id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
listlengths 0
5.42k
|
---|---|---|---|
GHSA-8h3j-g9f5-qfm7
|
Vulnerability in the Oracle Enterprise Command Center Framework product of Oracle E-Business Suite (component: API). Supported versions that are affected are ECC: 8, 9 and 10. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Enterprise Command Center Framework. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Enterprise Command Center Framework accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).
|
[] |
|
GHSA-p7fq-hg6g-9v5r
|
The Simple Restrict plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.2.7 via the WordPress core search feature. This makes it possible for unauthenticated attackers to extract sensitive data from posts that have been restricted to higher-level roles such as administrator.
|
[] |
|
GHSA-f85g-5x38-2g3r
|
Cross Site Request Forgery (CSRF) vulnerability exists in v2.0.0 in video_list.php, which can let a malicious user delete a video message.
|
[] |
|
GHSA-r6h3-83gr-j9r7
|
MDaemon Technologies SecurityGateway for Email Servers 8.5.2 is vulnerable to Cross Site Scripting (XSS) via the Blacklist endpoint.
|
[] |
|
CVE-2023-38205
|
ColdFusion Bypass - Vulnerability disclosure in ColdFusion | BYPASS CVE-2023-29298
|
Adobe ColdFusion versions 2018u18 (and earlier), 2021u8 (and earlier) and 2023u2 (and earlier) are affected by an Improper Access Control vulnerability that could result in a Security feature bypass. An attacker could leverage this vulnerability to access the administration CFM and CFC endpoints. Exploitation of this issue does not require user interaction.
|
[
"cpe:2.3:a:adobe:coldfusion:2018:-:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2018:update1:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2018:update10:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2018:update11:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2018:update12:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2018:update13:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2018:update14:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2018:update15:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2018:update16:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2018:update18:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2018:update2:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2018:update3:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2018:update4:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2018:update5:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2018:update6:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2018:update7:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2018:update8:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2018:update9:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2021:-:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2021:update1:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2021:update2:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2021:update3:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2021:update4:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2021:update5:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2021:update6:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2021:update7:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2021:update8:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2023:-:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2023:update1:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:2023:update2:*:*:*:*:*:*"
] |
CVE-2011-2816
|
WebKit, as used in Apple iTunes before 10.5, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-10-11-1.
|
[
"cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:6.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:6.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:6.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:8.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:8.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:9.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:9.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:9.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:9.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:9.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:9.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:10.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:10.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:10.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:10.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:10.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:10.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:10.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:webkit:*:*:*:*:*:*:*:*"
] |
|
GHSA-gpjg-cgg8-v765
|
Cisco PIX Firewall 515 and 520 with 5.1.4 OS running aaa authentication to a TACACS+ server allows remote attackers to cause a denial of service via a large number of authentication requests.
|
[] |
|
GHSA-8j76-3645-jj3r
|
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Eggemplo Gestion-Pymes plugin <= 1.5.6 versions.
|
[] |
|
CVE-2019-20409
|
The way in which velocity templates were used in Atlassian Jira Server and Data Center prior to version 8.8.0 allowed remote attackers to gain remote code execution if they were able to exploit a server side template injection vulnerability.
|
[
"cpe:2.3:a:atlassian:jira:*:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:jira_software_data_center:*:*:*:*:*:*:*:*"
] |
|
GHSA-wmm6-xq62-rq3v
|
An out-of-bounds read was addressed with improved input validation. This issue is fixed in macOS Sonoma 14.6, macOS Monterey 12.7.6, macOS Ventura 13.6.8. A local attacker may be able to cause unexpected system shutdown.
|
[] |
|
GHSA-4pcq-7rw3-2jvx
|
In the autofill service, the package name that is provided by the app process is trusted inappropriately. This could lead to information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
|
[] |
|
GHSA-gh4x-qv3p-m9pm
|
akbr patch-into was discovered to contain a prototype pollution via the function patchInto
|
akbr patch-into version 1.0.1 was discovered to contain a prototype pollution via the function patchInto. This vulnerability allows attackers to execute arbitrary code or cause a Denial of Service (DoS) via injecting arbitrary properties.
|
[] |
CVE-2020-13886
|
Intelbras TIP 200 60.61.75.15, TIP 200 LITE 60.61.75.15, and TIP 300 65.61.75.22 devices allow cgi-bin/cgiServer.exx?page=../ Directory Traversal.
|
[
"cpe:2.3:o:intelbras:tip200_firmware:60.61.75.15:*:*:*:*:*:*:*",
"cpe:2.3:h:intelbras:tip200:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intelbras:tip200lite_firmware:60.61.75.15:*:*:*:*:*:*:*",
"cpe:2.3:h:intelbras:tip200lite:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intelbras:tip300_firmware:65.61.75.22:*:*:*:*:*:*:*",
"cpe:2.3:h:intelbras:tip300:-:*:*:*:*:*:*:*"
] |
|
CVE-2017-0027
|
Microsoft Excel 2007 SP3, Excel 2010 SP2, Excel 2013 RT SP1, Excel 2016, Office Compatibility Pack SP3, and Excel Services on SharePoint Server 2013 SP1 allow remote attackers to obtain sensitive information from process memory via a crafted Office document, aka "Microsoft Office Information Disclosure Vulnerability."
|
[
"cpe:2.3:a:microsoft:excel:2007:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:excel:2010:sp2:*:*:*:*:x64:*",
"cpe:2.3:a:microsoft:excel:2013:sp1:*:*:rt:*:*:*",
"cpe:2.3:a:microsoft:excel:2016:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_compatibility_pack:*:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_server:2013:sp1:*:*:*:*:*:*"
] |
|
CVE-2020-8717
|
Improper input validation in a subsystem for some Intel Server Boards, Server Systems and Compute Modules before version 1.59 may allow an authenticated user to potentially enable denial of service via local access.
