id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 36
232
⌀ |
---|---|---|---|---|---|---|---|---|
GHSA-qhc9-7662-g2fq
|
App Sandbox in Apple Mac OS X before 10.9 allows attackers to bypass intended sandbox restrictions via a crafted app that uses the LaunchServices interface to specify process arguments.
|
[] | null | null | null | null | null |
|
GHSA-g25j-xhg4-fhj4
|
IBM API Connect's Developer Portal 5.0.0.0 through 5.0.8.3 is vulnerable to Server Side Request Forgery. An attacker, using specially crafted input parameters can trick the server into making potentially malicious calls within the trusted network. IBM X-Force ID: 146370.
|
[] | null | null | 9.9 | null | null |
|
GHSA-7rv3-2wf3-pj6w
|
Stack consumption vulnerability in the KFILE JPEG (kfile_jpeg) plugin in kdegraphics 3, as used by konqueror, digikam, and other KDE image browsers, allows remote attackers to cause a denial of service (stack consumption) via a crafted EXIF section in a JPEG file, which results in an infinite recursion.
|
[] | null | null | null | null | null |
|
RHSA-2015:1704
|
Red Hat Security Advisory: Red Hat JBoss Data Virtualization 6.1.0 security update
|
dashbuilder: XXE/SSRF vulnerability
|
[
"cpe:/a:redhat:jboss_data_virtualization:6.1"
] | null | null | null | null | null |
CVE-2017-18571
|
The search-everything plugin before 8.1.7 for WordPress has SQL injection related to WordPress 4.7.x, a different vulnerability than CVE-2014-2316.
|
[
"cpe:2.3:a:search_everything_project:search_everything:*:*:*:*:*:wordpress:*:*"
] | null | null | 9.8 | 7.5 | null |
|
GHSA-333x-jcc3-m545
|
Remote Desktop Commander Suite Agent before v4.8 contains an unquoted service path which allows attackers to escalate privileges to the system level.
|
[] | null | 7.8 | null | null | null |
|
GHSA-fj27-2rf7-hwm8
|
The Mahasna Batik (aka com.batik.mahasna) application 1.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
|
[] | null | null | null | null | null |
|
CVE-2016-9406
|
Cross-site scripting (XSS) vulnerability in the User control panel in MyBB (aka MyBulletinBoard) before 1.8.7 and MyBB Merge System before 1.8.7 might allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.
|
[
"cpe:2.3:a:mybb:merge_system:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:*:*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 | null |
|
CVE-2019-20491
|
cPanel before 82.0.18 allows attackers to leverage virtual mail accounts in order to bypass account suspensions (SEC-508).
|
[
"cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*"
] | null | 5.4 | null | 5.5 | null |
|
CVE-2020-15037
|
NeDi 1.9C is vulnerable to cross-site scripting (XSS) attack. The application allows an attacker to execute arbitrary JavaScript code via the Reports-Devices.php page st[] parameter.
|
[
"cpe:2.3:a:nedi:nedi:1.9c:*:*:*:*:*:*:*"
] | null | 5.4 | null | 3.5 | null |
|
CVE-2005-1775
|
Terminator 3: War of the Machines 1.16 and earlier allows remote attackers to cause a denial of service (application crash) via a large nickname.
|
[
"cpe:2.3:a:atari:terminator_3_war_of_the_machines:1.16:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-f22h-jvjx-fm57
|
Cross-site scripting (XSS) vulnerability in Open-AudIT Professional 2.1.1 allows remote attackers to inject arbitrary web script or HTML via a crafted name of a component, as demonstrated by the Admin->Logs section (with a logs?logs.type= URI) and the Manage->Attributes section (via the "Name (display)" field to the attributes/create URI).
|
[] | null | null | 5.4 | null | null |
|
RHSA-2006:0600
|
Red Hat Security Advisory: mailman security update
|
security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null | null |
CVE-2019-4299
|
IBM Robotic Process Automation with Automation Anywhere 11 could allow a local user to obtain highly sensitive information from log files when debugging is enabled. IBM X-Force ID: 160765.
|
[
"cpe:2.3:a:ibm:robotic_process_automation_with_automation_anywhere:*:*:*:*:*:*:*:*"
] | null | null | 5.1 | null | null |
|
CVE-2018-15988
|
Adobe Acrobat and Reader versions 2019.008.20081 and earlier, 2019.008.20080 and earlier, 2019.008.20081 and earlier, 2017.011.30106 and earlier version, 2017.011.30105 and earlier version, 2015.006.30457 and earlier, and 2015.006.30456 and earlier have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution.
|
[
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*"
] | null | null | 7.8 | 9.3 | null |
|
CVE-2024-5499
|
Out of bounds write in Streams API in Google Chrome prior to 125.0.6422.141 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*"
] | null | 8.8 | null | null | null |
|
CVE-2024-52528
|
Auth Token can be passed dummy or wrong the middleware response is 200 OK
|
Budget Control Gateway acts as an entry point for incoming requests and routes them to the appropriate microservices for Budget Control. Budget Control Gateway does not properly validate auth tokens, which allows attackers to bypass intended restrictions. This vulnerability is fixed in 1.5.2.
