id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 38
232
⌀ |
---|---|---|---|---|---|---|---|---|
CVE-2025-54131
|
Cursor bypasses its allow list to execute arbitrary commands
|
Cursor is a code editor built for programming with AI. In versions below 1.3, an attacker can bypass the allow list in auto-run mode with a backtick (`) or $(cmd). If a user has swapped Cursor from its default settings (requiring approval for every terminal call) to an allowlist, an attacker can execute arbitrary command execution outside of the allowlist without user approval. An attacker can trigger this vulnerability if chained with indirect prompt injection. This is fixed in version 1.3.
|
[] | null | 6.4 | null | null | null |
GHSA-6mw8-7v66-9f5v
|
Unrestricted file upload vulnerability in the DownloadsPlus module in PHP-Nuke allows remote attackers to execute arbitrary code by uploading a file with (1) .htm, (2) .html, or (3) .txt extensions, then accessing it via a direct request to the file. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. NOTE: it is unclear how allowing the upload of .html or .txt files supports arbitrary code execution; this might be legitimate functionality.
|
[] | null | null | null | null | null |
|
GHSA-h496-35px-76wp
|
An issue in the TP-Link MQTT Broker and API gateway of TP-Link Kasa KP125M v1.0.3 allows attackers to establish connections by impersonating devices owned by other users.
|
[] | null | 7.6 | null | null | null |
|
CVE-2020-13396
|
An issue was discovered in FreeRDP before 2.1.1. An out-of-bounds (OOB) read vulnerability has been detected in ntlm_read_ChallengeMessage in winpr/libwinpr/sspi/NTLM/ntlm_message.c.
|
[
"cpe:2.3:a:freerdp:freerdp:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"
] | null | 7.1 | null | 5.5 | null |
|
GHSA-p957-6gfm-79hj
|
In the Linux kernel, the following vulnerability has been resolved:kthread: unpark only parked kthreadCalling into kthread unparking unconditionally is mostly harmless when
the kthread is already unparked. The wake up is then simply ignored
because the target is not in TASK_PARKED state.However if the kthread is per CPU, the wake up is preceded by a call
to kthread_bind() which expects the task to be inactive and in
TASK_PARKED state, which obviously isn't the case if it is unparked.As a result, calling kthread_stop() on an unparked per-cpu kthread
triggers such a warning:Fix this with skipping unecessary unparking while stopping a kthread.
|
[] | null | 5.5 | null | null | null |
|
CVE-2016-10320
|
textract before 1.5.0 allows OS Command Injection attacks via a filename in a call to the process function. This may be a remote attack if a web application accepts names of arbitrary uploaded files.
|
[
"cpe:2.3:a:textract_project:textract:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | 9.3 | null |
|
CVE-2006-1698
|
Cross-site scripting (XSS) vulnerability in Matt Wright Guestbook 2.3.1 allows remote attackers to execute arbitrary web script or HTML via the (1) url, (2) city, (3) state, or (4) country parameters. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information, although it is likely that they are the result of post-disclosure analysis.
|
[
"cpe:2.3:a:matt_wright:matt_wright_guestbook:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-644f-fx6f-4895
|
An issue was discovered on Wireless IP Camera 360 devices. Attackers can read recordings by navigating to /mnt/idea0 or /mnt/idea1 on the SD memory card.
|
[] | null | null | 7.5 | null | null |
|
RHSA-2016:0053
|
Red Hat Security Advisory: java-1.7.0-openjdk security update
|
OpenJDK: protected methods can be used as interface methods via DirectMethodHandle (Libraries) TLS 1.2 Transcipt Collision attacks against MD5 in key exchange protocol (SLOTH) OpenJDK: URL deserialization inconsistencies (Networking, 8059054) OpenJDK: logging of RMI connection secrets (JMX, 8130710) OpenJDK: insufficient enforcement of totalEntitySizeLimit (JAXP, 8133962) OpenJDK: incorrect boundary check in JPEG decoder (AWT, 8139017) ICU: integer signedness issue in IndicRearrangementProcessor (OpenJDK 2D, 8140543)
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null | null |
CVE-2023-24678
|
A vulnerability in Centralite Pearl Thermostat 0x04075010 allows attackers to cause a Denial of Service (DoS) via a crafted Zigbee message.
|
[
"cpe:2.3:o:centralite:pearl_firmware:0x04075010:*:*:*:*:*:*:*",
"cpe:2.3:h:centralite:pearl:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
|
CVE-2020-10103
|
An XSS issue was discovered in Zammad 3.0 through 3.2. Malicious code can be provided by a low-privileged user through the File Upload functionality in Zammad. The malicious JavaScript will execute within the browser of any user who opens a specially crafted link to the uploaded file with an active Zammad session.
|
[
"cpe:2.3:a:zammad:zammad:*:*:*:*:*:*:*:*"
] | null | 5.4 | null | 3.5 | null |
|
CVE-2005-3147
|
StoreBackup before 1.19 creates the backup root with world-readable permissions, which allows local users to obtain sensitive information.