|
[
"cpe:2.3:o:intel:server_board_s2600wt_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_board_s2600wt2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_board_s2600wt2r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_board_s2600wtt:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_board_s2600wttr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:server_system_r1000wt_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_r1208wt2gs:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_r1208wt2gsr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_r1208wttgs:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_r1208wttgsbpp:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_r1208wttgsr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_r1304wt2gs:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_r1304wt2gsr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_r1304wttgs:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_r1304wttgsr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:server_system_r2000wt_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_r2208wt2ys:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_r2208wt2ysr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_r2208wttyc1:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_r2208wttyc1r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_r2208wttys:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_r2208wttysr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_r2224wttys:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_r2224wttysr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_r2308wttys:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_r2308wttysr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_r2312wttys:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_r2312wttysr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:server_board_s2600cw:*:*:*:*:*:*:*:*",
"cpe:2.3:a:intel:server_board_s2600cw2:-:*:*:*:*:*:*:*",
"cpe:2.3:a:intel:server_board_s2600cw2r:-:*:*:*:*:*:*:*",
"cpe:2.3:a:intel:server_board_s2600cw2s:-:*:*:*:*:*:*:*",
"cpe:2.3:a:intel:server_board_s2600cw2sr:-:*:*:*:*:*:*:*",
"cpe:2.3:a:intel:server_board_s2600cwt:-:*:*:*:*:*:*:*",
"cpe:2.3:a:intel:server_board_s2600cwtr:-:*:*:*:*:*:*:*",
"cpe:2.3:a:intel:server_board_s2600cwts:-:*:*:*:*:*:*:*",
"cpe:2.3:a:intel:server_board_s2600cwtsr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:compute_module_hns2600kp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:compute_module_hns2600kp:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:compute_module_hns2600kpf:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:compute_module_hns2600kpfr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:compute_module_hns2600kpr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:server_board_s2600kp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_board_s2600kp:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_board_s2600kpf:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_board_s2600kpfr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_board_s2600kpr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_board_s2600kptr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:compute_module_hns2600tp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:compute_module_hns2600tp:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:compute_module_hns2600tp24r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:compute_module_hns2600tp24sr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:compute_module_hns2600tpf:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:compute_module_hns2600tpfr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:compute_module_hns2600tpr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:compute_module_s2600tp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_board_s2600tp:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_board_s2600tpf:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_board_s2600tpfr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_board_s2600tpr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:server_board_s1200sp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_board_s1200spl:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_board_s1200splr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_board_s1200spo:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_board_s1200spor:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_board_s1200sps:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_board_s1200spsr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:server_system_lr1304sp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_lr1304spcfg1:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_lr1304spcfg1r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_lr1304spcfsgx1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:server_system_lsvrp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_lsvrp4304es6xx1:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_lsvrp4304es6xxr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:server_system_r1000sp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_r1208sposhor:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_r1208sposhorr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_r1304sposhbn:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_r1304sposhbnr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_r1304sposhor:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_r1304sposhorr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:server_board_s2600wf_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_board_s2600wf0:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_board_s2600wf0r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_board_s2600wfq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_board_s2600wfqr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_board_s2600wft:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_board_s2600wftr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:server_system_r1000wf_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_lnetcnt3y:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_mcb2208wfaf4:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_mcb2208wfaf5:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_mcb2208wfaf6:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_mcb2208wfhy2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_nb2208wfqnfvi:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_r1208wfqysr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_r1208wftys:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_r1208wftysr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_r1304wf0ys:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_r1304wf0ysr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_r1304wftys:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_r1304wftysr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:server_system_r2000wf_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_r2208wf0zs:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_r2208wf0zsr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_r2208wfqzs:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_r2208wfqzsr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_r2208wftzs:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_r2208wftzsr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_r2224wfqzs:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_r2224wftzs:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_r2224wftzsr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_r2308wftzs:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_r2308wftzsr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_r2312wf0np:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_r2312wf0npr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_r2312wfqzs:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_r2312wftzs:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_r2312wftzsr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_vrn2208waf6:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_vrn2208wfaf81:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_vrn2208wfaf82:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_vrn2208wfaf83:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_vrn2208wfhy6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:server_board_s2600st_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_board_s2600stb:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_board_s2600stbr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_board_s2600stq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_board_s2600stqr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:compute_module_hns2600bp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:compute_module_hns2600bpb:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:compute_module_hns2600bpb24:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:compute_module_hns2600bpb24r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:compute_module_hns2600bpblc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:compute_module_hns2600bpblc24:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:compute_module_hns2600bpblc24r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:compute_module_hns2600bpblcr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:compute_module_hns2600bpbr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:compute_module_hns2600bpq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:compute_module_hns2600bpq24:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:compute_module_hns2600bpq24r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:compute_module_hns2600bpqr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:compute_module_hns2600bps:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:compute_module_hns2600bps24:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:compute_module_hns2600bps24r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:compute_module_hns2600bpsr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:server_board_s2600bp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_board_s2600bpb:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_board_s2600bpbr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_board_s2600bpq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_board_s2600bpqr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_board_s2600bps:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_board_s2600bpsr:-:*:*:*:*:*:*:*"
] |
|
CVE-2025-6612
|
code-projects Inventory Management System removeCategories.php sql injection
|
A vulnerability was found in code-projects Inventory Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /php_action/removeCategories.php. The manipulation of the argument categoriesId leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
|
[] |
GHSA-8cwc-4974-xcpq
|
Unspecified vulnerability in the PeopleSoft Enterprise HRMS component in Oracle PeopleSoft Products 8.9 allows remote authenticated users to affect confidentiality and integrity via unknown vectors related to eProfile.
|
[] |
|
GHSA-xm6h-r8xh-f9jf
|
Jiangnan Online Judge (aka jnoj) 0.8.0 has XSS via the Problem[sample_input] parameter to web/admin/problem/create or web/polygon/problem/update.
|
[] |
|
CVE-2025-23367
|
Org.wildfly.core:wildfly-server: wildfly improper rbac permission
|
A flaw was found in the Wildfly Server Role Based Access Control (RBAC) provider. When authorization to control management operations is secured using the Role Based Access Control provider, a user without the required privileges can suspend or resume the server. A user with a Monitor or Auditor role is supposed to have only read access permissions and should not be able to suspend the server.
The vulnerability is caused by the Suspend and Resume handlers not performing authorization checks to validate whether the current user has the required permissions to proceed with the action.