|
[
"cpe:2.3:a:budgetcontrol:gateway:*:*:*:*:*:*:*:*"
] | 9.3 | null | null | null | null |
CVE-2022-36117
|
An issue was discovered in Blue Prism Enterprise 6.0 through 7.01. In a misconfigured environment that exposes the Blue Prism Application server, it is possible for an authenticated user to reverse engineer the Blue Prism software and circumvent access controls for an administrative function. If credential access is configured to be accessible by a machine or the runtime resource security group, using further reverse engineering, an attacker can spoof a known machine and request known encrypted credentials to decrypt later.
|
[
"cpe:2.3:a:ssctech:blue_prism:*:*:*:*:*:*:*:*"
] | null | 3.1 | null | null | null |
|
CVE-2022-37428
|
PowerDNS Recursor up to and including 4.5.9, 4.6.2 and 4.7.1, when protobuf logging is enabled, has Improper Cleanup upon a Thrown Exception, leading to a denial of service (daemon crash) via a DNS query that leads to an answer with specific properties.
|
[
"cpe:2.3:a:powerdns:recursor:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*"
] | null | 6.5 | null | null | null |
|
GHSA-p9mv-wfx3-mx37
|
The Tournamatch WordPress plugin before 4.6.1 does not sanitise and escape some parameters, which could allow users with a role as low as subscriber to perform Cross-Site Scripting attacks.
|
[] | null | 5.4 | null | null | null |
|
GHSA-3f7c-8v7j-hgxr
|
Phpgurukul Beauty Parlour Management System v1.1 is vulnerable to SQL Injection in admin/index.php via the the username parameter.
|
[] | null | 9.8 | null | null | null |
|
GHSA-5x49-v2vj-pp85
|
The Image Map Pro plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'save_project' function with an arbitrary shortcode in versions up to, and including, 6.0.20 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] | null | 6.4 | null | null | null |
|
GHSA-66vj-p7rx-6jrr
|
An issue has been discovered in GitLab CE/EE affecting all versions starting with 14.5. Arbitrary file read was possible by importing a group was due to incorrect handling of file.
|
[] | null | null | null | null | null |
|
CVE-2016-6258
|
The PV pagetable code in arch/x86/mm.c in Xen 4.7.x and earlier allows local 32-bit PV guest OS administrators to gain host OS privileges by leveraging fast-paths for updating pagetable entries.
|
[
"cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.1.5:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.2.3:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.6.3:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:citrix:xenserver:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:citrix:xenserver:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:citrix:xenserver:6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:citrix:xenserver:6.2.0:sp1:*:*:*:*:*:*",
"cpe:2.3:a:citrix:xenserver:6.5.0:sp1:*:*:*:*:*:*",
"cpe:2.3:a:citrix:xenserver:7.0:*:*:*:*:*:*:*"
] | null | null | 8.8 | 7.2 | null |
|
CVE-2005-0629
|
Multiple cross-site scripting (XSS) vulnerabilities in profile.php in 427BB 2.2 allow remote attackers to inject arbitrary web script or HTML via the (1) user or (2) Avatar parameters.
|
[
"cpe:2.3:a:427bb:fourtwosevenbb:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:427bb:fourtwosevenbb:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:427bb:fourtwosevenbb:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:427bb:fourtwosevenbb:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:427bb:fourtwosevenbb:2.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:427bb:fourtwosevenbb:2.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:427bb:fourtwosevenbb:2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:427bb:fourtwosevenbb:2.2.1:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-27w7-2jg3-x45x
|
A vulnerability, which was classified as critical, was found in SourceCodester Advanced Web Store 1.0. Affected is an unknown function of the file /admin/admin_addnew_product.php. The manipulation of the argument txtProdId leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
|
[] | 6.9 | 7.3 | null | null | null |
|
CVE-2021-34397
|
Bootloader contains a vulnerability in NVIDIA MB2, which may cause free-the-wrong-heap, which may lead to limited denial of service.
|
[
"cpe:2.3:o:nvidia:jetson_linux:*:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:jetson_agx_xavier_16gb:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:jetson_agx_xavier_32gb:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:jetson_agx_xavier_8gb:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:jetson_tx2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:jetson_tx2_4gb:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:jetson_tx2_nx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:jetson_tx2i:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:jetson_xavier_nx:-:*:developer_kit:*:*:*:*:*",
"cpe:2.3:h:nvidia:jetson_xavier_nx:-:*:production:*:*:*:*:*"
] | null | 1.9 | null | null | null |
|
GHSA-f7p2-4f5g-hfv9
|
When the installation directory does not have sufficiently restrictive file permissions, an attacker can modify files in the installation directory to cause execution of malicious code.
