id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 36
232
⌀ |
---|---|---|---|---|---|---|---|---|
GHSA-qrx9-3wpp-hfcm
|
Improper input validation in the Linux kernel-mode driver for some Intel(R) 800 Series Ethernet before version 1.17.2 may allow an authenticated user to potentially enable escalation of privilege via local access.
|
[] | 9.3 | 8.8 | null | null | null |
|
GHSA-98p9-xwhh-c2q7
|
A vulnerability in the web-based management interface of Cisco Data Center Network Manager could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the management interface on an affected device. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by persuading a user of the interface to click a customized link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive browser-based information.
|
[] | null | null | 6.1 | null | null |
|
GHSA-grmq-8wh7-vqvm
|
A vulnerability was found in Gwolle Guestbook Plugin 1.7.4. It has been rated as problematic. This issue affects some unknown processing. The manipulation leads to basic cross site scripting. The attack may be initiated remotely.
|
[] | null | 6.1 | null | null | null |
|
GHSA-2532-fj77-38p3
|
Multiple PHP remote file inclusion vulnerabilities in burnCMS 0.2 and earlier allow remote attackers to execute arbitrary PHP code via a URL in the root parameter to (1) mysql.class.php or (2) postgres.class.php in lib/db/; or (3) authuser.php, (4) misc.php, or (5) connect.php in lib/.
|
[] | null | null | null | null | null |
|
CVE-2017-7579
|
inc/PMF/Faq.php in phpMyFAQ before 2.9.7 has XSS in the question field.
|
[
"cpe:2.3:a:phpmyfaq:phpmyfaq:*:*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 | null |
|
CVE-2017-14401
|
The EyesOfNetwork web interface (aka eonweb) 5.1-0 has SQL injection via the user_name parameter to module/admin_user/add_modify_user.php in the "ACCOUNT UPDATE" section.
|
[
"cpe:2.3:a:eyesofnetwork:eyesofnetwork:5.1-0:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 | null |
|
GHSA-2vpg-h3vh-6g5m
|
The listening daemon in Blue Coat Systems Inc. WinProxy before 6.1a allows remote attackers to cause a denial of service (crash) via a long HTTP request that causes an out-of-bounds read.
|
[] | null | null | null | null | null |
|
GHSA-w665-48g4-w8g7
|
A vulnerability was found in Human Resource Management System 1.0. It has been classified as problematic. This affects an unknown part of the component Leave Handler. The manipulation of the argument Reason leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-210831.
|
[] | null | 5.4 | null | null | null |
|
GHSA-hc2r-g3jp-hcc7
|
Cross-Site Request Forgery (CSRF) vulnerability in Antsanchez Easy Cookie Law plugin <= 3.1 versions.
|
[] | null | 5.4 | null | null | null |
|
RHSA-2017:1484
|
Red Hat Security Advisory: kernel security update
|
kernel: heap/stack gap jumping via unbounded stack allocations kernel: Incorrectly mapped contents of PIE executable
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 2.9 | null | null |
GHSA-6p3v-7x9x-66jr
|
Grandstream GXP1600 series firmware 1.0.4.152 and below is vulnerable to authenticated remote command execution when an attacker adds an OpenVPN up script to the phone's VPN settings via the "Additional Settings" field in the web interface. When the VPN's connection is established, the user defined script is executed with root privileges.
|
[] | null | null | null | null | null |
|
CVE-2011-4001
|
Directory traversal vulnerability in HP no Mawashimono Nikki 6.6 and earlier allows remote attackers to read and modify arbitrary files via unspecified vectors.
|
[
"cpe:2.3:a:mawashimono:nikki:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:1.41:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:2.61:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:2.62:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:2.71:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:2.81:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:3.01:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:3.02:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:3.03:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:3.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:3.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:3.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:3.21:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:3.22:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:4.01:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:4.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:4.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:4.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:4.20:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:4.21:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:4.22:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:4.23:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:4.24:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:4.25:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:4.31:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:4.41:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:4.42:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:4.43:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:4.44:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:4.51:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:4.52:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:4.71:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:4.72:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:4.73:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:4.74:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.0:alpha:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.0:alpha2:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.0:alpha3:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.0:rc4:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.0:rc5:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.0:rc6:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.0:rc7:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.01:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.02:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.03:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.04:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.05:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.21:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.22:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.23:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.24:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.41:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.42:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.43:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.51:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.52:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.53:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.54:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.55:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.56:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.57:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.58:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.59:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.111:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.141:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.142:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.143:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.144:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.145:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.146:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.147:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.148:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.149:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.151:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.152:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.153:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.154:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.155:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.156:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.157:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.158:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.159:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.161:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.162:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.163:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.231:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.00:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.01:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.02:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.03:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.04:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.05:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.06:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.07:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.08:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.09:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.18:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.19:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.20:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.21:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.22:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.23:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.24:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.25:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.26:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.27:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.28:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.29:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.30:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.31:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.32:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.33:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.34:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.51:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.52:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.53:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.54:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2017-18685
|
An issue was discovered on Samsung mobile devices with KK(4.4), L(5.0/5.1), and M(6.0) software. The InputMethod application can cause a system crash via a malformed serializable object in an Intent. The Samsung ID is SVE-2016-7123 (February 2017).
|
[
"cpe:2.3:o:google:android:4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*"
] | null | 7.5 | null | 7.8 | null |
|
RHSA-2018:3663
|
Red Hat Security Advisory: sos-collector security update
|
sos-collector: incorrect permissions set on newly created files
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 5.9 | null | null |
GHSA-hx7r-89vp-x3gj
|
In Audiocodes Mediapack MP-11x through 6.60A.369.002, a crafted POST request request may result in an unauthenticated remote user's ability to execute unauthorized code.
