id
string | title
string | description
string | cpes
list | cvss_v4_0
float64 | cvss_v3_1
float64 | cvss_v3_0
float64 | cvss_v2_0
float64 | patch_commit_url
string |
---|---|---|---|---|---|---|---|---|
CVE-2024-11750
|
ONLYOFFICE DocSpace <= 2.1.1 - Authenticated (Contributor+) Stored Cross-Site Scripting
|
The ONLYOFFICE DocSpace plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'onlyoffice-docspace' shortcode in all versions up to, and including, 2.1.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] | null | 6.4 | null | null | null |
GHSA-93m4-v97h-82q2
|
Tor before 0.1.1.20 allows remote attackers to spoof log entries or possibly execute shell code via strings with non-printable characters.
|
[] | null | null | null | null | null |
|
CVE-2010-0175
|
Use-after-free vulnerability in the nsTreeSelection implementation in Mozilla Firefox before 3.0.19 and 3.5.x before 3.5.9, Thunderbird before 3.0.4, and SeaMonkey before 2.0.4 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via unspecified vectors that trigger a call to the handler for the select event for XUL tree items.
|
[
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.9:rc:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0:preview_release:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.21:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.22:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.23:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0:alpha:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1:alpha:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.18:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.19:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:alpha_1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:alpha_2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:alpha_3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:beta_1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:beta_2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.4:*:*:*:*:*:*:*"
] | null | null | null | 9.3 | null |
|
CVE-2021-2115
|
Vulnerability in the Oracle Common Applications Calendar product of Oracle E-Business Suite (component: Tasks). Supported versions that are affected are 12.1.1-12.1.3 and 12.2.3-12.2.10. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Common Applications Calendar. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Common Applications Calendar, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Common Applications Calendar accessible data as well as unauthorized update, insert or delete access to some of Oracle Common Applications Calendar accessible data. CVSS 3.1 Base Score 7.6 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N).
|
[
"cpe:2.3:a:oracle:common_applications_calendar:*:*:*:*:*:*:*:*"
] | null | 7.6 | null | null | null |
|
GHSA-gvh3-f4g3-c9ff
|
IBM MQ Operator LTS 2.0.0 through 2.0.29, MQ Operator CD 3.0.0, 3.0.1, 3.1.0 through 3.1.3, 3.3.0, 3.4.0, 3.4.1, 3.5.0, 3.5.1, 3.6.0, and MQ Operator SC2 3.2.0 through 3.2.13 Container could disclose sensitive information to a local user due to improper clearing of heap memory before release.
|
[] | null | 6.2 | null | null | null |
|
GHSA-w26v-m725-wjxm
|
Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
|
[] | null | 5.4 | null | null | null |
|
GHSA-qh8r-2p8w-h54f
|
Unspecified vulnerability in the Oracle E-Business Intelligence component in Oracle E-Business Suite 11.5.10.2, 12.0.6, and 12.1.3 allows remote attackers to affect integrity via unknown vectors.
|
[] | null | null | null | null | null |
|
CVE-2005-3327
|
Network Appliance Data ONTAP 7.0 and earlier allows iSCSI Initiators to bypass iSCSI authentication via a modified client that skips the Security (Start) mode, as required by the Login Negotiation protocol, and uses Operational mode without proving identity.
|
[
"cpe:2.3:a:network_appliance:data_ontap:*:*:*:*:*:*:*:*",
"cpe:2.3:a:network_appliance:data_ontap:6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:network_appliance:data_ontap:6.5:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2023-0357
|
Helpy version 2.8.0 allows an unauthenticated remote attacker to exploit an XSS stored in the application. This is possible because the application does not correctly validate the attachments sent by customers in the ticket.
|
[
"cpe:2.3:a:helpy.io:helpy:2.8.0:*:*:*:*:*:*:*"
] | null | 6.1 | null | null | null |
|
GHSA-fj66-g7xw-9g27
|
Jamf Private Access before 2022-05-16 has Incorrect Access Control, in which an unauthorized user can reach a system in the internal infrastructure, aka WND-44801.
|
[] | null | 7.5 | null | null | null |
|
CVE-2023-32605
|
Affected versions Trend Micro Apex Central (on-premise) are vulnerable to potential authenticated reflected cross-site scripting (XSS) attacks due to user input validation and sanitization issues.
Please note: an attacker must first obtain authentication to Apex Central on the target system in order to exploit this vulnerability.
This is similar to, but not identical to CVE-2023-32604.
|
[
"cpe:2.3:a:trendmicro:apex_central:2019:-:*:*:*:windows:*:*"
] | null | 5.4 | null | null | null |
|
CVE-2021-31879
|
GNU Wget through 1.21.1 does not omit the Authorization header upon a redirect to a different origin, a related issue to CVE-2018-1000007.
|
[
"cpe:2.3:a:gnu:wget:*:*:*:*:*:*:*:*",
"cpe:2.3:o:broadcom:brocade_fabric_operating_system_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:a250_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:a250:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:500f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:500f:-:*:*:*:*:*:*:*"
] | null | 6.1 | null | 5.8 | null |
|
RHSA-2018:0112
|
Red Hat Security Advisory: libvirt security update
|
An update for libvirt is now available for Red Hat Enterprise Linux 6.2 Advanced Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
|
[
"cpe:/o:redhat:rhel_mission_critical:6.2::server"
] | null | null | null | null | null |
GHSA-fqxf-7mq3-hv59
|
Insufficient validation of the IOCTL input buffer in AMD ?Prof may allow an attacker to send an arbitrary buffer leading to a potential Windows kernel crash resulting in denial of service.
|
[] | null | 7.5 | null | null | null |
|
GHSA-pc7w-54q4-2cx9
|
PHP remote file inclusion vulnerability in SocketMail Lite and Pro 2.2.6 and earlier, when register_globals and magic_quotes are enabled, allows remote attackers to execute arbitrary PHP code via a URL in the site_path parameter to (1) index.php and (2) inc-common.php.
|
[] | null | null | null | null | null |
|
CVE-2008-0596
|
Memory leak in CUPS before 1.1.22, and possibly other versions, allows remote attackers to cause a denial of service (memory consumption and daemon crash) via a large number of requests to add and remove shared printers.
|
[
"cpe:2.3:o:redhat:desktop:3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:desktop:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:as_3:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:as_4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:es_3:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:es_4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:ws_3:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:ws_4:*:*:*:*:*:*:*",
"cpe:2.3:a:easy_software_products:cups:1.1.17:*:*:*:*:*:*:*",
"cpe:2.3:a:easy_software_products:cups:1.1.22:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-mwg7-wp3h-xm4h
|
In telecom service, there is a missing permission check. This could lead to local denial of service in telecom service.
