8, 14.1.x before 14.1.5.3, and all versions of 13.1.x, when a SIP profile is configured on a Message Routing type virtual server, undisclosed traffic can cause TMM to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
|
[
"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
GHSA-mm4g-qrpv-xjp8
|
Cross-site scripting (XSS) vulnerability in Thyme 1.3 allows remote attackers to inject arbitrary web script or HTML via the search page.
|
[] | null | null | null | null | null |
|
CVE-2019-13341
|
In MiniCMS V1.10, stored XSS was found in mc-admin/conf.php (comment box), which can be used to get a user's cookie.
|
[
"cpe:2.3:a:1234n:minicms:1.10:*:*:*:*:*:*:*"
] | null | null | 4.8 | 3.5 | null |
|
GHSA-838x-95mf-gv8m
|
Mikrotik RouterOS before 6.42.7 and 6.40.9 is vulnerable to a memory corruption vulnerability. An authenticated remote attacker can crash the HTTP server by rapidly authenticating and disconnecting.
|
[] | null | null | 6.5 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.