id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 38
232
⌀ |
---|---|---|---|---|---|---|---|---|
GHSA-gqqq-66rq-4g43
|
The installer in the Ushahidi Platform before 2.5 omits certain calls to the exit function, which allows remote attackers to obtain administrative privileges via unspecified vectors.
|
[] | null | null | null | null | null |
|
GHSA-f2g4-3hj9-xg6q
|
In tinyexr 1.0.1, there is a heap-based buffer over-read in tinyexr::DecodePixelData.
|
[] | null | 8.8 | null | null | null |
|
CVE-2019-5006
|
An issue was discovered in Foxit Reader and PhantomPDF before 9.4 on Windows. It is a NULL pointer dereference during PDF parsing.
|
[
"cpe:2.3:a:foxitsoftware:foxit_reader:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:a:foxitsoftware:phantompdf:*:*:*:*:*:*:*:*"
] | null | null | 5.5 | 4.3 | null |
|
CVE-2018-9050
|
In Windows Master (aka Windows Optimization Master) 7.99.13.604, the driver file (WoptiHWDetect.SYS) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0xf100202d.
|
[
"cpe:2.3:a:windows_optimization_master_project:windows_optimization_master:7.99.13.604:*:*:*:*:*:*:*"
] | null | null | 7.8 | 6.1 | null |
|
GHSA-5jqm-qx6x-rp6c
|
Cross Site Scripting vulnerability found in Online Travel Agency System v.1.0 allows a remote attacker to execute arbitrary code via the description parameter in insert.php.
|
[] | null | 4.8 | null | null | null |
|
GHSA-4h87-8v24-9f5c
|
The play_midi function in playmidi.c in TiMidity++ 2.14.0 allows remote attackers to cause a denial of service (large loop and CPU consumption) via a crafted mid file. NOTE: CPU consumption might be relevant when using the --background option.
|
[] | null | null | 5.5 | null | null |
|
cisco-sa-ftd-dos-JnnJm4wB
|
Cisco Firepower Threat Defense Software Denial of Service Vulnerability
|
A vulnerability in the connection handling function in Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.
This vulnerability is due to improper traffic handling when platform limits are reached. An attacker could exploit this vulnerability by sending a high rate of UDP traffic through an affected device. A successful exploit could allow the attacker to cause all new, incoming connections to be dropped, resulting in a DoS condition.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is part of the April 2022 release of the Cisco ASA, FTD, and FMC Security Advisory Bundled publication. For a complete list of the advisories and links to them, see Cisco Event Response: April 2022 Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication ["https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-74836"].
|
[] | null | 8.6 | null | null | null |
GHSA-r38r-g64f-728h
|
Multiple vulnerabilities that affect Cisco Catalyst Digital Building Series Switches and Cisco Catalyst Micro Switches could allow an attacker to execute persistent code at boot time or to permanently prevent the device from booting, resulting in a permanent denial of service (DoS) condition. For more information about these vulnerabilities, see the Details section of this advisory.
|
[] | null | 6.8 | null | null | null |
|
CVE-2025-22869
|
Potential denial of service in golang.org/x/crypto
|
SSH servers which implement file transfer protocols are vulnerable to a denial of service attack from clients which complete the key exchange slowly, or not at all, causing pending content to be read into memory, but never transmitted.
|
[] | null | 7.5 | null | null | null |
GHSA-x55w-vjjp-222r
|
inflect vulnerable to Inefficient Regular Expression Complexity
|
inflect is customizable inflections for nodejs. inflect is vulnerable to Inefficient Regular Expression Complexity
|
[] | null | 7.5 | null | null | null |
GHSA-v8g2-qhw8-h443
|
The sctp module in FreeBSD 10.1 before p5, 10.0 before p17, 9.3 before p9, and 8.4 before p23 allows remote attackers to cause a denial of service (NULL pointer dereference and kernel panic) via a crafted RE_CONFIG chunk.
|
[] | null | null | null | null | null |
|
RHSA-2015:0043
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: sctp: skb_over_panic when receiving malformed ASCONF chunks kernel: net: sctp: fix panic on duplicate ASCONF chunks kernel: net: sctp: remote memory pressure from excessive queueing
|
[
"cpe:/o:redhat:rhel_eus:6.4::computenode",
"cpe:/o:redhat:rhel_eus:6.4::server"
] | null | null | null | null | null |
GHSA-3m95-wfxh-25xv
|
Missing Authorization vulnerability in Blocksera Cryptocurrency Widgets Pack allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Cryptocurrency Widgets Pack: from n/a through 2.0.1.
|
[] | null | 6.5 | null | null | null |
|
GHSA-22cq-xxr9-jrrv
|
Zenario CMS vulnerable to CSRF
|
Cross-Site Request Forgery (CSRF) vulnerability was discovered in the 8.3 version of Zenario Content Management System via the `admin/organizer.ajax.php?path=zenario__content%2Fpanels%2Fcontent` URI.
|
[] | null | null | 8.8 | null | null |
CVE-2013-3709
|
WebYaST 1.3 uses weak permissions for config/initializers/secret_token.rb, which allows local users to gain privileges by reading the Rails secret token from this file.
|
[
"cpe:2.3:a:novell:suse_lifecycle_management_server:1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:suse:studio_onsite:1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:suse:webyast:1.3:*:*:*:*:*:*:*"
] | null | null | null | 7.2 | null |
|
CVE-2010-4809
|
SQL injection vulnerability in index.php in DBSite 1.0 allows remote attackers to execute arbitrary SQL commands via the ID parameter.