|
[] | null | 7.8 | null | null | null |
|
CVE-2021-25785
|
Taocms v2.5Beta5 was discovered to contain a cross-site scripting (XSS) vulnerability via the component Management column.
|
[
"cpe:2.3:a:taogogo:taocms:2.5:beta5:*:*:*:*:*:*"
] | null | 4.8 | null | 3.5 | null |
|
GHSA-mmpf-hqvm-whr2
|
An Improper Locking vulnerability in the SIP ALG of Juniper Networks Junos OS on MX Series with MS-MPC or MS-MIC card and SRX Series allows an unauthenticated, network-based attacker to cause a flow processing daemon (flowd) crash and thereby a Denial of Service (DoS). Continued receipt of these specific packets will cause a sustained Denial of Service condition. This issue occurs when SIP ALG is enabled and specific SIP messages are processed simultaneously. This issue affects: Juniper Networks Junos OS on MX Series and SRX Series 20.4 versions prior to 20.4R3-S4; 21.1 versions prior to 21.1R3-S3; 21.2 versions prior to 21.2R3-S2; 21.3 versions prior to 21.3R3; 21.4 versions prior to 21.4R3; 22.1 versions prior to 22.1R2. This issue does not affect Juniper Networks Junos OS versions prior to 20.4R1 on MX Series, or SRX Series.
|
[] | null | 7.5 | null | null | null |
|
CVE-2005-2509
|
Unknown vulnerability in loginwindow in Mac OS X 10.4.2 and earlier, when Fast User Switching is enabled, allows attackers to log into other accounts if they know the passwords to at least two accounts.
|
[
"cpe:2.3:o:apple:mac_os_x:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.1.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.1.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.2.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.2.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.2.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.2.6:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.2.7:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.2.8:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.3.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.3.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.3.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.3.6:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.3.7:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.3.8:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.3.9:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.9:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.1.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.1.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.2.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.2.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.2.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.2.6:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.2.7:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.2.8:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.3.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.3.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.3.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.3.6:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.3.7:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.3.8:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.3.9:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.1:*:*:*:*:*:*:*"
] | null | null | null | 2.1 | null |
|
GHSA-8p32-r59w-h3pg
|
An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory, aka 'Windows Kernel Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2020-0928, CVE-2020-1589, CVE-2020-1592, CVE-2020-16854.
|
[] | null | 4 | null | null | null |
|
RHSA-2010:0610
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: bluetooth: potential bad memory access with sysfs files kernel: ext4: Make sure the MOVE_EXT ioctl can't overwrite append-only files /kernel/security/CVE-2006-0742 test cause kernel-xen panic on ia64 kernel: xfs swapext ioctl minor security issue kernel: cifs: Fix a kernel BUG with remote OS/2 server kernel: nfsd4: bug in read_buf kernel: dns_resolver upcall security issue
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null | null |
GHSA-8222-6fc8-mhvf
|
Vulnerability that affects org.springframework.ws:spring-ws and org.springframework.ws:spring-xml
|
Spring Web Services, versions 2.4.3, 3.0.4, and older unsupported versions of all three projects, were susceptible to XML External Entity Injection (XXE) when receiving XML data from untrusted sources.
|
[] | null | 9.8 | null | null | null |
CVE-2025-49415
|
WordPress FW Gallery <= 8.0.0 - Arbitrary File Deletion Vulnerability
|
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Fastw3b LLC FW Gallery allows Path Traversal. This issue affects FW Gallery: from n/a through 8.0.0.
|
[] | null | 8.6 | null | null | null |
GHSA-xxqj-98q4-mp83
|
ImageMagick 7.0.8-50 Q16 has memory leaks at AcquireMagickMemory because of an error in MagickWand/mogrify.c.
|
[] | null | 6.5 | null | null | null |
|
CVE-2019-7317
|
png_image_free in png.c in libpng 1.6.x before 1.6.37 has a use-after-free because png_image_free_function is called under png_safe_execute.
|
[
"cpe:2.3:a:libpng:libpng:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:hyperion_infrastructure_technology:11.2.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:java_se:7u221:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:java_se:8u212:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:11.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:12.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*",
"cpe:2.3:a:hpe:xp7_command_view_advanced_edition_suite:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:-:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:-:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*",
"cpe:2.3:a:opensuse:package_hub:-:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:9.6:*:*:*:*:vmware_vsphere:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:9.6:*:*:*:*:windows:*:*",
"cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:e-series_santricity_management:-:*:*:*:*:vcenter:*:*",
"cpe:2.3:a:netapp:e-series_santricity_storage_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:e-series_santricity_unified_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:e-series_santricity_web_services:*:*:*:*:*:web_services_proxy:*:*",
"cpe:2.3:a:netapp:oncommand_insight:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_workflow_automation:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:snapmanager:*:*:*:*:*:oracle:*:*",
"cpe:2.3:a:netapp:snapmanager:*:*:*:*:*:sap:*:*",
"cpe:2.3:a:netapp:snapmanager:3.4.2:p1:*:*:*:oracle:*:*",
"cpe:2.3:a:netapp:snapmanager:3.4.2:p1:*:*:*:sap:*:*",
"cpe:2.3:a:netapp:steelstore:-:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
] | null | 5.3 | null | 2.6 | null |
|
GHSA-wrw9-g9r9-p9h2
|
MariaDB through 10.5.9 allows attackers to trigger a convert_const_to_int use-after-free when the BIGINT data type is used.