|
[
"cpe:2.3:a:storebackup:storebackup:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:storebackup:storebackup:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:storebackup:storebackup:1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:storebackup:storebackup:1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:storebackup:storebackup:1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:storebackup:storebackup:1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:storebackup:storebackup:1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:storebackup:storebackup:1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:storebackup:storebackup:1.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:storebackup:storebackup:1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:storebackup:storebackup:1.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:storebackup:storebackup:1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:storebackup:storebackup:1.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:storebackup:storebackup:1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:storebackup:storebackup:1.12:*:*:*:*:*:*:*",
"cpe:2.3:a:storebackup:storebackup:1.12.1:*:*:*:*:*:*:*",
"cpe:2.3:a:storebackup:storebackup:1.12.2:*:*:*:*:*:*:*",
"cpe:2.3:a:storebackup:storebackup:1.13:*:*:*:*:*:*:*",
"cpe:2.3:a:storebackup:storebackup:1.14:*:*:*:*:*:*:*",
"cpe:2.3:a:storebackup:storebackup:1.15:*:*:*:*:*:*:*",
"cpe:2.3:a:storebackup:storebackup:1.16:*:*:*:*:*:*:*",
"cpe:2.3:a:storebackup:storebackup:1.16.1:*:*:*:*:*:*:*",
"cpe:2.3:a:storebackup:storebackup:1.16.2:*:*:*:*:*:*:*",
"cpe:2.3:a:storebackup:storebackup:1.17:*:*:*:*:*:*:*",
"cpe:2.3:a:storebackup:storebackup:1.18:*:*:*:*:*:*:*",
"cpe:2.3:a:storebackup:storebackup:1.18.1:*:*:*:*:*:*:*",
"cpe:2.3:a:storebackup:storebackup:1.18.2:*:*:*:*:*:*:*",
"cpe:2.3:a:storebackup:storebackup:1.18.3:*:*:*:*:*:*:*",
"cpe:2.3:a:storebackup:storebackup:1.18.4:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:*:*:*:*:*:*:*:*"
] | null | null | null | 2.1 | null |
|
GHSA-gv68-f32v-3whx
|
The IMAP server in IMail Server 8.20 in Ipswitch Collaboration Suite (ICS) before 2.02 allows remote attackers to cause a denial of service (crash) via a long argument to the LIST command, which causes IMail Server to reference invalid memory.
|
[] | null | null | null | null | null |
|
GHSA-jcrr-rr6w-8c83
|
free5GC AMF denial of service vulnerability
|
An issue was discovered in free5GC version 3.3.0, allows remote attackers to execute arbitrary code and cause a denial of service (DoS) on AMF component via crafted NGAP message.
|
[] | null | 7.5 | null | null | null |
CVE-2020-27635
|
In PicoTCP 1.7.0, TCP ISNs are improperly random.
|
[
"cpe:2.3:a:capgemini:picotcp:1.7.0:*:*:*:*:*:*:*"
] | null | 9.1 | null | null | null |
|
CVE-2021-28329
|
Remote Procedure Call Runtime Remote Code Execution Vulnerability
|
Remote Procedure Call Runtime Remote Code Execution Vulnerability
|
[
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1803:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1803:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_1909:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2004:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_20h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_server_2008_r2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012_r2:*:*:*:*:*:*:x64:*"
] | null | 8.8 | null | null | null |
GHSA-2r32-rq8q-r57h
|
A remote code execution vulnerability exists when the Windows font library improperly handles specially crafted embedded fonts, aka 'Microsoft Graphics Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-1144, CVE-2019-1145, CVE-2019-1149, CVE-2019-1150, CVE-2019-1151.
|
[] | null | null | null | null | null |
|
GHSA-67v8-27c2-cwg5
|
SAP 3D Visual Enterprise Viewer, version - 9, allows a user to open manipulated IFF file received from untrusted sources which results in crashing of the application and becoming temporarily unavailable until the user restarts the application, this is caused due to Improper Input Validation.
|
[] | null | null | null | null | null |
|
CVE-2017-7798
|
The Developer Tools feature suffers from a XUL injection vulnerability due to improper sanitization of the web page source code. In the worst case, this could allow arbitrary code execution when opening a malicious page with the style editor tool. This vulnerability affects Firefox ESR < 52.3 and Firefox < 55.
|
[
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.8 | null |
|
GHSA-27cg-j4c8-r728
|
Missing Authorization vulnerability in Unity Business Technology Pty Ltd The E-Commerce ERP allows Accessing Functionality Not Properly Constrained by ACLs. This issue affects The E-Commerce ERP: from n/a through 2.1.1.3.
|
[] | null | 7.3 | null | null | null |
|
CVE-2025-55013
|
Assemblyline 4 Service Client: Arbitrary Write through path traversal in Client code
|
The Assemblyline 4 Service Client interfaces with the API to fetch tasks and publish the result for a service in Assemblyline 4. In versions below 4.6.1.dev138, the Assemblyline 4 Service Client (task_handler.py) accepts a SHA-256 value returned by the service server and uses it directly as a local file name.A malicious or compromised server (or any MITM that can speak to client) can return a path-traversal payload such as `../../../etc/cron.d/evil` and force the client to write the downloaded bytes to an arbitrary location on disk. This is fixed in version 4.6.1.dev138.
|
[] | null | 4.2 | null | null | null |
GHSA-j337-hcvc-rc4g
|
Multiple unquoted Windows search path vulnerabilities in Novell ZENworks Desktop Management (ZDM) 7 through 7.1 might allow local users to gain privileges via a Trojan horse "program" file in the C: folder, related to an attempted launch of (1) ZenRem32.exe or (2) wm.exe.
|
[] | null | null | null | null | null |
|
GHSA-mf23-gg7j-9g6j
|
IBM Security Guardium Data Encryption (GDE) 3.0.0.2 could allow a remote authenticated attacker to execute arbitrary commands on the system. By sending a specially-crafted request, an attacker could exploit this vulnerability to execute arbitrary commands on the system. IBM X-Force ID: 172084.
|
[] | null | null | null | null | null |
|
CVE-2014-7478
|
The nashaplaneta.su (aka com.wNashaPlaneta) application 1.02 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
|
[
"cpe:2.3:a:nashaplaneta:nashaplaneta.su:1.02:*:*:*:*:android:*:*"
] | null | null | null | 5.4 | null |
|
GHSA-72hc-p753-5jcm
|
InnoShop V.0.3.8 and below is vulnerable to Cross Site Scripting (XSS) via SVG file upload.