|
[
"cpe:2.3:a:liberologico:dbsite:1.0:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-8wr6-crxg-xffx
|
A vulnerability has been found in PHPGurukul Old Age Home Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /admin/add-services.php. The manipulation of the argument sertitle leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
|
[] | 6.9 | 7.3 | null | null | null |
|
GHSA-5w44-6qm8-5cf9
|
Zimbra Collaboration before 8.8.12 Patch 1 has persistent XSS.
|
[] | null | null | null | null | null |
|
CVE-2019-1621
|
Cisco Data Center Network Manager Arbitrary File Download Vulnerability
|
A vulnerability in the web-based management interface of Cisco Data Center Network Manager (DCNM) could allow an unauthenticated, remote attacker to gain access to sensitive files on an affected device. The vulnerability is due to incorrect permissions settings on affected DCNM software. An attacker could exploit this vulnerability by connecting to the web-based management interface of an affected device and requesting specific URLs. A successful exploit could allow the attacker to download arbitrary files from the underlying filesystem of the affected device.
|
[
"cpe:2.3:a:cisco:data_center_network_manager:11.0\\(1\\):*:*:*:*:*:*:*"
] | null | null | 7.5 | null | null |
CVE-2018-8291
|
A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in Microsoft browsers, aka "Scripting Engine Memory Corruption Vulnerability." This affects ChakraCore, Internet Explorer 11, Microsoft Edge. This CVE ID is unique from CVE-2018-8242, CVE-2018-8283, CVE-2018-8287, CVE-2018-8288, CVE-2018-8296, CVE-2018-8298.
|
[
"cpe:2.3:a:microsoft:internet_explorer:11:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:chakracore:*:*:*:*:*:*:*:*"
] | null | null | 7.5 | 7.6 | null |
|
GHSA-6qjv-w5w3-xfr7
|
IBM Storage Defender - Resiliency Service 2.0 stores user credentials in plain clear text which can be read by a local user. IBM X-Force ID: 278748.
|
[] | null | 4.4 | null | null | null |
|
GHSA-4vr4-gmj4-mjv5
|
e107_web/js/plupload/upload.php in e107 2.1.8 allows remote attackers to execute arbitrary PHP code by uploading a .php filename with the image/jpeg content type.
|
[] | null | null | 7.2 | null | null |
|
GHSA-grpr-fwv2-4vf3
|
A vulnerability was found in Travelmate Travelable Trek Management Solution 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the component Comment Box Handler. The manipulation of the argument comment leads to cross site scripting. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. VDB-235214 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
|
[] | null | null | 3.1 | null | null |
|
CVE-2023-24444
|
Jenkins OpenID Plugin 2.4 and earlier does not invalidate the previous session on login.
|
[
"cpe:2.3:a:jenkins:openid:*:*:*:*:*:jenkins:*:*"
] | null | 9.8 | null | null | null |
|
RHSA-2024:2002
|
Red Hat Security Advisory: grub2 security update
|
grub2: Buffer overflow in grub_font_construct_glyph() can lead to out-of-bound write and possible secure boot bypass
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.2 | null | null | null |
GHSA-v7cj-vm62-r38r
|
Affected devices do not check the TFTP blocksize correctly. This could allow an authenticated attacker to read from an uninitialized buffer that potentially contains previously allocated data.
|
[] | 5.1 | 2.7 | null | null | null |
|
GHSA-98xr-mmq5-vc5h
|
MantisBT XSS allows unsanitized input via admin/install.php
|
An XSS issue was discovered in admin/install.php in MantisBT before 1.3.12 and 2.x before 2.5.2. Some variables under user control in the MantisBT installation script are not properly sanitized before being output, allowing remote attackers to inject arbitrary JavaScript code, as demonstrated by the $f_database, $f_db_username, and $f_admin_username variables. This is mitigated by the fact that the admin/ folder should be deleted after installation, and also prevented by CSP.
|
[] | null | 6.1 | null | null | null |
CVE-2023-20968
|
In multiple functions of p2p_iface.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-262235935
|
[
"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*"
] | null | 4.4 | null | null | null |
|
RHSA-2016:0855
|
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
|
kernel: kvm: reporting emulation failures to userspace kernel: File descriptors passed over unix sockets are not properly accounted kernel: kvm: reporting emulation failures to userspace kernel: x86: espfix not working for 32-bit KVM paravirt guests kernel: buffer overflow with fraglist larger than MAX_SKB_FRAGS + 2 in virtio-net kernel: Mounting ext2 fs e2fsprogs/tests/f_orphan as ext4 crashes system kernel: MTU value is not validated in IPv6 stack causing packet loss kernel: Null pointer dereference when mounting ext4 kernel: IPv6 connect causes DoS via NULL pointer dereference kernel: use-after-free via crafted IPV6 sendmsg for raw / tcp / udp / l2tp sockets.