|
[] | null | 7.5 | null | null | null |
|
CVE-2011-3362
|
Integer signedness error in the decode_residual_block function in cavsdec.c in libavcodec in FFmpeg before 0.7.3 and 0.8.x before 0.8.2, and libav through 0.7.1, allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via a crafted Chinese AVS video (aka CAVS) file.
|
[
"cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.4.9:pre1:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:libav:libav:*:*:*:*:*:*:*:*",
"cpe:2.3:a:libav:libav:0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:libav:libav:0.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:libav:libav:0.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:libav:libav:0.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:libav:libav:0.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:libav:libav:0.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:libav:libav:0.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:libav:libav:0.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:libav:libav:0.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:libav:libav:0.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:libav:libav:0.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:libav:libav:0.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:libav:libav:0.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:libav:libav:0.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:libav:libav:0.4.9:pre1:*:*:*:*:*:*",
"cpe:2.3:a:libav:libav:0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:libav:libav:0.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:libav:libav:0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:libav:libav:0.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:libav:libav:0.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:libav:libav:0.7:beta1:*:*:*:*:*:*",
"cpe:2.3:a:libav:libav:0.7:beta2:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
CVE-2011-0487
|
ICQ 7 does not verify the authenticity of updates, which allows man-in-the-middle attackers to execute arbitrary code via a crafted file that is fetched through an automatic-update mechanism.
|
[
"cpe:2.3:a:icq:icq:7:*:*:*:*:*:*:*"
] | null | null | null | 9.3 | null |
|
GHSA-59j4-wjwp-mw9m
|
Sandbox Bypass in Apache Velocity Engine
|
An attacker that is able to modify Velocity templates may execute arbitrary Java code or run arbitrary system commands with the same privileges as the account running the Servlet container. This applies to applications that allow untrusted users to upload/modify velocity templates running Apache Velocity Engine versions up to 2.2.
|
[] | null | 8.8 | null | null | null |
GHSA-j56m-fmmm-mpjf
|
Purchase Order Management v1.0 was discovered to contain a SQL injection vulnerability via the password parameter at /purchase_order/admin/login.php.
|
[] | null | 9.8 | null | null | null |
|
GHSA-pw44-hm4h-4f79
|
Found Linux Kernel flaw in the i740 driver. The Userspace program could pass any values to the driver through ioctl() interface. The driver doesn't check the value of 'pixclock', so it may cause a divide by zero error.
|
[] | null | 5.5 | null | null | null |
|
GHSA-mccr-h554-3wjw
|
Format string vulnerability in the print_proxies function in bin/proxy.c in libproxy 0.3.1 might allow context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via format string specifiers in a proxy name, as demonstrated using the http_proxy environment variable or a PAC file.
|
[] | null | null | null | null | null |
|
CVE-2024-33273
|
SQL injection vulnerability in shipup before v.3.3.0 allows a remote attacker to escalate privileges via the getShopID function.
|
[] | null | 9.8 | null | null | null |
|
GHSA-jw26-8m9h-2xm5
|
cgi-bin/webutil.pl in The Puppet Master WebUtil 2.3 allows remote attackers to execute arbitrary commands via shell metacharacters in the whois command.
|
[] | null | null | null | null | null |
|
CVE-2009-0884
|
Buffer overflow in FileZilla Server before 0.9.31 allows remote attackers to cause a denial of service via unspecified vectors related to SSL/TLS packets.
|
[
"cpe:2.3:a:filezilla-project:filezilla_server:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
CVE-2017-14596
|
In Joomla! before 3.8.0, inadequate escaping in the LDAP authentication plugin can result in a disclosure of a username and password.
