id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2022-4160 | Contest Gallery < 19.1.5 - Author+ SQL Injection | The Contest Gallery WordPress plugin before 19.1.5.1, Contest Gallery Pro WordPress plugin before 19.1.5.1 do not escape the cg_copy_id POST parameter before concatenating it to an SQL query in cg-copy-comments.php and cg-copy-rating.php. This may allow malicious users with at least author privilege to leak sensitive information from the site's database. | [
"cpe:2.3:a:contest-gallery:contest_gallery:*:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:contest-gallery:contest_gallery:*:*:*:*:pro:wordpress:*:*"
] | null | 6.5 | null | null |
GHSA-6hm2-c6p5-fc7q | A remote code execution vulnerability in the Android system ui. Product: Android. Versions: 7.1.1, 7.1.2. Android ID: A-35639138. | [] | null | null | 7.8 | null |
|
GHSA-mxf7-mjm7-qcvc | The d8s-timer for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. A potential code execution backdoor inserted by third parties is the democritus-dates package. The affected version of d8s-htm is 0.1.0. | [] | null | 8.8 | null | null |
|
CVE-2005-1720 | AFP Server for Mac OS X 10.4.1, when using an ACL enabled volume, does not properly remove an ACL when a file is copied to a directory that does not use ACLs, which will override the POSIX file permissions for that ACL. | [
"cpe:2.3:a:apple:afp_server:*:*:*:*:*:*:*:*"
] | null | null | null | 2.1 |
|
GHSA-9995-qvcg-x7g6 | Cross-site scripting (XSS) vulnerability in the Portlet Configuration module in Liferay Portal 7.1.0 through 7.3.2, and Liferay DXP 7.1 before fix pack 19, and 7.2 before fix pack 7, allows remote attackers to inject arbitrary web script or HTML via the _com_liferay_portlet_configuration_css_web_portlet_PortletConfigurationCSSPortlet_portletResource parameter. | [] | null | null | null | null |
|
ICSA-23-341-02 | Schweitzer Engineering Laboratories SEL-411L | An Improper Restriction of Rendered UI Layers or Frames in the Schweitzer Engineering Laboratories SEL-411L could allow an unauthenticated attacker to perform clickjacking based attacks against an authenticated and authorized user. | [] | null | 4.3 | null | null |
GHSA-mjfm-gr52-hwjg | A XSS vulnerability exist in Pandora FMS version 756 and below, that allows an attacker to perform javascript code executions via the module form name field. | [] | null | 6.1 | null | null |
|
CVE-2016-0407 | Unspecified vulnerability in the PeopleSoft Enterprise HCM component in Oracle PeopleSoft Products 9.1 and 9.2 allows remote authenticated users to affect confidentiality via vectors related to Fusion HR Talent Integration. | [
"cpe:2.3:a:oracle:peoplesoft_enterprise_human_capital_management_human_resources:9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:peoplesoft_enterprise_human_capital_management_human_resources:9.2:*:*:*:*:*:*:*"
] | null | null | 6.5 | 4 |
|
GHSA-pj2p-xpf5-qc8h | Navarino Infinity web interface up to version 2.2 exposes an unauthenticated script that is prone to blind sql injection. If successfully exploited the user can get info from the underlying postgresql database that could lead into to total compromise of the product. The said script is available with no authentication. | [] | null | null | 9.8 | null |
|
CVE-2020-20521 | Cross Site Scripting vulnerability found in KiteCMS v.1.1 allows a remote attacker to execute arbitrary code via the comment parameter. | [
"cpe:2.3:a:kitesky:kitecms:1.1.1:*:*:*:*:*:*:*"
] | null | 6.1 | null | null |
|
GHSA-5rxr-h5mf-7p7w | Google Chrome before 42.0.2311.90 does not properly consider the interaction of page navigation with the handling of touch events and gesture events, which allows remote attackers to trigger unintended UI actions via a crafted web site that conducts a "tapjacking" attack. | [] | null | null | null | null |
|
GHSA-8jj7-mqrc-fff9 | Buffer Overflow vulnerability in fmt_entry function in progs/dump_entry.c:1116 in ncurses 6.1 allows remote attackers to cause a denial of service via crafted command. | [] | null | 6.5 | null | null |
|
CVE-2002-0660 | Buffer overflow in libpng 1.0.12-3.woody.2 and libpng3 1.2.1-1.1.woody.2 on Debian GNU/Linux 3.0, and other operating systems, may allow attackers to cause a denial of service and possibly execute arbitrary code, a different vulnerability than CVE-2002-0728. | [
"cpe:2.3:a:greg_roelofs:libpng:1.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:greg_roelofs:libpng3:1.2.1:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-wjvf-c62h-746v | eGroupware before 1.8.006.20140217 allows remote attackers to conduct PHP object injection attacks, delete arbitrary files, and possibly execute arbitrary code via the (1) addr_fields or (2) trans parameter to addressbook/csv_import.php, (3) cal_fields or (4) trans parameter to calendar/csv_import.php, (5) info_fields or (6) trans parameter to csv_import.php in (a) projectmanager/ or (b) infolog/, or (7) processed parameter to preferences/inc/class.uiaclprefs.inc.php. | [] | null | null | null | null |
|