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 8.4 | null | null |
GHSA-c959-gjgp-27w6
|
The server in CollabNet ScrumWorks Pro before 6.0 allows remote authenticated users to gain privileges and obtain sensitive information via a modified desktop client.
|
[] | null | null | null | null | null |
|
GHSA-4pjh-5r8h-799v
|
H3C Magic R200 R200V200R004L02 was discovered to contain a stack overflow via the EditSTList interface at /goform/aspForm.
|
[] | null | 9.8 | null | null | null |
|
CVE-2016-0453
|
Unspecified vulnerability in the Oracle GlassFish Server component in Oracle Fusion Middleware 3.1.2 allows remote attackers to affect integrity via unknown vectors related to Embedded Server.
|
[
"cpe:2.3:a:oracle:fusion_middleware:3.1.2:*:*:*:*:*:*:*"
] | null | null | null | 1.8 | null |
|
CVE-2020-5191
|
PHPGurukul Hospital Management System in PHP v4.0 suffers from multiple Persistent XSS vulnerabilities.
|
[
"cpe:2.3:a:phpgurukul:hospital_management_system:4.0:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 | null |
|
CVE-2023-25150
|
Document content of files can be obtained through Collabora for files of other users
|
Nextcloud office/richdocuments is an office suit for the nextcloud server platform. In affected versions the Collabora integration can be tricked to provide access to any file without proper permission validation. As a result any user with access to Collabora can obtain the content of other users files. It is recommended that the Nextcloud Office App (Collabora Integration) is updated to 7.0.2 (Nextcloud 25), 6.3.2 (Nextcloud 24), 5.0.10 (Nextcloud 23), 4.2.9 (Nextcloud 21-22), or 3.8.7 (Nextcloud 15-20). There are no known workarounds for this issue.
|
[
"cpe:2.3:a:nextcloud:richdocuments:*:*:*:*:*:*:*:*"
] | null | 5.8 | null | null | null |
GHSA-cq5h-qx7v-mjg5
|
A vulnerability was discovered in BMC MyIT Digital Workplace DWP before 18.11. The DWP component sso.session.restore.cookies stores data using java serialization method. The vulnerability can be triggered by using an ivalid cookie that contains an embedded system command within a DWP API call, as demonstrated by the /dwp/rest/v2/administrator URI.
|
[] | null | 9.8 | null | null | null |
|
GHSA-r2mm-qr53-2j54
|
Race condition in the Firewall Authentication Proxy feature in Cisco IOS 12.0 through 12.4 allows remote attackers to bypass authentication, or bypass the consent web page, via a crafted request, aka Bug ID CSCsy15227.
|
[] | null | null | null | null | null |
|
CVE-2022-24099
|
Adobe Photoshop Font Parsing Out-Of-Bounds Read Information Disclosure Vulnerability
|
Adobe Photoshop versions 22.5.6 (and earlier)and 23.2.2 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[
"cpe:2.3:a:adobe:photoshop:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 3.3 | null | null | null |
CVE-2024-10334
|
Camera passwords stored in clear text
|
A vulnerability exists in the VideONet product included in the listed System 800xA versions, where VideONet is used.
An attacker who successfully exploited the vulnerability could, in the worst case scenario, stop or manipulate the video feed.
This issue affects System 800xA: 5.1.X; System 800xA: 6.0.3.X; System 800xA: 6.1.1.X; System 800xA: 6.2.X.
|
[] | 7 | 7.3 | null | null | null |
GHSA-56v4-v5wq-q58f
|
Reflected XSS in wordpress plugin parsi-font v4.2.5
|
[] | null | null | 6.1 | null | null |
|
CVE-2022-42281
|
NVIDIA DGX A100 contains a vulnerability in SBIOS in the FsRecovery, which may allow a highly privileged local attacker to cause an out-of-bounds write, which may lead to code execution, denial of service, compromised integrity, and information disclosure.
|
[
"cpe:2.3:o:nvidia:dgx_a100_firmware:*:*:*:*:sbios:*:*:*",
"cpe:2.3:h:nvidia:dgx_a100:-:*:*:*:*:*:*:*"
] | null | 6.7 | null | null | null |
|
GHSA-mxmw-6qgj-h67x
|
Jenkins PRQA Plugin stored password in plain text
|
Jenkins PRQA Plugin stored a password unencrypted in its global configuration file on the Jenkins controller. This password could be viewed by users with access to the Jenkins controller file system.The plugin now stores the password encrypted in the configuration files on disk.
|
[] | null | null | 3.3 | null | null |
cisco-sa-fmc-xss-sK2gkfvJ
|
Cisco Firepower Management Center Software Cross-Site Scripting Vulnerabilities
|
Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device.
These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information. In some cases, it is also possible to cause a temporary availability impact to portions of the FMC Dashboard.
Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.
This advisory is part of the November 2023 release of the Cisco ASA, FTD, and FMC Security Advisory Bundled publication. For a complete list of the advisories and links to them, see Cisco Event Response: November 2023 Semiannual Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication ["https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-74985"].
|
[] | null | 6.1 | null | null | null |
GHSA-mj96-jcmr-6947
|
VTiger CRM <= 8.1.0 does not correctly check user privileges. A low-privileged user can interact directly with the "Migration" administrative module to disable arbitrary modules.
|
[] | null | 8.3 | null | null | null |
|
GHSA-grfg-6c65-69m4
|
IBM Cloud Pak for Security (CP4S) 1.10.0.0 through 1.10.2.0 could allow an authenticated user to obtain highly sensitive information or perform unauthorized actions due to improper input validation. IBM X-Force ID: 233777.
|
[] | null | 8.1 | null | null | null |
|
CVE-2022-45550
|
AyaCMS 3.1.2 is vulnerable to Remote Code Execution (RCE).
|
[
"cpe:2.3:a:ayacms_project:ayacms:3.1.2:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
|
ICSA-20-098-04
|
Fuji Electric V-Server Lite
|
The buffer allocated to read data, when parsing VPR files, is too small.CVE-2020-10646 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been assigned; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).
|
[] | null | null | 7.8 | null | null |
CVE-2024-47146
|
Ruijie Reyee OS Resource Leak
|
Ruijie Reyee OS versions 2.206.x up to but not including 2.320.x could allow an attacker to obtain the devices serial number if physically adjacent and sniffing the RAW WIFI signal.