|
[] | null | 5.7 | null | null | null |
|
CVE-2014-8673
|
Multiple SQL vulnerabilities exist in planning.php, user_list.php, projets.php, user_groupes.php, and groupe_list.php in Simple Online Planning (SOPPlanning)before 1.33.
|
[
"cpe:2.3:a:soplanning:soplanning:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 | null |
|
GHSA-xcj7-g4qj-qpph
|
Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.34 and prior, 7.5.24 and prior, 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H).
|
[] | null | null | null | null | null |
|
CVE-2020-12281
|
iSmartgate PRO 1.5.9 is vulnerable to CSRF that allows remote attackers to create a new user via /index.php.
|
[
"cpe:2.3:o:gogogate:ismartgate_pro_firmware:1.5.9:*:*:*:*:*:*:*",
"cpe:2.3:h:gogogate:ismartgate_pro:-:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4.3 | null |
|
RHSA-2020:4007
|
Red Hat Security Advisory: systemd security and bug fix update
|
systemd: memory leak in button_open() in login/logind-button.c when udev events are received
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 2.4 | null | null | null |
GHSA-94xj-6h93-9hj5
|
An elevation of privilege vulnerability in the kernel scsi driver. Product: Android. Versions: Android kernel. Android ID A-65023233.
|
[] | null | null | 7.8 | null | null |
|
ICSA-13-014-01
|
Siemens SIMATIC RF Manager ActiveX Buffer Overflow
|
Buffer overflow in a third-party ActiveX component in Siemens SIMATIC RF-MANAGER 2008, and RF-MANAGER Basic 3.0 and earlier, allows remote attackers to execute arbitrary code via a crafted web site.
|
[] | null | null | null | null | null |
CVE-2007-5400
|
Heap-based buffer overflow in the Shockwave Flash (SWF) frame handling in RealNetworks RealPlayer 10.5 Build 6.0.12.1483 might allow remote attackers to execute arbitrary code via a crafted SWF file.
|
[
"cpe:2.3:a:real:realplayer:10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:10.5:*:*:*:*:*:*:*"
] | null | null | null | 9.3 | null |
|
CVE-2025-4231
|
PAN-OS: Authenticated Admin Command Injection Vulnerability in the Management Web Interface
|
A command injection vulnerability in Palo Alto Networks PAN-OS® enables an authenticated administrative user to perform actions as the root user.
The attacker must have network access to the management web interface and successfully authenticate to exploit this issue.
Cloud NGFW and Prisma Access are not impacted by this vulnerability.
|
[
"cpe:2.3:o:palo_alto_networks:pan-os:11.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:palo_alto_networks:pan-os:11.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:palo_alto_networks:pan-os:11.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:*:*:*:*:*:*:*",
"cpe:2.3:o:palo_alto_networks:pan-os:10.2.6:*:*:*:*:*:*:*",
"cpe:2.3:o:palo_alto_networks:pan-os:10.2.5:*:*:*:*:*:*:*",
"cpe:2.3:o:palo_alto_networks:pan-os:10.2.4:*:*:*:*:*:*:*",
"cpe:2.3:o:palo_alto_networks:pan-os:10.2.3:*:*:*:*:*:*:*",
"cpe:2.3:o:palo_alto_networks:pan-os:10.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:palo_alto_networks:pan-os:10.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:palo_alto_networks:pan-os:10.2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:palo_alto_networks:pan-os:10.1.14:*:*:*:*:*:*:*",
"cpe:2.3:o:palo_alto_networks:pan-os:10.1.13:*:*:*:*:*:*:*",
"cpe:2.3:o:palo_alto_networks:pan-os:10.1.12:*:*:*:*:*:*:*",
"cpe:2.3:o:palo_alto_networks:pan-os:10.1.11:*:*:*:*:*:*:*",
"cpe:2.3:o:palo_alto_networks:pan-os:10.1.10:*:*:*:*:*:*:*",
"cpe:2.3:o:palo_alto_networks:pan-os:10.1.9:*:*:*:*:*:*:*",
"cpe:2.3:o:palo_alto_networks:pan-os:10.1.8:*:*:*:*:*:*:*",
"cpe:2.3:o:palo_alto_networks:pan-os:10.1.7:*:*:*:*:*:*:*",
"cpe:2.3:o:palo_alto_networks:pan-os:10.1.6:*:*:*:*:*:*:*",
"cpe:2.3:o:palo_alto_networks:pan-os:10.1.5:*:*:*:*:*:*:*",
"cpe:2.3:o:palo_alto_networks:pan-os:10.1.4:*:*:*:*:*:*:*",
"cpe:2.3:o:palo_alto_networks:pan-os:10.1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:palo_alto_networks:pan-os:10.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:palo_alto_networks:pan-os:10.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:palo_alto_networks:pan-os:10.1.0:*:*:*:*:*:*:*"
] | 7.1 | null | null | null | null |
CVE-2018-4170
|
An issue was discovered in certain Apple products. macOS before 10.13.4 is affected. The issue involves the "Admin Framework" component. It allows local users to discover a password by listing a process and its arguments during sysadminctl execution.
|
[
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | 2.1 | null |
|
GHSA-fh73-wccq-24r7
|
Multiple stack-based and heap-based buffer overflows in EnderUNIX spamGuard before 1.7-BETA allow remote attackers to execute arbitrary code via the (1) qmail_parseline and (2) sendmail_parseline functions in parser.c, (3) loadconfig and (4) removespaces functions in loadconfig.c, and possibly (5) unspecified functions in functions.c.
|
[] | null | null | null | null | null |
|
CVE-2023-41177
|
Reflected cross-site scripting (XSS) vulnerabilities in Trend Micro Mobile Security (Enterprise) could allow an exploit against an authenticated victim that visits a malicious link provided by an attacker.