CVE-2023-41937 | Jenkins Bitbucket Push and Pull Request Plugin 2.4.0 through 2.8.3 (both inclusive) trusts values provided in the webhook payload, including certain URLs, and uses configured Bitbucket credentials to connect to those URLs, allowing attackers to capture Bitbucket credentials stored in Jenkins by sending a crafted webhook payload. | [
"cpe:2.3:a:jenkins:bitbucket_push_and_pull_request:*:*:*:*:*:jenkins:*:*"
] | null | 7.5 | null | null |
|
CVE-2020-9442 | OpenVPN Connect 3.1.0.361 on Windows has Insecure Permissions for %PROGRAMDATA%\OpenVPN Connect\drivers\tap\amd64\win10, which allows local users to gain privileges by copying a malicious drvstore.dll there. | [
"cpe:2.3:a:openvpn:connect:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | 7.2 |
|
CVE-2006-2205 | The audio_write function in NetBSD 3.0 allows local users to cause a denial of service (kernel crash) by using the audiosetinfo ioctl to change the sample rate of an audio device. | [
"cpe:2.3:o:netbsd:netbsd:3.0:*:*:*:*:*:*:*"
] | null | null | null | 2.1 |
|
GHSA-x56w-f8v2-mmj6 | Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution. | [] | null | null | null | null |
|
CVE-2010-1886 | Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 SP2 and R2, and Windows 7 allow local users to gain privileges by leveraging access to a process with NetworkService credentials, as demonstrated by TAPI Server, SQL Server, and IIS processes, and related to the Windows Service Isolation feature. NOTE: the vendor states that privilege escalation from NetworkService to LocalSystem does not cross a "security boundary." | [
"cpe:2.3:o:microsoft:windows_2003_server:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:*:sp2:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:-:sp2:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:*:x32:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:*:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:*:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:*:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp2:professional:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
GHSA-qp82-v7w8-wfwq | A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V2.0). Due to insufficient checking of user permissions, an attacker may access URLs that require special authorization. An attacker must have access to a low privileged account in order to exploit the vulnerability. | [] | null | 8.8 | null | null |
|
CVE-2012-2975 | Cross-site scripting (XSS) vulnerability in the traffic overview page on the F5 ASM appliance 10.0.0 through 11.2.0 HF2 allows remote attackers to inject arbitrary web script or HTML via crafted requests that are later listed on a summary page. | [
"cpe:2.3:h:f5:application_security_manager_appliance:10.0.0:*:*:*:*:*:*:*",
"cpe:2.3:h:f5:application_security_manager_appliance:11.2.0:hf2:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-75cc-hh4w-xh9h | A vulnerability in the SM-1T3/E3 firmware on Cisco Second Generation Integrated Services Routers (ISR G2) and the Cisco 4451-X Integrated Services Router (ISR4451-X) could allow an unauthenticated, remote attacker to cause the ISR G2 Router or the SM-1T3/E3 module on the ISR4451-X to reload, resulting in a denial of service (DoS) condition on an affected device. The vulnerability is due to improper handling of user input. An attacker could exploit this vulnerability by first connecting to the SM-1T3/E3 module console and entering a string sequence. A successful exploit could allow the attacker to cause the ISR G2 Router or the SM-1T3/E3 module on the ISR4451-X to reload, resulting in a DoS condition on an affected device. | [] | null | null | 8.6 | null |
|
CVE-2018-12361 | An integer overflow can occur in the SwizzleData code while calculating buffer sizes. The overflowed value is used for subsequent graphics computations when their inputs are not sanitized which results in a potentially exploitable crash. This vulnerability affects Thunderbird < 60, Firefox ESR < 60.1, and Firefox < 61. | [
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"
] | null | null | 8.8 | 6.8 |
|
GHSA-6vj8-jgwx-4v5m | A vulnerability has been identified in Tecnomatix Plant Simulation (All versions < V2201.0006). The affected application contains an out of bounds write past the end of an allocated buffer while parsing a specially crafted SPP file. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-19808) | [] | null | 7.8 | null | null |
|
GHSA-p4rg-7c2h-6cqp | The Spotfire Library component of TIBCO Software Inc.'s Spotfire Analyst and Spotfire Server contains an easily exploitable vulnerability that allows a low privileged attacker with network access to execute a Stored Cross Site Scripting (XSS) on the affected system. A successful attack using this vulnerability requires human interaction from a person other than the attacker. Affected releases are TIBCO Software Inc.'s Spotfire Analyst: versions 11.4.7 and below, versions 11.5.0, 11.6.0, 11.7.0, 11.8.0, 12.0.0, 12.0.1, 12.0.2, 12.0.3, and 12.0.4, versions 12.1.0 and 12.1.1 and Spotfire Server: versions 11.4.11 and below, versions 11.5.0, 11.6.0, 11.6.1, 11.6.2, 11.6.3, 11.7.0, 11.8.0, 11.8.1, 12.0.0, 12.0.1, 12.0.2, 12.0.3, 12.0.4, and 12.0.5, versions 12.1.0 and 12.1.1. | [] | null | 5.4 | null | null |
|