|
[] | null | 5.5 | null | null | null |
|
CVE-2025-52581
|
An integer overflow vulnerability exists in the GDF parsing functionality of The Biosig Project libbiosig 3.9.0 and Master Branch (35a819fa). A specially crafted GDF file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.
|
[] | null | 9.8 | null | null | null |
|
GHSA-7q36-jprx-hc27
|
A vulnerability was found in code-projects Online Book Shop 1.0. It has been classified as critical. This affects an unknown part of the file /booklist.php. The manipulation of the argument subcatid leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
|
[] | 5.3 | 6.3 | null | null | null |
|
RHSA-2014:0625
|
Red Hat Security Advisory: openssl security update
|
openssl: freelist misuse causing a possible use-after-free openssl: Buffer overflow via DTLS invalid fragment openssl: SSL_MODE_RELEASE_BUFFERS NULL pointer dereference in do_ssl3_write() openssl: DoS when sending invalid DTLS handshake openssl: SSL/TLS MITM vulnerability openssl: client-side denial of service when using anonymous ECDH
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null | null |
GHSA-6r9c-25q3-26fc
|
Directory traversal vulnerability in ecrire/exec/valider_xml.php in SPIP 3.1.2 and earlier allows remote attackers to enumerate the files on the system via the var_url parameter in a valider_xml action.
|
[] | null | null | 7.5 | null | null |
|
CVE-2020-23877
|
pdf2xml v2.0 was discovered to contain a stack buffer overflow in the component getObjectStream.
|
[
"cpe:2.3:a:science-miner:pdf2xml:2.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 | null |
|
GHSA-3886-8ggm-q6g4
|
Multiple cross-site scripting (XSS) vulnerabilities in the esb-csv-import-export plugin through 1.1 for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) cie_type, (2) cie_import, (3) cie_update, or (4) cie_ignore parameter to includes/admin/views/esb-cie-import-export-page.php.
|
[] | null | null | 6.1 | null | null |
|
GHSA-7x3f-83h7-pff9
|
SQL injection vulnerability in protect.php in X-Scripts X-Protection 1.10, with magic_quotes_gpc disabled, allows remote attackers to execute arbitrary SQL commands via the (1) username and (2) password parameter.
|
[] | null | null | null | null | null |
|
CVE-2007-4084
|
Multiple SQL injection vulnerabilities in AlstraSoft Affiliate Network Pro allow remote attackers to execute arbitrary SQL commands via (1) the pgmid parameter in an uploadProducts action to merchants/index.php and possibly (2) the rowid parameter to merchants/temp.php.
|
[
"cpe:2.3:a:alstrasoft:affiliate_network_pro:8.0:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2000-0383
|
The file transfer component of AOL Instant Messenger (AIM) reveals the physical path of the transferred file to the remote recipient.
|
[
"cpe:2.3:a:aol:instant_messenger:4.0:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
CVE-2024-50103
|
ASoC: qcom: Fix NULL Dereference in asoc_qcom_lpass_cpu_platform_probe()
|
In the Linux kernel, the following vulnerability has been resolved:
ASoC: qcom: Fix NULL Dereference in asoc_qcom_lpass_cpu_platform_probe()
A devm_kzalloc() in asoc_qcom_lpass_cpu_platform_probe() could
possibly return NULL pointer. NULL Pointer Dereference may be
triggerred without addtional check.
Add a NULL check for the returned pointer.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
CVE-2019-14130
|
Memory corruption can occurs in trusted application if offset size from HLOS is more than actual mapped buffer size in Snapdragon Auto, Snapdragon Compute, Snapdragon Mobile, Snapdragon Wired Infrastructure and Networking in Kamorta, QCS404, Rennell, SC7180, SDX55, SM6150, SM7150, SM8250, SXR2130
|
[
"cpe:2.3:o:qualcomm:kamorta_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:kamorta:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs404_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs404:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:rennell_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:rennell:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sc7180_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sc7180:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx55:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm6150_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm6150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm7150_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm7150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm8250_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm8250:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sxr2130_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sxr2130:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | 4.6 | null |
|
GHSA-mjff-hx99-hm9w
|
MuleSoft is aware of a Remote Code Execution vulnerability affecting certain versions of a Mule runtime component that may affect both CloudHub and on-premise customers. Versions affected: Mule 4.1.x and 4.2.x runtime released before February 2, 2021.
|
[] | null | null | null | null | null |
|
CVE-2013-2057
|
YaBB through 2.5.2: 'guestlanguage' Cookie Parameter Local File Include Vulnerability
|
[
"cpe:2.3:a:yabb:yabb:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 | null |
|
GHSA-wgmc-38h7-h2w9
|
Rejected reason: Not used
|
[] | null | null | null | null | null |
|
GHSA-8h6w-5gpw-7wpv
|
SQL injection vulnerability in in the authenticate function in MailWatch for MailScanner 1.0.2 allows remote attackers to execute arbitrary SQL commands.
|
[] | null | null | null | null | null |
|
CVE-2025-24448
|
Illustrator | Out-of-bounds Read (CWE-125)
|
Illustrator versions 29.2.1, 28.7.4 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[] | null | 5.5 | null | null | null |
CVE-2024-6150
|
A non-admin user can cause short-term disruption in Target VM availability in Citrix Provisioning
|
[] | 4.8 | null | null | null | null |
|
GHSA-hc92-m58j-m3m5
|
When creating a callback over IPC for showing the Color Picker window, multiple of the same callbacks could have been created at a time and eventually all simultaneously destroyed as soon as one of the callbacks finished. This could have led to a use-after-free causing a potentially exploitable crash. This vulnerability affects Firefox < 117, Firefox ESR < 102.15, Firefox ESR < 115.2, and Thunderbird < 115.2.
|
[] | null | 6.5 | null | null | null |
|
GHSA-x3cf-qq49-8942
|
The security policy processing module in Huawei Secospace USG6300 with software V500R001C20SPC100, V500R001C20SPC101, V500R001C20SPC200; Secospace USG6500 with software V500R001C20SPC100, V500R001C20SPC101, V500R001C20SPC200; Secospace USG6600 with software V500R001C20SPC100, V500R001C20SPC101, V500R001C20SPC200 allows authenticated attackers to setup a specific security policy into the devices, causing a buffer overflow and crashing the system.
|
[] | null | null | 6.5 | null | null |
|
PYSEC-2022-276
| null |
LIEF commit 365a16a was discovered to contain a heap-buffer overflow via the function print_binary at /c/macho_reader.c.
