id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 36
232
⌀ |
---|---|---|---|---|---|---|---|---|
CVE-2003-0987
|
mod_digest for Apache before 1.3.31 does not properly verify the nonce of a client response by using a AuthNonce secret.
|
[
"cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2025-7286
|
IrfanView CADImage Plugin DXF File Parsing Memory Corruption Remote Code Execution Vulnerability
|
IrfanView CADImage Plugin DXF File Parsing Memory Corruption Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView CADImage Plugin. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of DXF files. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-26222.
|
[] | null | null | 7.8 | null | null |
CVE-2018-5126
|
Memory safety bugs were reported in Firefox 58. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox < 59.
|
[
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 | null |
|
GHSA-f9h6-7qr4-xp3c
|
Untrusted search path vulnerability in GNS3 1.2.3 allows local users to gain privileges via a Trojan horse uuid.dll in an unspecified directory.
|
[] | null | null | null | null | null |
|
CVE-2024-57575
|
Tenda AC18 V15.03.05.19 was discovered to contain a stack overflow via the ssid parameter in the form_fast_setting_wifi_set function.
|
[] | null | 9.8 | null | null | null |
|
CVE-2020-12368
|
Integer overflow in some Intel(R) Graphics Drivers before version 26.20.100.8141 may allow a privileged user to potentially enable an escalation of privilege via local access.
|
[
"cpe:2.3:a:intel:graphics_drivers:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | 4.6 | null |
|
GHSA-3cff-w6rq-c82x
|
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.2.20. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).
|
[] | null | null | 8.6 | null | null |
|
GHSA-pcpv-9vhw-96hp
|
In checkAccess of MediaProvider.java, there is a possible file deletion due to a path traversal error. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-221855295
|
[] | null | 7.8 | null | null | null |
|
GHSA-23wh-25r8-cjxj
|
Multiple cross-site scripting (XSS) vulnerabilities in event/index2.do in ManageEngine EventLog Analyzer before 9.0 build 9002 allow remote attackers to inject arbitrary web script or HTML via the (1) width, (2) height, (3) url, (4) helpP, (5) tab, (6) module, (7) completeData, (8) RBBNAME, (9) TC, (10) rtype, (11) eventCriteria, (12) q, (13) flushCache, or (14) product parameter. Fixed in Build 11072.
|
[] | null | null | null | null | null |
|
CVE-2007-2484
|
PHP remote file inclusion vulnerability in js/wptable-button.php in the wp-Table 1.43 and earlier plugin for WordPress, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the wpPATH parameter.
|
[
"cpe:2.3:a:ruben_boelinger:wp-table:*:*:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
GHSA-p3xx-84fp-3hm5
|
IBM Jazz Foundation (IBM Rational Engineering Lifecycle Manager 5.0 through 6.0.6) is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 153495.
|
[] | null | null | 5.4 | null | null |
|
GHSA-gpjj-6jr7-j6mx
|
The The Motors - Car Dealer, Rental & Listing WordPress theme theme for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 5.6.65. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes.*It is unclear exactly which version the issue was patched in from the changelog. Therefore, we used the latest version at the time of verification.
|
[] | null | 7.3 | null | null | null |
|
CVE-2021-37457
|
Cross Site Scripting (XSS) exists in NCH Axon PBX v2.22 and earlier via the SipRule field (stored).
|
[
"cpe:2.3:a:nchsoftware:axon_pbx:*:*:*:*:*:*:*:*"
] | null | 5.4 | null | 3.5 | null |
|
GHSA-w25q-j7hc-27j8
|
The Auto-update service for Okta Verify for Windows is vulnerable to two flaws which in combination could be used to execute arbitrary code.
|
[] | null | 7.1 | null | null | null |
|
GHSA-qvrc-hgq4-x7gw
|
Microsoft Internet Explorer 6.0.2900.2180 and earlier does not block javascript: URIs in Refresh headers in HTTP responses, which allows remote attackers to conduct cross-site scripting (XSS) attacks via vectors related to (1) injecting a Refresh header or (2) specifying the content of a Refresh header, a related issue to CVE-2009-1312.
|
[] | null | null | null | null | null |
|
CVE-2018-2746
|
Vulnerability in the Oracle Banking Corporate Lending component of Oracle Financial Services Applications (subcomponent: Core module). Supported versions that are affected are 12.3.0, 12.4.0, 12.5.0 and 14.0.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Banking Corporate Lending. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Banking Corporate Lending accessible data as well as unauthorized update, insert or delete access to some of Oracle Banking Corporate Lending accessible data. CVSS 3.0 Base Score 7.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N).