|
[] | null | 9.8 | null | null | null |
|
CVE-2012-4597
|
Cross-site scripting (XSS) vulnerability in McAfee Email and Web Security (EWS) 5.5 through Patch 6 and 5.6 through Patch 3, and McAfee Email Gateway (MEG) 7.0.0 and 7.0.1, allows remote attackers to inject arbitrary web script or HTML via vectors related to the McAfee Security Appliance Management Console/Dashboard.
|
[
"cpe:2.3:a:mcafee:email_and_web_security:5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:email_and_web_security:5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:email_gateway:7.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:email_gateway:7.0.1:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-gjjp-x6r5-h5rj
|
The Xen hypervisor block backend driver for Linux kernel 2.6.18, when running on a 64-bit host with a 32-bit paravirtualized guest, allows local privileged users in the guest OS to cause a denial of service (host OS crash) via a request that specifies a large number of blocks.
|
[] | null | null | null | null | null |
|
RHSA-2013:0144
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Use-after-free when displaying table with many columns and column groups (MFSA 2013-05) Mozilla: Compartment mismatch with quickstubs returned values (MFSA 2013-09) Mozilla: Address space layout leaked in XBL objects (MFSA 2013-11) Mozilla: Buffer overflow in Javascript string concatenation (MFSA 2013-12) Mozilla: Use-after-free in serializeToStream (MFSA 2013-16) Mozilla: Use-after-free in ListenerManager (MFSA 2013-17) Mozilla: Chrome Object Wrapper (COW) bypass through plugin objects (MFSA 2013-15) Mozilla: URL spoofing in addressbar during page loads (MFSA 2013-04) Mozilla: Use-after-free and buffer overflow issues found using Address Sanitizer (MFSA 2013-02) Mozilla: Use-after-free and buffer overflow issues found using Address Sanitizer (MFSA 2013-02) Mozilla: Use-after-free and buffer overflow issues found using Address Sanitizer (MFSA 2013-02) Mozilla: Miscellaneous memory safety hazards (rv:10.0.12) (MFSA 2013-01)
|
[
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null | null |
CVE-2009-1371
|
The CLI_ISCONTAINED macro in libclamav/others.h in ClamAV before 0.95.1 allows remote attackers to cause a denial of service (application crash) via a malformed file with UPack encoding.
|
[
"cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.01:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.02:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.03:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.05:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.8_:rc3:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.9_rc1:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.14:pre:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.21:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.22:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.23:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.24:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.51:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.52:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.53:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.54:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.60:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.60p:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.65:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.66:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.67:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.67-1:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.68:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.68.1:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.70:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.70:rc:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.71:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.72:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.73:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.74:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.75:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.75.1:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.80:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.80:rc4:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.80_rc:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.80_rc1:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.80_rc2:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.80_rc3:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.81:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.81_rc1:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.82:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.83:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.84:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.84_rc1:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.84_rc2:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.85:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.85.1:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.86:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.86.1:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.86.2:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.86_rc1:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.87:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.87.1:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.88:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.88.1:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.88.2:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.88.3:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.88.4:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.88.5:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.88.6:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.88.7:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.88.7_p0:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.88.7_p1:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.90:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.90.1:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.90.1_p0:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.90.2:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.90.2_p0:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.90.3:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.90.3_p0:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.90.3_p1:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.90_rc1:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.90_rc1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.90_rc2:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.90_rc3:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.91:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.91.1:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.91.2:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.91.2_p0:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.91_rc1:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.91_rc2:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.92:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.92.1:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.92_p0:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.93:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.93.1:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.93.2:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.93.3:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.94:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.94.1:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.94.2:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.95:src1:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.95:src2:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-644w-28vg-vrrc
|
The leakage of the client secret in TonTon-Tei Line v13.6.1 allows attackers to obtain the channel access token and send crafted broadcast messages.
|
[] | null | 8.2 | null | null | null |
|
CVE-2014-4007
|
The SAP Upgrade tools for ABAP has hardcoded credentials, which makes it easier for remote attackers to obtain access via unspecified vectors.
|
[
"cpe:2.3:a:sap:upgrade_tools:-:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
CVE-2023-21101
|
In multiple functions of WVDrmPlugin.cpp, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android SoCAndroid ID: A-258189255
|
[
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] | null | 7 | null | null | null |
|
CVE-2023-46204
|
WordPress Duplicate Theme Plugin <= 0.1.6 is vulnerable to Cross Site Request Forgery (CSRF)
|
Cross-Site Request Forgery (CSRF) vulnerability in Muller Digital Inc. Duplicate Theme plugin <= 0.1.6 versions.
|
[
"cpe:2.3:a:mullerdigital:duplicate_theme:*:*:*:*:*:wordpress:*:*"
] | null | 4.3 | null | null | null |
GHSA-x356-8vx7-fmf3
|
Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.36 and prior, 7.5.26 and prior, 7.6.22 and prior and and 8.0.29 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H).
|
[] | null | 6.3 | null | null | null |
|
GHSA-qrcv-45vg-jfwm
|
An Incorrect Access Control (issue 1 of 2) was discovered in GitLab Community and Enterprise Edition before 11.7.8, 11.8.x before 11.8.4, and 11.9.x before 11.9.2. It allowed non-members of a private project/group to add and read labels.
|
[] | null | null | null | null | null |
|
CVE-2025-25769
|
Wangmarket v4.10 to v5.0 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /controller/UserController.java.