|
[
"cpe:2.3:o:ruijienetworks:reyee_os:*:*:*:*:*:*:*:*"
] | 7.1 | 6.5 | null | null | null |
ICSA-20-287-06
|
Siemens SIPORT MP
|
Vulnerable versions of the device could allow an authenticated attacker to impersonate other users of the system and perform (potentially administrative) actions on behalf of those users if the single sign-on feature ('Allow logon without password') is enabled.
|
[] | null | 8.8 | null | null | null |
CVE-2006-7207
|
Buffer overflow in ageet AGEphone before 1.4.0 might allow remote attackers to have an unknown impact via unspecified vectors.
|
[
"cpe:2.3:a:ageet:agephone:*:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
GHSA-qmfg-pfxw-q9rj
|
TP-Link TL-WR840N EU v6.20 was discovered to contain insecure protections for its UART console. This vulnerability allows attackers to connect to the UART port via a serial connection and execute commands as the root user without authentication.
|
[] | null | 6.8 | null | null | null |
|
CVE-2023-24838
|
HGiga PowerStation - Information Leakage
|
HGiga PowerStation has a vulnerability of Information Leakage. An unauthenticated remote attacker can exploit this vulnerability to obtain the administrator's credential. This credential can then be used to login PowerStation or Secure Shell to achieve remote code execution.
|
[
"cpe:2.3:o:hgiga:powerstation_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hgiga:powerstation:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
CVE-2018-16497
|
In Versa Analytics, the cron jobs are used for scheduling tasks by executing commands at specific dates and times on the server. If the job is run as the user root, there is a potential privilege escalation vulnerability. In this case, the job runs a script as root that is writable by users who are members of the versa group.
|
[
"cpe:2.3:a:versa-networks:versa_analytics:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | 7.2 | null |
|
GHSA-xp9g-ff98-2ffp
|
A NULL pointer dereference in XFAForm::scanFields in XFAForm.cc in xpdf 4.00 allows attackers to launch denial of service via a specific pdf file, as demonstrated by pdftohtml.
|
[] | null | null | 5.5 | null | null |
|
CVE-2025-1086
|
Safetytest Cloud-Master Server static path traversal
|
A vulnerability has been found in Safetytest Cloud-Master Server up to 1.1.1 and classified as critical. This vulnerability affects unknown code of the file /static/. The manipulation leads to path traversal: '../filedir'. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
|
[] | 6.9 | 5.3 | 5.3 | 5 | null |
CVE-2010-4184
|
NetSupport Manager (NSM) before 11.00.0005 sends HTTP headers with cleartext fields containing details about client machines, which allows remote attackers to obtain potentially sensitive information by sniffing the network.
|
[
"cpe:2.3:a:netsupportsoftware:netsupport_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netsupportsoftware:netsupport_manager:5.00:*:*:*:*:*:*:*",
"cpe:2.3:a:netsupportsoftware:netsupport_manager:5.01:*:*:*:*:*:*:*",
"cpe:2.3:a:netsupportsoftware:netsupport_manager:5.02:*:*:*:*:*:*:*",
"cpe:2.3:a:netsupportsoftware:netsupport_manager:5.02_f1:*:*:*:*:*:*:*",
"cpe:2.3:a:netsupportsoftware:netsupport_manager:5.03:*:*:*:*:*:*:*",
"cpe:2.3:a:netsupportsoftware:netsupport_manager:5.05:*:*:*:*:*:*:*",
"cpe:2.3:a:netsupportsoftware:netsupport_manager:5.30:*:*:*:*:*:*:*",
"cpe:2.3:a:netsupportsoftware:netsupport_manager:5.31:*:*:*:*:*:*:*",
"cpe:2.3:a:netsupportsoftware:netsupport_manager:6.00:*:*:*:*:*:*:*",
"cpe:2.3:a:netsupportsoftware:netsupport_manager:6.10:*:*:*:*:*:*:*",
"cpe:2.3:a:netsupportsoftware:netsupport_manager:6.11:*:*:*:*:*:*:*",
"cpe:2.3:a:netsupportsoftware:netsupport_manager:7.01:*:*:*:*:*:*:*",
"cpe:2.3:a:netsupportsoftware:netsupport_manager:7.10:*:*:*:*:*:*:*",
"cpe:2.3:a:netsupportsoftware:netsupport_manager:8.00:*:*:*:*:*:*:*",
"cpe:2.3:a:netsupportsoftware:netsupport_manager:8.10:*:*:*:*:*:*:*",
"cpe:2.3:a:netsupportsoftware:netsupport_manager:8.50:*:*:*:*:*:*:*",
"cpe:2.3:a:netsupportsoftware:netsupport_manager:8.60:*:*:*:*:*:*:*",
"cpe:2.3:a:netsupportsoftware:netsupport_manager:9.00:*:*:*:*:*:*:*",
"cpe:2.3:a:netsupportsoftware:netsupport_manager:9.10:*:*:*:*:*:*:*",
"cpe:2.3:a:netsupportsoftware:netsupport_manager:9.50:*:*:*:*:*:*:*",
"cpe:2.3:a:netsupportsoftware:netsupport_manager:9.60:*:*:*:*:*:*:*",
"cpe:2.3:a:netsupportsoftware:netsupport_manager:10.00:*:*:*:*:*:*:*",
"cpe:2.3:a:netsupportsoftware:netsupport_manager:10.20:*:*:*:*:*:*:*",
"cpe:2.3:a:netsupportsoftware:netsupport_manager:10.30:*:*:*:*:*:*:*",
"cpe:2.3:a:netsupportsoftware:netsupport_manager:10.50:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
CVE-2022-20399
|
In the SEPolicy configuration of system apps, there is a possible access to the 'ip' utility due to an insecure default value. This could lead to local information disclosure of network data with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-219808546References: Upstream kernel
|
[
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
|
GHSA-jv76-h7hf-p5wh
|
A vulnerability has been identified in Solid Edge SE2021 (All Versions < SE2021MP7). The PSKERNEL.dll library in affected application lacks proper validation while parsing user-supplied OBJ files that could lead to a use-after-free condition. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-13777)
|
[] | null | null | null | null | null |
|
CVE-2016-10878
|
The wp-google-map-plugin plugin before 3.1.2 for WordPress has XSS.