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7.4",
"cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el9",
"cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7",
"cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el8",
"cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8",
"cpe:/a:redhat:build_keycloak:",
"cpe:/a:redhat:jboss_data_grid:8",
"cpe:/a:redhat:jboss_fuse:7",
"cpe:/a:redhat:jboss_data_grid:7",
"cpe:/a:redhat:jbosseapxp",
"cpe:/a:redhat:jboss_enterprise_bpms_platform:7",
"cpe:/a:redhat:red_hat_single_sign_on:7"
] |
GHSA-8vqf-2mgv-72m8
|
MyBB (aka MyBulletinBoard) before 1.4.12 allows remote authenticated users to bypass intended restrictions on the number of [img] MyCodes by editing a post after it has been created.
|
[] |
|
CVE-2017-10986
|
An FR-GV-303 issue in FreeRADIUS 3.x before 3.0.15 allows "DHCP - Infinite read in dhcp_attr2vp()" and a denial of service.
|
[
"cpe:2.3:a:freeradius:freeradius:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:freeradius:freeradius:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:freeradius:freeradius:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:freeradius:freeradius:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:freeradius:freeradius:3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:freeradius:freeradius:3.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:freeradius:freeradius:3.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:freeradius:freeradius:3.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:freeradius:freeradius:3.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:freeradius:freeradius:3.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:freeradius:freeradius:3.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:freeradius:freeradius:3.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:freeradius:freeradius:3.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:freeradius:freeradius:3.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:freeradius:freeradius:3.0.14:*:*:*:*:*:*:*"
] |
|
CVE-2023-23595
|
BlueCat Device Registration Portal 2.2 allows XXE attacks that exfiltrate single-line files. A single-line file might contain credentials, such as "machine example.com login daniel password qwerty" in the documentation example for the .netrc file format. NOTE: 2.x versions are no longer supported. There is no available information about whether any later version is affected.
|
[
"cpe:2.3:a:bluecatnetworks:device_registration_portal:2.2:*:*:*:*:*:*:*"
] |
|
GHSA-6rqj-rwr9-wwm7
|
Several web pages provided SAP NetWeaver Process Integration (versions: SAP_XIESR: 7.10 to 7.11, 7.20, 7.30, 7.31, 7.40, 7.50 and SAP_XITOOL: 7.10 to 7.11, 7.30, 7.31, 7.40, 7.50) are not password protected. An attacker could access landscape information like host names, ports or other technical data in the absence of restrictive firewall and port settings.
|
[] |
|
CVE-2025-4030
|
PHPGurukul COVID19 Testing Management System search-report-result.php sql injection
|
A vulnerability was found in PHPGurukul COVID19 Testing Management System 1.0. It has been classified as critical. This affects an unknown part of the file /search-report-result.php. The manipulation of the argument serachdata leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
|
[] |
GHSA-95qr-67rx-9pgh
|
Umbraco CMS vulnerable to stored XSS
|
A stored XSS vulnerability exists in Umbraco CMS <= 8.9.1 or current. An authenticated user can inject arbitrary JavaScript code into iframes when editing content using the TinyMCE rich-text editor, as TinyMCE is configured to allow iframes by default in Umbraco CMS.
|
[] |
CVE-2020-28957
|
Multiple cross-site scripting (XSS) vulnerabilities in the Customer Add module of Foxlor v0.10.16 allows attackers to execute arbitrary web scripts or HTML via a crafted payload entered into the name, firstname, or username input fields.
|
[
"cpe:2.3:a:froxlor:froxlor:0.10.16:*:*:*:*:debian:*:*",
"cpe:2.3:a:froxlor:froxlor:0.10.16:*:*:*:*:gentoo:*:*",
"cpe:2.3:a:froxlor:froxlor:0.10.16:*:*:*:*:ubuntu:*:*"
] |
|
GHSA-qqm4-x6m2-p2v9
|
In certain scenarios in Tenable.sc prior to 5.17.0, a scanner could potentially be used outside the user's defined scan zone without a particular zone being specified within the Automatic Distribution configuration.
|
[] |
|
GHSA-h78h-f6r8-7qx8
|
The Jetpack CRM WordPress plugin before 5.4.3 does not sanitise and escape its settings, allowing high privilege users such as admin to perform cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.
|
[] |
|
CVE-2023-50822
|
WordPress Currency Converter Widget Plugin <= 3.0.2 is vulnerable to Cross Site Scripting (XSS)
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Currency.Wiki Currency Converter Widget – Exchange Rates allows Stored XSS.This issue affects Currency Converter Widget – Exchange Rates: from n/a through 3.0.2.
|
[
"cpe:2.3:a:currencywiki:currency_converter_widget_-_exchange_rates:*:*:*:*:*:wordpress:*:*"
] |
GHSA-4v8x-9h4c-j4jc
|
The NBA Game Time 2013-2014 (aka com.nbadigital.gametimelite) application 4.11 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
|
[] |
|
GHSA-7rx9-h3cp-pvq7
|
Duktape is an 3rd-party embeddable JavaScript engine, with a focus on portability and compact footprint. When adding too many values in valstack JavaScript will crash. This issue occurs due to bug in Duktape 2.6 which is an 3rd-party solution that we use.
|
[] |
|
CVE-2022-39066
|
There is a SQL injection vulnerability in ZTE MF286R. Due to insufficient validation of the input parameters of the phonebook interface, an authenticated attacker could use the vulnerability to execute arbitrary SQL injection.
|
[
"cpe:2.3:o:zte:mf286r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zte:mf286r:-:*:*:*:*:*:*:*"
] |
|
GHSA-j8g5-pp5p-x858
|
Multiple cross-site scripting (XSS) vulnerabilities in DwZone Shopping Cart 1.1.9 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) ToCategory and (2) FromCategory parameters to (a) ProductDetailsForm.asp and (3) UserName and (4) Password parameters to (b) LogIn/VerifyUserLog.asp.
|
[] |
|
CVE-2021-2300
|
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 8.0.23 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
|
[
"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*",
"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*"
] |
|
GHSA-5h7h-63px-44w7
|
An issue has been found in function EmbedStream::getChar in PDF2JSON 0.70 that allows attackers to cause a Denial of Service due to a null pointer derefenrece (invalid read of size 8) .
|
[] |
|
CVE-2013-0961
|
WebKit in Apple Safari before 6.0.3 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, a different vulnerability than CVE-2013-0960.
|
[
"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0.0b1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0.0b2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0.3:85.8:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0.3:85.8.1:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.3.2:312.5:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.3.2:312.6:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.3:417.8:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.3:417.9:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.3:417.9.2:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.3:417.9.3:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.0b:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.1:beta:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.1b:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.2b:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.3b:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.4b:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.1.0b:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:4.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:4.0.0b:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:4.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:4.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:5.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:5.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:5.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:5.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:5.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:5.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:5.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:5.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:5.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.7.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.8.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.7.5:*:*:*:*:*:*:*"
] |
|
GHSA-r2hp-2frf-2gvx
|
Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 18 of 46).