|
[
"cpe:2.3:a:oracle:banking_corporate_lending:12.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:banking_corporate_lending:12.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:banking_corporate_lending:12.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:banking_corporate_lending:14.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:banking_payments:12.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:banking_payments:12.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:banking_payments:12.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:banking_payments:14.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:flexcube_enterprise_limits_and_collateral_management:12.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:flexcube_enterprise_limits_and_collateral_management:14.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:flexcube_investor_servicing:12.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:flexcube_investor_servicing:12.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:flexcube_investor_servicing:12.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:flexcube_investor_servicing:12.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:flexcube_universal_banking:11.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:flexcube_universal_banking:11.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:flexcube_universal_banking:12.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:flexcube_universal_banking:12.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:flexcube_universal_banking:12.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:flexcube_universal_banking:12.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:flexcube_universal_banking:12.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:flexcube_universal_banking:12.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:flexcube_universal_banking:12.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:flexcube_universal_banking:14.0.0:*:*:*:*:*:*:*"
] | null | null | 7.1 | 5.5 | null |
|
CVE-2013-1083
|
Unspecified vulnerability in the login functionality in the Reporting Module in Novell Identity Manager (aka IDM) Roles Based Provisioning Module 4.0.2 before Field Patch C has unknown impact and attack vectors.
|
[
"cpe:2.3:a:novell:identity_manager_roles_based_provisioning_module:4.0.2:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
GHSA-3qjp-m28w-prvg
|
The VersionMapper.fromKernelVersionString method in oVirt Engine allows remote authenticated users to cause a denial of service (process crash) for all VMs.
|
[] | null | null | 6.5 | null | null |
|
CVE-2023-4318
|
Herd Effects < 5.2.4 - Effect Deletion via CSRF
|
The Herd Effects WordPress plugin before 5.2.4 does not have CSRF when deleting its items, which could allow attackers to make logged in admins delete arbitrary effects via a CSRF attack
|
[
"cpe:2.3:a:wow-company:herd_effects:*:*:*:*:*:wordpress:*:*"
] | null | 4.3 | null | null | null |
CVE-2017-1000145
|
Mahara 1.9 before 1.9.7 and 1.10 before 1.10.5 and 15.04 before 15.04.2 are vulnerable to anonymous comments being able to be placed on artefact detail pages even when the site administrator had disallowed anonymous comments.
|
[
"cpe:2.3:a:mahara:mahara:1.9:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.9.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.9.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.9.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.10:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.10.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.10.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.10.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:15.04:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:15.04:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:15.04.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:15.04.1:*:*:*:*:*:*:*"
] | null | null | 4.9 | 4 | null |
|
CVE-2015-2984
|
I-O DATA DEVICE WN-G54/R2 routers with firmware before 1.03 and NP-BBRS routers allow remote attackers to cause a denial of service (SSDP reflection) via UPnP requests.
|
[
"cpe:2.3:o:iodata:wn-g54\\/r2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:iodata:wn-g54\\/r2:*:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
CVE-2020-35228
|
A cross-site scripting (XSS) vulnerability in the administration web panel on NETGEAR JGS516PE/GS116Ev2 v2.6.0.43 devices allows remote attackers to inject arbitrary web script or HTML via the language parameter.
|
[
"cpe:2.3:o:netgear:gs116e_firmware:2.6.0.43:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:gs116e:v2:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:jgs516pe_firmware:2.6.0.43:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:jgs516pe:-:*:*:*:*:*:*:*"
] | null | 4.8 | null | 3.5 | null |
|
GHSA-vmp5-c5hp-6c65
|
Woodpecker allows cross-site scripting (XSS) via build logs
|
Woodpecker before 0.15.1 allows XSS via build logs because web/src/components/repo/build/BuildLog.vue lacks escaping.
|
[] | null | 6.1 | null | null | null |
GHSA-68jp-v8xx-q94v
|
An issue was discovered in GNU recutils 1.8. There is a NULL pointer dereference in the function rec_field_name_equal_p at rec-field-name.c in librec.a, leading to a crash.
|
[] | null | null | null | null | null |
|
GHSA-m5jv-88vc-r8cm
|
Multiple cross-site scripting (XSS) vulnerabilities in BEA WebLogic Server and Express 6.1 through 10.0 MP1 allow remote attackers to inject arbitrary web script or HTML via unspecified samples. NOTE: this might be the same issue as CVE-2007-2694.
|
[] | null | null | null | null | null |
|
CVE-2025-26704
|
Improper Privilege Management vulnerability in ZTE GoldenDB allows Privilege Escalation.This issue affects GoldenDB: from 6.1.03 through 6.1.03.05.
|
[] | null | 6.4 | null | null | null |
|
CVE-2024-45356
|
Xiaomi phone framework has unauthorized access vulnerability
|
A unauthorized access vulnerability exists in the Xiaomi phone framework. The vulnerability is caused by improper validation and can be exploited by attackers to Access sensitive methods.
|
[] | null | 7.3 | null | null | null |
CVE-2024-32915
|
In CellInfoListParserV2::FillCellInfo() of protocolnetadapter.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with baseband firmware compromise required. User interaction is not needed for exploitation.