GHSA-m5xj-wwcw-844f | An issue was discovered in the svg-vector-icon-plugin (aka WP SVG Icons) plugin through 3.2.1 for WordPress. wp-admin/admin.php?page=wp-svg-icons-custom-set mishandles Custom Icon uploads. CSRF leads to upload of a ZIP archive containing a .php file. | [] | null | null | 8.8 | null |
|
CVE-2013-5163 | Directory Services in Apple Mac OS X before 10.8.5 Supplemental Update allows local users to bypass password-based authentication and modify arbitrary Directory Services records via unspecified vectors. | [
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.8.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.8.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.8.4:*:*:*:*:*:*:*"
] | null | null | null | 6.6 |
|
GHSA-4cjm-5fqc-2f6p | Heap-based buffer overflow in the create_url_list function in gena/gena_device.c in Portable UPnP SDK (aka libupnp) before 1.6.21 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a valid URI followed by an invalid one in the CALLBACK header of an SUBSCRIBE request. | [] | null | null | 9.8 | null |
|
CVE-2020-10265 | RVD#1443: UR dashboard server enables unauthenticated remote control of core robot functions | Universal Robots Robot Controllers Version CB2 SW Version 1.4 upwards, CB3 SW Version 3.0 and upwards, e-series SW Version 5.0 and upwards expose a service called DashBoard server at port 29999 that allows for control over core robot functions like starting/stopping programs, shutdown, reset safety and more. The DashBoard server is not protected by any kind of authentication or authorization. | [
"cpe:2.3:a:universal-robots:ur_software:*:*:*:*:*:*:*:*",
"cpe:2.3:h:universal-robots:ur10:-:*:*:*:*:*:*:*",
"cpe:2.3:h:universal-robots:ur3:-:*:*:*:*:*:*:*",
"cpe:2.3:h:universal-robots:ur5:-:*:*:*:*:*:*:*",
"cpe:2.3:h:universal-robots:ur10e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:universal-robots:ur3e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:universal-robots:ur5e:-:*:*:*:*:*:*:*"
] | null | null | 9.4 | null |
GHSA-2p28-5mvp-2j2r | Drupal Comment reply form allows access to restricted content | In Drupal versions 8.4.x versions before 8.4.5 users with permission to post comments are able to view content and comments they do not have access to, and are also able to add comments to this content. This vulnerability is mitigated by the fact that the comment system must be enabled and the attacker must have permission to post comments. | [] | null | null | 8.1 | null |
GHSA-7xm3-983m-rxjr | The regex implementation in Google V8, as used in Google Chrome before 19.0.1084.46, allows remote attackers to cause a denial of service (invalid write operation) or possibly have unspecified other impact via unknown vectors. | [] | null | null | null | null |
|
GHSA-8wfx-77v8-mc24 | Certain NETGEAR devices are affected by stored XSS. This affects R7000 before 1.0.11.110, R7900 before 1.0.4.30, R8000 before 1.0.4.62, RAX200 before 1.0.3.106, R7000P before 1.3.3.140, RAX80 before 1.0.3.106, R6900P before 1.3.3.140, and RAX75 before 1.0.3.106. | [] | null | null | null | null |
|
GHSA-vwp5-w4rq-g4cc | Koji blacklisted paths workaround | Koji 1.13.0 does not properly validate SCM paths, allowing an attacker to work around blacklisted paths for build submission. | [] | null | null | 7.5 | null |
CVE-2014-9275 | UnRTF allows remote attackers to cause a denial of service (out-of-bounds memory access and crash) and possibly execute arbitrary code via a crafted RTF file. | [
"cpe:2.3:a:unrtf_project:unrtf:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-g3r2-9725-84qv | Untrusted search path vulnerability in HTTrack 3.43-9 allows local users to gain privileges via a Trojan horse httrack-plugin.dll file in the current working directory, as demonstrated by a directory that contains a .whtt file. NOTE: some of these details are obtained from third party information. | [] | null | null | null | null |
|
GHSA-vwqh-rcfq-pqf7 | Incorrect Access Control vulnerability in jshERP V3.3 allows attackers to obtain sensitive information via the doFilter function. | [] | null | 6.5 | null | null |
|
RHSA-2024:5056 | Red Hat Security Advisory: Red Hat Integration Camel K 1.10.7 release and security update. | pgjdbc: PostgreSQL JDBC Driver allows attacker to inject SQL if using PreferQueryMode=SIMPLE | [
"cpe:/a:redhat:camel_k:1.10.7"
] | null | 9.8 | null | null |
GHSA-qgf9-6cxx-q2qv | CSV Injection vulnerability in Addactis IBNRS v.3.10.3.107 allows a remote attacker to execute arbitrary code via a crafted .ibnrs file to the Project Description, Identifiers, Custom Triangle Name (inside Input Triangles) and Yield Curve Name parameters. | [] | null | 9.8 | null | null |
|
CVE-2021-30783 | An access issue was addressed with improved access restrictions. This issue is fixed in macOS Big Sur 11.5, Security Update 2021-004 Catalina, Security Update 2021-005 Mojave. A sandboxed process may be able to circumvent sandbox restrictions. | [