|
[
"cpe:2.3:a:flippercode:wp_google_map:*:*:*:*:*:wordpress:*:*"
] | null | 6.1 | null | 4.3 | null |
|
CVE-2008-0456
|
CRLF injection vulnerability in the mod_negotiation module in the Apache HTTP Server 2.2.6 and earlier in the 2.2.x series, 2.0.61 and earlier in the 2.0.x series, and 1.3.39 and earlier in the 1.3.x series allows remote authenticated users to inject arbitrary HTTP headers and conduct HTTP response splitting attacks by uploading a file with a multi-line name containing HTTP header sequences and a file extension, which leads to injection within a (1) "406 Not Acceptable" or (2) "300 Multiple Choices" HTTP response when the extension is omitted in a request for the file.
|
[
"cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*"
] | null | null | null | 2.6 | null |
|
GHSA-2856-c9gx-h7rp
|
Alibaba HTTP server allows remote attackers to read files via a .. (dot dot) attack.
|
[] | null | null | null | null | null |
|
CVE-2020-25133
|
An issue was discovered in Observium Professional, Enterprise & Community 20.8.10631. It is vulnerable to directory traversal and local file inclusion due to the fact that there is an unrestricted possibility of loading any file with an inc.php extension. Inclusion of other files (even though limited to the mentioned extension) can lead to Remote Code Execution. This can occur via /ports/?format=../ URIs to pages/ports.inc.php.
|
[
"cpe:2.3:a:observium:observium:20.8.10631:*:*:*:community:*:*:*",
"cpe:2.3:a:observium:observium:20.8.10631:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:observium:observium:20.8.10631:*:*:*:professional:*:*:*"
] | null | 8.8 | null | 6.5 | null |
|
GHSA-4x8x-2pc3-p82q
|
An elevation of privilege vulnerability in the Qualcomm ADSPRPC driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-34112914. References: QC-CR#1110747.
|
[] | null | null | 7 | null | null |
|
GHSA-g4h5-9rrr-q667
|
A insufficient verification of data authenticity vulnerability [CWE-345] in FortiAnalyzer version 7.4.0 and below 7.2.3 allows a remote unauthenticated attacker to send messages to the syslog server of FortiAnalyzer via the knoweldge of an authorized device serial number.
|
[] | null | 5.3 | null | null | null |
|
CVE-2007-4815
|
Multiple PHP remote file inclusion vulnerabilities in WebED in Markus Iser ED Engine 0.8999 alpha allow remote attackers to execute arbitrary PHP code via a URL in the Codebase parameter to (1) channeledit.php, (2) post.php, (3) view.php, or (4) viewitem.php in source/mod/rss/.
|
[
"cpe:2.3:a:markus_iser:ed_engine:0.8999_alpha:*:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
CVE-2024-20830
|
Incorrect default permission in AppLock prior to SMR MAr-2024 Release 1 allows local attackers to configure AppLock settings.
|
[] | null | 5.3 | null | null | null |
|
CVE-2012-6090
|
Multiple stack-based buffer overflows in the expand function in os/pl-glob.c in SWI-Prolog before 6.2.5 and 6.3.x before 6.3.7 allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted filename.
|
[
"cpe:2.3:a:swi-prolog:swi-prolog:*:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:5.6.50:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:5.6.51:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:5.6.52:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:5.6.53:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:5.6.54:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:5.6.55:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:5.6.56:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:5.6.57:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:5.6.58:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:5.6.59:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:5.6.61:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:5.6.62:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:5.6.63:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:5.6.64:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:5.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:5.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:5.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:5.8.3:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:5.10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:5.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:5.10.2:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:5.10.3:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:5.10.4:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:5.10.5:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:6.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:6.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:6.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:6.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:6.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:6.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:6.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:6.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:6.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:6.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:6.3.6:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-jf9h-v46r-899c
|
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley MicroStation CONNECT 10.16.2.034. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of IFC files. Crafted data in an IFC file can trigger a read past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-16573.
|
[] | null | 7.8 | null | null | null |
|
CVE-2024-51747
|
Arbitrary File Read and Delete in kanboard
|
Kanboard is project management software that focuses on the Kanban methodology. An authenticated Kanboard admin can read and delete arbitrary files from the server. File attachments, that are viewable or downloadable in Kanboard are resolved through its `path` entry in the `project_has_files` SQLite db. Thus, an attacker who can upload a modified sqlite.db through the dedicated feature, can set arbitrary file links, by abusing path traversals. Once the modified db is uploaded and the project page is accessed, a file download can be triggered and all files, readable in the context of the Kanboard application permissions, can be downloaded. This issue has been addressed in version 1.2.42 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
|
[
"cpe:2.3:a:kanboard:kanboard:*:*:*:*:*:*:*:*"
] | null | 9.1 | null | null | null |
RHSA-2007:0965
|
Red Hat Security Advisory: ruby security update
|
Net: HTTP insufficient verification of SSL certificate net:: * modules
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null | null |
CVE-2020-27230
|
A number of exploitable SQL injection vulnerabilities exists in ‘patientslist.do’ page of OpenClinic GA 5.173.3 application. The findSector parameter in ‘‘patientslist.do’ page is vulnerable to authenticated SQL injection An attacker can make an authenticated HTTP request to trigger this vulnerability.