|
[] |
|
CVE-2021-40465
|
Windows Text Shaping Remote Code Execution Vulnerability
|
Windows Text Shaping Remote Code Execution Vulnerability
|
[
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_7:sp1:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_7:sp1:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2008:sp2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:sp2:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2237:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2237:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2237:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2237:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1854:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1854:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.18363.1854:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1288:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1288:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1288:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.288:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.19041.1288:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2004:10.0.19041.1288:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_20h2:10.0.19042.1288:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_20h2:10.0.19042.1288:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_20h2:10.0.19042.1288:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_21h2:10.0.22000.258:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_11_21h2:10.0.22000.258:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19086:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19086:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.4704:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.4704:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.4704:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:6.1.7601.25740:sp1:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_7:6.1.7601.25740:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20144:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20144:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:6.3.9600.20144:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21251:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21251:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_server_2008_r2:6.1.7601.25740:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23490:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012_r2:6.3.9600.20144:*:*:*:*:*:x64:*"
] |
GHSA-q8m7-wvp9-24h5
|
Cross Site Scripting (XSS) vulnerabilty in IPFire 2.23 via the IPfire web UI in the mail.cgi.
|
[] |
|
CVE-2019-8575
|
The issue was addressed with improved data deletion. This issue is fixed in AirPort Base Station Firmware Update 7.8.1, AirPort Base Station Firmware Update 7.9.1. A base station factory reset may not delete all user information.
|
[
"cpe:2.3:o:apple:airport_base_station_firmware:*:*:*:*:*:*:*:*"
] |
|
CVE-2013-5313
|
Cross-site request forgery (CSRF) vulnerability in core/admin/modules/users/update.php in BigTree CMS 4.0 RC2 and earlier allows remote attackers to hijack the authentication of administrators for requests that modify arbitrary user accounts via an edit user action.
|
[
"cpe:2.3:a:bigtreecms:bigtree_cms:*:rc2:*:*:*:*:*:*",
"cpe:2.3:a:bigtreecms:bigtree_cms:4.0:b1:*:*:*:*:*:*",
"cpe:2.3:a:bigtreecms:bigtree_cms:4.0:b2:*:*:*:*:*:*",
"cpe:2.3:a:bigtreecms:bigtree_cms:4.0:b3:*:*:*:*:*:*",
"cpe:2.3:a:bigtreecms:bigtree_cms:4.0:b4:*:*:*:*:*:*",
"cpe:2.3:a:bigtreecms:bigtree_cms:4.0:b5:*:*:*:*:*:*",
"cpe:2.3:a:bigtreecms:bigtree_cms:4.0:b6:*:*:*:*:*:*",
"cpe:2.3:a:bigtreecms:bigtree_cms:4.0:b7:*:*:*:*:*:*",
"cpe:2.3:a:bigtreecms:bigtree_cms:4.0:rc1:*:*:*:*:*:*"
] |
|
CVE-2014-5774
|
The Web Browser & Explorer (aka internetexplorer.browser.webexplorer) application 4 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
|
[
"cpe:2.3:a:web_browser_\\&_explorer_project:web_browser_\\&_explorer:4.0:*:*:*:*:android:*:*"
] |
|
GHSA-j6g5-q83j-9gxv
|
Certain NETGEAR devices are affected by denial of service. This affects M4300-28G before 12.0.2.15, M4300-52G before 12.0.2.15, M4300-28G-POE+ before 12.0.2.15, M4300-52G-POE+ before 12.0.2.15, M4300-8X8F before 12.0.2.15, M4300-12X12F before 12.0.2.15, M4300-24X24F before 12.0.2.15, M4300-24X before 12.0.2.15, M4300-48X before 12.0.2.15, and M4200 before 12.0.2.15.
|
[] |
|
GHSA-gq64-xh72-gm28
|
A privilege escalation vulnerability in the McAfee Agent prior to 5.7.5. McAfee Agent uses openssl.cnf during the build process to specify the OPENSSLDIR variable as a subdirectory within the installation directory. A low privilege user could have created subdirectories and executed arbitrary code with SYSTEM privileges by creating the appropriate pathway to the specifically created malicious openssl.cnf file.
|
[] |
|
GHSA-jpxv-3x5m-xq4r
|
An issue was discovered in Siren Investigate before 12.1.7. Script variable whitelisting is insufficiently sandboxed.
|
[] |
|
CVE-2011-2949
|
Heap-based buffer overflow in RealNetworks RealPlayer 11.0 through 11.1 and 14.0.0 through 14.0.5, RealPlayer SP 1.0 through 1.1.5, and RealPlayer Enterprise 2.0 through 2.1.5 allows remote attackers to execute arbitrary code via crafted ID3v2 tags in an MP3 file.
|
[
"cpe:2.3:a:realnetworks:realplayer:11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:11.1:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:14.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:14.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:14.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:14.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:14.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:14.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer_sp:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer_sp:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer_sp:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer_sp:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer_sp:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer_sp:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer_sp:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer_sp:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer_sp:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer_sp:1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:2.0:*:enterprise:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:2.1.2:*:enterprise:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:2.1.3:*:enterprise:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:2.1.4:*:enterprise:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:2.1.5:*:enterprise:*:*:*:*:*"
] |
|
GHSA-jvpm-vq39-pfjh
|
Algo Communication Products Ltd. 8373 IP Zone Paging Adapter Firmware 1.7.6 allows attackers to perform a directory traversal via a web request sent to /fm-data.lua.
|
[] |
|
CVE-2017-9873
|
IrfanView version 4.44 (32bit) with FPX Plugin 4.46 allows attackers to execute arbitrary code or cause a denial of service via a crafted .fpx file, related to a "Read Access Violation on Control Flow starting at FPX!GetPlugInInfo+0x0000000000012bf2."
|
[
"cpe:2.3:a:irfanview:irfanview:4.44:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:fpx:4.46:*:*:*:*:*:*:*"
] |
|
CVE-2024-31325
|
In multiple locations, there is a possible way to reveal images across users data due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
|
[
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0l:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*"
] |
|
GHSA-28f3-rf96-2vvg
|
Job Portal v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'txtPass' parameter of the login.php resource does not validate the characters received and they are sent unfiltered to the database.
|
[] |
|
GHSA-x4fw-2374-xpjm
|
The OpenType Font (OTF) driver in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, Windows Server 2012, and Windows RT allows remote attackers to execute arbitrary code via a crafted OpenType font file, aka "OpenType Font Parsing Vulnerability."