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:-:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-001:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-002:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-004:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-005:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-006:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-007:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-001:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-002:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-003:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-004:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-005:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-006:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-007:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-001:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-002:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-003:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-004:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:supplemental_update:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:supplemental_update_2:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-005:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-007:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-002:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-003:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:supplemental_update:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | 2.1 |
|
GHSA-244g-8368-6wr9 | Apache Wicket allows attackers to check for third-party libraries | In Apache Wicket 1.5.10 or 6.13.0, by issuing requests to special urls handled by Wicket, it is possible to check for the existence of particular classes in the classpath and thus check whether a third party library with a known security vulnerability is in use. | [] | null | null | 5.3 | null |
CVE-2007-1729 | SQL injection vulnerability in includes/start.php in Flexbb 1.0.0 10005 Beta Release 1 allows remote attackers to execute arbitrary SQL commands via the flexbb_lang_id COOKIE parameter to index.php. | [
"cpe:2.3:a:revolutionproducts:flexbb:1.0.0_10005_beta_1:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-442g-q24g-3535 | Stack-based buffer overflow in IN_CDDA.dll in Winamp 5.05, and possibly other versions including 5.06, allows remote attackers to execute arbitrary code via a certain .m3u playlist file. | [] | null | null | null | null |
|
CVE-2017-9159 | libautotrace.a in AutoTrace 0.31.1 allows remote attackers to cause a denial of service (invalid write and SEGV), related to the pnm_load_rawpbm function in input-pnm.c:391:15. | [
"cpe:2.3:a:autotrace_project:autotrace:0.31.1:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
GHSA-866w-jmq2-r5wh | In prestashop 8.1.4, a NULL pointer dereference was identified in the math_round function within Tools.php. | [] | null | 5.3 | null | null |
|
CVE-2025-27539 | A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'VerifyUser' method. This could allow an unauthenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with "NT AUTHORITY\NetworkService" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on. (ZDI-CAN-25914) | [] | 9.3 | 9.8 | null | null |
|
CVE-2016-1526 | The TtfUtil:LocaLookup function in TtfUtil.cpp in Libgraphite in Graphite 2 1.2.4, as used in Mozilla Firefox before 43.0 and Firefox ESR 38.x before 38.6.1, incorrectly validates a size value, which allows remote attackers to obtain sensitive information or cause a denial of service (out-of-bounds read and application crash) via a crafted Graphite smart font. | [
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:38.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:38.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:38.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"cpe:2.3:a:sil:graphite2:1.2.4:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*"
] | null | null | 8.1 | 5.8 |
|
GHSA-8j4w-5fw4-rm27 | Prototype Pollution in deeply | Versions of `deeply` prior to 1.0.1 are vulnerable to Prototype Pollution. The package fails to validate which Object properties it updates. This allows attackers to modify the prototype of Object, causing the addition or modification of an existing property on all objects.RecommendationUpgrade to version 3.1.0 or later. | [] | null | 9.8 | null | null |
CVE-2008-6182 | SQL injection vulnerability in the Ignite Gallery (com_ignitegallery) component 0.8.0 through 0.8.3 for Joomla! allows remote attackers to execute arbitrary SQL commands via the gallery parameter in a view action to index.php. | [
"cpe:2.3:a:joomla:ignitegallery:0.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:ignitegallery:0.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:ignitegallery:0.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:ignitegallery:0.8.3:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2023-46141 | Phoenix Contact: Automation Worx and classic line controllers prone to Incorrect Permission Assignment for Critical Resource | Incorrect Permission Assignment for Critical Resource vulnerability in multiple products of the PHOENIX CONTACT classic line allow an remote unauthenticated attacker to gain full access of the affected device. | [