|
[
"cpe:2.3:a:openclinic_ga_project:openclinic_ga:5.173.3:*:*:*:*:*:*:*"
] | null | null | 6.4 | null | null |
|
GHSA-p4qx-pmxg-37rx
|
Multiple SQL injection vulnerabilities in PHP-Nuke 7.8 allow remote attackers to modify SQL queries and execute arbitrary PHP code via (1) the username parameter in the Your Account page, (2) the url parameter in the Downloads module, and (3) the description parameter in the Web_Links module.
|
[] | null | null | null | null | null |
|
GHSA-74gf-m3p3-28x4
|
SmartAgent v1.1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /tests/interface.php.
|
[] | null | 9.8 | null | null | null |
|
CVE-2023-27973
|
Certain HP LaserJet Pro print products are potentially vulnerable to Heap Overflow and/or Remote Code Execution.
|
[
"cpe:2.3:o:hp:laserjet_pro_m304-m305_w1a46a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_pro_m304-m305_w1a46a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:laserjet_pro_m304-m305_w1a47a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_pro_m304-m305_w1a47a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:laserjet_pro_m304-m305_w1a48a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_pro_m304-m305_w1a48a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:laserjet_pro_m304-m305_w1a66a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_pro_m304-m305_w1a66a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:laserjet_pro_m404-m405_93m22a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_pro_m404-m405_93m22a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:laserjet_pro_m404-m405_w1a51a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_pro_m404-m405_w1a51a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:laserjet_pro_m404-m405_w1a52a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_pro_m404-m405_w1a52a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:laserjet_pro_m404-m405_w1a53a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_pro_m404-m405_w1a53a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:laserjet_pro_m404-m405_w1a56a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_pro_m404-m405_w1a56a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:laserjet_pro_m404-m405_w1a57a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_pro_m404-m405_w1a57a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:laserjet_pro_m404-m405_w1a58a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_pro_m404-m405_w1a58a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:laserjet_pro_m404-m405_w1a59a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_pro_m404-m405_w1a59a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:laserjet_pro_m404-m405_w1a60a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_pro_m404-m405_w1a60a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:laserjet_pro_m404-m405_w1a63a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_pro_m404-m405_w1a63a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:laserjet_pro_m453-m454_w1y40a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_pro_m453-m454_w1y40a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:laserjet_pro_m453-m454_w1y41a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_pro_m453-m454_w1y41a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:laserjet_pro_m453-m454_w1y43a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_pro_m453-m454_w1y43a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:laserjet_pro_m453-m454_w1y44a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_pro_m453-m454_w1y44a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:laserjet_pro_m453-m454_w1y45a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_pro_m453-m454_w1y45a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:laserjet_pro_m453-m454_w1y46a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_pro_m453-m454_w1y46a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:laserjet_pro_m453-m454_w1y47a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_pro_m453-m454_w1y47a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:laserjet_pro_mfp_m428-m429_f_w1a29a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_pro_mfp_m428-m429_f_w1a29a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:laserjet_pro_mfp_m428-m429_f_w1a30a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_pro_mfp_m428-m429_f_w1a30a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:laserjet_pro_mfp_m428-m429_f_w1a32a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_pro_mfp_m428-m429_f_w1a32a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:laserjet_pro_mfp_m428-m429_f_w1a34a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_pro_mfp_m428-m429_f_w1a34a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:laserjet_pro_mfp_m428-m429_f_w1a35a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_pro_mfp_m428-m429_f_w1a35a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:laserjet_pro_mfp_m428-m429_f_w1a38a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_pro_mfp_m428-m429_f_w1a38a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:laserjet_pro_mfp_m428-m429_w1a28a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_pro_mfp_m428-m429_w1a28a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:laserjet_pro_mfp_m428-m429_w1a31a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_pro_mfp_m428-m429_w1a31a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:laserjet_pro_mfp_m428-m429_w1a33a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_pro_mfp_m428-m429_w1a33a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:laserjet_pro_mfp_m478-m479_w1a75a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_pro_mfp_m478-m479_w1a75a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:laserjet_pro_mfp_m478-m479_w1a76a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_pro_mfp_m478-m479_w1a76a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:laserjet_pro_mfp_m478-m479_w1a77a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_pro_mfp_m478-m479_w1a77a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:laserjet_pro_mfp_m478-m479_w1a78a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_pro_mfp_m478-m479_w1a78a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:laserjet_pro_mfp_m478-m479_w1a79a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_pro_mfp_m478-m479_w1a79a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:laserjet_pro_mfp_m478-m479_w1a80a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_pro_mfp_m478-m479_w1a80a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:laserjet_pro_mfp_m478-m479_w1a81a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_pro_mfp_m478-m479_w1a81a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:laserjet_pro_mfp_m478-m479_w1a82a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:laserjet_pro_mfp_m478-m479_w1a82a:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
|
CVE-2020-7274
|
ENS elevated permissions vulnerability
|
Privilege escalation vulnerability in McTray.exe in McAfee Endpoint Security (ENS) for Windows Prior to 10.7.0 April 2020 Update allows local users to spawn unrelated processes with elevated privileges via the system administrator granting McTray.exe elevated privileges (by default it runs with the current user's privileges).