|
[] |
|
CVE-2025-3631
|
IBM MQ denial of service
|
An IBM MQ 9.3 and 9.4 Client connecting to an MQ Queue Manager can cause a SIGSEGV in the AMQRMPPA channel process terminating it.
|
[
"cpe:2.3:a:ibm:mq:9.3.2.0:*:*:*:continuous_delivery:*:*:*",
"cpe:2.3:a:ibm:mq:9.3.5.1:*:*:*:continuous_delivery:*:*:*",
"cpe:2.3:a:ibm:mq:9.4.0.0:*:*:*:continuous_delivery:*:*:*",
"cpe:2.3:a:ibm:mq:9.4.2.1:*:*:*:continuous_delivery:*:*:*",
"cpe:2.3:a:ibm:mq:9.4.0.0:*:*:*:lts:*:*:*",
"cpe:2.3:a:ibm:mq:9.4.0.11:*:*:*:lts:*:*:*",
"cpe:2.3:a:ibm:mq_appliance:9.3.2.0:*:*:*:continuous_delivery:*:*:*",
"cpe:2.3:a:ibm:mq_appliance:9.3.5.2:*:*:*:continuous_delivery:*:*:*",
"cpe:2.3:a:ibm:mq_appliance:9.4.0.0:*:*:*:lts:*:*:*",
"cpe:2.3:a:ibm:mq_appliance:9.4.0.11:*:*:*:lts:*:*:*",
"cpe:2.3:a:ibm:mq_appliance:9.4.1.0:*:*:*:continuous_delivery:*:*:*",
"cpe:2.3:a:ibm:mq_appliance:9.4.2.1:*:*:*:continuous_delivery:*:*:*"
] |
CVE-2004-0638
|
Buffer overflow in the KSDWRTB function in the dbms_system package (dbms_system.ksdwrt) for Oracle 9i Database Server Release 2 9.2.0.3 and 9.2.0.4, 9i Release 1 9.0.1.4 and 9.0.1.5, and 8i Release 1 8.1.7.4, allows remote authorized users to execute arbitrary code via a long second argument.
|
[
"cpe:2.3:a:oracle:oracle8i:enterprise_8.1.7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:oracle8i:standard_8.1.7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:oracle9i:enterprise_9.0.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:oracle9i:enterprise_9.0.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:oracle9i:enterprise_9.2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:oracle9i:enterprise_9.2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:oracle9i:personal_9.0.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:oracle9i:personal_9.0.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:oracle9i:personal_9.2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:oracle9i:personal_9.2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:oracle9i:standard_9.0.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:oracle9i:standard_9.0.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:oracle9i:standard_9.2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:oracle9i:standard_9.2.0.4:*:*:*:*:*:*:*"
] |
|
CVE-2005-1973
|
Java Web Start in Java 2 Platform Standard Edition (J2SE) 5.0 and 5.0 Update 1 allows applications to assign permissions to themselves and gain privileges.
|
[
"cpe:2.3:a:sun:j2se:5.0:*:sdk:*:*:*:*:*",
"cpe:2.3:a:sun:j2se:5.0_update1:*:sdk:*:*:*:*:*"
] |
|
CVE-2021-3733
|
There's a flaw in urllib's AbstractBasicAuthHandler class. An attacker who controls a malicious HTTP server that an HTTP client (such as web browser) connects to, could trigger a Regular Expression Denial of Service (ReDOS) during an authentication request with a specially crafted payload that is sent by the server to the client. The greatest threat that this flaw poses is to application availability.
|
[
"cpe:2.3:a:python:python:*:*:*:*:*:*:*:*",
"cpe:2.3:a:python:python:3.10.0:-:*:*:*:*:*:*",
"cpe:2.3:a:redhat:codeready_linux_builder:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:codeready_linux_builder_for_ibm_z_systems:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:codeready_linux_builder_for_power_little_endian:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.4:*:*:*:*:*:*:*",
"cpe:2.3:a:fedoraproject:extra_packages_for_enterprise_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:management_services_for_element_software_and_netapp_hci:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:solidfire\\,_enterprise_sds_\\&_hci_storage_node:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:hci_compute_node_firmware:-:*:*:*:*:*:*:*"
] |
|
GHSA-6pg5-wf6r-xvh8
|
In the Linux kernel, the following vulnerability has been resolved:arcnet: Add NULL check in com20020pci_probe()devm_kasprintf() returns NULL when memory allocation fails. Currently,
com20020pci_probe() does not check for this case, which results in a
NULL pointer dereference.Add NULL check after devm_kasprintf() to prevent this issue and ensure
no resources are left allocated.
|
[] |
|
CVE-2025-37099
|
A remote code execution vulnerability exists in HPE Insight Remote Support (IRS) prior to v7.15.0.646.
|
[] |
|
CVE-2006-4977
|
Multiple unrestricted file upload vulnerabilities in (1) back/upload_img.php and (2) admin/upload_img.php in Walter Beschmout PhpQuiz 1.2 and earlier allow remote attackers to upload arbitrary PHP code to the phpquiz/img_quiz folder via the (a) upload, (b) ok_update, (c) image, and (d) path parameters, possibly requiring directory traversal sequences in the path parameter.
|
[
"cpe:2.3:a:walter_beschmout:phpquiz:*:*:*:*:*:*:*:*"
] |
|
CVE-2019-25035
|
Unbound before 1.9.5 allows an out-of-bounds write in sldns_bget_token_par. NOTE: The vendor disputes that this is a vulnerability. Although the code may be vulnerable, a running Unbound installation cannot be remotely or locally exploited
|
[
"cpe:2.3:a:nlnetlabs:unbound:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] |
|
CVE-2013-4435
|
Salt (aka SaltStack) 0.15.0 through 0.17.0 allows remote authenticated users who are using external authentication or client ACL to execute restricted routines by embedding the routine in another routine.
|
[
"cpe:2.3:a:saltstack:salt:0.15.0:*:*:*:*:*:*:*",
"cpe:2.3:a:saltstack:salt:0.15.1:*:*:*:*:*:*:*",
"cpe:2.3:a:saltstack:salt:0.16.0:*:*:*:*:*:*:*",
"cpe:2.3:a:saltstack:salt:0.16.2:*:*:*:*:*:*:*",
"cpe:2.3:a:saltstack:salt:0.16.3:*:*:*:*:*:*:*",
"cpe:2.3:a:saltstack:salt:0.16.4:*:*:*:*:*:*:*",
"cpe:2.3:a:saltstack:salt:0.17.0:*:*:*:*:*:*:*"
] |
|
CVE-2018-14838
|
rejucms 2.1 has stored XSS via the admin/book.php content parameter.