|
[] | null | null | null | null | null |
CVE-2016-4371
|
HPE Service Manager Software 9.30, 9.31, 9.32, 9.33, 9.34, 9.35, 9.40, and 9.41 allows remote authenticated users to obtain sensitive information, modify data, and conduct server-side request forgery (SSRF) attacks via unspecified vectors, related to the Server, Web Client, Windows Client, and Service Request components.
|
[
"cpe:2.3:a:hp:service_manager:9.30:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:service_manager:9.31:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:service_manager:9.32:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:service_manager:9.33:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:service_manager:9.34:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:service_manager:9.35:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:service_manager:9.40:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:service_manager:9.41:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:service_manager_mobility:9.30:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:service_manager_mobility:9.31:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:service_manager_mobility:9.32:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:service_manager_mobility:9.33:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:service_manager_mobility:9.34:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:service_manager_mobility:9.35:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:service_manager_mobility:9.40:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:service_manager_mobility:9.41:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:service_manager_server:9.30:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:service_manager_server:9.31:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:service_manager_server:9.32:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:service_manager_server:9.33:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:service_manager_server:9.34:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:service_manager_server:9.35:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:service_manager_server:9.40:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:service_manager_server:9.41:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:service_manager_service_request_catalog:9.30:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:service_manager_service_request_catalog:9.31:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:service_manager_service_request_catalog:9.32:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:service_manager_service_request_catalog:9.33:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:service_manager_service_request_catalog:9.34:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:service_manager_service_request_catalog:9.35:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:service_manager_service_request_catalog:9.40:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:service_manager_service_request_catalog:9.41:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:service_manager_web_client:9.30:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:service_manager_web_client:9.31:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:service_manager_web_client:9.32:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:service_manager_web_client:9.33:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:service_manager_web_client:9.34:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:service_manager_web_client:9.35:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:service_manager_web_client:9.40:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:service_manager_web_client:9.41:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:service_manager_windows_client:9.30:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:service_manager_windows_client:9.31:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:service_manager_windows_client:9.32:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:service_manager_windows_client:9.33:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:service_manager_windows_client:9.34:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:service_manager_windows_client:9.35:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:service_manager_windows_client:9.40:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:service_manager_windows_client:9.41:*:*:*:*:*:*:*"
] | null | null | 8 | 6 | null |
|
GHSA-x3x6-8hwq-3mg4
|
admin/filemanager/ (aka the File Manager) in EZTechhelp EZCMS 1.2 and earlier does not require authentication, which allows remote attackers to create, modify, read, and delete files.
|
[] | null | null | null | null | null |
|
CVE-2025-26477
|
Dell ECS version 3.8.1.4 and prior contain an Improper Input Validation vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Code execution.
|
[] | null | 4.3 | null | null | null |
|
CVE-2021-24067
|
Microsoft Excel Remote Code Execution Vulnerability
|
Microsoft Excel Remote Code Execution Vulnerability
|
[
"cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:microsoft:excel:2010:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:excel:2013:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:excel:2013:sp1:*:*:rt:*:*:*",
"cpe:2.3:a:microsoft:excel:2016:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2019:*:*:*:*:-:*:*",
"cpe:2.3:a:microsoft:office:2019:*:*:*:*:macos:*:*",
"cpe:2.3:a:microsoft:office_online_server:-:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_web_apps:2013:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_web_apps_server:2013:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2021:*:*:*:ltsc:*:*:*",
"cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:excel:2016:*:*:*:*:*:x86:*",
"cpe:2.3:a:microsoft:excel:2016:*:*:*:*:*:x64:*",
"cpe:2.3:a:microsoft:excel:2013:sp1:*:*:*:*:x86:*",
"cpe:2.3:a:microsoft:excel:2013:sp1:*:*:*:*:x64:*"
] | null | 7.8 | null | null | null |
CVE-2022-41547
|
Mobile Security Framework (MobSF) v0.9.2 and below was discovered to contain a local file inclusion (LFI) vulnerability in the StaticAnalyzer/views.py script. This vulnerability allows attackers to read arbitrary files via a crafted HTTP request.
|
[
"cpe:2.3:a:opensecurity:mobile_security_framework:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
|
CVE-2024-9483
|
Uninitialized variable in digital signiture verification may crash the application
|
A null-pointer-dereference in the signature verification module in AVG/Avast Antivirus signature <24092400 released on 24/Sep/2024 on MacOS may allow a malformed xar file to crash the application during processing.
|
[
"cpe:2.3:a:avast:antivirus:*:*:*:*:*:macos:*:*",
"cpe:2.3:a:avg:antivirus:*:*:*:*:*:macos:*:*"
] | null | 5.1 | null | null | null |
GHSA-qcqw-xq86-g95h
|
A memory corruption issue was addressed with improved memory handling. This issue affected versions prior to iOS 12, macOS Mojave 10.14, tvOS 12, watchOS 5.
|
[] | null | null | 7.8 | null | null |
|
GHSA-g3m4-2wr6-2q64
|
SysAid On-Prem versions <= 23.3.40 are vulnerable to an unauthenticated XML External Entity (XXE) vulnerability in the Checkin processing functionality, allowing for administrator account takeover and file read primitives.
|
[] | null | 9.3 | null | null | null |
|
GHSA-5pcp-jwf5-3c2g
|
In Iolo System Shield AntiVirus and AntiSpyware 5.0.0.136, the amp.sys driver file contains an Arbitrary Write vulnerability due to not validating input values from IOCtl 0x00226003.
|
[] | null | null | 9.8 | null | null |
|
GHSA-hjc9-48r3-j77h
|
perl.robot in realtimebattle 1.0.8 allows local users to overwrite arbitrary files via a symlink attack on the /tmp/perl.robot.log temporary file.
|
[] | null | null | null | null | null |
|
CVE-2012-6605
|
The device-management command-line interface in Palo Alto Networks PAN-OS before 3.1.11 and 4.0.x before 4.0.9 allows remote authenticated users to execute arbitrary code via unspecified vectors, aka Ref ID 34896.
|
[
"cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:3.1.9:*:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:4.0.5:*:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:4.0.6:*:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:4.0.7:*:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:4.0.8:*:*:*:*:*:*:*"
] | null | null | null | 9 | null |
|
RHSA-2024:3513
|
Red Hat Security Advisory: less security update
|
less: OS command injection
|
[
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 8.6 | null | null | null |
GHSA-mpx5-6w72-2g32
|
An exposure of sensitive information vulnerability was identified in GitHub Enterprise Server that could allow an attacker to disclose the names of private repositories within an organization. This issue could be exploited by leveraging a user-to-server token with no scopes via the Search API endpoint. Successful exploitation required an organization administrator to install a malicious GitHub App in the organization’s repositories. This vulnerability impacted only GitHub Enterprise Server version 3.17 and was addressed in version 3.17.2. The vulnerability was reported through the GitHub Bug Bounty program.