|
[] | null | 4.3 | null | null | null |
|
GHSA-g6px-r2w9-3w2v
|
Aquaverde GmbH Aquarius CMS prior to version 4.1.1 is affected by: Incorrect Access Control. The impact is: The access to the log file is not restricted. It contains sensitive information like passwords etc. The component is: log file. The attack vector is: open the file.
|
[] | null | null | null | null | null |
|
CVE-2017-5157
|
An issue was discovered in Schneider Electric homeLYnk Controller, LSS100100, all versions prior to V1.5.0. The homeLYnk controller is susceptible to a cross-site scripting attack. User inputs can be manipulated to cause execution of JavaScript code.
|
[
"cpe:2.3:o:schneider_electric:homelynk_controller_lss100100_firmware:1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:homelynk_controller_lss100100:-:*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 | null |
|
GHSA-7cw6-37m4-4r8g
|
The issue collector in Atlassian Jira before version 7.6.6, from version 7.7.0 before version 7.7.4, from version 7.8.0 before version 7.8.4 and from version 7.9.0 before version 7.9.2 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the error message of custom fields when an invalid value is specified.
|
[] | null | null | 6.1 | null | null |
|
CVE-2016-1933
|
Integer overflow in the image-deinterlacing functionality in Mozilla Firefox before 44.0 allows remote attackers to cause a denial of service (memory consumption or application crash) via a crafted GIF image.
|
[
"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"
] | null | null | 6.5 | 4.3 | null |
|
CVE-2025-24607
|
WordPress IdeaPush plugin <= 8.71 - Broken Access Control vulnerability
|
Missing Authorization vulnerability in Northern Beaches Websites IdeaPush allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects IdeaPush: from n/a through 8.71.
|
[] | null | 5.8 | null | null | null |
CVE-2024-26078
|
Adobe Experience Manager | Cross-site Scripting (Stored XSS) (CWE-79)
|
Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
|
[
"cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*"
] | null | 5.4 | null | null | null |
CVE-2024-35239
|
Stored Cross-site Scripting on Components of Umbraco Forms
|
Umbraco Commerce is an open source dotnet web forms solution. In affected versions an authenticated user that has access to edit Forms may inject unsafe code into Forms components. This issue can be mitigated by configuring TitleAndDescription:AllowUnsafeHtmlRendering after upgrading to one of the patched versions (13.0.1, 12.2.2, 10.5.3, 8.13.13).
|
[] | null | 2.7 | null | null | null |
CVE-2022-30720
|
Improper input validation check logic vulnerability in libsmkvextractor prior to SMR Jun-2022 Release 1 allows attackers to trigger crash.
|
[
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*"
] | null | 2.5 | null | null | null |
|
CVE-2019-12925
|
MailEnable Enterprise Premium 10.23 was vulnerable to multiple directory traversal issues, with which authenticated users could add, remove, or potentially read files in arbitrary folders accessible by the IIS user. This could lead to reading other users' credentials including those of SYSADMIN accounts, reading other users' emails, or adding emails or files to other users' accounts.
|
[
"cpe:2.3:a:mailenable:mailenable:*:*:*:*:premium:*:*:*"
] | null | null | 8.1 | 6.5 | null |
|
CVE-2018-11862
|
Buffer overflow can happen in WLAN module due to lack of validation of the input length in Snapdragon Mobile in version SD 845, SD 850, SDA660.
|
[
"cpe:2.3:o:qualcomm:sd_845_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_845:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_850_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_850:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sda660_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sda660:-:*:*:*:*:*:*:*"
] | null | null | 7.8 | 7.2 | null |
|
GHSA-qpw4-52v6-qh2v
|
In IKARUS anti.virus 2.16.20, the driver file (ntguard.SYS) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x83000084.
|
[] | null | null | 7.8 | null | null |
|
CVE-2017-15519
|
Versions of SnapCenter 2.0 through 3.0.1 allow unauthenticated remote attackers to view and modify backup related data via the Plug-in for NAS File Services. All users are urged to move to version 3.0.1 and perform the mitigation steps or upgrade to 4.0 following the product documentation.
|
[
"cpe:2.3:a:netapp:snapcenter_server:*:*:*:*:*:*:*:*"
] | null | null | 7.2 | 6.4 | null |
|
CVE-2024-12007
|
code-projects Farmacia visualizar-produto.php sql injection
|
A vulnerability, which was classified as critical, was found in code-projects Farmacia 1.0. This affects an unknown part of the file /visualizar-produto.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
|
[
"cpe:2.3:a:code-projects:farmacia:1.0:*:*:*:*:*:*:*"
] | 5.3 | 6.3 | 6.3 | 6.5 | null |
CVE-2021-30246
|
In the jsrsasign package through 10.1.13 for Node.js, some invalid RSA PKCS#1 v1.5 signatures are mistakenly recognized to be valid. NOTE: there is no known practical attack.