"cpe:2.3:a:phoenixcontact:automationworx_software_suite:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:axc_1050_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:axc_1050:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:axc_1050_xc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:axc_1050_xc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:axc_3050_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:axc_3050:-:*:*:*:*:*:*:*",
"cpe:2.3:a:phoenixcontact:config\\+:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fc_350_pci_eth_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fc_350_pci_eth:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:ilc1x0_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:ilc1x0:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:ilc1x1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:ilc1x1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:ilc_3xx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:ilc_3xx:-:*:*:*:*:*:*:*",
"cpe:2.3:a:phoenixcontact:pc_worx:*:*:*:*:*:*:*:*",
"cpe:2.3:a:phoenixcontact:pc_worx_express:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:pc_worx_rt_basic_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:pc_worx_rt_basic:-:*:*:*:*:*:*:*",
"cpe:2.3:a:phoenixcontact:pc_worx_srt:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:rfc_430_eth-ib_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:rfc_430_eth-ib:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:rfc_450_eth-ib_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:rfc_450_eth-ib:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:rfc_460r_pn_3tx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:rfc_460r_pn_3tx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:rfc_470s_pn_3tx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:rfc_470s_pn_3tx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:rfc_480s_pn_4tx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:rfc_480s_pn_4tx:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
GHSA-qxhc-qpv2-7r2r | Certain NETGEAR devices are affected by command injection by an authenticated user. This affects RBK752 before 3.2.16.6, RBR750 before 3.2.16.6, RBS750 before 3.2.16.6, RBK852 before 3.2.16.6, RBR850 before 3.2.16.6, and RBS850 before 3.2.16.6. | [] | null | null | null | null |
|
CVE-2017-17595 | Beauty Parlour Booking Script 1.0 has SQL Injection via the /list gender or city parameter. | [
"cpe:2.3:a:beauty_parlour_booking_script_project:beauty_parlour_booking_script:1.0:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 |
|
GHSA-4jch-8qq5-hqg6 | Froxlor Improper Input Validation vulnerability | Improper Input Validation in GitHub repository froxlor/froxlor prior to 2.1.0-beta1. | [] | null | null | 9.9 | null |
GHSA-wf6c-3r5q-6h6w | In Xymon through 4.3.28, a buffer overflow exists in the status-log viewer CGI because of expansion in appfeed.c. | [] | null | null | 9.8 | null |
|
CVE-2011-0822 | Unspecified vulnerability in the Streams, AQ & Replication Mgmt component in Oracle Database Server 10.1.0.5 and 10.2.0.3, and Oracle Enterprise Manager Grid Control 10.1.0.6, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. | [
"cpe:2.3:a:oracle:database_server:10.1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_server:10.2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:enterprise_manager_grid_control:10.1.0.6:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
GHSA-rm2c-w33r-fvgv | Mitel MiCloud Management Portal before 6.1 SP5 could allow an attacker, by sending a crafted request, to view system information due to insufficient output sanitization. | [] | null | null | null | null |
|
GHSA-36fg-m6m3-3q45 | Missing Authorization vulnerability in Undsgn Uncode Core.This issue affects Uncode Core: from n/a through 2.8.8. | [] | null | 7.7 | null | null |
|
GHSA-mh3g-wmcq-xxrw | Authentication bypass vulnerability in the setup screen of L2Blocker(on-premise) Ver4.8.5 and earlier and L2Blocker(Cloud) Ver4.8.5 and earlier allows an adjacent attacker to perform an unauthorized login and obtain the stored information or cause a malfunction of the device by using alternative paths or channels for Sensor. | [] | null | 8.1 | null | null |
|
GHSA-8593-j8v5-33h8 | An open redirect vulnerability in Fortinet FortiManager 6.0.0, 5.6.5 and below versions, FortiAnalyzer 6.0.0, 5.6.5 and below versions allows attacker to inject script code during converting a HTML table to a PDF document under the FortiView feature. An attacker may be able to social engineer an authenticated user into generating a PDF file containing injected malicious URLs. | [] | null | null | 6.1 | null |
|
CVE-2020-20696 | A cross-site scripting (XSS) vulnerability in /admin/content/post of GilaCMS v1.11.4 allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the Tags field. | [
"cpe:2.3:a:gilacms:gila_cms:1.11.4:*:*:*:*:*:*:*"
] | null | 5.4 | null | 3.5 |
|
CVE-2023-40635 | In linkturbo, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed | [
"cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
|
GHSA-88wv-r6ff-qxwp | In onResult of AccountManagerService.java, there is a possible way to perform an arbitrary background activity launch due to parcel mismatch. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | [] | null | 7.8 | null | null |