|
[] | 6.3 | 4.3 | null | null | null |
|
CVE-2025-26890
|
WordPress HUSKY plugin <= 1.3.6.4 - Local File Inclusion vulnerability
|
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in PluginUs.Net HUSKY allows PHP Local File Inclusion.This issue affects HUSKY: from n/a through 1.3.6.4.
|
[] | null | 7.5 | null | null | null |
CVE-2015-6293
|
Cisco AsyncOS 8.x before 8.0.8-113, 8.1.x and 8.5.x before 8.5.3-051, 8.6.x and 8.7.x before 8.7.0-171-LD, and 8.8.x before 8.8.0-085 on Web Security Appliance (WSA) devices allows remote attackers to cause a denial of service (memory consumption) via multiple file-range requests, aka Bug ID CSCur39155.
|
[
"cpe:2.3:a:cisco:web_security_appliance:8.0.0-000:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:web_security_appliance:8.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:web_security_appliance:8.0.5:hp1:*:*:*:*:*:*",
"cpe:2.3:a:cisco:web_security_appliance:8.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:web_security_appliance:8.0.6-078:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:web_security_appliance:8.0.7-142:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:web_security_appliance:8.0.8-mr-113:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:web_security_appliance:8.5.0-497:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:web_security_appliance:8.5.0.000:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:web_security_appliance:8.5.2-024:*:*:*:*:*:*:*"
] | null | null | null | 7.8 | null |
|
CVE-2020-36534
|
easyii CMS out cross-site request forgery
|
A vulnerability was found in easyii CMS. It has been classified as problematic. Affected is an unknown function of the file /admin/sign/out. The manipulation leads to cross site request forgery. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
|
[
"cpe:2.3:a:easyiicms:easyiicms:-:*:*:*:*:*:*:*"
] | null | 4.3 | null | null | null |
RHSA-2025:3623
|
Red Hat Security Advisory: firefox security update
|
firefox: thunderbird: Use-after-free triggered by XSLTProcessor firefox: thunderbird: URL Bar Spoofing via non-BMP Unicode characters firefox: thunderbird: Memory safety bugs fixed in Firefox 137, Thunderbird 137, Firefox ESR 128.9, and Thunderbird 128.9
|
[
"cpe:/a:redhat:rhel_aus:8.2::appstream"
] | null | 8.8 | null | null | null |
GHSA-rxvw-rgx9-7hq4
|
The Giveaways and Contests by RafflePress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'rafflepress' and 'rafflepress_gutenberg' shortcode in versions up to, and including, 1.12.0 due to insufficient input sanitization and output escaping on 'giframe' user supplied attribute. This makes it possible for authenticated attackers with contributor level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] | null | 6.4 | null | null | null |
|
CVE-2022-31643
|
A potential security vulnerability has been identified in the system BIOS for certain HP PC products which may allow loss of integrity. HP is releasing firmware updates to mitigate the potential vulnerability.
|
[
"cpe:2.3:o:hp:elite_dragonfly_g3_firmware:01.03.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_dragonfly_g3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:dragonfly_folio_g3_firmware:01.03.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:dragonfly_folio_g3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_dragonfly_g2_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_dragonfly_g2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_dragonfly_max_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_dragonfly_max:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_x2_g8_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_x2_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_x360_1040_g9_firmware:01.03.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_x360_1040_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_x360_830_g9_firmware:01.03.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_x360_830_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_1040_g9_firmware:01.03.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_1040_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_630_g9_firmware:01.04.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_630_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_640_g9_firmware:01.04.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_640_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_645_g9_firmware:01.08.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_645_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_650_g9_firmware:01.04.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_650_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_655_g9_firmware:01.08.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_655_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_830_g9_firmware:01.03.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_830_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_830_g8_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_830_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_835_g9_firmware:01.02.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_835_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_835_g8_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_835_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_840_g9_firmware:01.03.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_840_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_840_aero_g8_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_840_aero_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_840_g8_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_840_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_845_g9_firmware:01.02.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_845_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_845_g8_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_845_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_850_g8_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_850_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_855_g8_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_855_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_860_g9_firmware:01.03.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_860_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_865_g9_firmware:01.02.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_865_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_x360_1030_g8_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_x360_1030_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_x360_1040_g8_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_x360_1040_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_x360_830_g8_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_x360_830_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:pro_x360_fortis_g10_firmware:01.03.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:pro_x360_fortis_g10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:pro_x360_fortis_g9_firmware:01.03.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:pro_x360_fortis_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_430_g8_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_430_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_440_g9_firmware:01.04.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_440_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_440_g8_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_440_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_445_g9_firmware:01.08.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_445_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_445_g8_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_445_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_450_g9_firmware:01.04.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_450_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_450_g8_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_450_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_455_g9_firmware:01.08.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_455_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_455_g8_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_455_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_630_g8_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_630_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_635_aero_g8_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_635_aero_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_640_g8_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_640_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_650_g8_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_650_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_fortis_g10_firmware:01.03.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_fortis_g10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_fortis_g9_firmware:01.03.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_fortis_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_x360_11_g7_ee_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_x360_11_g7_ee:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_x360_435_g8_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_x360_435_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_firefly_g8_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_firefly_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_firefly_g9_firmware:01.03.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_firefly_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_fury_g8_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_fury_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_fury_16_g9_firmware:01.03.02:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_fury_16_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_power_g8_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_power_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_power_g9_firmware:01.03.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_power_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_studio_g8_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_studio_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_studio_g9_firmware:01.03.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_studio_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zhan_66_pro_g5_firmware:01.04.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zhan_66_pro_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zhan_66_pro_a_14_g4_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zhan_66_pro_a_14_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zhan_66_pro_a_14_g5_firmware:01.08.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zhan_66_pro_a_14_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_mini_600_g9_firmware:02.05.