Please note, this vulnerability is similar to, but not identical to, CVE-2023-41178.
|
[
"cpe:2.3:a:trendmicro:mobile_security:9.8:*:*:*:enterprise:*:*:*"
] | null | 6.1 | null | null | null |
|
CVE-2005-1586
|
Quick.Forum 2.1.6 stores potentially sensitive information such as usernames, banned IP addresses, censored words, and backups under the web document root, which allows remote attackers to obtain that information via a direct request to (1) db/users.txt, (2) db/banList.txt, (3) db/censureWords.txt, or (4) backup files.
|
[
"cpe:2.3:a:open_solution:quick.forum:2.1.6:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
CVE-2021-41865
|
HashiCorp Nomad and Nomad Enterprise 1.1.1 through 1.1.5 allowed authenticated users with job submission capabilities to cause denial of service by submitting incomplete job specifications with a Consul mesh gateway and host networking mode. Fixed in 1.1.6.
|
[
"cpe:2.3:a:hashicorp:nomad:*:*:*:*:-:*:*:*",
"cpe:2.3:a:hashicorp:nomad:*:*:*:*:enterprise:*:*:*"
] | null | 6.5 | null | 4 | null |
|
CVE-2008-6513
|
Unrestricted file upload vulnerability in saa.php in Andy's PHP Knowledgebase (aphpkb) 0.92.9 allows remote attackers to execute arbitrary code by uploading a file with an executable extension, then accessing it via a link that is listed by authors.php.
|
[
"cpe:2.3:a:aphpkb:aphpkb:0.92.9:*:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
CVE-2022-48505
|
This issue was addressed with improved data protection. This issue is fixed in macOS Ventura 13. An app may be able to modify protected parts of the file system
|
[
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
|
CVE-2023-20946
|
In onStart of BluetoothSwitchPreferenceController.java, there is a possible permission bypass due to a confused deputy. This could lead to remote escalation of privilege in Bluetooth settings with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-244423101
|
[
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
|
CVE-2019-15545
|
An issue was discovered in the libp2p-core crate before 0.8.1 for Rust. Attackers can spoof ed25519 signatures.
|
[
"cpe:2.3:a:libp2p:libp2p:*:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 | null |
|
RHSA-2024:2666
|
Red Hat Security Advisory: OpenShift Container Platform 4.14.24 security and extras update
|
golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON
|
[
"cpe:/a:redhat:openshift:4.14::el8",
"cpe:/a:redhat:openshift:4.14::el9"
] | null | 5.9 | null | null | null |
CVE-2009-0573
|
Multiple cross-site scripting (XSS) vulnerabilities in FotoWeb 6.0 (Build 273) allow remote attackers to inject arbitrary web script or HTML via the (1) s parameter to cmdrequest/Login.fwx and the (2) search parameter to Grid.fwx.
|
[
"cpe:2.3:a:fotoware:fotoweb:6.0:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-8hx8-vq69-hf44
|
Buffer overflow in nsrindexd in EMC NetWorker 7.5.x and 7.6.x before 7.6.5, and 8.x before 8.0.0.6, allows remote attackers to execute arbitrary code via crafted SunRPC data.
|
[] | null | null | null | null | null |
|
GHSA-87j3-r63j-gww6
|
** DISPUTED ** The libesedb_catalog_definition_read function in libesedb_catalog_definition.c in libesedb through 2018-04-01 allows remote attackers to cause a heap-based buffer over-read via a crafted esedb file. NOTE: the vendor has disputed this as described in the GitHub issue comments.
|
[] | null | null | 6.5 | null | null |
|
GHSA-qjwp-fx53-r42v
|
In Wireshark 2.6.0 to 2.6.4 and 2.4.0 to 2.4.10, the dissection engine could crash. This was addressed in epan/tvbuff_composite.c by preventing a heap-based buffer over-read.
|
[] | null | null | 5.5 | null | null |
|
RHSA-2022:5596
|
Red Hat Security Advisory: Red Hat build of Quarkus 2.7.6 release and security update
|
jackson-databind: denial of service via a large depth of nested objects
|
[
"cpe:/a:redhat:quarkus:2.7"
] | null | 7.5 | null | null | null |
GHSA-jmqg-4j8j-7728
|
An issue was discovered in Paessler PRTG Network Monitor 23.2.83.1760 x64. The NetApp Volume Sensor transmits cleartext credentials over the network when the HTTP protocol is selected. This can be triggered remotely via a CSRF by simply sending a controls/addsensor3.htm link to a logged-in victim.
|
[] | null | 6.5 | null | null | null |
|
GHSA-jhg2-2xh7-hgw9
|
A precision error in Skia in Google Chrome prior to 67.0.3396.62 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page.
|
[] | null | null | 8.8 | null | null |
|
GHSA-22c2-9gwg-mj59
|
Langroid has a Code Injection vulnerability in LanceDocChatAgent through vector_store
|
Summary[LanceDocChatAgent](https://github.com/langroid/langroid/blob/main/langroid/agent/special/lance_doc_chat_agent.py#L158) uses pandas eval() through `compute_from_docs()`:
https://github.com/langroid/langroid/blob/18667ec7e971efc242505196f6518eb19a0abc1c/langroid/vector_store/base.py#L136-L150As a result, an attacker may be able to make the agent run malicious commands through [QueryPlan.dataframe_calc](https://github.com/langroid/langroid/blob/main/langroid/agent/special/lance_tools.py#L16) compromising the host system.FixLangroid 0.53.15 sanitizes input to the affected function by default to tackle the most common attack vectors, and added several warnings about the risky behavior in the project documentation.