|
[
"cpe:2.3:a:jsrsasign_project:jsrsasign:*:*:*:*:*:node.js:*:*"
] | null | 9.1 | null | 6.4 | null |
|
CVE-2023-45051
|
WordPress Image vertical reel scroll slideshow Plugin <= 9.0 is vulnerable to Cross Site Scripting (XSS)
|
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Gopi Ramasamy Image vertical reel scroll slideshow plugin <= 9.0 versions.
|
[
"cpe:2.3:a:gopiplus:image_vertical_reel_scroll_slideshow:*:*:*:*:*:wordpress:*:*"
] | null | 5.9 | null | null | null |
CVE-2018-6576
|
SQL Injection exists in Event Manager 1.0 via the event.php id parameter or the page.php slug parameter.
|
[
"cpe:2.3:a:ezcode:event_manager:1.0:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 | null |
|
GHSA-w2hv-73f9-x6qr
|
The ZD YouTube FLV Player plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 1.2.6 via the $_GET['image'] parameter. This makes it possible for unauthenticated attackers to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.
|
[] | null | 8.3 | null | null | null |
|
CVE-2019-15643
|
The ultimate-faqs plugin before 1.8.22 for WordPress has XSS.
|
[
"cpe:2.3:a:etoilewebdesign:ultimate_faq:*:*:*:*:*:wordpress:*:*"
] | null | null | 6.1 | 4.3 | null |
|
GHSA-54cr-gv8w-8324
|
Malicious Package in xoc
|
Version 1.0.7 of `xoc` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`RecommendationIf version 1.0.7 of this module is found installed you will want to replace it with a version before or after 1.0.7. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.Users may consider downgrading to version 1.0.5
|
[] | null | null | null | null | null |
CVE-2022-44928
|
D-Link DVG-G5402SP GE_1.03 was discovered to contain a command injection vulnerability via the Maintenance function.
|
[
"cpe:2.3:o:d-link:dvg-g5402sp_firmware:ge_1.03:*:*:*:*:*:*:*",
"cpe:2.3:h:d-link:dvg-g5402sp:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
|
GHSA-xmgj-jp3c-9mp3
|
PR100088 Modbus gateway versions prior to Release R02 (or Software Version 1.1.13166) may allow an attacker to be able to change the password for an admin user who is currently or previously logged in, provided the device has not been restarted.
|
[] | null | null | 9.8 | null | null |
|
GHSA-j8g4-6p94-j4fp
|
The plugin Wbcom Designs – BuddyPress Group Reviews for WordPress is vulnerable to unauthorized settings changes and review modification due to missing capability checks and improper nonce checks in several functions related to said actions in versions up to, and including, 2.8.3. This makes it possible for unauthenticated attackers to modify reviews and plugin settings on the affected site.
|
[] | null | 5.3 | null | null | null |
|
GHSA-j776-x47j-qph6
|
PGPMail.pl 1.31 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) recipient or (2) pgpuserid parameters.
|
[] | null | null | null | null | null |
|
CVE-2012-3128
|
Unspecified vulnerability in Oracle SPARC T-Series Servers running System Firmware 8.2.0 and 8.1.4.e or earlier allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Integrated Lights Out Manager.
|
[
"cpe:2.3:o:oracle:sparc_t-series_server_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:sparc_t-series_server_firmware:8.2.0:*:*:*:*:*:*:*",
"cpe:2.3:h:oracle:netra_sparc_t3-1:-:*:*:*:*:*:*:*",
"cpe:2.3:h:oracle:netra_sparc_t3-1b:-:*:*:*:*:*:*:*",
"cpe:2.3:h:oracle:netra_sparc_t4-1:-:*:*:*:*:*:*:*",
"cpe:2.3:h:oracle:netra_sparc_t4-1b:-:*:*:*:*:*:*:*",
"cpe:2.3:h:oracle:netra_sparc_t4-2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:oracle:sparc_t3-1:-:*:*:*:*:*:*:*",
"cpe:2.3:h:oracle:sparc_t3-1b:-:*:*:*:*:*:*:*",
"cpe:2.3:h:oracle:sparc_t3-2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:oracle:sparc_t3-4:-:*:*:*:*:*:*:*",
"cpe:2.3:h:oracle:sparc_t4-1:-:*:*:*:*:*:*:*",
"cpe:2.3:h:oracle:sparc_t4-1b:-:*:*:*:*:*:*:*",
"cpe:2.3:h:oracle:sparc_t4-2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:oracle:sparc_t4-4:-:*:*:*:*:*:*:*"
] | null | null | null | 3.7 | null |
|
GHSA-34w2-qwhq-wprv
|
Request to LDAP is sent before user permissions are checked.