|
CVE-2013-2051 | The Tomcat 6 DIGEST authentication functionality as used in Red Hat Enterprise Linux 6 allows remote attackers to bypass intended access restrictions by performing a replay attack after a nonce becomes stale. NOTE: this issue is due to an incomplete fix for CVE-2012-5887. | [
"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*"
] | null | null | null | 2.6 |
|
GHSA-jh62-vvqv-2m3p | Missing Authorization vulnerability in ONTRAPORT Inc. PilotPress.This issue affects PilotPress: from n/a through 2.0.30. | [] | null | 5.3 | null | null |
|
CVE-2022-38097 | A use-after-free vulnerability exists in the JavaScript engine of Foxit Software's PDF Reader, version 12.0.1.12430. By prematurely destroying annotation objects, a specially-crafted PDF document can trigger the reuse of previously freed memory, which can lead to arbitrary code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially-crafted, malicious site if the browser plugin extension is enabled. | [
"cpe:2.3:a:foxit:pdf_reader:12.0.1.12430:*:*:*:*:*:*:*"
] | null | null | 8.8 | null |
|
CVE-2023-43766 | Certain WithSecure products allow Local privilege escalation via the lhz archive unpack handler. This affects WithSecure Client Security 15, WithSecure Server Security 15, WithSecure Email and Server Security 15, WithSecure Elements Endpoint Protection 17 and later, WithSecure Client Security for Mac 15, WithSecure Elements Endpoint Protection for Mac 17 and later, Linux Security 64 12.0 , Linux Protection 12.0, and WithSecure Atlant (formerly F-Secure Atlant) 1.0.35-1. | [
"cpe:2.3:a:f-secure:linux_protection:12.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f-secure:linux_security_64:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:a:f-secure:atlant:1.0.35-1:*:*:*:*:*:*:*",
"cpe:2.3:a:f-secure:client_security:15.00:*:*:*:*:*:*:*",
"cpe:2.3:a:f-secure:elements_endpoint_protection:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f-secure:email_and_server_security:15.00:*:*:*:*:*:*:*",
"cpe:2.3:a:f-secure:server_security:15.00:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
|
GHSA-rcx2-m7jp-p9wj | Jupyter Notebook open redirect vulnerability | In Jupyter Notebook before 5.7.8, an open redirect can occur via an empty netloc. This issue exists because of an incomplete fix for CVE-2019-10255. | [] | 5.3 | null | 6.1 | null |
GHSA-m6cw-m47w-wq2g | The MergeTrack function in GPAC 1.0.1 allows attackers to cause a denial of service (NULL pointer dereference) via a crafted file in the MP4Box command. | [] | null | null | null | null |
|
CVE-2017-3112 | An issue was discovered in Adobe Flash Player 27.0.0.183 and earlier versions. This vulnerability occurs as a result of a computation that reads data that is past the end of the target buffer; the computation is part of AdobePSDK metadata. The use of an invalid (out-of-range) pointer offset during access of internal data structure fields causes the vulnerability. A successful attack can lead to sensitive data exposure. | [
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:chrome:*:*",
"cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:edge:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:internet_explorer_11:*:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*"
] | null | null | 9.8 | 10 |
|
CVE-2018-11769 | CouchDB administrative users before 2.2.0 can configure the database server via HTTP(S). Due to insufficient validation of administrator-supplied configuration settings via the HTTP API, it is possible for a CouchDB administrator user to escalate their privileges to that of the operating system's user under which CouchDB runs, by bypassing the blacklist of configuration settings that are not allowed to be modified via the HTTP API. This privilege escalation effectively allows a CouchDB admin user to gain arbitrary remote code execution, bypassing CVE-2017-12636 and CVE-2018-8007. | [
"cpe:2.3:a:apache:couchdb:*:*:*:*:*:*:*:*"
] | null | null | 7.2 | 9 |
|
GHSA-2frf-49c5-28xj | Microsoft Edge in Microsoft Windows 10 1703 allows an attacker to obtain information to further compromise the user's system, due to the way that the Microsoft Edge scripting engine handles objects in memory, aka "Scripting Engine Information Disclosure Vulnerability". | [] | null | null | 4.3 | null |
|
GHSA-rv5q-72p2-2q24 | Centreon contains cross-site scripting vulnerability via esc_name parameter | Centreon v20.10.18 was discovered to contain a cross-site scripting (XSS) vulnerability via the `esc_name` (Escalation Name) parameter at `Configuration/Notifications/Escalations`. This vulnerability allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload. Versions 21.04.16, 21.10.8, and 22.04.2 contain patches. | [] | null | 5.4 | null | null |
GHSA-4m6g-cqp8-43xm | An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site. | [] | null | null | 8.8 | null |
|
CVE-2020-2251 | Jenkins SoapUI Pro Functional Testing Plugin 1.5 and earlier transmits project passwords in its configuration in plain text as part of job configuration forms, potentially resulting in their exposure. | [
"cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:jenkins:*:*",