|
[
"cpe:2.3:a:rejucms_project:rejucms:2.1:*:*:*:*:*:*:*"
] |
|
CVE-2015-0989
|
PACTware 4.1 SP3 allows remote attackers to cause a denial of service (application crash) via a crafted file that triggers an internal error.
|
[
"cpe:2.3:a:icsgmbh:pactware:4.1:sp3:*:*:*:*:*:*"
] |
|
CVE-2024-43306
|
WordPress WP-Lister Lite for eBay plugin <= 3.6.0 - Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in WP-Lister Lite for eBay allows Reflected XSS.This issue affects WP-Lister Lite for eBay: from n/a through 3.6.0.
|
[] |
CVE-2021-0283
|
Junos OS: Upon receipt of specific sequences of genuine packets destined to the device the kernel will crash and restart (vmcore)
|
A buffer overflow vulnerability in the TCP/IP stack of Juniper Networks Junos OS allows an attacker to send specific sequences of packets to the device thereby causing a Denial of Service (DoS). By repeatedly sending these sequences of packets to the device, an attacker can sustain the Denial of Service (DoS) condition. The device will abnormally shut down as a result of these sent packets. A potential indicator of compromise will be the following message in the log files: "eventd[13955]: SYSTEM_ABNORMAL_SHUTDOWN: System abnormally shut down" These issue are only triggered by traffic destined to the device. Transit traffic will not trigger these issues. This issue affects: Juniper Networks Junos OS 12.3 versions prior to 12.3R12-S19; 15.1 versions prior to 15.1R7-S10; 16.1 version 16.1R1 and later versions; 16.2 version 16.2R1 and later versions; 17.1 version 17.1R1 and later versions; 17.2 version 17.2R1 and later versions; 17.3 versions prior to 17.3R3-S12; 17.4 version 17.4R1 and later versions; 18.1 versions prior to 18.1R3-S13; 18.2 version 18.2R1 and later versions; 18.3 versions prior to 18.3R3-S5; 18.4 versions prior to 18.4R2-S9, 18.4R3-S9; 19.1 versions prior to 19.1R3-S6; 19.2 versions prior to 19.2R1-S7, 19.2R3-S3; 19.3 versions prior to 19.3R2-S7, 19.3R3-S3; 19.4 versions prior to 19.4R3-S5; 20.1 versions prior to 20.1R2-S2, 20.1R3-S1; 20.2 versions prior to 20.2R3-S2; 20.3 versions prior to 20.3R3; 20.4 versions prior to 20.4R2-S1, 20.4R3; 21.1 versions prior to 21.1R1-S1, 21.1R2; 21.2 versions prior to 21.2R1-S1, 21.2R2.
|
[
"cpe:2.3:o:juniper:junos:12.3:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3:r10:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3:r10-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3:r10-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3:r11:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3:r12:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3:r12-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3:r12-s10:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3:r12-s11:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3:r12-s12:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3:r12-s13:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3:r12-s14:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3:r12-s15:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3:r12-s16:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3:r12-s17:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3:r12-s18:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3:r12-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3:r12-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3:r12-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3:r12-s8:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:a1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f2-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f2-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f5-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f6-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f6-s10:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f6-s12:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f6-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f6-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f6-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f6-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f6-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f6-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f6-s8:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f6-s9:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r4-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r4-s8:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r4-s9:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r5-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r5-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r5-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r5-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r6-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r6-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r6-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r6-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r6-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r7-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r7-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r7-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r7-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r7-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r7-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r7-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r7-s8:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r3-s10:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r3-s11:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r3-s8:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r4-s12:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r4-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r4-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r4-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r4-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r4-s8:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r4-s9:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r5-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r6-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r6-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r6-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r6-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r7-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r7-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r7-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r7-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r7-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r7-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r7-s8:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.2:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.2:r1-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.2:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.2:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.2:r2-s10:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.2:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.2:r2-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.2:r2-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.2:r2-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.2:r2-s8:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.2:r2-s9:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.2:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.1:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.1:r1-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.1:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.1:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.1:r2-s10:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.1:r2-s11:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.1:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.1:r2-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.1:r2-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.1:r2-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.1:r2-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.1:r2-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.1:r2-s8:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.1:r2-s9:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.1:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.1:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.1:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.1:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.2:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.2:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.2:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.2:r1-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.2:r1-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.2:r1-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.2:r1-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.2:r1-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.2:r1-s8:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.2:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.2:r2-s11:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.2:r2-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.2:r2-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.2:r2-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.2:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.2:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.2:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.2:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.2:r3-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r1-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r2-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r2-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r2-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r3:-:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r3-s10:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r3-s11:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r3-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r3-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r3-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r3-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r3-s8:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r3-s9:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r2-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r3-s10:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r3-s11:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r3-s12:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r3-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r3-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r3-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r3-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r3-s8:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r3-s9:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r1:-:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r1-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r1-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r1-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r2-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r2-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r2-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r2-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r2-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r3-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r3-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r3-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r3-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r1-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r1-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r1-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r1-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r2-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r2-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r3-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r1-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r1-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r1-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r1-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r1-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r2-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r2-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r2-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r2-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r2-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r3-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r3-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r3-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r3-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r3-s8:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r1-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r1-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r1-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r1-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r3-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r3-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r1-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r1-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r1-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r1-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r2-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r2-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r2-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r2-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r1-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r1-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r2-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r3-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r1-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r1-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r1-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r2-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.3:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.3:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.3:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.1:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*"
] |
CVE-2018-8139
|
A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge, aka "Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-0945, CVE-2018-0946, CVE-2018-0951, CVE-2018-0953, CVE-2018-0954, CVE-2018-0955, CVE-2018-1022, CVE-2018-8114, CVE-2018-8122, CVE-2018-8128, CVE-2018-8137.
|
[
"cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:chakracore:*:*:*:*:*:*:*:*"
] |
|
CVE-2024-37382
|
An issue discovered in import host feature in Ab Initio Metadata Hub and Authorization Gateway before 4.3.1.1 allows attackers to run arbitrary code via crafted modification of server configuration.