|
[
"cpe:2.3:a:joomla:joomla\\!:1.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:1.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:1.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:1.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:1.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:1.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:1.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:1.5.8:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:1.5.9:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:1.5.10:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:1.5.11:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:1.5.12:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:1.5.13:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:1.5.14:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:1.5.15:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:1.5.16:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:1.5.17:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:1.5.18:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:1.5.19:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:1.5.20:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:1.5.21:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:1.5.22:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:1.5.23:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:1.5.24:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:1.5.25:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:1.5.26:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:1.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:1.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:1.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:1.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:1.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:1.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:1.6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:1.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:1.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:1.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:1.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:1.7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:1.7.5:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:2.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:2.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:2.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:2.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:2.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:2.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:2.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:2.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:2.5.8:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:2.5.9:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:2.5.10:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:2.5.11:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:2.5.12:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:2.5.13:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:2.5.14:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:2.5.15:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:2.5.16:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:2.5.17:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:2.5.18:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:2.5.19:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:2.5.20:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:2.5.21:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:2.5.22:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:2.5.23:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:2.5.24:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:2.5.25:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:2.5.26:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:2.5.27:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:2.5.28:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:3.7.5:*:*:*:*:*:*:*"
] | null | null | 9.8 | 5 | null |
|
GHSA-cm7m-hh39-78r7
|
A vulnerability has been identified in JT2Go (All versions < V13.2), Solid Edge SE2021 (All Versions < SE2021MP5), Teamcenter Visualization (All versions < V13.2). The plmxmlAdapterSE70.dll library in affected applications lacks proper validation of user-supplied data when parsing PAR files. This could result in an out of bounds write past the fixed-length heap-based buffer. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-13422)
|
[] | null | 7.8 | null | null | null |
|
CVE-2019-19680
|
A file-extension filtering vulnerability in Proofpoint Enterprise Protection (PPS / PoD), in the unpatched versions of PPS through 8.9.22 and 8.14.2 respectively, allows attackers to bypass protection mechanisms (related to extensions, MIME types, virus detection, and journal entries for transmitted files) by sending malformed (not RFC compliant) multipart email.
|
[
"cpe:2.3:a:proofpoint:enterprise_protection:*:*:*:*:lts:*:*:*",
"cpe:2.3:a:proofpoint:enterprise_protection:*:*:*:*:-:*:*:*"
] | null | 8.8 | null | 6.8 | null |
|
CVE-2011-2014
|
The LDAP over SSL (aka LDAPS) implementation in Active Directory, Active Directory Application Mode (ADAM), and Active Directory Lightweight Directory Service (AD LDS) in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 does not examine Certificate Revocation Lists (CRLs), which allows remote authenticated users to bypass intended certificate restrictions and access Active Directory resources by leveraging a revoked X.509 certificate for a domain account, aka "LDAPS Authentication Bypass Vulnerability."
|
[
"cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:x86:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x32:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:*:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:*"
] | null | null | null | 9 | null |
|
CVE-2013-0757
|
The Chrome Object Wrapper (COW) implementation in Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.2, and SeaMonkey before 2.15 does not prevent modifications to the prototype of an object, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges by referencing Object.prototype.__proto__ in a crafted HTML document.
|
[
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird_esr:*:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:-:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:vmware:*:*",
"cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp4:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp2:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*"
] | null | null | null | 9.3 | null |
|
CVE-2020-7577
|
A vulnerability has been identified in Camstar Enterprise Platform (All versions), Opcenter Execution Core (All versions < V8.2). Through the use of several vulnerable fields of the application, an authenticated user could perform an SQL Injection attack by passing a modified SQL query downstream to the back-end server. The exploit of this vulnerability could be used to read, and potentially modify application data to which the user has access to.
|
[
"cpe:2.3:a:siemens:opcenter_execution_core:*:*:*:*:*:*:*:*"
] | null | 8.1 | null | 5.5 | null |
|
GHSA-wv97-3q88-x27x
|
A vulnerability was found in chinese-poetry 0.1. It has been rated as problematic. This issue affects some unknown processing of the file rank/server.js. The manipulation leads to inefficient regular expression complexity. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
|
[] | 2.1 | 4.3 | null | null | null |
|
CVE-2009-0546
|
Stack-based buffer overflow in NewsGator FeedDemon 2.7 and earlier allows user-assisted remote attackers to execute arbitrary code via a long text attribute in an outline element in a .opml file.
|
[
"cpe:2.3:a:newsgator:feeddemon:*:*:*:*:*:*:*:*",
"cpe:2.3:a:newsgator:feeddemon:2.0.0.24:*:*:*:*:*:*:*",
"cpe:2.3:a:newsgator:feeddemon:2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:newsgator:feeddemon:2.6.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:newsgator:feeddemon:2.6.1.5:*:*:*:*:*:*:*"
] | null | null | null | 9.3 | null |
|
CVE-2011-2827
|
Use-after-free vulnerability in Google Chrome before 13.0.782.215 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to text searching.
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
cisco-sa-20190417-es-tvcs-dos
|
Cisco Expressway Series and Cisco TelePresence Video Communication Server Denial of Service Vulnerability
|
A vulnerability in the phone book feature of Cisco Expressway Series and Cisco TelePresence Video Communication Server (VCS) could allow an authenticated, remote attacker to cause the CPU to increase to 100% utilization, causing a denial of service (DoS) condition on an affected system.