|
[] | null | 8 | null | null | null |
|
GHSA-vh2f-wj96-fxxh
|
In the Linux kernel, the following vulnerability has been resolved:RDMA/mlx5: Fix fortify source warning while accessing Eth segment------------[ cut here ]------------
memcpy: detected field-spanning write (size 56) of single field "eseg->inline_hdr.start" at /var/lib/dkms/mlnx-ofed-kernel/5.8/build/drivers/infiniband/hw/mlx5/wr.c:131 (size 2)
WARNING: CPU: 0 PID: 293779 at /var/lib/dkms/mlnx-ofed-kernel/5.8/build/drivers/infiniband/hw/mlx5/wr.c:131 mlx5_ib_post_send+0x191b/0x1a60 [mlx5_ib]
Modules linked in: 8021q garp mrp stp llc rdma_ucm(OE) rdma_cm(OE) iw_cm(OE) ib_ipoib(OE) ib_cm(OE) ib_umad(OE) mlx5_ib(OE) ib_uverbs(OE) ib_core(OE) mlx5_core(OE) pci_hyperv_intf mlxdevm(OE) mlx_compat(OE) tls mlxfw(OE) psample nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set nf_tables libcrc32c nfnetlink mst_pciconf(OE) knem(OE) vfio_pci vfio_pci_core vfio_iommu_type1 vfio iommufd irqbypass cuse nfsv3 nfs fscache netfs xfrm_user xfrm_algo ipmi_devintf ipmi_msghandler binfmt_misc crct10dif_pclmul crc32_pclmul polyval_clmulni polyval_generic ghash_clmulni_intel sha512_ssse3 snd_pcsp aesni_intel crypto_simd cryptd snd_pcm snd_timer joydev snd soundcore input_leds serio_raw evbug nfsd auth_rpcgss nfs_acl lockd grace sch_fq_codel sunrpc drm efi_pstore ip_tables x_tables autofs4 psmouse virtio_net net_failover failover floppy
[last unloaded: mlx_compat(OE)]
CPU: 0 PID: 293779 Comm: ssh Tainted: G OE 6.2.0-32-generic #32~22.04.1-Ubuntu
Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011
RIP: 0010:mlx5_ib_post_send+0x191b/0x1a60 [mlx5_ib]
Code: 0c 01 00 a8 01 75 25 48 8b 75 a0 b9 02 00 00 00 48 c7 c2 10 5b fd c0 48 c7 c7 80 5b fd c0 c6 05 57 0c 03 00 01 e8 95 4d 93 da <0f> 0b 44 8b 4d b0 4c 8b 45 c8 48 8b 4d c0 e9 49 fb ff ff 41 0f b7
RSP: 0018:ffffb5b48478b570 EFLAGS: 00010046
RAX: 0000000000000000 RBX: 0000000000000001 RCX: 0000000000000000
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
RBP: ffffb5b48478b628 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000000 R12: ffffb5b48478b5e8
R13: ffff963a3c609b5e R14: ffff9639c3fbd800 R15: ffffb5b480475a80
FS: 00007fc03b444c80(0000) GS:ffff963a3dc00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000556f46bdf000 CR3: 0000000006ac6003 CR4: 00000000003706f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
<TASK>
? show_regs+0x72/0x90
? mlx5_ib_post_send+0x191b/0x1a60 [mlx5_ib]
? __warn+0x8d/0x160
? mlx5_ib_post_send+0x191b/0x1a60 [mlx5_ib]
? report_bug+0x1bb/0x1d0
? handle_bug+0x46/0x90
? exc_invalid_op+0x19/0x80
? asm_exc_invalid_op+0x1b/0x20
? mlx5_ib_post_send+0x191b/0x1a60 [mlx5_ib]
mlx5_ib_post_send_nodrain+0xb/0x20 [mlx5_ib]
ipoib_send+0x2ec/0x770 [ib_ipoib]
ipoib_start_xmit+0x5a0/0x770 [ib_ipoib]
dev_hard_start_xmit+0x8e/0x1e0
? validate_xmit_skb_list+0x4d/0x80
sch_direct_xmit+0x116/0x3a0
__dev_xmit_skb+0x1fd/0x580
__dev_queue_xmit+0x284/0x6b0
? _raw_spin_unlock_irq+0xe/0x50
? __flush_work.isra.0+0x20d/0x370
? push_pseudo_header+0x17/0x40 [ib_ipoib]
neigh_connected_output+0xcd/0x110
ip_finish_output2+0x179/0x480
? __smp_call_single_queue+0x61/0xa0
__ip_finish_output+0xc3/0x190
ip_finish_output+0x2e/0xf0
ip_output+0x78/0x110
? __pfx_ip_finish_output+0x10/0x10
ip_local_out+0x64/0x70
__ip_queue_xmit+0x18a/0x460
ip_queue_xmit+0x15/0x30
__tcp_transmit_skb+0x914/0x9c0
tcp_write_xmit+0x334/0x8d0
tcp_push_one+0x3c/0x60
tcp_sendmsg_locked+0x2e1/0xac0
tcp_sendmsg+0x2d/0x50
inet_sendmsg+0x43/0x90
sock_sendmsg+0x68/0x80
sock_write_iter+0x93/0x100
vfs_write+0x326/0x3c0
ksys_write+0xbd/0xf0
? do_syscall_64+0x69/0x90
__x64_sys_write+0x19/0x30
do_syscall_
---truncated---
|
[] | null | 7.8 | null | null | null |
|
CVE-2020-15314
|
Zyxel CloudCNM SecuManager 3.1.0 and 3.1.1 has a hardcoded RSA SSH key for the root account.
|
[
"cpe:2.3:a:zyxel:cloudcnm_secumanager:3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:zyxel:cloudcnm_secumanager:3.1.1:*:*:*:*:*:*:*"
] | null | 5.9 | null | 4.3 | null |
|
CVE-2025-39361
|
WordPress Royal Elementor Addons plugin <= 1.7.1017 - Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WProyal Royal Elementor Addons allows Stored XSS.This issue affects Royal Elementor Addons: from n/a through 1.7.1017.
|
[] | null | 6.5 | null | null | null |
GHSA-x8jc-gpmg-fxrr
|
SQL injection vulnerability in search.php in MyTopix 1.2.3 allows remote attackers to execute arbitrary SQL commands via the (1) mid and (2) keywords parameters.