|
[
"cpe:2.3:a:mcafee:endpoint_security:10.5.0:*:*:*:*:windows:*:*",
"cpe:2.3:a:mcafee:endpoint_security:10.5.1:*:*:*:*:windows:*:*",
"cpe:2.3:a:mcafee:endpoint_security:10.5.2:*:*:*:*:windows:*:*",
"cpe:2.3:a:mcafee:endpoint_security:10.5.3:*:*:*:*:windows:*:*",
"cpe:2.3:a:mcafee:endpoint_security:10.5.4:*:*:*:*:windows:*:*",
"cpe:2.3:a:mcafee:endpoint_security:10.5.5:*:*:*:*:windows:*:*",
"cpe:2.3:a:mcafee:endpoint_security:10.6.0:*:*:*:*:windows:*:*"
] | null | 6.6 | null | null | null |
CVE-2008-4360
|
mod_userdir in lighttpd before 1.4.20, when a case-insensitive operating system or filesystem is used, performs case-sensitive comparisons on filename components in configuration options, which might allow remote attackers to bypass intended access restrictions, as demonstrated by a request for a .PHP file when there is a configuration rule for .php files.
|
[
"cpe:2.3:a:lighttpd:lighttpd:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-ffr4-qpj4-f769
|
M-Core stores the database under the web document root, which allows remote attackers to obtain sensitive information via a direct request to db/uyelik.mdb.
|
[] | null | null | null | null | null |
|
CVE-2025-54611
|
EXTRA_REFERRER resource read vulnerability in the Gallery module.
Impact: Successful exploitation of this vulnerability may affect service confidentiality.
|
[] | null | 7.3 | null | null | null |
|
GHSA-xxxh-xcx8-7g7r
|
Cross-site scripting (XSS) vulnerability in the Twitter Search (twittersearch) extension before 0.1.1 for TYPO3 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
|
[] | null | null | null | null | null |
|
GHSA-c558-w58v-5fw4
|
A remote code execution vulnerability exists in Microsoft Word software when it fails to properly handle objects in memory, aka "Microsoft Word Remote Code Execution Vulnerability." This affects Microsoft Word, Office 365 ProPlus, Microsoft Office. This CVE ID is unique from CVE-2018-8539.
|
[] | null | null | 7.8 | null | null |
|
GHSA-6gwx-p5v3-gp7v
|
Windows Mobile Broadband Driver Remote Code Execution Vulnerability
|
[] | null | 6.8 | null | null | null |
|
CVE-2022-36027
|
Segfault TFLite converter on per-channel quantized transposed convolutions in TensorFlow
|
TensorFlow is an open source platform for machine learning. When converting transposed convolutions using per-channel weight quantization the converter segfaults and crashes the Python process. We have patched the issue in GitHub commit aa0b852a4588cea4d36b74feb05d93055540b450. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
|
[
"cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*",
"cpe:2.3:a:google:tensorflow:2.10:rc0:*:*:*:*:*:*",
"cpe:2.3:a:google:tensorflow:2.10:rc1:*:*:*:*:*:*",
"cpe:2.3:a:google:tensorflow:2.10:rc2:*:*:*:*:*:*",
"cpe:2.3:a:google:tensorflow:2.10:rc3:*:*:*:*:*:*"
] | null | 5.9 | null | null | null |
GHSA-c83x-hjxm-j4gf
|
An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. macOS before 10.12.6 is affected. tvOS before 10.2.2 is affected. watchOS before 3.2.3 is affected. The issue involves the "Kernel" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app.
|
[] | null | null | 7.8 | null | null |
|
cisco-sa-20190220-fpwr-ssltls-dos
|
Cisco Firepower Threat Defense Software SSL or TLS Denial of Service Vulnerability
|
A vulnerability in the detection engine of Cisco Firepower Threat Defense Software could allow an unauthenticated, remote attacker to cause the unexpected restart of the SNORT detection engine, resulting in a denial of service (DoS) condition.
The vulnerability is due to the incomplete error handling of the SSL or TLS packet header during the connection establishment. An attacker could exploit this vulnerability by sending a crafted SSL or TLS packet during the connection handshake. An exploit could allow the attacker to cause the SNORT detection engine to unexpectedly restart, resulting in a partial DoS condition while the detection engine restarts.
There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190220-fpwr-ssltls-dos ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190220-fpwr-ssltls-dos"]
|
[] | null | null | 5.8 | null | null |
GHSA-rc27-7vgm-6rx5
|
Multiple PHP remote file inclusion vulnerabilities in CyBoards PHP Lite 1.21 allow remote attackers to execute arbitrary PHP code via a URL in the script_path parameter to (1) flat_read.php, (2) post.php, (3) process_post.php, (4) process_search.php, (5) forum.php, (6) process_subscribe.php, (7) read.php, (8) search.php, (9) subscribe.php in path/; and (10) add_ban.php, (11) add_ban_form.php, (12) add_board.php, (13) add_vip.php, (14) add_vip_form.php, (15) copy_ban.php, (16) copy_vip.php, (17) delete_ban.php, (18) delete_board.php, (19) delete_messages.php, (20) delete_vip.php, (21) edit_ban.php, (22) edit_board.php, (23) edit_vip.php, (24) index.php, (25) lock_messages.php, (26) login.php, (27) modify_ban_list.php, (28) modify_vip_list.php, (29) move_messages.php, (30) process_add_board.php, (31) process_ban.php, (32) process_delete_ban.php, (33) process_delete_board.php, (34) process_delete_messages.php, (35) process_delete_vip.php, (36) process_edit_board.php, (37) process_lock_messages.php, (38) process_login.php, (39) process_move_messages.php, (40) process_sticky_messages.php, (41) process_vip.php, and (42) sticky_messages.php in path/adminopts. NOTE: the include/common.php vector is covered by CVE-2006-2871. NOTE: some of these vectors might not be vulnerabilities under proper installation.