The vulnerability is due to improper handling of the XML input. An attacker could exploit this vulnerability by sending a Session Initiation Protocol (SIP) message with a crafted XML payload to an affected device. A successful exploit could allow the attacker to exhaust CPU resources, resulting in a DoS condition. Manual intervention may be required to recover the device.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. Mitigation options that address this vulnerability are available.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190417-es-tvcs-dos ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190417-es-tvcs-dos"]
|
[] | null | null | 7.7 | null | null |
CVE-2015-1771
|
Cross-site request forgery (CSRF) vulnerability in the web applications in Microsoft Exchange Server 2013 SP1 and Cumulative Update 8 allows remote attackers to hijack the authentication of arbitrary users, aka "Exchange Cross-Site Request Forgery Vulnerability."
|
[
"cpe:2.3:a:microsoft:exchange_server:2013:cumulative_update_8:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:exchange_server:2013:sp1:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
RHSA-2017:1975
|
Red Hat Security Advisory: libreoffice security and bug fix update
|
libreoffice: Heap-buffer-overflow in tools::Polygon::Insert
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 5.3 | null | null |
CVE-2018-16358
|
A cross-site scripting (XSS) vulnerability in inc/core/class.dc.core.php in the media manager in Dotclear through 2.14.1 allows remote authenticated users to upload HTML content containing an XSS payload with the file extension .ahtml.
|
[
"cpe:2.3:a:dotclear:dotclear:*:*:*:*:*:*:*:*"
] | null | null | 5.4 | 3.5 | null |
|
CVE-2025-8638
|
Kenwood DMX958XR Firmware Update Command Injection Vulnerability
|
Kenwood DMX958XR Firmware Update Command Injection Vulnerability. This vulnerability allows physically present attackers to execute arbitrary code on affected installations of Kenwood DMX958XR devices. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the firmware update process. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-26261.
|
[] | null | null | 6.8 | null | null |
RHSA-2004:585
|
Red Hat Security Advisory: xchat security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null | null |
CVE-2021-34652
|
Media Usage <= 0.0.4 Reflected Cross-Site Scripting
|
The Media Usage WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the id parameter in the ~/mmu_admin.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 0.0.4.
|
[
"cpe:2.3:a:meowapps:media_usage:*:*:*:*:*:wordpress:*:*"
] | null | 6.1 | null | null | null |
CVE-2012-3283
|
Unspecified vulnerability on the HP LeftHand Virtual SAN Appliance hydra with software before 10.0 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1511.
|
[
"cpe:2.3:a:hp:san\\/iq:*:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:san\\/iq:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:san\\/iq:8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:san\\/iq:8.5:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:san\\/iq:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:lefthand_p4000_virtual_san_appliance:-:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
GHSA-g5jf-3pr8-vjwm
|
An XML External Entity (XXE) issue exists in OSCI-Transport 1.2 as used in OSCI Transport Library 1.6.1 (Java) and OSCI Transport Library 1.6 (.NET), exploitable by sending a crafted standard-conforming OSCI message from within the infrastructure.
|
[] | null | null | 9.8 | null | null |
|
GHSA-8hrg-qfqw-3fgp
|
Vulnerability in the Java SE, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162, 10 and JRockit: R28.3.17. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Java SE, JRockit executes to compromise Java SE, JRockit. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 7.7 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).
|
[] | null | null | 7.7 | null | null |
|
CVE-2022-33093
|
74cmsSE v3.5.1 was discovered to contain a SQL injection vulnerability via the key parameter at /freelance/resume_list.
|
[
"cpe:2.3:a:74cms:74cmsse:3.5.1:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null |
|
CVE-2023-1042
|
SourceCodester Online Pet Shop We App update_status.php cross site scripting
|
A vulnerability has been found in SourceCodester Online Pet Shop We App 1.0 and classified as problematic. This vulnerability affects unknown code of the file /pet_shop/admin/orders/update_status.php. The manipulation of the argument oid with the input 1"><script>alert(1111)</script> leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-221800.
|
[
"cpe:2.3:a:online_pet_shop_we_app_project:online_pet_shop_we_app:1.0:*:*:*:*:*:*:*"
] | null | 3.5 | 3.5 | 4 | null |
CVE-2024-27460
|
A privilege escalation exists in the updater for Plantronics Hub 3.25.1 and below.
|
[
"cpe:2.3:a:hp_inc:plantronics_hub:*:*:*:*:*:*:*:*"
] | null | 6.7 | null | null | null |
|
CVE-2021-0953
|
In setOnClickActivityIntent of SearchWidgetProvider.java, there is a possible way to access contacts and history bookmarks without permission due to an unsafe PendingIntent. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-184046278
|
[
"cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*"
] | null | 7.8 | null | 7.2 | null |
|
CVE-2023-44385
|
Client-Side Request Forgery in Home Assistant iOS/macOS native Apps
|
The Home Assistant Companion for iOS and macOS app up to version 2023.4 are vulnerable to Client-Side Request Forgery. Attackers may send malicious links/QRs to victims that, when visited, will make the victim to call arbitrary services in their Home Assistant installation. Combined with this security advisory, may result in full compromise and remote code execution (RCE). Version 2023.7 addresses this issue and all users are advised to upgrade. There are no known workarounds for this vulnerability. This issue is also tracked as GitHub Security Lab (GHSL) Vulnerability Report: GHSL-2023-161.