|
[] | null | null | null | null | null |
|
CVE-2017-11358
|
The read_samples function in hcom.c in Sound eXchange (SoX) 14.4.2 allows remote attackers to cause a denial of service (invalid memory read and application crash) via a crafted hcom file.
|
[
"cpe:2.3:a:sound_exchange_project:sound_exchange:14.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
] | null | null | 5.5 | 4.3 | null |
|
CVE-2009-0860
|
Cross-site scripting (XSS) vulnerability in the web user interface in the login application in NetMRI 3.0.1 and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, related to error pages.
|
[
"cpe:2.3:a:netcordia:netmri:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-3c96-x4xm-9p54
|
The web interface in Pattern Insight 2.3 allows remote attackers to conduct clickjacking attacks via a FRAME element.
|
[] | null | null | null | null | null |
|
CVE-2021-38966
|
IBM Cloud Pak for Automation 21.0.2 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 212357.
|
[
"cpe:2.3:a:ibm:cloud_pak_for_automation:21.0.2:-:*:*:*:*:*:*",
"cpe:2.3:a:ibm:workflow_process_service:21.0.2:*:*:*:*:*:*:*"
] | null | null | 5.4 | null | null |
|
GHSA-q44p-q588-242q
|
jQuery 1.4.2 allows remote attackers to conduct cross-site scripting (XSS) attacks via vectors related to use of the text method inside after.
|
[] | null | null | 6.1 | null | null |
|
GHSA-cg57-h35j-g58g
|
getgps data in iTrack Easy can be modified without authentication by setting the data using the parametercmd:setothergps. This vulnerability can be exploited to alter the GPS data of a lost device.
|
[] | null | null | 7.5 | null | null |
|
RHSA-2023:3715
|
Red Hat Security Advisory: libvirt security update
|
libvirt: Memory leak in virPCIVirtualFunctionList cleanup
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 6.3 | null | null | null |
GHSA-995f-rv3r-c9mx
|
Microsoft Windows SCSI Class System File Elevation of Privilege Vulnerability
|
[] | null | 7.8 | null | null | null |
|
CVE-2011-1269
|
Microsoft PowerPoint 2002 SP3, 2003 SP3, and 2007 SP2; Office 2004 and 2008 for Mac; Open XML File Format Converter for Mac; and Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP2 make unspecified function calls during file parsing without proper handling of memory, which allows remote attackers to execute arbitrary code via a crafted PowerPoint document, aka "Presentation Memory Corruption RCE Vulnerability."
|
[
"cpe:2.3:a:microsoft:office:2004:*:mac:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2008:*:mac:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_compatibility_pack:2007:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:open_xml_file_format_converter:*:*:mac:*:*:*:*:*",
"cpe:2.3:a:microsoft:powerpoint:2002:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:powerpoint:2003:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:powerpoint:2007:sp2:*:*:*:*:*:*"
] | null | null | null | 9.3 | null |
|
RHSA-2022:1934
|
Red Hat Security Advisory: mod_auth_mellon security update
|
mod_auth_mellon: Open Redirect vulnerability in logout URLs
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | null | 6.1 | null | null |
CVE-2020-9707
|
Adobe Acrobat and Reader versions 2020.009.20074 and earlier, 2020.001.30002, 2017.011.30171 and earlier, and 2015.006.30523 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
|
[
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:20.001.30002:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:20.001.30002:*:*:*:classic:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 3.3 | null | 4.3 | null |
|
GHSA-cwx6-6g6c-mmwm
|
Improper conditions check in Intel BIOS platform sample code for some Intel(R) Processors before may allow a privileged user to potentially enable escalation of privilege via local access.
|
[] | null | 6.7 | null | null | null |
|
CVE-2017-1337
|
IBM WebSphere MQ 9.0.1 and 9.0.2 Java/JMS application can incorrectly transmit user credentials in plain text. IBM X-Force ID: 126245.
|
[
"cpe:2.3:a:ibm:websphere_mq:9.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_mq:9.0.2:*:*:*:*:*:*:*"
] | null | null | 8.1 | 4.3 | null |
|
CVE-2020-13245
|
Certain NETGEAR devices are affected by Missing SSL Certificate Validation. This affects R7000 1.0.9.6_1.2.19 through 1.0.11.100_10.2.10, and possibly R6120, R7800, R6220, R8000, R6350, R9000, R6400, RAX120, R6400v2, RBR20, R6800, XR300, R6850, XR500, and R7000P.
|
[
"cpe:2.3:o:netgear:r6120_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6120:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6220_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6220:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6350_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6350:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6400_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6400:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6400:v2:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6800_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6800:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6850_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6850:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r7000p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7000p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r7800_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7800:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r8000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r8000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r9000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r9000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rax120_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rax120:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbr20_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbr20:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:xr300_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:xr300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:xr500_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:xr500:-:*:*:*:*:*:*:*"
] | null | 5.9 | null | 4.3 | null |
|
CVE-2007-5910
|
Stack-based buffer overflow in Autonomy (formerly Verity) KeyView Viewer, Filter, and Export SDK before 9.2.0.12, as used by ActivePDF DocConverter, wp6sr.dll in IBM Lotus Notes 8.0 and before 7.0.3, Symantec Mail Security, and other products, allows remote attackers to execute arbitrary code via a crafted WordPerfect (WPD) file.