|
[
"cpe:2.3:a:abinitio:metadata_hub:*:*:*:*:*:*:*:*",
"cpe:2.3:a:abinitio:metadata_hub:4.1.5.10:*:*:*:*:*:*:*",
"cpe:2.3:a:abinitio:metadata_hub:4.1.6.11:*:*:*:*:*:*:*",
"cpe:2.3:a:abinitio:metadata_hub:4.2.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:abinitio:metadata_hub:4.2.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:abinitio:metadata_hub:4.2.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:abinitio:metadata_hub:4.3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:abinitio:authorization_gateway:*:*:*:*:*:*:*:*",
"cpe:2.3:a:abinitio:authorization_gateway:4.1.5.10:*:*:*:*:*:*:*",
"cpe:2.3:a:abinitio:authorization_gateway:4.1.6.11:*:*:*:*:*:*:*",
"cpe:2.3:a:abinitio:authorization_gateway:4.2.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:abinitio:authorization_gateway:4.2.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:abinitio:authorization_gateway:4.2.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:abinitio:authorization_gateway:4.3.1.0:*:*:*:*:*:*:*"
] |
|
CVE-2024-54523
|
The issue was addressed with improved bounds checks. This issue is fixed in macOS Sequoia 15.2, watchOS 11.2, tvOS 18.2, iOS 18.2 and iPadOS 18.2. An app may be able to corrupt coprocessor memory.
|
[] |
|
CVE-2006-6451
|
Multiple cross-site scripting (XSS) vulnerabilities in SWsoft Plesk 8.0.1 and earlier allow remote attackers to inject arbitrary web script or HTML via unspecified parameters to (1) get_password.php or (2) login_up.php3.
|
[
"cpe:2.3:a:swsoft:plesk:*:*:*:*:*:*:*:*",
"cpe:2.3:a:swsoft:plesk:7.5:*:*:*:*:*:*:*"
] |
|
CVE-2021-33580
|
regex injection leading to DoS
|
User controlled `request.getHeader("Referer")`, `request.getRequestURL()` and `request.getQueryString()` are used to build and run a regex expression. The attacker doesn't have to use a browser and may send a specially crafted Referer header programmatically. Since the attacker controls the string and the regex pattern he may cause a ReDoS by regex catastrophic backtracking on the server side. This problem has been fixed in Roller 6.0.2.
|
[
"cpe:2.3:a:apache:roller:*:*:*:*:*:*:*:*"
] |
CVE-2005-3897
|
Apple Safari 2.0.2 allows remote attackers to cause a denial of service (system slowdown) via a Javascript BODY onload event that calls the window function.
|
[
"cpe:2.3:a:apple:safari:2.0.2:*:*:*:*:*:*:*"
] |
|
GHSA-5q32-m2cg-3vh8
|
PHP, when not configured with the "display_errors = Off" setting in php.ini, allows remote attackers to obtain the physical path for an include file via a trailing slash in a request to a directly accessible PHP program, which modifies the base path, causes the include directive to fail, and produces an error message that contains the path.
|
[] |
|
GHSA-284r-cvrc-f2f2
|
Buffer overflow in the SQLVDIRLib.SQLVDirControl ActiveX control in Tools\Binn\sqlvdir.dll in Microsoft SQL Server 2000 (aka SQL Server 8.0) allows remote attackers to cause a denial of service (browser crash) or possibly execute arbitrary code via a long URL in the second argument to the Connect method. NOTE: this issue is not a vulnerability in many environments, since the control is not marked as safe for scripting and would not execute with default Internet Explorer settings.
|
[] |
|
GHSA-2v2f-rp8w-vrxh
|
In Apache OFBiz 16.11.01 to 16.11.04, the OFBiz HTTP engine (org.apache.ofbiz.service.engine.HttpEngine.java) handles requests for HTTP services via the /webtools/control/httpService endpoint. Both POST and GET requests to the httpService endpoint may contain three parameters: serviceName, serviceMode, and serviceContext. The exploitation occurs by having DOCTYPEs pointing to external references that trigger a payload that returns secret information from the host.
|
[] |
|
GHSA-47gc-w76h-c45c
|
UsualToolCMS 8.0 allows CSRF for adding a user account via the cmsadmin/a_adminx.php?x=a URI.
|
[] |
|
CVE-2007-2647
|
Static code injection vulnerability in admin/admin_configuration.php in Monalbum 0.8.7 allows remote authenticated users to inject arbitrary PHP code into the conf/config.inc.php file via the (1) gadm_pass, (2) gadm_user, (3) gcfgHote, (4) gcfgPass, (5) gcfgUser, (6) gclassement_rep, (7) gcontour, (8) gfond, (9) ggd_version, (10) ghome, (11) ghor, (12) gimg_copyright, (13) glangage, (14) gmenu_visible, (15) gmini_hasard, (16) gordre_rep, (17) gpage, (18) gracine, (19) grech_inactive, (20) grep_mini, (21) grepertoire, (22) gsite, (23) gslide, (24) gtitre, (25) guse_copyright, (26) gversion, (27) gvert, or (28) gcfgBase parameter.
|
[
"cpe:2.3:a:monalbum:monalbum:0.8.7:*:*:*:*:*:*:*"
] |
|
GHSA-5jx5-8xhw-92v9
|
A memory initialization issue was addressed with improved memory handling. This issue affected versions prior to iOS 12.1, macOS Mojave 10.14.1, tvOS 12.1, watchOS 5.1.
|
[] |
|
GHSA-q6h9-8v42-99g3
|
An input validation vulnerability in CA Privileged Access Manager 2.x allows remote attackers to poison log files with specially crafted input.
|
[] |
|
GHSA-7x7c-p9w7-j58x
|
Use after free in Windows SSDP Service allows an authorized attacker to elevate privileges locally.
|
[] |
|
GHSA-fvxr-2gvx-7v48
|
IBM Security Guardium 10.x through 10.1 before p100 allows remote authenticated users to obtain sensitive information by reading an Application Error message.
|
[] |
|
GHSA-xj6j-6m68-mr7h
|
Libde265 v1.0.11 was discovered to contain a segmentation violation via the function decoder_context::process_slice_segment_header at decctx.cc.
|
[] |
|
CVE-2023-33673
|
Tenda AC8V4.0-V16.03.34.06 was discovered to contain a stack overflow via the firewallEn parameter in the formSetFirewallCfg function.