|
[] | null | 8.5 | null | null | null |
|
RHSA-2020:1266
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: heap overflow in mwifiex_update_vs_ie() function of Marvell WiFi driver
|
[
"cpe:/o:redhat:rhel_eus:7.5::computenode",
"cpe:/o:redhat:rhel_eus:7.5::server"
] | null | null | 8 | null | null |
CVE-2023-48411
|
In SignalStrengthAdapter::FillGsmSignalStrength() of protocolmiscadapter.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with baseband firmware compromise required. User interaction is not needed for exploitation.
|
[
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
|
GHSA-hxq4-c433-55vx
|
The Report Builder and Data Collection Component (DCC) in IBM Jazz Reporting Service (JRS) 5.x before 5.0.2 ifix016 and 6.x before 6.0.1 ifix005 maintain session ID validity after a logout action, which allows remote authenticated users to hijack sessions by leveraging an unattended workstation.
|
[] | null | null | 8.8 | null | null |
|
GHSA-9q66-mr67-3695
|
doku.php in DokuWiki, as used in Fedora 16, 17, and 18, when certain PHP error levels are set, allows remote attackers to obtain sensitive information via the prefix parameter, which reveals the installation path in an error message.
|
[] | null | null | null | null | null |
|
CVE-2021-43759
|
Adobe Media Encoder MP4 File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability
|
Adobe Media Encoder versions 22.0, 15.4.2 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious MP4 file.
|
[
"cpe:2.3:a:adobe:media_encoder:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:media_encoder:22.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 3.3 | null | null | null |
CVE-2025-6197
|
An open redirect vulnerability has been identified in Grafana OSS organization switching functionality.
Prerequisites for exploitation:
- Multiple organizations must exist in the Grafana instance
- Victim must be on a different organization than the one specified in the URL
|
[] | null | 4.2 | null | null | null |
|
GHSA-9wmc-rg4h-28wv
|
github.com/kumahq/kuma affected by CVE-2023-44487
|
ImpactEnvoy and Go HTTP/2 protocol stack is vulnerable to the "Rapid Reset" class of exploits, which send a sequence of HEADERS frames optionally followed by RST_STREAM frames.This can be exercised if you use the builtin gateway and receive untrusted http2 traffic.Patcheshttps://github.com/kumahq/kuma/pull/8023
https://github.com/kumahq/kuma/pull/8001
https://github.com/kumahq/kuma/pull/8034WorkaroundsDisable http2 on the gateway listener with a MeshProxyPatch or ProxyTemplate.Referenceshttps://github.com/advisories/GHSA-qppj-fm5r-hxr3
https://github.com/golang/go/issues/63417
https://github.com/envoyproxy/envoy/security/advisories/GHSA-jhv4-f7mr-xx76
https://cloud.google.com/blog/products/identity-security/how-it-works-the-novel-http2-rapid-reset-ddos-attack
https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/?sf269548684=1
https://www.envoyproxy.io/docs/envoy/latest/configuration/best_practices/edge
|
[] | null | 7.5 | null | null | null |
CVE-2024-44101
|
there is a possible Null Pointer Dereference (modem crash) due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.
|
[
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
|
GHSA-vhqr-3gr2-7px9
|
Subrion CMS Cross-site Scripting
|
`uploads/.htaccess` in Subrion CMS 4.2.1 allows XSS because it does not block .html file uploads (but does block, for example, .htm file uploads).
|
[] | null | null | 6.1 | null | null |
CVE-2021-35952
|
fastrack Reflex 2.0 W307S_REFLEX_v90.89 Activity Tracker allows a Remote attacker to change the time, date, and month via Bluetooth LE Characteristics on handle 0x0017.
|
[
"cpe:2.3:o:fastrack:reflex_2.0_firmware:90.89:*:*:*:*:*:*:*",
"cpe:2.3:h:fastrack:reflex_2.0:-:*:*:*:*:*:*:*"
] | null | 5.3 | null | null | null |
|
CVE-2024-36842
|
An issue in Oncord+ Android Infotainment Systems OS Android 12, Model Hardware TS17,Hardware part Number F57L_V3.2_20220301, and Build Number PlatformVER:K24-2023/05/09-v0.01 allows a remote attacker to execute arbitrary code via the ADB port component.
|
[] | null | 7.3 | null | null | null |
|
CVE-2024-56897
|
Improper access control in the HTTP server in YI Car Dashcam v3.88 allows unrestricted file downloads, uploads, and API commands. API commands can also be made to make unauthorized modifications to the device settings, such as disabling recording, disabling sounds, factory reset.
|
[] | null | 9.8 | null | null | null |
|
CVE-2023-32672
|
Apache Superset: SQL parser edge case bypasses data access authorization
|
An Incorrect authorisation check in SQLLab in Apache Superset versions up to and including 2.1.0. This vulnerability allows an authenticated user to query tables that they do not have proper access to within Superset. The vulnerability can be exploited by leveraging a SQL parsing vulnerability.