|
[] | 8.1 | null | null | null | null |
GHSA-p6cx-v2j5-9938
|
The Social Sharing WordPress plugin before 3.3.45 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins.
|
[] | null | 5.4 | null | null | null |
|
CVE-2021-20360
|
IBM Cloud Pak for Applications 4.3 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 195031.
|
[
"cpe:2.3:a:ibm:cloud_pak_for_applications:4.3:*:*:*:*:*:*:*"
] | null | null | 5.9 | null | null |
|
CVE-2024-26683
|
wifi: cfg80211: detect stuck ECSA element in probe resp
|
In the Linux kernel, the following vulnerability has been resolved:
wifi: cfg80211: detect stuck ECSA element in probe resp
We recently added some validation that we don't try to
connect to an AP that is currently in a channel switch
process, since that might want the channel to be quiet
or we might not be able to connect in time to hear the
switching in a beacon. This was in commit c09c4f31998b
("wifi: mac80211: don't connect to an AP while it's in
a CSA process").
However, we promptly got a report that this caused new
connection failures, and it turns out that the AP that
we now cannot connect to is permanently advertising an
extended channel switch announcement, even with quiet.
The AP in question was an Asus RT-AC53, with firmware
3.0.0.4.380_10760-g21a5898.
As a first step, attempt to detect that we're dealing
with such a situation, so mac80211 can use this later.
|
[] | null | 5.5 | null | null | null |
CVE-2021-33332
|
Cross-site scripting (XSS) vulnerability in the Portlet Configuration module in Liferay Portal 7.1.0 through 7.3.2, and Liferay DXP 7.1 before fix pack 19, and 7.2 before fix pack 7, allows remote attackers to inject arbitrary web script or HTML via the _com_liferay_portlet_configuration_css_web_portlet_PortletConfigurationCSSPortlet_portletResource parameter.
|
[
"cpe:2.3:a:liferay:dxp:7.1:-:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.1:fix_pack_1:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.1:fix_pack_10:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.1:fix_pack_11:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.1:fix_pack_12:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.1:fix_pack_13:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.1:fix_pack_14:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.1:fix_pack_15:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.1:fix_pack_16:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.1:fix_pack_17:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.1:fix_pack_18:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.1:fix_pack_2:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.1:fix_pack_3:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.1:fix_pack_4:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.1:fix_pack_5:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.1:fix_pack_6:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.1:fix_pack_7:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.1:fix_pack_8:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.1:fix_pack_9:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.2:-:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.2:fix_pack_1:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.2:fix_pack_2:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.2:fix_pack_3:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.2:fix_pack_4:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.2:fix_pack_5:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.2:fix_pack_6:*:*:*:*:*:*",
"cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 | null |
|
CVE-2008-5414
|
Unspecified vulnerability in the Feature Pack for Web Services in the Web Services Security component in IBM WebSphere Application Server (WAS) 7 before 7.0.0.1 has unknown impact and attack vectors related to "userNameToken."
|
[
"cpe:2.3:a:ibm:websphere_application_server:7.0:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
CVE-2023-37861
|
PHOENIX CONTACT: OS Command Injection in WP 6xxx Web panels
|
In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 an authenticated remote attacker can execute code with root permissions with a specially crafted HTTP POST when uploading a certificate to the device.
|
[
"cpe:2.3:h:phoenixcontact:wp_6070-wvps:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:wp_6101-wxps:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:wp_6121-wxps:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:wp_6156-whps:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:wp_6185-whps:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:wp_6215-whps:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:wp_6070-wvps_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:wp_6101-wxps_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:wp_6121-wxps_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:wp_6156-whps_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:wp_6185-whps_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:wp_6215-whps_firmware:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | null | null |
GHSA-3rfh-cr92-3h5r
|
A remote code execution vulnerability exists when the Windows font library improperly handles specially crafted embedded fonts, aka 'Win32k Graphics Remote Code Execution Vulnerability'.
|
[] | null | null | null | null | null |
|
CVE-2015-6127
|
Windows Media Center in Microsoft Windows Vista SP2, Windows 7 SP1, Windows 8, and Windows 8.1 allows remote attackers to read arbitrary files via a crafted .mcl file, aka "Windows Media Center Information Disclosure Vulnerability."
|
[
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
CVE-2014-7649
|
The Classic Car Buyer (aka com.magazinecloner.carbuyer) application @7F08017A for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
|
[
"cpe:2.3:a:pocketmags:classic_car_buyer:\\@7f08017a:*:*:*:*:android:*:*"
] | null | null | null | 5.4 | null |
|
GHSA-m9fp-2r32-q2mw
|
Incorrect conversion between numeric types in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally.
|
[] | null | 7.8 | null | null | null |
|
RHSA-2018:2840
|
Red Hat Security Advisory: Red Hat JBoss Fuse/A-MQ 6.3 R9 security and bug fix update
|
Console: HTTPOnly and Secure attributes not set on cookies in Red Hat AMQ
|
[
"cpe:/a:redhat:jboss_amq:6.3",
"cpe:/a:redhat:jboss_fuse:6.3"
] | null | null | null | null | null |
GHSA-88g4-46fj-wmhh
|
GUI overlay vulnerability in Mozilla Firefox 1.5.x before 1.5.0.10 and 2.x before 2.0.0.2, and SeaMonkey before 1.0.8 allows remote attackers to spoof certain user interface elements, such as the host name or security indicators, via the CSS3 hotspot property with a large, transparent, custom cursor.
|
[] | null | null | null | null | null |
|
GHSA-fqmr-rqgw-fg3q
|
ZKTeco BioTime allows unauthenticated attackers to enumerate usernames and log in as any user with a password unchanged from the default value '123456'. Users should change their passwords (located under the Attendance Settings tab as "Self-Password").