"cpe:2.3:a:jenkins:soapui_pro_functional_testing:*:*:*:*:*:jenkins:*:*"
] | null | 4.3 | null | 4 |
|
GHSA-v7rc-8rwm-q37q | The Bamazoo – Button Generator plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's dgs shortcode in all versions up to, and including, 1.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] | null | 6.4 | null | null |
|
GHSA-m4qq-492w-2qw2 | HCL iNotes is susceptible to a link to non-existent domain vulnerability. An attacker could use this vulnerability to trick a user into supplying sensitive information such as username, password, credit card number, etc. | [] | null | 7.4 | null | null |
|
GHSA-mv9f-rw8q-hv5f | In Chromecast bootROM, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege in the bootloader, with physical USB access, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android SoCAndroid ID: A-174490700 | [] | null | null | null | null |
|
CVE-2022-30414 | Covid-19 Travel Pass Management System v1.0 is vulnerable to SQL Injection via /ctpms/admin/?page=applications/view_application&id=. | [
"cpe:2.3:a:covid_19_travel_pass_management_system_project:covid_19_travel_pass_management_system:1.0:*:*:*:*:*:*:*"
] | null | 7.2 | null | 6.5 |
|
CVE-2008-3558 | Stack-based buffer overflow in the WebexUCFObject ActiveX control in atucfobj.dll in Cisco WebEx Meeting Manager before 20.2008.2606.4919 allows remote attackers to execute arbitrary code via a long argument to the NewObject method. | [
"cpe:2.3:a:cisco:webex_meeting_manager:20.2008.2601.4928:*:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
CVE-2017-3219 | Acronis True Image up to and including version 2017 Build 8053 performs software updates using HTTP. Downloaded updates are only verified using a server-provided MD5 hash. | [
"cpe:2.3:a:acronis:true_image:*:*:*:*:*:*:*:*"
] | null | null | 8.8 | 8.3 |
|
GHSA-qp9h-mj96-rrv3 | A vulnerability in the Cisco Webex Network Recording Player for Microsoft Windows and the Cisco Webex Player for Microsoft Windows could allow an attacker to execute arbitrary code on an affected system. The vulnerability exist because the affected software improperly validates Advanced Recording Format (ARF) and Webex Recording Format (WRF) files. An attacker could exploit this vulnerability by sending a user a malicious ARF or WRF file via a link or email attachment and persuading the user to open the file with the affected software on the local system. A successful exploit could allow the attacker to execute arbitrary code on the affected system. | [] | null | 7.8 | null | null |
|
CVE-2023-28704 | Furbo dog camera - Command Injection | Furbo dog camera has insufficient filtering for special parameter of device log management function. An unauthenticated remote attacker in the Bluetooth network with normal user privileges can exploit this vulnerability to perform command injection attack to execute arbitrary system commands or disrupt service. | [
"cpe:2.3:o:furbo:dog_camera_firmware:542:*:*:*:*:*:*:*",
"cpe:2.3:h:furbo:dog_camera:-:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
CVE-2009-4154 | Directory traversal vulnerability in includes/feedcreator.class.php in Elxis CMS allows remote attackers to read arbitrary files via a .. (dot dot) in the filename parameter. | [
"cpe:2.3:a:elxis:elxis_cms:*:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2023-23306 | The `Toybox.Ant.BurstPayload.add` API method in CIQ API version 2.2.0 through 4.1.7 suffers from a type confusion vulnreability, which can result in an out-of-bounds write operation. A malicious application could create a specially crafted `Toybox.Ant.BurstPayload` object, call its `add` method, override arbitrary memory and hijack the execution of the device's firmware. | [
"cpe:2.3:a:garmin:connect-iq:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
GHSA-vqcx-vjch-5hpp | An information disclosure vulnerability in the Android media framework (libeffects). Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0. Android ID: A-63662938. | [] | null | null | 5.5 | null |
|
CVE-2014-6462 | Unspecified vulnerability in the Oracle Access Manager component in Oracle Fusion Middleware 11.1.2.1 and 11.1.2.2 allows remote attackers to affect integrity via unknown vectors related to Admin Console. | [
"cpe:2.3:a:oracle:fusion_middleware:11.1.2.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:fusion_middleware:11.1.2.2.0:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-p7f9-cm57-hjf2 | Improper permissions in the installer for Intel(R) RWC2, all versions, may allow an authenticated user to potentially enable escalation of privilege via local access. | [] | null | null | null | null |
|
CVE-2016-5352 | epan/crypt/airpdcap.c in the IEEE 802.11 dissector in Wireshark 2.x before 2.0.4 mishandles certain length values, which allows remote attackers to cause a denial of service (application crash) via a crafted packet. | [
"cpe:2.3:a:wireshark:wireshark:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:2.0.3:*:*:*:*:*:*:*"
] | null | null | 5.9 | 4.3 |
|
CVE-1999-0636 | The discard service is running. | [] | null | null | null | 10 |
|