|
[] | null | null | null | null | null |
|
GHSA-6f77-7m76-pqgc
|
A vulnerability classified as critical has been found in SourceCodester Online Computer and Laptop Store 1.0. Affected is the function register of the file Master.php. The manipulation of the argument email leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-241254 is the identifier assigned to this vulnerability.
|
[] | null | null | 7.3 | null | null |
|
GHSA-9ww8-p9mv-xgqx
|
An issue found in FLIR-DVTEL version not specified allows a remote attacker to execute arbitrary code via a crafted request to the management page of the device.
|
[] | null | 9.8 | null | null | null |
|
CVE-2017-11853
|
Windows kernel in Windows 7 SP1, Windows Server 2008 SP2 and R2 SP1, Windows 8.1 and RT 8.1, Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and 1709, Windows Server 2016, and Windows Server, version 1709 allows an attacker to log in and run a specially crafted application due to the Windows kernel improperly initializing a memory address, aka "Windows Kernel Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-11842, CVE-2017-11849, and CVE-2017-11851.
|
[
"cpe:2.3:o:microsoft:windows_10:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:itanium:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*",
"cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*"
] | null | null | 5.5 | 4.3 | null |
|
GHSA-2pgm-5x83-qh65
|
RuoYi v3.8.3 has a Weak password vulnerability in the management system.
|
[] | null | 9.8 | null | null | null |
|
GHSA-6wx2-xqp3-gggw
|
Cisco 6000, 6500, and 7600 series systems with Multilayer Switch Feature Card 2 (MSFC2) and a FlexWAN or OSM module allow local users to cause a denial of service (hang or reset) by sending a layer 2 frame packet that encapsulates a layer 3 packet, but has inconsistent length values with that packet.
|
[] | null | null | null | null | null |
|
GHSA-jp3f-6v6c-9w56
|
Format string vulnerability in Easy Address Book Web Server 1.2 allows remote attackers to cause a denial of service (crash) or "compromise the server" via encoded format string specifiers in the query string.
|
[] | null | null | null | null | null |
|
GHSA-grvr-p5w5-26pc
|
An issue was discovered in DouCo DouPHP 1.5 20181221. It allows full path disclosure in "Smarty error: unable to read resource" error messages for a crafted installation page.
|
[] | null | null | 5.3 | null | null |
|
GHSA-hcm7-xw9m-99cx
|
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.35 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
|
[] | null | 4.9 | null | null | null |
|
PYSEC-2024-255
| null |
Gradio before 4.20 allows credential leakage on Windows.
|
[] | null | null | null | null | null |
GHSA-q69v-fxm4-rmj3
|
Integer underflow in the CDownloadSink class code in the Vector Markup Language (VML) component (VGX.DLL), as used in Internet Explorer 5.01, 6, and 7 allows remote attackers to execute arbitrary code via compressed content with an invalid buffer size, which triggers a heap-based buffer overflow.
|
[] | null | null | null | null | null |
|
GHSA-fr8g-9wgw-f9rw
|
Cross-site scripting (XSS) vulnerability in GuestbookXL 1.3 allows remote attackers to inject arbitrary web script or HTML via a javascript URI in an IMG tag in a comment field to (1) guestwrite.php or (2) guestbook.php.
|
[] | null | null | null | null | null |
|
CVE-2025-2388
|
Keytop 路内停车收费系统 API getParks improper authentication
|
A vulnerability was found in Keytop 路内停车收费系统 2.7.1. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /saas/commonApi/park/getParks of the component API. The manipulation leads to improper authentication. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
|
[] | 6.9 | 7.3 | 7.3 | 7.5 | null |
CVE-2024-26856
|
net: sparx5: Fix use after free inside sparx5_del_mact_entry
|
In the Linux kernel, the following vulnerability has been resolved:
net: sparx5: Fix use after free inside sparx5_del_mact_entry
Based on the static analyzis of the code it looks like when an entry
from the MAC table was removed, the entry was still used after being
freed. More precise the vid of the mac_entry was used after calling
devm_kfree on the mac_entry.
The fix consists in first using the vid of the mac_entry to delete the
entry from the HW and after that to free it.
|
[] | null | null | null | null | null |
GHSA-vgr2-h473-jfqv
|
The RenderTable::simplifiedNormalFlowLayout function in core/rendering/RenderTable.cpp in Blink, as used in Google Chrome before 40.0.2214.91, skips captions during table layout in certain situations, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors related to the Fonts implementation.
|
[] | null | null | null | null | null |
|
CVE-2019-1334
|
An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory, aka 'Windows Kernel Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2019-1345.
|
[
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
] | null | 5.5 | null | 2.1 | null |
|
CVE-2022-28085
|
A flaw was found in htmldoc commit 31f7804. A heap buffer overflow in the function pdf_write_names in ps-pdf.cxx may lead to arbitrary code execution and Denial of Service (DoS).
|
[
"cpe:2.3:a:htmldoc_project:htmldoc:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | 6.8 | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.