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_mini_600_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_mini_800_g9_firmware:02.05.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_mini_800_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_sff_600_g9_firmware:02.05.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_sff_600_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_sff_800_g9_firmware:02.05.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_sff_800_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_tower_600_g9_firmware:02.05.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_tower_600_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_tower_680_g9_firmware:02.05.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_tower_680_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_tower_800_g9_firmware:02.05.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_tower_800_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_tower_880_g9_firmware:02.05.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_tower_880_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_800_g8_firmware:02.09.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_800_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_805_g8_firmware:02.05.02:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_805_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_880_g8_firmware:02.09.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_880_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_800_g8_24_firmware:02.09.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_800_g8_24:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_800_g8_27_firmware:02.09.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_800_g8_27:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_840_g9_firmware:02.06.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_840_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_870_g9_firmware:02.06.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_870_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:mini_conferencing_pc_firmware:02.05.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:mini_conferencing_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:pro_mini_400_g9_firmware:02.05.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:pro_mini_400_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:pro_sff_400_g9_firmware:02.05.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:pro_sff_400_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:pro_tower_400_g9_firmware:02.05.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:pro_tower_400_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:pro_tower_480_g9_firmware:02.05.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:pro_tower_480_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_405_g8_firmware:02.05.02:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_405_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proone_440_g9_firmware:02.05.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proone_440_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:z1_g8_tower_firmware:02.09.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:z1_g8_tower:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:z1_g9_tower_firmware:02.05.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:z1_g9_tower:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:engage_go_10_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:engage_go_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp_z2_mini_g9_firmware:01.04.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:hp_z2_mini_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp_z2_small_form_factor_g8_firmware:01.05.02:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:hp_z2_small_form_factor_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp_z2_small_form_factor_g9_firmware:01.04.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:hp_z2_small_form_factor_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp_z2_tower_g8_firmware:01.05.02:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:hp_z2_tower_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp_z2_tower_g9_firmware:01.04.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:hp_z2_tower_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:pro_mt440_g3_firmware:01.05.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:pro_mt440_g3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_mt645_g7_firmware:01.10.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_mt645_g7:-:*:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
|
GHSA-hm2x-9mrv-7fj2
|
Windows Projected File System Elevation of Privilege Vulnerability
|
[] | null | 7.8 | null | null | null |
|
RHSA-2024:2038
|
Red Hat Security Advisory: tigervnc security update
|
xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice xorg-x11-server: Use-after-free in ProcRenderAddGlyphs
|
[
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 7.8 | null | null | null |
GHSA-6mvj-2569-3mcm
|
Editor.js vulnerable to Code Injection
|
Editor.js is a block-style editor with clean JSON output. Versions prior to 2.26.0 are vulnerable to Code Injection via pasted input. The processHTML method passes pasted input into wrapper’s innerHTML. This issue is patched in version 2.26.0.
|
[] | 5.3 | 6.1 | null | null | null |
CVE-2024-2036
|
ApplyOnline – Application Form Builder and Manager <= 2.6 - Missing Authorization to Sensitive Information Exposure
|
The ApplyOnline – Application Form Builder and Manager plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the aol_modal_box AJAX action in all versions up to, and including, 2.6. This makes it possible for authenticated attackers, with subscriber access or higher, to view Application submissions.
|
[] | null | 4.3 | null | null | null |
CVE-2015-0305
|
Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK & Compiler before 16.0.0.272 allow attackers to execute arbitrary code by leveraging an unspecified "type confusion."
|
[
"cpe:2.3:a:adobe:adobe_air_sdk_and_compiler:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:android:*:*",
"cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air_sdk:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:14.0.0.125:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:14.0.0.145:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:14.0.0.176:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:14.0.0.179:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.144:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.152:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.167:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.189:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.223:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.238:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.239:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.246:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:16.0.0.234:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:16.0.0.235:*:*:*:*:*:*:*"
] | null | null | null | 9.3 | null |
|
CVE-2018-21127
|
Certain NETGEAR devices are affected by command injection by an unauthenticated attacker. This affects WAC505 before 5.0.0.17 and WAC510 before 5.0.0.17.
|
[
"cpe:2.3:o:netgear:wac505_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wac505:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:wac510_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wac510:-:*:*:*:*:*:*:*"
] | null | null | 8.8 | null | null |
|
CVE-2022-41686
|
Out-of-bound memory read and write in /dev/mmz_userdev device driver. The impact depends on the privileges of the attacker. The unprivileged process run on the device could read out-of-bound memory leading sensitive to information disclosure. The proc ...
|
OpenHarmony-v3.1.2 and prior versions, 3.0.6 and prior versions have an Out-of-bound memory read and write vulnerability in /dev/mmz_userdev device driver. The impact depends on the privileges of the attacker. The unprivileged process run on the device could read out-of-bound memory leading sensitive to information disclosure. The processes with system user UID run on the device would be able to write out-of-bound memory which could lead to unspecified memory corruption.
|
[
"cpe:2.3:a:openharmony:openharmony:*:*:*:*:long_term_support:*:*:*",
"cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*"
] | null | 5.1 | null | null | null |
GHSA-mc83-gm47-m9vc
|
A vulnerability in the call-handling functionality of Session Initiation Protocol (SIP) Software for Cisco IP Phone 7800 Series and 8800 Series could allow an unauthenticated, remote attacker to cause an affected phone to reload unexpectedly, resulting in a temporary denial of service (DoS) condition. The vulnerability is due to incomplete error handling when XML data within a SIP packet is parsed. An attacker could exploit this vulnerability by sending a SIP packet that contains a malicious XML payload to an affected phone. A successful exploit could allow the attacker to cause the affected phone to reload unexpectedly, resulting in a temporary DoS condition.
|
[] | null | null | null | null | null |
|
GHSA-mv77-9g28-cwg3
|
`CHECK` fail via inputs in `PyFunc`
|
ImpactAn input `token` that is not a UTF-8 bytestring will trigger a `CHECK` fail in [`tf.raw_ops.PyFunc`](https://github.com/tensorflow/tensorflow/blob/master/tensorflow/python/lib/core/py_func.cc).PatchesWe have patched the issue in GitHub commit [9f03a9d3bafe902c1e6beb105b2f24172f238645](https://github.com/tensorflow/tensorflow/commit/9f03a9d3bafe902c1e6beb105b2f24172f238645).The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range.For more informationPlease consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.AttributionThis vulnerability has been reported by [email protected]
|
[] | null | 4.8 | null | null | null |
CVE-2017-16927
|
The scp_v0s_accept function in sesman/libscp/libscp_v0.c in the session manager in xrdp through 0.9.4 uses an untrusted integer as a write length, which allows local users to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted input stream.
|
[
"cpe:2.3:a:neutrinolabs:xrdp:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"
] | null | null | 8.4 | 7.2 | null |
|
GHSA-8jjx-c624-8pjg
|
An issue was discovered in PSPP 1.2.0. There is a heap-based buffer overflow at the function read_bytes_internal in utilities/pspp-dump-sav.c, which allows attackers to cause a denial of service (application crash) or possibly have unspecified other impact.
|
[] | null | null | 7.8 | null | null |
|
GHSA-rp4p-25j3-mhw4
|
It was observed that while login into Business-central console, HTTP request discloses sensitive information like username and password when intercepted using some tool like burp suite etc.