GHSA-v2p2-mj8c-jjfr | baigoStudio baigoSSO v3.0.1 allows remote attackers to execute arbitrary PHP code via the first form field of a configuration screen, because this code is written to the BG_SITE_NAME field in the opt_base.inc.php file. | [] | null | null | 7.2 | null |
|
CVE-2011-4542 | Hastymail2 2.1.1 before RC2 allows remote attackers to execute arbitrary commands via the (1) rs or (2) rsargs[] parameter in a mailbox Drafts action to the default URI. | [
"cpe:2.3:a:hastymail:hastymail2:*:beta1:*:*:*:*:*:*",
"cpe:2.3:a:hastymail:hastymail2:*:beta2:*:*:*:*:*:*",
"cpe:2.3:a:hastymail:hastymail2:*:beta3:*:*:*:*:*:*",
"cpe:2.3:a:hastymail:hastymail2:*:rc1:*:*:*:*:*:*",
"cpe:2.3:a:hastymail:hastymail2:*:rc2:*:*:*:*:*:*",
"cpe:2.3:a:hastymail:hastymail2:*:rc3:*:*:*:*:*:*",
"cpe:2.3:a:hastymail:hastymail2:*:rc4:*:*:*:*:*:*",
"cpe:2.3:a:hastymail:hastymail2:*:rc5:*:*:*:*:*:*",
"cpe:2.3:a:hastymail:hastymail2:*:rc6:*:*:*:*:*:*",
"cpe:2.3:a:hastymail:hastymail2:*:rc7:*:*:*:*:*:*",
"cpe:2.3:a:hastymail:hastymail2:*:rc8:*:*:*:*:*:*",
"cpe:2.3:a:hastymail:hastymail2:*:rc9:*:*:*:*:*:*",
"cpe:2.3:a:hastymail:hastymail2:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:hastymail:hastymail2:1.01:*:*:*:*:*:*:*",
"cpe:2.3:a:hastymail:hastymail2:1.1:rc1:*:*:*:*:*:*",
"cpe:2.3:a:hastymail:hastymail2:1.1:rc2:*:*:*:*:*:*",
"cpe:2.3:a:hastymail:hastymail2:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:hastymail:hastymail2:2.0:a1:*:*:*:*:*:*",
"cpe:2.3:a:hastymail:hastymail2:2.0:a2:*:*:*:*:*:*",
"cpe:2.3:a:hastymail:hastymail2:2.0:b1:*:*:*:*:*:*",
"cpe:2.3:a:hastymail:hastymail2:2.0:b2:*:*:*:*:*:*",
"cpe:2.3:a:hastymail:hastymail2:2.0:b3:*:*:*:*:*:*",
"cpe:2.3:a:hastymail:hastymail2:2.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:hastymail:hastymail2:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:hastymail:hastymail2:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:hastymail:hastymail2:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:hastymail:hastymail2:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:hastymail:hastymail2:2.0.5:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-rvvx-45rh-qmgg | An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site. | [] | null | null | 8.8 | null |
|
CVE-2022-31538 | The joaopedro-fg/mp-m08-interface repository through 2020-12-10 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely. | [
"cpe:2.3:a:mp-m08-interface_project:mp-m08-interface:*:*:*:*:*:*:*:*"
] | null | 9.3 | null | 6.4 |
|
RHSA-2016:2133 | Red Hat Security Advisory: kernel security update | kernel: Uninitialized variable in request_key handling causes kernel crash in error handling path kernel: mm: privilege escalation via MAP_PRIVATE COW breakage | [
"cpe:/o:redhat:rhel_aus:6.4::server"
] | null | null | 7.8 | null |
CVE-2024-1586 | The Schema & Structured Data for WP & AMP plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the custom schema in all versions up to, and including, 1.26 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. By default the required authentication level is admin, but administrators have the ability to assign role based access to users as low as subscriber. | [] | null | 6.4 | null | null |
|
GHSA-hv54-4vmp-5687 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in chuyencode CC Custom Taxonomy plugin <= 1.0.1 versions. | [] | null | 5.9 | null | null |
|
CVE-2015-7946 | MTP service exposed during emergency dialer | Information Exposure vulnerability in Unity8 as used on the Ubuntu phone and possibly also in Unity8 shipped elsewhere. This allows an attacker to enable the MTP service by opening the emergency dialer. Fixed in 8.11+16.04.20160111.1-0ubuntu1 and 8.11+15.04.20160122-0ubuntu1. | [
"cpe:2.3:a:ubports:unity8:-:*:*:*:*:*:*:*"
] | null | 7.3 | null | null |
GHSA-fp8g-5vph-mrcj | A remote arbitrary file modification vulnerability was discovered in some Aruba Instant Access Point (IAP) products in version(s): Aruba Instant 6.5.x: 6.5.4.17 and below; Aruba Instant 8.3.x: 8.3.0.13 and below; Aruba Instant 8.5.x: 8.5.0.10 and below; Aruba Instant 8.6.x: 8.6.0.4 and below. Aruba has released patches for Aruba Instant that address this security vulnerability. | [] | null | 8.1 | null | null |
|
GHSA-3qc6-x7mq-579v | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Roberto Alicata ra_qrcode allows Stored XSS.This issue affects ra_qrcode: from n/a through 2.1.0. | [] | null | 6.5 | null | null |
|
GHSA-7g2v-q2xx-v4j9 | This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader 11.2.1.53537. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the deletePages method. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-16828. | [] | null | 7.8 | null | null |
|
CVE-2021-36096 | Support Bundle includes S/Mime and PGP secret or PIN | Generated Support Bundles contains private S/MIME and PGP keys if containing folder is not hidden. This issue affects: OTRS AG ((OTRS)) Community Edition 6.0.x version 6.0.1 and later versions. OTRS AG OTRS 7.0.x version 7.0.28 and prior versions; 8.0.x version 8.0.15 and prior versions. | [
"cpe:2.3:a:otrs:otrs:*:*:*:*:community:*:*:*",
"cpe:2.3:a:otrs:otrs:*:*:*:*:-:*:*:*"
] | null | 5.2 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.