|
[] | 6.9 | 7.3 | null | null | null |
|
GHSA-5445-rx9p-gmmp
|
A flaw was found in, Fedora versions of krb5 from 1.16.1 to, including 1.17.x, in the way a Kerberos client could crash the KDC by sending one of the RFC 4556 "enctypes". A remote unauthenticated user could use this flaw to crash the KDC.
|
[] | null | 7.5 | null | null | null |
|
GHSA-x43h-8pfv-xx24
|
The various bson_append functions in the MongoDB C driver library may be susceptible to buffer overflow when performing operations that could result in a final BSON document which exceeds the maximum allowable size (INT32_MAX), resulting in a segmentation fault and possible application crash. This issue affected libbson versions prior to 1.27.5, MongoDB Server v8.0 versions prior to 8.0.1 and MongoDB Server v7.0 versions prior to 7.0.16
|
[] | null | 8.4 | null | null | null |
|
GHSA-4r6q-r4w3-542r
|
Unspecified vulnerability in Oracle Sun Java System Access Manager and Oracle OpenSSO 7, 7.1, and 8 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
|
[] | null | null | null | null | null |
|
CVE-2024-7134
|
LiquidPoll <= 3.3.78 - Unauthenticated Stored Cross-Site Scripting via form_data Parameter
|
The LiquidPoll – Polls, Surveys, NPS and Feedback Reviews plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘form_data’ parameter in all versions up to, and including, 3.3.78 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[
"cpe:2.3:a:liquidpoll:liquidpoll:*:*:*:*:*:*:*:*"
] | null | 7.2 | null | null | null |
CVE-2008-3764
|
Eval injection vulnerability in globalsoff.php in Turnkey PHP Live Helper 2.0.1 and earlier allows remote attackers to execute arbitrary PHP code via the test parameter, and probably arbitrary parameters, to chat.php.
|
[
"cpe:2.3:a:turnkeywebtools:php_live_helper:*:*:*:*:*:*:*:*",
"cpe:2.3:a:turnkeywebtools:php_live_helper:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:turnkeywebtools:php_live_helper:2.0:beta_1:*:*:*:*:*:*",
"cpe:2.3:a:turnkeywebtools:php_live_helper:2.0:beta_2:*:*:*:*:*:*",
"cpe:2.3:a:turnkeywebtools:php_live_helper:2.0:beta_3:*:*:*:*:*:*",
"cpe:2.3:a:turnkeywebtools:php_live_helper:2.0:beta_4:*:*:*:*:*:*",
"cpe:2.3:a:turnkeywebtools:php_live_helper:2.0:beta_5:*:*:*:*:*:*",
"cpe:2.3:a:turnkeywebtools:php_live_helper:2.0:beta_6:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2017-18549
|
An issue was discovered in drivers/scsi/aacraid/commctrl.c in the Linux kernel before 4.13. There is potential exposure of kernel stack memory because aac_send_raw_srb does not initialize the reply structure.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | null | 5.5 | 2.1 | null |
|
CVE-2013-4540
|
Buffer overflow in scoop_gpio_handler_update in QEMU before 1.7.2 might allow remote attackers to execute arbitrary code via a large (1) prev_level, (2) gpio_level, or (3) gpio_dir value in a savevm image.
|
[
"cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.9.1-5:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.10.2:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.10.3:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.10.4:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.10.5:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.10.6:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.11.0:rc0:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.11.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.11.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.11.0-rc0:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.11.0-rc1:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.11.0-rc2:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.11.1:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.12.0:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.12.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.12.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.12.1:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.12.2:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.12.3:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.12.4:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.12.5:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.13.0:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.13.0:rc0:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.13.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.14.0:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.14.0:rc0:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.14.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.14.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.14.1:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.15.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.15.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.15.1:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.15.2:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.0:rc4:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.1:rc1:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.1:rc2:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.1:rc3:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.1:rc4:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.5.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.5.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.5.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.6.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.6.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.6.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.6.2:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2023-3796
|
Bug Finder Foody Friend Profile Picture profile unrestricted upload
|
A vulnerability, which was classified as problematic, has been found in Bug Finder Foody Friend 1.0. Affected by this issue is some unknown functionality of the file /user/profile of the component Profile Picture Handler. The manipulation of the argument profile_picture leads to unrestricted upload. The attack may be launched remotely. The identifier of this vulnerability is VDB-235064. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
|
[
"cpe:2.3:a:bugfinder:foody_friend:1.0:*:*:*:*:*:*:*"
] | null | 4.3 | 4.3 | 4 | null |
GHSA-p365-3j3h-vmq6
|
Cross-site scripting (XSS) vulnerability in search.asp in Solupress News 1.0 and earlier allows remote attackers to inject arbitrary web script or HTML via the keywords parameter.
|
[] | null | null | null | null | null |
|
GHSA-x3jc-cf5h-qjrx
|
Exposure of sensitive information to an unauthorized actor in Windows Imaging Component allows an unauthorized attacker to disclose information locally.
|
[] | null | 6.2 | null | null | null |
|
CVE-2024-26103
|
Adobe Experience Manager | Cross-site Scripting (Reflected XSS) (CWE-79)
|
Adobe Experience Manager versions 6.5.19 and earlier are affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
|
[
"cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*",
"cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*"
] | null | 5.4 | null | null | null |
GHSA-77mr-wc79-m8j3
|
PHPMailer untrusted code may be run from an overridden address validator
|
If a function is defined that has the same name as the default built-in email address validation scheme (`php`), it will be called in default configuration as when no validation scheme is provided, the default scheme's callable `php` was being called. If an attacker is able to inject such a function into the application (a much bigger issue), it will be called whenever an email address is validated, such as when calling `validateAddress()`.ImpactLow impact – exploitation requires that an attacker can already inject code into an application, but it provides a trigger pathway.PatchesThis is patched in PHPMailer 6.5.0 by denying the use of simple strings as validator function names, which is a very minor BC break.WorkaroundsInject your own email validator function.ReferencesReported by [Vikrant Singh Chauhan](mailto:[email protected]) via [huntr.dev](https://www.huntr.dev/).