|
[] | null | 7.5 | null | null | null |
|
GHSA-7hrx-2h6p-x7pc
|
In the Linux kernel, the following vulnerability has been resolved:scsi: mpi3mr: Fix memory leaks in mpi3mr_init_ioc()Don't allocate memory again when IOC is being reinitialized.
|
[] | null | null | null | null | null |
|
CVE-2024-5019
|
WhatsUp Gold LoadCSSUsingBasePath Directory Traversal Information Disclosure Vulnerability
|
In WhatsUp Gold versions released before 2023.1.3,
an unauthenticated Arbitrary File Read issue exists in Wug.UI.Areas.Wug.Controllers.SessionController.CachedCSS. This vulnerability allows reading of any file with iisapppool\NmConsole privileges.
|
[
"cpe:2.3:a:progress:whatsup_gold:2023.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:progress:whatsup_gold:*:*:*:*:*:*:*:*"
] | null | 5.3 | null | null | null |
GHSA-w2v5-r8g7-67hv
|
Cross-site scripting (XSS) vulnerability in the BuddyPress Extended Friendship Request plugin before 1.0.2 for WordPress, when the "Friend Connections" component is enabled, allows remote attackers to inject arbitrary web script or HTML via the friendship_request_message parameter to wp-admin/admin-ajax.php. NOTE: some of these details are obtained from third party information.
|
[] | null | null | null | null | null |
|
GHSA-9j94-67jr-4cqj
|
Rack session gets restored after deletion
|
SummaryWhen using the `Rack::Session::Pool` middleware, simultaneous rack requests can restore a deleted rack session, which allows the unauthenticated user to occupy that session.Details[Rack session middleware](https://github.com/rack/rack-session/blob/v2.1.0/lib/rack/session/abstract/id.rb#L271-L278) prepares the session at the beginning of request, then saves is back to the store with possible changes applied by host rack application. This way the session becomes to be a subject of race conditions in general sense over concurrent rack requests.ImpactWhen using the `Rack::Session::Pool` middleware, and provided the attacker can acquire a session cookie (already a major issue), the session may be restored if the attacker can trigger a long running request (within that same session) adjacent to the user logging out, in order to retain illicit access even after a user has attempted to logout.MitigationUpdate to the latest version of `rack-session`, orEnsure your application invalidates sessions atomically by marking them as logged out e.g., using a `logged_out` flag, instead of deleting them, and check this flag on every request to prevent reuse, orImplement a custom session store that tracks session invalidation timestamps and refuses to accept session data if the session was invalidated after the request began.RelatedThis code was previously part of `rack` in Rack < 3, see <https://github.com/rack/rack/security/advisories/GHSA-vpfw-47h7-xj4g> for the equivalent advisory in `rack` (affecting Rack < 3 only).
|
[] | null | 4.2 | null | null | null |
CVE-2014-7814
|
SQL injection vulnerability in Red Hat CloudForms 3.1 Management Engine (CFME) 5.3 allows remote authenticated users to execute arbitrary SQL commands via a crafted REST API request to an SQL filter.
|
[
"cpe:2.3:a:redhat:cloudforms_3.1_management_engine:5.3:*:*:*:*:*:*:*"
] | null | null | null | 6.5 | null |
|
GHSA-cmwc-cfp9-2c98
|
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
|
[] | null | null | null | null | null |
|
GHSA-p658-759g-r8hf
|
The Interactive Content WordPress plugin before 1.15.8 does not validate uploads which could allow a Contributors and above to update malicious SVG files, leading to Stored Cross-Site Scripting issues
|
[] | null | 5.4 | null | null | null |
|
CVE-2021-31430
|
This vulnerability allows local attackers to disclose sensitive information on affected installations of Parallels Desktop 15.1.5-47309. An attacker must first obtain the ability to execute high-privileged code on the target guest system in order to exploit this vulnerability. The specific flaw exists within the IDE virtual device. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to escalate privileges and execute arbitrary code in the context of the hypervisor. Was ZDI-CAN-13188.
|
[
"cpe:2.3:a:parallels:parallels_desktop:15.1.5-47309:*:*:*:*:*:*:*"
] | null | null | 6 | null | null |
|
GHSA-9c9g-7w7x-vr22
|
Microsoft Internet Explorer 10 and 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2014-0313.
|
[] | null | null | null | null | null |
|
GHSA-w9gf-3cjv-vfxp
|
Cross-site scripting (XSS) vulnerability in admin/menu.php in SAXON 5.4 allows remote attackers to inject arbitrary web script or HTML via the config[news_url] parameter.
|
[] | null | null | null | null | null |
|
RHSA-2020:0513
|
Red Hat Security Advisory: flash-plugin security update
|
flash-plugin: Arbitrary Code Execution vulnerability (APSB20-06)
|
[
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 8.8 | null | null |
RHSA-2015:0236
|
Red Hat Security Advisory: Red Hat JBoss Fuse/A-MQ 6.1.0 security and bug fix update
|
CXF: Improper security semantics enforcement of SAML SubjectConfirmation methods Framework: directory traversal flaw
|
[
"cpe:/a:redhat:jboss_amq:6.1.0",
"cpe:/a:redhat:jboss_fuse:6.1.0"
] | null | null | null | null | null |
GHSA-wmw4-vj25-rfxw
|
The Unlimited Elements For Elementor (Free Widgets, Addons, Templates) plugin for WordPress is vulnerable to IP Address Spoofing in all versions up to, and including, 1.5.112 due to insufficient IP address validation and/or use of user-supplied HTTP headers as a primary method for IP retrieval. This makes it possible for unauthenticated attackers to bypass antispam functionality in the Form Builder widgets.
|
[] | null | 5.3 | null | null | null |
|
CVE-2024-13982
|
SPON IP Network Intercom System rj_get_token.php Arbitrary File Read
|
SPON IP Network Broadcast System, a digital audio transmission platform developed by SPON Communications, contains an arbitrary file read vulnerability in the rj_get_token.php endpoint. The flaw arises from insufficient input validation on the jsondata[url] parameter, which allows attackers to perform directory traversal and access sensitive files on the server. An unauthenticated remote attacker can exploit this vulnerability by sending a crafted POST request to read arbitrary files, potentially exposing system configuration, credentials, or internal logic. An affected version range is undefined.
|
[] | 8.7 | null | null | null | null |
ICSA-23-080-01
|
Keysight N6845A Geolocation Server
|
N6854A Geolocation Server versions 2.4.2 are vulnerable to untrusted data deserialization, which may allow a malicious actor to escalate privileges in the affected device’s default configuration and achieve remote code execution. CVE-2023-1399 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been assigned; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).