|
[
"cpe:2.3:a:activepdf:docconverter:3.8.2_.5:*:*:*:*:*:*:*",
"cpe:2.3:a:autonomy:keyview_export_sdk:*:*:*:*:*:*:*:*",
"cpe:2.3:a:autonomy:keyview_filter_sdk:*:*:*:*:*:*:*:*",
"cpe:2.3:a:autonomy:keyview_viewer_sdk:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:*:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:mail_security:5.0:*:appliance:*:*:*:*:*",
"cpe:2.3:a:symantec:mail_security:5.0:*:microsoft_exchange:*:*:*:*:*",
"cpe:2.3:a:symantec:mail_security:5.0.0:*:smtp:*:*:*:*:*",
"cpe:2.3:a:symantec:mail_security:5.0.0.24:*:appliance:*:*:*:*:*",
"cpe:2.3:a:symantec:mail_security:5.0.1:*:smtp:*:*:*:*:*",
"cpe:2.3:a:symantec:mail_security:7.5:*:domino:*:*:*:*:*"
] | null | null | null | 9.3 | null |
|
GHSA-55hp-hjjj-m6wh
|
QuickCMS is vulnerable to Reflected XSS via sLangEdit parameter in admin's panel functionality. A malicious attacker can craft a specially crafted URL that, when opened, results in arbitrary JavaScript execution in the victim's browser.The vendor was notified early about this vulnerability, but didn't respond with the details of vulnerability or vulnerable version range. Only version 6.8 was tested and confirmed as vulnerable, other versions were not tested and might also be vulnerable.
|
[] | 5.1 | 6.1 | null | null | null |
|
CVE-2023-46737
|
Possible endless data attack from attacker-controlled registry in cosign
|
Cosign is a sigstore signing tool for OCI containers. Cosign is susceptible to a denial of service by an attacker controlled registry. An attacker who controls a remote registry can return a high number of attestations and/or signatures to Cosign and cause Cosign to enter a long loop resulting in an endless data attack. The root cause is that Cosign loops through all attestations fetched from the remote registry in pkg/cosign.FetchAttestations. The attacker needs to compromise the registry or make a request to a registry they control. When doing so, the attacker must return a high number of attestations in the response to Cosign. The result will be that the attacker can cause Cosign to go into a long or infinite loop that will prevent other users from verifying their data. In Kyvernos case, an attacker whose privileges are limited to making requests to the cluster can make a request with an image reference to their own registry, trigger the infinite loop and deny other users from completing their admission requests. Alternatively, the attacker can obtain control of the registry used by an organization and return a high number of attestations instead the expected number of attestations. The issue can be mitigated rather simply by setting a limit to the limit of attestations that Cosign will loop through. The limit does not need to be high to be within the vast majority of use cases and still prevent the endless data attack. This issue has been patched in version 2.2.1 and users are advised to upgrade.
|
[
"cpe:2.3:a:sigstore:cosign:*:*:*:*:*:*:*:*"
] | null | 3.1 | null | null | null |
CVE-2025-3774
|
Wise Chat <= 3.3.4 - Unauthenticated Stored Cross-Site Scripting via X-Forwarded-For Header
|
The Wise Chat plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the X-Forwarded-For header in all versions up to, and including, 3.3.4 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] | null | 7.2 | null | null | null |
GHSA-624h-qqfx-32pv
|
Adobe Acrobat and Reader versions 2019.010.20098 and earlier, 2019.010.20098 and earlier, 2017.011.30127 and earlier version, and 2015.006.30482 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure .
|
[] | null | null | 7.5 | null | null |
|
RHSA-2023:4499
|
Red Hat Security Advisory: thunderbird security update
|
thunderbird: File Extension Spoofing using the Text Direction Override Character Mozilla: Offscreen Canvas could have bypassed cross-origin restrictions Mozilla: Incorrect value used during WASM compilation Mozilla: Potential permissions request bypass via clickjacking Mozilla: Crash in DOMParser due to out-of-memory conditions Mozilla: Fix potential race conditions when releasing platform objects Mozilla: Stack buffer overflow in StorageManager Mozilla: Cookie jar overflow caused unexpected cookie jar state Mozilla: Memory safety bugs fixed in Firefox 116, Firefox ESR 115.1, Firefox ESR 102.14, Thunderbird 115.1, and Thunderbird 102.14 Mozilla: Memory safety bugs fixed in Firefox ESR 115.1, and Thunderbird 115.1
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 9.8 | null | null | null |
CVE-2023-45807
|
OpenSearch Issue with tenant read-only permissions
|
OpenSearch is a community-driven, open source fork of Elasticsearch and Kibana following the license change in early 2021. There is an issue with the implementation of tenant permissions in OpenSearch Dashboards where authenticated users with read-only access to a tenant can perform create, edit and delete operations on index metadata of dashboards and visualizations in that tenant, potentially rendering them unavailable. This issue does not affect index data, only metadata. Dashboards correctly enforces read-only permissions when indexing and updating documents. This issue does not provide additional read access to data users don’t already have. This issue can be mitigated by disabling the tenants functionality for the cluster. Versions 1.3.14 and 2.11.0 contain a fix for this issue.
|
[
"cpe:2.3:a:amazon:opensearch:*:*:*:*:*:docker:*:*",
"cpe:2.3:a:amazon:opensearch:*:*:*:*:*:maven:*:*"
] | null | 5.4 | null | null | null |
GHSA-cgx8-9m8p-2q4p
|
A vulnerability in the Network Address Translation 64 (NAT64) functions of Cisco IOS Software could allow an unauthenticated, remote attacker to cause either an interface queue wedge or a device reload. The vulnerability is due to the incorrect handling of certain IPv4 packet streams that are sent through the device. An attacker could exploit this vulnerability by sending specific IPv4 packet streams through the device. An exploit could allow the attacker to either cause an interface queue wedge or a device reload, resulting in a denial of service (DoS) condition.
|
[] | null | null | 7.5 | null | null |
|
GHSA-vpg4-mfvr-xc5c
|
An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A stack out-of-bounds read occurs in mbc_enc_len() during regular expression searching. Invalid handling of reg->dmin in forward_search_range() could result in an invalid pointer dereference, as an out-of-bounds read from a stack buffer.
|
[] | null | null | 9.8 | null | null |
|
GHSA-j6jv-rr9g-q9j6
|
A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory leak at the fifo_alloc_common function in libavutil/fifo.c.