|
[
"cpe:2.3:a:home-assistant:home_assistant_companion:*:*:*:*:*:iphone_os:*:*",
"cpe:2.3:a:home-assistant:home_assistant_companion:*:*:*:*:*:macos:*:*"
] | null | 8.6 | null | null | null |
CVE-2024-57099
|
ClassCMS v4.8 has a code execution vulnerability. Attackers can exploit this vulnerability by constructing a payload in the classview parameter of the model management feature, allowing them to execute arbitrary code and potentially take control of the server.
|
[] | null | 9.8 | null | null | null |
|
GHSA-mrhp-8chw-79jf
|
The vulnerability allows a malicious low-privileged PAM user to access information about other PAM users and their group memberships.
|
[] | 5.1 | null | null | null | null |
|
CVE-2021-37956
|
Use after free in Offline use in Google Chrome on Android prior to 94.0.4606.54 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.8 | null |
|
GHSA-g347-3vm4-xrvv
|
Absolute path traversal vulnerability in forcedownload.php in Gravy Media Photo Host 1.0.8 allows remote attackers to read arbitrary files via an encoded "/" (slash) in the file parameter.
|
[] | null | null | null | null | null |
|
GHSA-qv52-3gx5-px5v
|
A use of hard-coded cryptographic key vulnerability in the SSLVPN of FortiOS before 7.0.1 may allow an attacker to retrieve the key by reverse engineering.
|
[] | null | null | null | null | null |
|
GHSA-m9c5-rh9r-8cwm
|
SQL injection vulnerability in oku.asp in Hunkaray Duyuru Scripti allows remote attackers to execute arbitrary SQL commands via the id parameter.
|
[] | null | null | null | null | null |
|
ICSA-19-031-01
|
Schneider Electric EVLink Parking
|
A hard-coded credentials vulnerability exists that could enable an attacker to gain access to the device.CVE-2018-7800 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). A code injection vulnerability exists that could allow remote code execution with maximum privileges.CVE-2018-7801 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). A SQL injection vulnerability exists that could give an attacker access to the web interface with full privileges.CVE-2018-7802 has been assigned to this vulnerability. A CVSS v3 base score of 6.4 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N).
|
[] | null | null | 6.4 | null | null |
GHSA-gp5f-p5wv-f6gw
|
IBM Rational Quality Manager (RQM) 5.0 through 5.02 and 6.0 through 6.0.6 are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 141803.
|
[] | null | null | 5.4 | null | null |
|
GHSA-x6mq-hc4c-8mhc
|
An issue was discovered in Avaya one-X Portal for IP Office 9.1.2.0 and prior. The DownloadToLocalDriveServlet function from the AFA portal is only intended to download backup ZIP files from the server to the operator desktop; however, a malicious user capable of intercepting the HTTP request would be able to modify folder and filename parameters in order to get access to any file on the underlying operating system, as demonstrated by a folder=/etc/&filename=passwd query string. Additionally it could cause a DoS, as this functions also implements file deletion after downloading.
|
[] | null | null | null | null | null |
|
CVE-2022-43610
|
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Corel CorelDRAW Graphics Suite 23.5.0.506. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of GIF images. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-16350.
|
[
"cpe:2.3:a:corel:coreldraw:*:*:*:*:*:*:*:*"
] | null | null | 3.3 | null | null |
|
CVE-2021-27679
|
Cross-site scripting (XSS) vulnerability in Navigation in Batflat CMS 1.3.6 allows remote attackers to inject arbitrary web script or HTML via the field name.
|
[
"cpe:2.3:a:batflat:batflat:1.3.6:*:*:*:*:*:*:*"
] | null | 5.4 | null | 3.5 | null |
|
GHSA-gvc5-x64j-cff4
|
Multiple unspecified vulnerabilities in Salford Software Support Incident Tracker (SiT!) before 3.30 have unknown impact and attack vectors.
|
[] | null | null | null | null | null |
|
CVE-2017-1000193
|
October CMS build 412 is vulnerable to stored WCI (a.k.a XSS) in brand logo image name resulting in JavaScript code execution in the victim's browser.
|
[
"cpe:2.3:a:octobercms:october:*:*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 | null |
|
CVE-2008-6916
|
Siemens SpeedStream 5200 with NetPort Software 1.1 allows remote attackers to bypass authentication via an invalid Host header, possibly involving a trailing dot in the hostname.
|
[
"cpe:2.3:h:siemens:speedstream_5200:-:*:*:*:*:*:*:*",
"cpe:2.3:a:john_doe:netport_software:1.1:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
GHSA-fc77-f4hm-5777
|
A vulnerability was discovered in Samsung Mobile Processors Exynos 1280, Exynos 2200, Exynos 1330, Exynos 1380, and Exynos 2400 where they do not properly check the length of the data, which can lead to a Information disclosure.