|
[
"cpe:2.3:o:tenda:ac8_firmware:16.03.34.06:*:*:*:*:*:*:*",
"cpe:2.3:h:tenda:ac8:-:*:*:*:*:*:*:*"
] |
|
CVE-2025-48379
|
Pillow Vulnerable to Write Buffer Overflow on BCn encoding
|
Pillow is a Python imaging library. In versions 11.2.0 to before 11.3.0, there is a heap buffer overflow when writing a sufficiently large (>64k encoded with default settings) image in the DDS format due to writing into a buffer without checking for available space. This only affects users who save untrusted data as a compressed DDS image. This issue has been patched in version 11.3.0.
|
[] |
GHSA-xmr8-m3g7-8q7w
|
Cross-Site Request Forgery (CSRF) vulnerability in Kevin McCabe Kevin's allows Stored XSS.This issue affects Kevin's: from n/a through 2.0.0.
|
[] |
|
GHSA-mj2q-vj3c-h4fh
|
In all android releases(Android for MSM, Firefox OS for MSM, QRD Android) from CAF using the linux kernel, Null pointer dereference vulnerability may occur due to missing NULL assignment in NAT module of freed pointer.
|
[] |
|
CVE-2021-31960
|
Windows Bind Filter Driver Information Disclosure Vulnerability
|
Windows Bind Filter Driver Information Disclosure Vulnerability
|
[
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1052:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1052:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1052:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.19041.1052:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2004:10.0.19041.1052:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_20h2:10.0.19042.1052:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_20h2:10.0.19042.1052:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_20h2:10.0.19042.1052:*:*:*:*:*:*:*"
] |
CVE-2023-39939
|
SQL injection vulnerability in LuxCal Web Calendar prior to 5.2.3M (MySQL version) and LuxCal Web Calendar prior to 5.2.3L (SQLite version) allows a remote unauthenticated attacker to execute arbitrary queries against the database and obtain or alter the information in it.
|
[
"cpe:2.3:a:luxcal:web_calendar:*:*:*:*:*:*:*:*",
"cpe:2.3:a:luxsoft:luxcal_web_calendar:*:*:*:*:*:*:*:*"
] |
|
CVE-2016-10397
|
In PHP before 5.6.28 and 7.x before 7.0.13, incorrect handling of various URI components in the URL parser could be used by attackers to bypass hostname-specific URL checks, as demonstrated by evil.example.com:80#@good.example.com/ and evil.example.com:[email protected]/ inputs to the parse_url function (implemented in the php_url_parse_ex function in ext/standard/url.c).
|
[
"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:7.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:7.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:7.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:7.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:7.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:7.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:7.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:7.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:7.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:7.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:7.0.12:*:*:*:*:*:*:*"
] |
|
CVE-2021-3958
|
SQL Injection Vulnerability in Ipack SCADA Software
|
Improper Handling of Parameters vulnerability in Ipack Automation Systems Ipack SCADA Software allows : Blind SQL Injection.This issue affects Ipack SCADA Software: from unspecified before 1.1.0.
|
[
"cpe:2.3:a:ipack:scada_automation:*:*:*:*:*:*:*:*"
] |
GHSA-9g56-qqc5-7rw9
|
Use after free issue in editcap could cause denial of service via crafted capture file
|
[] |
|
CVE-2021-30875
|
A lock screen issue allowed access to contacts on a locked device. This issue was addressed with improved state management. This issue is fixed in iOS 15.1 and iPadOS 15.1. A local attacker may be able to view contacts from the lock screen.
|
[
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"
] |
|
CVE-2023-1459
|
SourceCodester Canteen Management System changeUsername.php sql injection
|
A vulnerability was found in SourceCodester Canteen Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file changeUsername.php. The manipulation of the argument username leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-223304.
|
[
"cpe:2.3:a:canteen_management_system_project:canteen_management_system:1.0:*:*:*:*:*:*:*"
] |
CVE-2023-24582
|
Two OS command injection vulnerabilities exist in the urvpn_client cmd_name_action functionality of Milesight UR32L v32.3.0.5. A specially crafted network request can lead to arbitrary command execution. An attacker can send a network request to trigger these vulnerabilities.This OS command injection is triggered through a TCP packet.
|
[
"cpe:2.3:h:milesight:ur32l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:milesight:ur32l_firmware:32.3.0.5:*:*:*:*:*:*:*"
] |
|
CVE-2005-1039
|
Race condition in Core Utilities (coreutils) 5.2.1, when (1) mkdir, (2) mknod, or (3) mkfifo is running with the -m switch, allows local users to modify permissions of other files.
|
[
"cpe:2.3:a:gnu:coreutils:5.2.1:*:*:*:*:*:*:*"
] |
|
CVE-2017-17123
|
The coff_slurp_reloc_table function in coffcode.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted COFF based file.
|
[
"cpe:2.3:a:gnu:binutils:2.29.1:*:*:*:*:*:*:*"
] |
|
CVE-2024-27817
|
The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.6.7, macOS Monterey 12.7.5, iOS 16.7.8 and iPadOS 16.7.8, tvOS 17.5, visionOS 1.2, iOS 17.5 and iPadOS 17.5, macOS Sonoma 14.5. An app may be able to execute arbitrary code with kernel privileges.
|
[
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:visionos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*"
] |
|
GHSA-v554-ffg4-x8gc
|
The SVGPlus plugin for WordPress is vulnerable to Stored Cross-Site Scripting via REST API SVG File uploads in all versions up to, and including, 1.1.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file.
|
[] |
|
GHSA-8pc7-rggg-xw6r
|
The ovirt-engine-provisiondb utility in Red Hat Enterprise Virtualization (RHEV) Engine 4.0 allows local users to obtain sensitive database provisioning information by reading log files.
|
[] |
|
CVE-2000-0892
|
Some telnet clients allow remote telnet servers to request environment variables from the client that may contain sensitive information, or remote web servers to obtain the information via a telnet: URL.
|
[
"cpe:2.3:a:u_win:u_win:*:*:*:*:*:*:*:*",
"cpe:2.3:o:caldera:openlinux:*:*:*:*:*:*:*:*"
] |
|
GHSA-c863-xvw8-47cg
|
An issue was discovered on the D-Link DWR-932B router. /var/miniupnpd.conf has no deny rules.
|
[] |
|
GHSA-jgmm-xwf9-46q6
|
Sensitive information exposure in onCharacteristicChanged in Charm by Samsung prior to version 1.2.3 allows attacker to get bluetooth connection information without permission.
|
[] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.