|
[] | null | null | null | null | null |
|
CVE-2023-26405
|
ZDI-CAN-20712: Object Prototype pollution which leads to API Restrictions Bypass
|
Adobe Acrobat Reader versions 23.001.20093 (and earlier) and 20.005.30441 (and earlier) are affected by an Improper Input Validation vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[
"cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
GHSA-c62j-xm9j-qw97
|
The Site Reviews WordPress plugin before 6.7.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
|
[] | null | 4.8 | null | null | null |
|
GHSA-cg5m-p8pg-93cg
|
Theoretically, it would be possible for an attacker to brute-force the password for an instance in single-user password protection mode via a timing attack given the linear nature of the `!==` used for comparison.The risk is minified by the additional overhead of the request, which varies in a non-constant nature making the attack less reliable to execute
|
[] | null | null | 7.1 | null | null |
|
RHSA-2023:2075
|
Red Hat Security Advisory: libwebp security update
|
Mozilla: libwebp: Double-free in libwebp
|
[
"cpe:/a:redhat:rhel_eus:9.0::appstream"
] | null | 7.5 | null | null | null |
GHSA-7xq3-j5px-xf94
|
The is_asn1 function in strongSwan 4.1.11 through 5.0.4 does not properly validate the return value of the asn1_length function, which allows remote attackers to cause a denial of service (segmentation fault) via a (1) XAuth username, (2) EAP identity, or (3) PEM encoded file that starts with a 0x04, 0x30, or 0x31 character followed by an ASN.1 length value that triggers an integer overflow.
|
[] | null | null | null | null | null |
|
RHSA-2024:2066
|
Red Hat Security Advisory: buildah security update
|
buildah: full container escape at build time
|
[
"cpe:/a:redhat:rhel_eus:9.0::appstream"
] | null | 8.6 | null | null | null |
CVE-2019-4298
|
IBM Robotic Process Automation with Automation Anywhere 11 uses a high privileged PostgreSQL account for database access which could allow a local user to perform actions they should not have privileges to execute. IBM X-Force ID: 160764.
|
[
"cpe:2.3:a:ibm:robotic_process_automation_with_automation_anywhere:*:*:*:*:*:*:*:*"
] | null | null | 7.7 | null | null |
|
CVE-2022-0806
|
Data leak in Canvas in Google Chrome prior to 99.0.4844.51 allowed a remote attacker who convinced a user to engage in screen sharing to potentially leak cross-origin data via a crafted HTML page.
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4.3 | null |
|
GHSA-c8c6-j574-7j4p
|
In telephony service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed.
|
[] | null | 5.5 | null | null | null |
|
GHSA-hc9m-j5rq-cphm
|
Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.862 Application 20.0.2014 allows Server-Side Request Forgery: Elatec V-2023-014.
|
[] | null | 9.8 | null | null | null |
|
CVE-2023-5222
|
Viessmann Vitogate 300 Web Management Interface vitogate.cgi isValidUser hard-coded password
|
A vulnerability classified as critical was found in Viessmann Vitogate 300 up to 2.1.3.0. This vulnerability affects the function isValidUser of the file /cgi-bin/vitogate.cgi of the component Web Management Interface. The manipulation leads to use of hard-coded password. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-240364. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
|
[
"cpe:2.3:o:viessmann:vitogate_300_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:viessmann:vitogate_300:-:*:*:*:*:*:*:*"
] | null | 6.3 | 6.3 | 5.8 | null |
GHSA-76g9-9frm-pxr6
|
An issue was discovered on NETGEAR Nighthawk M1 (MR1100) devices before 12.06.03. The web-interface Cross-Site Request Forgery token is stored in a dynamically generated JavaScript file, and therefore can be embedded in third party pages, and re-used against the Nighthawk web interface. This entirely bypasses the intended security benefits of the use of a CSRF-protection token.
|
[] | null | null | 8.1 | null | null |
|
CVE-2021-2405
|
Vulnerability in the Oracle Engineering product of Oracle E-Business Suite (component: Change Management). Supported versions that are affected are 12.2.3-12.2.10. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Engineering. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Engineering accessible data as well as unauthorized access to critical data or complete access to all Oracle Engineering accessible data. CVSS 3.1 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N).
|
[
"cpe:2.3:a:oracle:engineering:*:*:*:*:*:*:*:*"
] | null | 8.1 | null | null | null |
|
GHSA-43g9-956r-vq78
|
readelf in GNU Binutils 2.28 is vulnerable to a heap-based buffer over-read while processing corrupt RL78 binaries. The vulnerability can trigger program crashes. It may lead to an information leak as well.
|
[] | null | null | 9.1 | null | null |
|
CVE-2001-0674
|
Directory traversal vulnerability in RobTex Viking Web server before 1.07-381 allows remote attackers to read arbitrary files via a hexadecimal encoded dot-dot attack (eg. http://www.server.com/%2e%2e/%2e%2e) in an HTTP URL request.
|
[
"cpe:2.3:a:robtex:viking_server:*:*:*:*:*:*:*:*",
"cpe:2.3:a:robtex:viking_server:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:robtex:viking_server:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:robtex:viking_server:1.0.7:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
CVE-2018-4023
|
An exploitable code execution vulnerability exists in the XML_UploadFile Wi-Fi command of the NT9665X Chipset firmware, running on the Anker Roav A1 Dashcam, version RoavA1SWV1.9. A specially crafted packet can cause a stack-based buffer overflow, resulting in code execution.
|
[
"cpe:2.3:o:anker-in:roav_dashcam_a1_firmware:1.9:*:*:*:*:*:*:*",
"cpe:2.3:h:anker-in:roav_dashcam_a1:-:*:*:*:*:*:*:*"
] | null | null | 10 | null | null |
|
GHSA-442g-whj9-hm26
|
(1) ipxchk and (2) ipxlink in SGI OS2 IRIX 6.3 does not properly clear the IFS environmental variable before executing system calls, which allows local users to execute arbitrary commands.