[CVE-2021-3603](https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3603)For more informationIf you have any questions or comments about this advisory:Open an issue in [the PHPMailer project](https://github.com/PHPMailer/PHPMailer)[Email us](mailto:[email protected]).
|
[] | null | 8.1 | null | null | null |
CVE-2005-0992
|
Cross-site scripting (XSS) vulnerability in index.php in phpMyAdmin before 2.6.2-rc1 allows remote attackers to inject arbitrary web script or HTML via the convcharset parameter.
|
[
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.2_pre1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.2_pre2:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.2_rc1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.2_rc2:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.2_rc3:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.5.5_pl1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.5.5_rc1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.5.5_rc2:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.5.6_rc1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.5.7_pl1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.6.0_pl1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.6.0_pl2:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.6.0_pl3:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.6.1_pl1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.6.1_pl3:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.6.1_rc1:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-gm2j-53hw-w74v
|
Certain NETGEAR devices are affected by stored XSS. This affects D7800 before 1.0.1.56, R7500v2 before 1.0.3.46, R7800 before 1.0.2.68, R8900 before 1.0.4.28, R9000 before 1.0.4.28, RAX120 before 1.0.0.78, RBR20 before 2.3.5.26, RBS20 before 2.3.5.26, RBK20 before 2.3.5.26, RBR40 before 2.3.5.30, RBS40 before 2.3.5.30, RBK40 before 2.3.5.30, RBR50 before 2.3.5.30, RBS50 before 2.3.5.30, RBK50 before 2.3.5.30, XR500 before 2.3.2.56, and XR700 before 1.0.1.10.
|
[] | null | null | null | null | null |
|
GHSA-6fxp-47hx-rmfr
|
PHP remote file inclusion vulnerability in formdisp.php in the Mermaid 1.2 module for PHP-Nuke allows remote attackers to execute arbitrary PHP code via a URL in the module_name parameter.
|
[] | null | null | null | null | null |
|
GHSA-4chh-684c-357m
|
Cross-site scripting (XSS) vulnerability in Gallery before 1.5.2 allows remote attackers to inject arbitrary web script or HTML via unknown attack vectors, possibly involving the user name (fullname).
|
[] | null | null | null | null | null |
|
CVE-2023-30704
|
Improper Authorization vulnerability in Samsung Internet prior to version 22.0.0.35 allows physical attacker access downloaded files in Secret Mode without user authentication.
|
[
"cpe:2.3:a:samsung:internet:*:*:*:*:*:*:*:*"
] | null | 3.8 | null | null | null |
|
GHSA-6xx3-j36r-9j4v
|
Improper Privilege Management vulnerability exists in homeLYnk (Wiser For KNX) and spaceLYnk V2.60 and prior which could cause shell access when unauthorized code is loaded into the system folder.
|
[] | null | null | null | null | null |
|
CVE-2023-3439
|
A flaw was found in the MCTP protocol in the Linux kernel. The function mctp_unregister() reclaims the device's relevant resource when a netcard detaches. However, a running routine may be unaware of this and cause the use-after-free of the mdev->addrs object, potentially leading to a denial of service.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.18:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.18:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.18:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.18:rc4:*:*:*:*:*:*"
] | null | 4.7 | null | null | null |
|
CVE-2021-34809
|
Improper neutralization of special elements used in a command ('Command Injection') vulnerability in task management component in Synology Download Station before 3.8.16-3566 allows remote authenticated users to execute arbitrary code via unspecified vectors.
|
[
"cpe:2.3:a:synology:download_station:*:*:*:*:*:*:*:*"
] | null | 9.9 | null | null | null |
|
CVE-2005-0318
|
useredit_account.wdm in Alt-N WebAdmin 3.0.4 does not properly validate account edits by the logged in user, which allows remote authenticated users to edit other users' account information via a modified user parameter.
|
[
"cpe:2.3:a:alt-n:webadmin:3.0.2:*:*:*:*:*:*:*"
] | null | null | null | 2.1 | null |
|
CVE-2006-6073
|
Multiple SQL injection vulnerabilities in Enthrallweb eShopping Cart allow remote attackers to execute arbitrary SQL commands via the (1) ProductID parameter in productdetail.asp or the (2) categoryid parameter in products.asp.
|
[
"cpe:2.3:a:enthrallweb:eshopping_cart:-:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2024-4771
|
A memory allocation check was missing which would lead to a use-after-free if the allocation failed. This could have triggered a crash or potentially be leveraged to achieve code execution. This vulnerability affects Firefox < 126.
|
[
"cpe:2.3:a:mozilla:firefox:126:*:*:*:*:*:*:*"
] | null | 8.6 | null | null | null |
|
CVE-2015-5646
|
Cybozu Garoon 3.x through 3.7.5 and 4.x through 4.0.3 allows remote authenticated users to execute arbitrary PHP code via unspecified vectors, aka CyVDB-863 and CyVDB-867.