|
[] | null | null | 7.8 | null | null |
GHSA-6qpf-6fwg-q2xj
|
Cross-site scripting (XSS) vulnerability in HP Proliant Support Pack (PSP) before 8.7 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
|
[] | null | null | null | null | null |
|
CVE-2010-4830
|
SQL injection vulnerability in Resumes/TD_RESUME_Indlist.asp in Techno Dreams (T-Dreams) Job Career Package 3.0 allows remote attackers to execute arbitrary SQL commands via the z_Residency parameter.
|
[
"cpe:2.3:a:t-dreams:job_career_package:3.0:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2024-11780
|
Site Search 360 <= 2.1.6 - Authenticated (Contributor+) Stored Cross-Site Scripting
|
The Site Search 360 plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'ss360-resultblock' shortcode in all versions up to, and including, 2.1.6 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] | null | 6.4 | null | null | null |
CVE-2024-20003
|
In Modem NL1, there is a possible system crash due to an improper input validation. This could lead to remote denial of service, if NW sent invalid NR RRC Connection Setup message, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01191612; Issue ID: MOLY01191612 (MSV-981).
|
[
"cpe:2.3:h:mediatek:mt6875t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt2735:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6297:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mediatek:nr15:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
|
GHSA-9fm7-cmvm-vvjr
|
D-Link DWL-2600AP 4.2.0.15 Rev A devices have an authenticated OS command injection vulnerability via the Restore Configuration functionality in the Web interface, using shell metacharacters in the admin.cgi?action=config_restore configRestore or configServerip parameter.
|
[] | null | 7.8 | null | null | null |
|
GHSA-54c7-72v9-gm27
|
In version v12 of parisneo/lollms-webui, the 'Send file to AL' function allows uploading files with various extensions, including potentially dangerous ones like .py, .sh, .bat, and more. Attackers can exploit this by uploading files with malicious content and then using the '/open_file' API endpoint to execute these files. The vulnerability arises from the use of 'subprocess.Popen' to open files without proper validation, leading to potential remote code execution.
|
[] | null | null | 6.6 | null | null |
|
CVE-2020-35680
|
smtpd/lka_filter.c in OpenSMTPD before 6.8.0p1, in certain configurations, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted pattern of client activity, because the filter state machine does not properly maintain the I/O channel between the SMTP engine and the filters layer.
|
[
"cpe:2.3:a:opensmtpd:opensmtpd:*:*:*:*:*:*:*:*",
"cpe:2.3:a:opensmtpd:opensmtpd:6.8.0:-:*:*:*:*:*:*",
"cpe:2.3:a:opensmtpd:opensmtpd:6.8.0:patch1-rc1:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null |
|
cisco-sa-20190227-wmda-cmdinj
|
Cisco Webex Meetings Desktop App and Cisco Webex Productivity Tools Update Service Command Injection Vulnerability
|
A vulnerability in the update service of Cisco Webex Meetings Desktop App and Cisco Webex Productivity Tools for Windows could allow an authenticated, local attacker to execute arbitrary commands as a privileged user.
The vulnerability is due to insufficient validation of user-supplied parameters. An attacker could exploit this vulnerability by invoking the update service command with a crafted argument. An exploit could allow the attacker to run arbitrary commands with SYSTEM user privileges.
While the CVSS Attack Vector metric denotes the requirement for an attacker to have local access, administrators should be aware that in Active Directory deployments, the vulnerability could be exploited remotely by leveraging the operating system remote management tools.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190227-wmda-cmdinj ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190227-wmda-cmdinj"]
|
[] | null | null | 7.8 | null | null |
GHSA-w9wh-5q96-r696
|
Race condition in the JavaScript garbage collection in Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code by causing the garbage collector to delete a temporary variable while it is still being used during the creation of a new Function object.
|
[] | null | null | null | null | null |
|
CVE-2004-0165
|
Format string vulnerability in Point-to-Point Protocol (PPP) daemon (pppd) 2.4.0 for Mac OS X 10.3.2 and earlier allows remote attackers to read arbitrary pppd process data, including PAP or CHAP authentication credentials, to gain privileges.
|
[
"cpe:2.3:o:apple:mac_os_x:10.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.1.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.1.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.2.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.2.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.2.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.2.6:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.2.7:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.2.8:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.1.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.1.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.2.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.2.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.2.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.2.6:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.2.7:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.2.8:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.3.2:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-c856-w373-jm6c
|
In JetBrains TeamCity before 2024.07.1 multiple stored XSS was possible on Clouds page
|
[] | null | 4.6 | null | null | null |
|
CVE-2011-4925
|
Terascale Open-Source Resource and Queue Manager (aka TORQUE Resource Manager) before 2.5.9, when munge authentication is used, allows remote authenticated users to impersonate arbitrary user accounts via unspecified vectors.