|
[] | null | null | null | null | null |
|
CVE-2018-1553
|
IBM WebSphere Application Server Liberty prior to 18.0.0.2 could allow a remote attacker to obtain sensitive information, caused by mishandling of exceptions by the SAML Web SSO feature. IBM X-Force ID: 142890.
|
[
"cpe:2.3:a:ibm:websphere_application_server:*:*:*:*:liberty:*:*:*"
] | null | null | 5.3 | null | null |
|
CVE-2025-41708
|
Cleartext Transmission of Sensitive Data via Insecure HTTP Web Interface
|
Due to an unsecure default configuration HTTP is used instead of HTTPS for the web interface. An unauthenticated attacker on the same network could exploit this to learn sensitive data during transmission.
|
[] | null | 7.4 | null | null | null |
CVE-2022-45086
|
Cross-site Scripting in Smartpower Web
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Group Arge Energy and Control Systems Smartpower Web allows Cross-Site Scripting (XSS). This issue affects Smartpower Web: before 23.01.01.
|
[
"cpe:2.3:a:gruparge:smartpower_web:*:*:*:*:*:*:*:*"
] | null | 5.4 | null | null | null |
CVE-2023-0868
|
Stealing Cookies using Reflected XSS via graph results
|
Reflected cross-site scripting in graph results in multiple versions of OpenNMS Meridian and Horizon could allow an attacker access to steal session cookies. Users
should upgrade to Meridian 2023.1.0 or newer, or Horizon 31.0.4. Meridian and
Horizon installation instructions state that they are intended for installation
within an organization's private networks and should not be directly accessible
from the Internet.
|
[
"cpe:2.3:a:opennms:horizon:*:*:*:*:*:*:*:*",
"cpe:2.3:a:opennms:meridian:*:*:*:*:*:*:*:*"
] | null | 6.7 | null | null | null |
GHSA-94rc-fxwq-q3h5
|
OpenSID 18.06-pasca has an Unrestricted File Upload vulnerability via an Attachment Document in the article feature. This vulnerability leads to uploading arbitrary PHP code via a .php filename with the application/pdf Content-Type.
|
[] | null | null | 9.8 | null | null |
|
ICSA-19-204-01
|
Mitsubishi Electric FR Configurator2
|
This vulnerability is triggered when input passed to the XML parser is not sanitized while parsing the XML project and/or template file (.frc2). Once a user opens the file, the attacker could read arbitrary files. CVE-2019-10976 has been assigned to this vulnerability. A CVSS v3 base score of 7.1 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H). This vulnerability can be triggered when an attacker provides the target with a rogue project file (.frc2). Once a user opens the rogue project, CPU exhaustion occurs, which causes the software to quit responding until the application is restarted. CVE-2019-10972 has been assigned to this vulnerability. A CVSS v3 base score of 5.5 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H).
|
[] | null | null | 5.5 | null | null |
CVE-2015-3215
|
The NetKVM Windows Virtio driver allows remote attackers to cause a denial of service (guest crash) via a crafted length value in an IP packet, as demonstrated by a value that does not account for the size of the IP options.
|
[
"cpe:2.3:a:redhat:virtio-win:-:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 | null |
|
GHSA-8qq3-mrrg-37qg
|
Microsoft Dynamics Business Central Cross-site Scripting Vulnerability
|
[] | null | 6.1 | null | null | null |
|
GHSA-4w56-w59g-jg9w
|
Adobe Experience Manager versions 6.5.19 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
|
[] | null | 5.4 | null | null | null |
|
GHSA-pgg9-mmcg-8mxp
|
MantisBT Incorrect Authorization in bug_actiongroup_page.php
|
An issue was discovered in MantisBT before 2.24.4. Due to insufficient access-level checks, any logged-in user allowed to perform Group Actions can get access to the Summary fields of private Issues via bug_arr[]= in a crafted bug_actiongroup_page.php URL. (The target Issues can have Private view status, or belong to a private Project.)
|
[] | null | null | null | null | null |
CVE-2023-37314
|
D-Link DAP-2622 DDP Set IPv6 Address Auth Username Stack-based Buffer Overflow Remote Code Execution Vulnerability
|
D-Link DAP-2622 DDP Set IPv6 Address Auth Username Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DAP-2622 routers. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the DDP service. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root.
. Was ZDI-CAN-20092.
|
[
"cpe:2.3:o:dlink:dap_2622_firmware:*:*:*:*:*:*:*:*"
] | null | null | 8.8 | null | null |
CVE-2012-3842
|
Multiple cross-site scripting (XSS) vulnerabilities in CMD_DOMAIN in JBMC Software DirectAdmin 1.403 allow remote authenticated users with certain privileges to inject arbitrary web script or HTML via the (1) select0 or (2) select8 parameters.
|
[
"cpe:2.3:a:jbmc-software:directadmin:1.403:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
RHSA-2011:0542
|
Red Hat Security Advisory: Red Hat Enterprise Linux 6.1 kernel security, bug fix and enhancement update
|
kvm: arch/x86/kvm/x86.c: reading uninitialized stack memory kernel: unlimited socket backlog DoS kernel: unlimited socket backlog DoS kernel: thp: prevent hugepages during args/env copying into the user stack kernel: fs/partitions: Validate map_count in Mac partition tables kernel: BUG_ON() in rds_send_xmit() kernel: potential kernel deadlock when creating circular epoll file structures kernel: nfs4: Ensure that ACL pages sent over NFS were not allocated from the slab kernel: fs/partitions: Corrupted OSF partition table infoleak kernel: ipv4: netfilter: arp_tables: fix infoleak to userspace kernel: ipv4: netfilter: ip_tables: fix infoleak to userspace kernel: ipv6: netfilter: ip6_tables: fix infoleak to userspace kernel: drivers/scsi/mpt2sas: prevent heap overflows kernel: drivers/scsi/mpt2sas: prevent heap overflows kernel: bonding: Incorrect TX queue offset
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null | null |
CVE-2018-20870
|
The WebDAV transport feature in cPanel before 76.0.8 enables debug logging (SEC-467).