|
[
"cpe:2.3:a:apache:superset:*:*:*:*:*:*:*:*"
] | null | 4.3 | null | null | null |
CVE-2024-21001
|
Vulnerability in the Oracle Business Intelligence Enterprise Edition product of Oracle Analytics (component: BI Platform Security). The supported version that is affected is 7.0.0.0.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Business Intelligence Enterprise Edition. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Business Intelligence Enterprise Edition, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Business Intelligence Enterprise Edition accessible data as well as unauthorized read access to a subset of Oracle Business Intelligence Enterprise Edition accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N).
|
[
"cpe:2.3:a:oracle:business_intelligence:7.0.0.0.0:*:*:*:enterprise:*:*:*"
] | null | 5.4 | null | null | null |
|
CVE-2018-17156
|
In FreeBSD before 11.2-STABLE(r340268) and 11.2-RELEASE-p5, due to incorrectly accounting for padding on 64-bit platforms, a buffer underwrite could occur when constructing an ICMP reply packet when using a non-standard value for the net.inet.icmp.quotelen sysctl.
|
[
"cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:11.2:p5:*:*:*:*:*:*"
] | null | null | 5.9 | 4.3 | null |
|
GHSA-x39q-2wv2-8mx8
|
Cross-site scripting (XSS) vulnerability in D-Link DAP-2253 Access Point (Rev. A1) with firmware before 1.30 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
|
[] | null | null | null | null | null |
|
GHSA-3r3r-2438-9jg4
|
Cross-site scripting (XSS) vulnerability in (1) System Consultants La!Cooda WIZ 1.4.0 and earlier and (2) SpaceTag LacoodaST 2.1.3 and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, possibly involving upload of files containing XSS sequences.
|
[] | null | null | null | null | null |
|
GHSA-p77r-v683-34m4
|
Missing Authorization vulnerability in social share pro Social Share Icons & Social Share Buttons allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Social Share Icons & Social Share Buttons: from n/a through 3.5.7.
|
[] | null | 4.3 | null | null | null |
|
CVE-2019-1000019
|
libarchive version commit bf9aec176c6748f0ee7a678c5f9f9555b9a757c1 onwards (release v3.0.2 onwards) contains a CWE-125: Out-of-bounds Read vulnerability in 7zip decompression, archive_read_support_format_7zip.c, header_bytes() that can result in a crash (denial of service). This attack appears to be exploitable via the victim opening a specially crafted 7zip file.
|
[
"cpe:2.3:a:libarchive:libarchive:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4.3 | null |
|
GHSA-8pvf-j4qm-jw83
|
Adobe Acrobat Reader versions 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier have an exploitable memory corruption vulnerability in the PPKLite security handler. Successful exploitation could lead to arbitrary code execution.
|
[] | null | null | 7.8 | null | null |
|
CVE-2016-6421
|
Cisco IOS XR 5.2.2 allows remote attackers to cause a denial of service (process restart) via a crafted OSPF Link State Advertisement (LSA) update, aka Bug ID CSCvb05643.
|
[
"cpe:2.3:o:cisco:ios_xr:5.2.2:*:*:*:*:*:*:*"
] | null | null | 5.3 | 5 | null |
|
CVE-2020-7831
|
A vulnerability in the web-based contract management service interface Ebiz4u of INOGARD could allow an victim user to download any file. The attacker is able to use startup menu directory via directory traversal for automatic execution. The victim user need to reboot, however.
|
[
"cpe:2.3:a:inogard:ebiz4u:cviewer_object_1.0.5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 8.8 | null | null | null |
|
GHSA-h9h2-mfx3-9xhg
|
Xsession in Red Hat Linux 6.1 and earlier can allow local users with restricted accounts to bypass execution of the .xsession file by starting kde, gnome or anotherlevel from kdm.
|
[] | null | null | null | null | null |
|
CVE-2021-27876
|
An issue was discovered in Veritas Backup Exec before 21.2. The communication between a client and an Agent requires successful authentication, which is typically completed over a secure TLS communication. However, due to a vulnerability in the SHA Authentication scheme, an attacker is able to gain unauthorized access and complete the authentication process. Subsequently, the client can execute data management protocol commands on the authenticated connection. By using crafted input parameters in one of these commands, an attacker can access an arbitrary file on the system using System privileges.
|
[
"cpe:2.3:a:veritas:backup_exec:*:*:*:*:*:*:*:*"
] | null | 8.1 | null | null | null |
|
CVE-2008-1845
|
The Korn shell (aka mksh) before R33d on MirOS (aka MirBSD) does not flush the tty's I/O when invoking mksh in a new terminal, which allows local users to gain privileges by opening a virtual terminal and entering command sequences, which might later be executed in opportunistic circumstances by a different user who launches mksh and specifies that terminal with the -T option.