|
[
"cpe:2.3:a:cybozu:garoon:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:3.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:3.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:3.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:3.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:3.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:3.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:3.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:3.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:3.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:3.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:3.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:3.7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:3.7.5:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:4.0.3:*:*:*:*:*:*:*"
] | null | null | null | 8.5 | null |
|
CVE-2023-42644
|
In dm service, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed
|
[
"cpe:2.3:o:google:android:11.0:-:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:-:*:*:*:*:*:*",
"cpe:2.3:o:google:android:13.0:-:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc7731e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc9832e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t310:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
|
RHSA-2015:0052
|
Red Hat Security Advisory: flash-plugin security update
|
flash-plugin: Information disclosure via various methods (APSB15-01) flash-plugin: Information disclosure via various methods (APSB15-01) flash-plugin: Multiple code-execution flaws (APSB15-01) flash-plugin: Multiple code-execution flaws (APSB15-01) flash-plugin: Multiple code-execution flaws (APSB15-01) flash-plugin: Multiple code-execution flaws (APSB15-01) flash-plugin: Information disclosure via various methods (APSB15-01) flash-plugin: Multiple code-execution flaws (APSB15-01) flash-plugin: Multiple code-execution flaws (APSB15-01)
|
[
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null | null |
GHSA-2jp3-xwf9-m84m
|
Multiple unspecified vulnerabilities in Astaro Security Gateway (ASG) before 7.005 allow remote attackers to cause a denial of service via (1) certain email, which stops the SMTP Proxy during scanning; (2) certain HTTP traffic, which stops or slows down the HTTP proxy during HTTP responses containing virus scanned web pages; and (3) a disconnection during a streaming session.
|
[] | null | null | null | null | null |
|
CVE-2024-11356
|
Tourmaster < 5.3.4 - Unauthenticated Stored XSS via Room Booking
|
The tourmaster WordPress plugin before 5.3.4 does not sanitise and escape some parameters when outputting them in the page, which could allow unauthenticated users to perform Cross-Site Scripting attacks.
|
[] | null | 6.1 | null | null | null |
GHSA-xwx6-2367-24jg
|
Cross-site scripting (XSS) vulnerability in Collaboration - File Sharing 01-20 up to 01-20-/B and 01-30 up to 01-30-/B in Hitachi Groupmax Collaboration Portal up to 07-30-/D, Groupmax Collaboration Web Client - Forum/File Sharing up to 07-30-/C, uCosminexus Collaboration Portal up to 06-30-/D, and uCosminexus Collaboration Portal - Forum/File Sharing up to 06-30-/C on Windows allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
|
[] | null | null | null | null | null |
|
CVE-2023-30510
|
Authenticated Server-side Request Forgery in Aruba EdgeConnect Enterprise Web Management Interface
|
A vulnerability exists in the Aruba EdgeConnect Enterprise web management interface that allows remote authenticated users to issue arbitrary URL requests from the Aruba EdgeConnect Enterprise instance. The impact of this vulnerability is limited to a subset of URLs which can result in the possible disclosure of data due to the network position of the Aruba EdgeConnect Enterprise instance.
|
[
"cpe:2.3:a:arubanetworks:edgeconnect_enterprise:*:*:*:*:*:*:*:*"
] | null | 4.1 | null | null | null |
GHSA-2cq9-f7wp-92xf
|
iOpus Secure Email Attachments (SEA), probably 1.0, does not properly handle passwords that consist of repetitions of a substring, which allows attackers to decrypt files by entering only the substring.
|
[] | null | null | null | null | null |
|
CVE-2007-2082
|
Direct static code injection vulnerability in admin/settings.php in MyBlog 0.9.8 and earlier allows remote authenticated admin users to inject arbitrary PHP code via the content parameter, which can be executed by accessing index.php. NOTE: a separate vulnerability could be leveraged to make this issue exploitable by remote unauthenticated attackers.
|
[
"cpe:2.3:a:myblog:myblog:*:*:*:*:*:*:*:*"
] | null | null | null | 6.5 | null |
|
CVE-2016-2198
|
QEMU (aka Quick Emulator) built with the USB EHCI emulation support is vulnerable to a null pointer dereference flaw. It could occur when an application attempts to write to EHCI capabilities registers. A privileged user inside quest could use this flaw to crash the QEMU process instance resulting in DoS.
|
[
"cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:2.6.0:rc0:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:2.6.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:2.6.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:2.6.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:2.6.0:rc4:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
] | null | 5.5 | null | 2.1 | null |
|
CVE-2025-51650
|
An arbitrary file upload vulnerability in the component /controller/PicManager.php of FoxCMS v1.2.6 allows attackers to execute arbitrary code via uploading a crafted template file.
|
[] | null | 5.6 | null | null | null |
|
CVE-2020-8205
|
The uppy npm package < 1.13.2 and < 2.0.0-alpha.5 is vulnerable to a Server-Side Request Forgery (SSRF) vulnerability, which allows an attacker to scan local or external networks or otherwise interact with internal systems.
|
[
"cpe:2.3:a:transloadit:uppy:*:*:*:*:*:node.js:*:*",
"cpe:2.3:a:transloadit:uppy:2.0.0:alpha0:*:*:*:node.js:*:*",
"cpe:2.3:a:transloadit:uppy:2.0.0:alpha1:*:*:*:node.js:*:*",
"cpe:2.3:a:transloadit:uppy:2.0.0:alpha2:*:*:*:node.js:*:*",
"cpe:2.3:a:transloadit:uppy:2.0.0:alpha3:*:*:*:node.js:*:*",
"cpe:2.3:a:transloadit:uppy:2.0.0:alpha4:*:*:*:node.js:*:*"
] | null | 7.5 | null | 5 | null |
|
CVE-2023-50988
|
Tenda i29 v1.0 V1.0.0.5 was discovered to contain a buffer overflow via the bandwidth parameter in the wifiRadioSetIndoor function.
|
[
"cpe:2.3:o:tenda:i29_firmware:1.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:tenda:i29_firmware:1.0.0.5:*:*:*:*:*:*:*",
"cpe:2.3:h:tenda:i29:1.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.