|
[] | null | 4.4 | null | null | null |
|
CVE-2013-7469
|
Seafile through 6.2.11 always uses the same Initialization Vector (IV) with Cipher Block Chaining (CBC) Mode to encrypt private data, making it easier to conduct chosen-plaintext attacks or dictionary attacks.
|
[
"cpe:2.3:a:seafile:seafile:*:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 | null |
|
GHSA-gg9q-x7v7-56vv
|
The Spellcheck API implementation in Google Chrome before 44.0.2403.89 does not use an HTTPS session for downloading a Hunspell dictionary, which allows man-in-the-middle attackers to deliver incorrect spelling suggestions or possibly have unspecified other impact via a crafted file, a related issue to CVE-2015-1263.
|
[] | null | null | null | null | null |
|
GHSA-pvhr-6mxv-4gr5
|
A heap-based overflow vulnerability in MHW_RECOG_LIB_INFO function in libSDKRecognitionText.spensdk.samsung.so library prior to SMR Sep-2022 Release 1 allows attacker to cause memory access fault.
|
[] | null | 7.8 | null | null | null |
|
GHSA-468w-3r6j-mchw
|
The issue was addressed with additional permissions checks. This issue is fixed in macOS Ventura 13.6.1. An attacker may be able to access passkeys without authentication.
|
[] | null | 7.5 | null | null | null |
|
CVE-2022-25842
|
Arbitrary File Write via Archive Extraction (Zip Slip)
|
All versions of package com.alibaba.oneagent:one-java-agent-plugin are vulnerable to Arbitrary File Write via Archive Extraction (Zip Slip) using a specially crafted archive that holds directory traversal filenames (e.g. ../../evil.exe). The attacker can overwrite executable files and either invoke them remotely or wait for the system or user to call them, thus achieving remote command execution on the victim’s machine.
|
[
"cpe:2.3:a:alibabagroup:one-java-agent:*:*:*:*:*:*:*:*"
] | null | 6.9 | null | null | null |
GHSA-9735-hqm8-4h6p
|
OpenBSD 7.3 before errata 014 is missing an argument-count bounds check in console terminal emulation. This could cause incorrect memory access and a kernel crash after receiving crafted DCS or CSI terminal escape sequences.
|
[] | null | 5.5 | null | null | null |
|
CVE-2012-3846
|
Cross-site scripting (XSS) vulnerability in index.php in PHP-pastebin 2.1 allows remote attackers to inject arbitrary web script or HTML via the title parameter.
|
[
"cpe:2.3:a:atmoner:php-pastebin:2.1:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-mh2f-2hrx-5245
|
User Enumeration and Data Integrity in Barcode functionality in OpenText Content Management versions 24.3-25.1on Windows and Linux allows a malicous authenticated attacker to potentially alter barcode attributes.
|
[] | 5.9 | null | null | null | null |
|
GHSA-p9j3-5qrg-xc56
|
Vulnerability in the JD Edwards EnterpriseOne Tools product of Oracle JD Edwards (component: Design Tools SEC). Supported versions that are affected are 9.2.6.4 and prior. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise JD Edwards EnterpriseOne Tools. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in JD Edwards EnterpriseOne Tools, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of JD Edwards EnterpriseOne Tools accessible data as well as unauthorized read access to a subset of JD Edwards EnterpriseOne Tools accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).
|
[] | null | 6.1 | null | null | null |
|
GHSA-fx4g-m96x-942q
|
Improper access control in the PMC for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.
|
[] | null | null | null | null | null |
|
CVE-2007-0887
|
axigen 1.2.6 through 2.0.0b1 does not properly parse login credentials, which allows remote attackers to cause a denial of service (NULL dereference and application crash) via a base64-encoded "*\x00" sequence on the imap port (143/tcp).
|
[
"cpe:2.3:a:gecad_technologies:axigen_mail_server:1.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:gecad_technologies:axigen_mail_server:2.0.0b1:*:*:*:*:*:*:*"
] | null | null | null | 7.8 | null |
|
CVE-2021-37794
|
A stored cross-site scripting (XSS) vulnerability exists in FileBrowser < v2.16.0 that allows an authenticated user authorized to upload a malicious .svg file which acts as a stored XSS payload. If this stored XSS payload is triggered by an administrator it will trigger malicious OS commands on the server running the FileBrowser instance.
|
[
"cpe:2.3:a:filebrowser_project:filebrowser:*:*:*:*:*:*:*:*"
] | null | 5.4 | null | 3.5 | null |
|
CVE-2022-28656
|
is_closing_session() allows users to consume RAM in the Apport process
|
[
"cpe:2.3:a:apport_project:apport:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:21.10:*:*:*:-:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:22.04:*:*:*:lts:*:*:*"
] | null | 5.5 | null | null | null |
|
GHSA-8qc5-fvr8-g263
|
Transient DOS while processing IKEv2 Informational request messages, when a malformed fragment packet is received.
|
[] | null | 7.5 | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.