|
[
"cpe:2.3:o:mirbsd:miros:*:c:*:*:*:*:*:*",
"cpe:2.3:o:mirbsd:miros:33:a:*:*:*:*:*:*",
"cpe:2.3:o:mirbsd:miros:33:b:*:*:*:*:*:*"
] | null | null | null | 7.2 | null |
|
CVE-2019-13921
|
A vulnerability has been identified in SIMATIC WinAC RTX (F) 2010 (All versions < SP3 Update 1). Affected versions of the software contain a vulnerability that could allow an unauthenticated attacker to trigger a denial-of-service condition. The vulnerability can be triggered if a large HTTP request is sent to the executing service. The security vulnerability could be exploited by an attacker with network access to the affected systems. Successful exploitation requires no system privileges and no user interaction. An attacker could use the vulnerability to compromise availability of the service provided by the software.
|
[
"cpe:2.3:a:siemens:simatic_winac_rtx_\\(f\\)_2010:*:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simatic_winac_rtx_\\(f\\)_2010:-:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simatic_winac_rtx_\\(f\\)_2010:-:update_1:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simatic_winac_rtx_\\(f\\)_2010:-:update_2:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simatic_winac_rtx_\\(f\\)_2010:-:update_3:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simatic_winac_rtx_\\(f\\)_2010:sp1:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simatic_winac_rtx_\\(f\\)_2010:sp2:-:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simatic_winac_rtx_\\(f\\)_2010:sp2:update_1:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simatic_winac_rtx_\\(f\\)_2010:sp2:update_2:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simatic_winac_rtx_\\(f\\)_2010:sp2:update_3:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simatic_winac_rtx_\\(f\\)_2010:sp2:update_4:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null |
|
CVE-2018-0660
|
Directory traversal vulnerability in ver.2.8.4.0 and earlier and ver.3.3.0.0 and earlier allows an attacker to create arbitrary files via specially crafted ATC file.
|
[
"cpe:2.3:a:hibara:attachecase:*:*:*:*:*:*:*:*"
] | null | null | 3.3 | 4.3 | null |
|
CVE-2014-0710
|
Race condition in the cut-through proxy feature in Cisco Firewall Services Module (FWSM) Software 3.x before 3.2(28) and 4.x before 4.1(15) allows remote attackers to cause a denial of service (device reload) via certain matching traffic, aka Bug ID CSCuj16824.
|
[
"cpe:2.3:a:cisco:firewall_services_module_software:3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(3\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(4\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(5\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(6\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(7\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(8\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(9\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(10\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(11\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(12\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(13\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(14\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(15\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(16\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(17\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(18\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(19\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(20\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(21\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firewall_services_module_software:3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(3\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(4\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(5\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(6\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(7\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(8\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(9\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(10\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(11\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(12\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(13\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(14\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(15\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(16\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(17\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(18\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(19\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(20\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(21\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(22\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(23\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(24\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(25\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(26\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(27\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firewall_services_module_software:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(3\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(4\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(5\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(6\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(7\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(8\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(10\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(11\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(12\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(13\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(14\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(15\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firewall_services_module_software:4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(3\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(4\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(5\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(6\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(7\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(8\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(9\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(10\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(11\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(12\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(13\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(14\\):*:*:*:*:*:*:*"
] | null | null | null | 7.1 | null |
|
CVE-2022-48477
|
In JetBrains Hub before 2023.1.15725 SSRF protection in Auth Module integration was missing
|
[
"cpe:2.3:a:jetbrains:hub:*:*:*:*:*:*:*:*"
] | null | 4.1 | null | null | null |
|
GHSA-q9fg-rvgp-p6jg
|
Bentley View SKP File Parsing Use-After-Free Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Bentley View. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of SKP files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-18981.
|
[] | null | null | 3.3 | null | null |
|
CVE-2025-49134
|
Weblate exposes personal IP address via e-mail
|
Weblate is a web based localization tool. Prior to version 5.12, the audit log notifications included the full IP address of the acting user. This could be obtained by third-party servers such as SMTP relays, or spam filters. This issue has been patched in version 5.12.
|
[] | 2.1 | null | null | null | null |
GHSA-v7rj-7455-pv9p
|
NCH FlexiServer v6.00 suffers from a syslog?file=/.. path traversal vulnerability.
|
[] | null | null | null | null | null |
|
RHSA-2022:7935
|
Red Hat Security Advisory: pcs security, bug fix, and enhancement update
|
pcs: improper authentication via PAM
|
[
"cpe:/a:redhat:enterprise_linux:9::highavailability",
"cpe:/a:redhat:enterprise_linux:9::resilientstorage"
] | null | 6.3 | null | null | null |
GHSA-rfj2-4g26-7jw5
|
Potentially compromised builds
|
All Xtext & Xtend versions prior to 2.18.0 were built using HTTP instead of HTTPS file transfer and thus the built artifacts may have been compromised.