|
[
"cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*"
] | null | null | 5.5 | 2.1 | null |
|
GHSA-997j-7vrq-hm64
|
An issue was discovered on MOXA EDS-G512E 5.1 build 16072215 devices. An attacker could extract public and private keys from the firmware image available on the MOXA website and could use them against a production switch that has the default keys embedded.
|
[] | null | null | 7.5 | null | null |
|
CVE-2015-3755
|
WebKit in Apple Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, as used in iOS before 8.4.1 and other products, allows remote attackers to spoof the user interface via a malformed URL.
|
[
"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
CVE-2020-5900
|
In versions 3.0.0-3.4.0, 2.0.0-2.9.0, and 1.0.1, there is insufficient cross-site request forgery (CSRF) protections for the NGINX Controller user interface.
|
[
"cpe:2.3:a:f5:nginx_controller:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:nginx_controller:1.0.1:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.8 | null |
|
GHSA-3cxh-xp3g-jxjm
|
Apache ShardingSphere-Agent Deserialization of Untrusted Data vulnerability
|
Deserialization of Untrusted Data vulnerability in Apache ShardingSphere-Agent, which allows attackers to execute arbitrary code by constructing a special YAML configuration file.The attacker needs to have permission to modify the ShardingSphere Agent YAML configuration file on the target machine, and the target machine can access the URL with the arbitrary code JAR.
An attacker can use SnakeYAML to deserialize java.net.URLClassLoader and make it load a JAR from a specified URL, and then deserialize javax.script.ScriptEngineManager to load code using that ClassLoader. When the ShardingSphere JVM process starts and uses the ShardingSphere-Agent, the arbitrary code specified by the attacker will be executed during the deserialization of the YAML configuration file by the Agent.This issue affects ShardingSphere-Agent: through 5.3.2. This vulnerability is fixed in Apache ShardingSphere 5.4.0.
|
[] | null | 8.8 | null | null | null |
CVE-2018-4971
|
Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have a Use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
|
[
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.8 | null |
|
CVE-2023-50213
|
D-Link G416 nodered File Handling Command Injection Remote Code Execution Vulnerability
|
D-Link G416 nodered File Handling Command Injection Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link G416 routers. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the HTTP service listening on TCP port 80. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-21807.
|
[
"cpe:2.3:a:dlink:g416_firmware:1.08b02:*:*:*:*:*:*:*"
] | null | null | 8.8 | null | null |
GHSA-7v52-g769-jjrf
|
An issue was discovered in DTS Monitoring 3.57.0. The parameter url within the WGET check function is vulnerable to OS command injection (blind).
|
[] | null | 9.8 | null | null | null |
|
CVE-2019-16761
|
Validator parsing discrepancy due to string encoding in NPM slp-validate 1.0.0
|
A specially crafted Bitcoin script can cause a discrepancy between the specified SLP consensus rules and the validation result of the [email protected] npm package. An attacker could create a specially crafted Bitcoin script in order to cause a hard-fork from the SLP consensus. All versions >1.0.0 have been patched.
|
[
"cpe:2.3:a:simpleledger:slp-validate:1.0.0:*:*:*:*:*:*:*"
] | null | 5.7 | null | null | null |
GHSA-f6c4-g32j-952q
|
In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, a specially-crafted HDMI CEC message can be used to cause stack memory corruption.
|
[] | null | null | 7.8 | null | null |
|
GHSA-9gqv-fg2w-3mm9
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Rustaurius Ultimate WP Mail allows SQL Injection. This issue affects Ultimate WP Mail: from n/a through 1.3.4.
|
[] | null | 8.5 | null | null | null |
|
CVE-2023-37448
|
A lock screen issue was addressed with improved state management. This issue is fixed in macOS Sonoma 14. A user may be able to view restricted content from the lock screen.
|
[
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*"
] | null | 3.3 | null | null | null |
|
CVE-2023-26281
|
IBM HTTP Server denial of service
|
IBM HTTP Server 8.5 used by IBM WebSphere Application Server could allow a remote user to cause a denial of service using a specially crafted URL. IBM X-Force ID: 248296.
|
[
"cpe:2.3:a:ibm:http_server:8.5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:z\\/os:-:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:solaris:-:*:*:*:*:*:*:*"
] | null | 5.9 | null | null | null |
RHSA-2016:1427
|
Red Hat Security Advisory: atomic-openshift security and bug fix update
|
Kubernetes: disclosure of information in multi tenant environments via watch-cache list
|
[
"cpe:/a:redhat:openshift:3.2::el7"
] | null | null | 6.5 | null | null |
GHSA-vqp7-6hqw-v8m9
|
When the F5 BIG-IP APM 13.0.0-13.1.1 or 12.1.0-12.1.3 renders certain pages (pages with a logon agent or a confirm box), the BIG-IP APM may disclose configuration information such as partition and agent names via URI parameters.
|
[] | null | null | 7.5 | null | null |
|
RHSA-2025:15005
|
Red Hat Security Advisory: kernel security update
|
kernel: udp: Fix memory accounting leak. kernel: net_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too kernel: RDMA/iwcm: Fix use-after-free of work objects after cm_id destruction kernel: ext4: only dirty folios when data journaling regular files kernel: vsock: Fix transport_* TOCTOU kernel: tipc: Fix use-after-free in tipc_conn_close() kernel: netfilter: nf_conntrack: fix crash due to removal of uninitialised entry
|
[
"cpe:/o:redhat:enterprise_linux:10.0"
] | null | 7.1 | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.