|
[
"cpe:2.3:a:cluster_resources:torque_resource_manager:1.0.1p0:*:*:*:*:*:*:*",
"cpe:2.3:a:cluster_resources:torque_resource_manager:1.0.1p1:*:*:*:*:*:*:*",
"cpe:2.3:a:cluster_resources:torque_resource_manager:1.0.1p2:*:*:*:*:*:*:*",
"cpe:2.3:a:cluster_resources:torque_resource_manager:1.0.1p3:*:*:*:*:*:*:*",
"cpe:2.3:a:cluster_resources:torque_resource_manager:1.0.1p4:*:*:*:*:*:*:*",
"cpe:2.3:a:cluster_resources:torque_resource_manager:1.0.1p5:*:*:*:*:*:*:*",
"cpe:2.3:a:cluster_resources:torque_resource_manager:1.0.1p6:*:*:*:*:*:*:*",
"cpe:2.3:a:cluster_resources:torque_resource_manager:1.1.0p0:*:*:*:*:*:*:*",
"cpe:2.3:a:cluster_resources:torque_resource_manager:1.1.0p1:*:*:*:*:*:*:*",
"cpe:2.3:a:cluster_resources:torque_resource_manager:1.1.0p2:*:*:*:*:*:*:*",
"cpe:2.3:a:cluster_resources:torque_resource_manager:1.1.0p3:*:*:*:*:*:*:*",
"cpe:2.3:a:cluster_resources:torque_resource_manager:1.1.0p4:*:*:*:*:*:*:*",
"cpe:2.3:a:cluster_resources:torque_resource_manager:1.1.0p5:*:*:*:*:*:*:*",
"cpe:2.3:a:cluster_resources:torque_resource_manager:1.1.0p6:*:*:*:*:*:*:*",
"cpe:2.3:a:cluster_resources:torque_resource_manager:1.2.0p0:*:*:*:*:*:*:*",
"cpe:2.3:a:cluster_resources:torque_resource_manager:1.2.0p1:*:*:*:*:*:*:*",
"cpe:2.3:a:cluster_resources:torque_resource_manager:1.2.0p2:*:*:*:*:*:*:*",
"cpe:2.3:a:cluster_resources:torque_resource_manager:1.2.0p3:*:*:*:*:*:*:*",
"cpe:2.3:a:cluster_resources:torque_resource_manager:1.2.0p4:*:*:*:*:*:*:*",
"cpe:2.3:a:cluster_resources:torque_resource_manager:1.2.0p5:*:*:*:*:*:*:*",
"cpe:2.3:a:cluster_resources:torque_resource_manager:1.2.0p6:*:*:*:*:*:*:*",
"cpe:2.3:a:cluster_resources:torque_resource_manager:2.0.0p0:*:*:*:*:*:*:*",
"cpe:2.3:a:cluster_resources:torque_resource_manager:2.0.0p1:*:*:*:*:*:*:*",
"cpe:2.3:a:cluster_resources:torque_resource_manager:2.0.0p2:*:*:*:*:*:*:*",
"cpe:2.3:a:cluster_resources:torque_resource_manager:2.0.0p3:*:*:*:*:*:*:*",
"cpe:2.3:a:cluster_resources:torque_resource_manager:2.0.0p4:*:*:*:*:*:*:*",
"cpe:2.3:a:cluster_resources:torque_resource_manager:2.0.0p5:*:*:*:*:*:*:*",
"cpe:2.3:a:cluster_resources:torque_resource_manager:2.0.0p6:*:*:*:*:*:*:*",
"cpe:2.3:a:clusterresources:torque_resource_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:clusterresources:torque_resource_manager:2.1.0p0:*:*:*:*:*:*:*",
"cpe:2.3:a:clusterresources:torque_resource_manager:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:clusterresources:torque_resource_manager:2.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:clusterresources:torque_resource_manager:2.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:clusterresources:torque_resource_manager:2.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:clusterresources:torque_resource_manager:2.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:clusterresources:torque_resource_manager:2.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:clusterresources:torque_resource_manager:2.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:clusterresources:torque_resource_manager:2.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:clusterresources:torque_resource_manager:2.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:clusterresources:torque_resource_manager:2.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:clusterresources:torque_resource_manager:2.3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:clusterresources:torque_resource_manager:2.3.8:*:*:*:*:*:*:*",
"cpe:2.3:a:clusterresources:torque_resource_manager:2.3.9:*:*:*:*:*:*:*",
"cpe:2.3:a:clusterresources:torque_resource_manager:2.3.10:*:*:*:*:*:*:*",
"cpe:2.3:a:clusterresources:torque_resource_manager:2.3.11:*:*:*:*:*:*:*",
"cpe:2.3:a:clusterresources:torque_resource_manager:2.3.12:*:*:*:*:*:*:*",
"cpe:2.3:a:clusterresources:torque_resource_manager:2.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:clusterresources:torque_resource_manager:2.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:clusterresources:torque_resource_manager:2.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:clusterresources:torque_resource_manager:2.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:clusterresources:torque_resource_manager:2.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:clusterresources:torque_resource_manager:2.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:clusterresources:torque_resource_manager:2.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:clusterresources:torque_resource_manager:2.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:clusterresources:torque_resource_manager:2.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:clusterresources:torque_resource_manager:2.4.9:*:*:*:*:*:*:*",
"cpe:2.3:a:clusterresources:torque_resource_manager:2.4.10:*:*:*:*:*:*:*",
"cpe:2.3:a:clusterresources:torque_resource_manager:2.4.11:*:*:*:*:*:*:*",
"cpe:2.3:a:clusterresources:torque_resource_manager:2.4.12:*:*:*:*:*:*:*",
"cpe:2.3:a:clusterresources:torque_resource_manager:2.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:clusterresources:torque_resource_manager:2.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:clusterresources:torque_resource_manager:2.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:clusterresources:torque_resource_manager:2.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:clusterresources:torque_resource_manager:2.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:clusterresources:torque_resource_manager:2.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:clusterresources:torque_resource_manager:2.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:clusterresources:torque_resource_manager:2.5.7:*:*:*:*:*:*:*"
] | null | null | null | 4.9 | null |
|
CVE-2018-5489
|
NetApp 7-Mode Transition Tool allows users with valid credentials to access functions and information which may have been intended to be restricted to administrators or privileged users. 7MTT versions below 2.0 do not enforce user authorization rules on file information and status that it has previously collected. The released version of 7MTT has been updated to maintain and verify authorization rules for file information, status and utilities.
|
[
"cpe:2.3:a:netapp:7-mode_transition_tool:*:*:*:*:*:*:*:*"
] | null | null | 6.5 | 4 | null |
|
GHSA-29j4-8jcf-4q5w
|
The BEAR for WordPress is vulnerable to Missing Authorization in versions up to, and including, 1.1.3.3. This is due to a missing capability check on the woobe_bulkoperations_apply_default_combination function. This makes it possible for authenticated attackers (subscriber or higher) to manipulate products.
|
[] | null | 4.3 | null | null | null |
|
GHSA-wqrx-hq6q-6g5p
|
ASUS Japan WL-330NUL devices with firmware before 3.0.0.42 allow remote attackers to cause a denial of service via unspecified vectors.
|
[] | null | null | 4.3 | null | null |
|
CVE-2023-46240
|
CodeIgniter4 vulnerable to information disclosure when detailed error report is displayed in production environment
|
CodeIgniter is a PHP full-stack web framework. Prior to CodeIgniter4 version 4.4.3, if an error or exception occurs, a detailed error report is displayed even if in the production environment. As a result, confidential information may be leaked. Version 4.4.3 contains a patch. As a workaround, replace `ini_set('display_errors', '0')` with `ini_set('display_errors', 'Off')` in `app/Config/Boot/production.php`.
|
[
"cpe:2.3:a:codeigniter:codeigniter:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
CVE-2021-47602
|
mac80211: track only QoS data frames for admission control
|
In the Linux kernel, the following vulnerability has been resolved:
mac80211: track only QoS data frames for admission control
For admission control, obviously all of that only works for
QoS data frames, otherwise we cannot even access the QoS
field in the header.
Syzbot reported (see below) an uninitialized value here due
to a status of a non-QoS nullfunc packet, which isn't even
long enough to contain the QoS header.
Fix this to only do anything for QoS data packets.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.16:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.16:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.16:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.16:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.16:rc5:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.