|
[] | null | 8.1 | null | null | null |
CVE-2025-28935
|
WordPress Fancybox Plus plugin <= 1.0.1 - Reflected Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in puzich Fancybox Plus allows Reflected XSS. This issue affects Fancybox Plus: from n/a through 1.0.1.
|
[] | null | 7.1 | null | null | null |
CVE-2014-9481
|
The Scribunto extension for MediaWiki allows remote attackers to obtain the rollback token and possibly other sensitive information via a crafted module, related to unstripping special page HTML.
|
[
"cpe:2.3:a:mediawiki:mediawiki:*:*:*:*:*:*:*:*"
] | null | 5.9 | null | 4.3 | null |
|
CVE-2020-3296
|
Cisco Small Business RV Series Routers Stack Overflow Arbitrary Code Execution Vulnerabilities
|
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV320 and RV325 Series Routers and Cisco Small Business RV016, RV042, and RV082 Routers could allow an authenticated, remote attacker with administrative privileges to execute arbitrary code on an affected device. The vulnerabilities are due to insufficient boundary restrictions on user-supplied input to scripts in the web-based management interface. An attacker with administrative privileges that are sufficient to log in to the web-based management interface could exploit each vulnerability by sending crafted requests that contain overly large values to an affected device, causing a stack overflow. A successful exploit could allow the attacker to cause the device to crash or allow the attacker to execute arbitrary code with root privileges on the underlying operating system.
|
[
"cpe:2.3:o:cisco:rv016_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:rv016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv042_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:rv042:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv042g_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:rv042g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv082_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:rv082:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv320_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:rv320:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv325_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:rv325:-:*:*:*:*:*:*:*"
] | null | null | 7.2 | null | null |
CVE-2017-1773
|
IBM DataPower Gateways 7.1, 7,2, 7.5, and 7.6 could allow an attacker using man-in-the-middle techniques to spoof DNS responses to perform DNS cache poisoning and redirect Internet traffic. IBM X-Force ID: 136817.
|
[
"cpe:2.3:a:ibm:datapower_gateway:*:*:*:*:*:*:*:*"
] | null | null | 4 | 4.3 | null |
|
RHSA-2024:3479
|
Red Hat Security Advisory: Red Hat OpenStack Platform 16.2 director Operator container images security update
|
goproxy: Denial of service (DoS) via unspecified vectors. golang: net/http/internal: Denial of Service (DoS) via Resource Consumption via HTTP requests golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS ssh: Prefix truncation attack on Binary Packet Protocol (BPP)
|
[
"cpe:/a:redhat:openstack:16.2::el8"
] | null | 5.9 | null | null | null |
CVE-2025-21235
|
Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability
|
Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability
|
[] | null | 7.8 | null | null | null |
GHSA-jmgh-c58q-8wvv
|
Memory corruption in video due to buffer overflow while reading the dts file in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables
|
[] | null | 7.8 | null | null | null |
|
GHSA-pxv2-r799-mj6c
|
A flaw exists in FlashArray whereby the Key Encryption Key (KEK) is logged during key rotation when RDL is configured.
|
[] | 5.1 | null | null | null | null |
|
CVE-2007-6726
|
Multiple cross-site scripting (XSS) vulnerabilities in Dojo 0.4.1 and 0.4.2, as used in Apache Struts and other products, allow remote attackers to inject arbitrary web script or HTML via unspecified vectors involving (1) xip_client.html and (2) xip_server.html in src/io/.
|
[
"cpe:2.3:a:apache:struts:2.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:dojotoolkit:dojo:0.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:dojotoolkit:dojo:0.4.2:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-7f45-cvww-9pp8
|
In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, while performing update of FOTA partition, uninitialized data can be pushed to storage.
|
[] | null | null | 7.5 | null | null |
|
CVE-2021-0947
|
The method PVRSRVBridgeTLDiscoverStreams allocates puiStreamsInt on the heap, fills the contents of the buffer via TLServerDiscoverStreamsKM, and then copies the buffer to userspace. The method TLServerDiscoverStreamsKM may fail for several reasons including invalid sizes. If this method fails the buffer will be left uninitialized and despite the error will still be copied to userspace. Kernel leak of uninitialized heap data with no privs required.Product: AndroidVersions: Android SoCAndroid ID: A-236838960
|
[
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
|
GHSA-g6r9-732f-vcc2
|
Unspecified vulnerability in the Oracle iPlanet Web Server component in Oracle Sun Products Suite 7.0 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Administration Console.
|
[] | null | null | null | null | null |
|
CVE-2024-32945
|
LaTeX post content manipulation via renderer state leak across contexts
|
Mattermost Mobile Apps versions <=2.16.0 fail to protect against abuse of a globally shared MathJax state which allows an attacker to change the contents of a LateX post, by creating another post with specific macro definitions.
|
[
"cpe:2.3:a:mattermost:mattermost:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mattermost:mattermost_mobile:*:*:*:*:*:*:*:*"
] | null | 2.6 | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.