id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
PYSEC-2021-322 | null | Wasmtime is an open source runtime for WebAssembly & WASI. Wasmtime before version 0.30.0 is affected by a type confusion vulnerability. As a Rust library the `wasmtime` crate clearly marks which functions are safe and which are `unsafe`, guaranteeing that if consumers never use `unsafe` then it should not be possible to have memory unsafety issues in their embeddings of Wasmtime. An issue was discovered in the safe API of `Linker::func_*` APIs. These APIs were previously not sound when one `Engine` was used to create the `Linker` and then a different `Engine` was used to create a `Store` and then the `Linker` was used to instantiate a module into that `Store`. Cross-`Engine` usage of functions is not supported in Wasmtime and this can result in type confusion of function pointers, resulting in being able to safely call a function with the wrong type. Triggering this bug requires using at least two `Engine` values in an embedding and then additionally using two different values with a `Linker` (one at the creation time of the `Linker` and another when instantiating a module with the `Linker`). It's expected that usage of more-than-one `Engine` in an embedding is relatively rare since an `Engine` is intended to be a globally shared resource, so the expectation is that the impact of this issue is relatively small. The fix implemented is to change this behavior to `panic!()` in Rust instead of silently allowing it. Using different `Engine` instances with a `Linker` is a programmer bug that `wasmtime` catches at runtime. This bug has been patched and users should upgrade to Wasmtime version 0.30.0. If you cannot upgrade Wasmtime and are using more than one `Engine` in your embedding it's recommended to instead use only one `Engine` for the entire program if possible. An `Engine` is designed to be a globally shared resource that is suitable to have only one for the lifetime of an entire process. If using multiple `Engine`s is required then code should be audited to ensure that `Linker` is only used with one `Engine`. | [] | null | null | null | null |
CVE-2008-5802 | SQL injection vulnerability in index.php in E-topbiz Online Store 1.0 allows remote attackers to execute arbitrary SQL commands via the cat_id parameter. | [
"cpe:2.3:a:e-topbiz:online_store:1.0:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2022-20052 | In mdp, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS05836642; Issue ID: ALPS05836642. | [
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6755:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8163:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8183:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8735a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8735b:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*"
] | null | 6.5 | null | 6.9 |
|
GHSA-49jc-r788-3fc9 | gix refs and paths with reserved Windows device names access the devices | SummaryOn Windows, fetching refs that clash with legacy device names reads from the devices, and checking out paths that clash with such names writes arbitrary data to the devices. This allows a repository, when cloned, to cause indefinite blocking or the production of arbitrary message that appear to have come from the application, and potentially other harmful effects under limited circumstances.DetailsIt is possible to create a Git repository that contains references or filenames that Windows treats as legacy DOS-style aliases for system devices. When such a repository is cloned:In references, `gix-ref` does not include a check for such names before attempting to access them on disk, which reads from the devices, though the ability to exfiltrate data appears limited.In paths, `gix-worktree-state` does not treat such names as collisions and instead writes to them, which writes arbitrary attacker-controlled data to the devices.Some such device names refer to devices that are often absent or inaccessible. But a few are guaranteed to be available, allowing some attacks to be carried out with low complexity. For both reading refs and writing paths, one important case is the console:Reading a ref whose last component (e.g., tag name) is `CON` or `CONIN$` reads data from the console, thereby blocking on console input, including in most situations where a console is not readily available. This may facilitate denial of service attacks.Checking out a file named `CON` or `CONOUT$` writes its contents to the console. This allows an untrusted repository to produce arbitrary text that appears to be a message from the application. Such text may facilitate social engineering if it is selected to instruct the user to perform a particular action.Another potentially important case is serial ports. For example, `COM1` refers to the first serial port, if present. A malicious repository may be able to disrupt intended use of serial ports or attempt to interact with a device. In some configurations, it may be possible to interfere with the operation of a physical or virtual serial console. On Windows, local access to serial ports is often permitted even for limited user accounts without elevation.[Naming Files, Paths, and Namespaces](https://learn.microsoft.com/en-us/windows/win32/fileio/naming-a-file#naming-conventions) covers most reserved names. `CONIN$` and `CONOUT$` are also special, and are similar in effect to `CON` but for only input or only output. These names are case-insensitive and can also be accessed with file extensions (e.g, `CON.txt` is equivalent to `CON`) and with some variations involving added spaces or colons.PoCRef exampleCreate a repository on a non-Windows system (or in WSL) with at least one commit. Use `git tag CON` to create a lightweight tag named `CON`. Place the repository somewhere it can be cloned on Windows. A `file://` URL is sufficient for testing if a private remote is unavailable. If using `git push`, pass `--tags` so the remote has the tag.On a Windows system, clone the repository with `gix clone`. This command will block immediately, reading input from the console. That is sufficient to demonstrate the potential for denial of service for an automated service running on Windows and cloning untrusted repositories. The experiment can be stopped with <kbd>Ctrl</kbd>+<kbd>C</kbd>.However, if desired, input can be provided. Ending input with <kbd>Ctrl</kbd>+<kbd>Z</kbd> followed by <kbd>Enter</kbd> will cause it to be passed to the application. This will lead to an error message, the specific details of which vary by whether the input is empty or nonempty, and whether it matches or does not match the hexadecimal hash of the tagged commit.Path exampleCreate a repository on a non-Windows system (or in WSL) and commit a file named `CON` with the contents:While that example text serves to illustrate the risk, any distinctive text is sufficient to observe the vulnerability. Place the repository somewhere it can be cloned on Windows. As above, a `file://` URL is sufficient.On a Windows system, clone the repository with `gix clone`. The output usually looks like this, with the deceptive message appearing to come from `gix`:The exact placement of the message is nondeterministic. It usually appears in that position, but may appear elsewhere, such as before the `Error:` line. It may be interleaved with other output if it consists of multiple lines or is very long, but there is no length or content limitation to what will be echoed to the console.ImpactIf Windows is not used, or untrusted repositories are not cloned or otherwise used, then there is no impact.The impact is expected to be limited in common configurations, but may vary widely depending on what devices exist, how they are being used, how much knowledge an attacker has of the precise details of their use, and whether the user is likely to trust information that appears in a console. Accessing devices through refs is expected to be less dangerous than accessing them through filenames, since it is trivial to attempt to write arbitrary data using filenames.For attacks using the `CON` or `CONOUT$` device names, the greatest risk is if a command the user would not otherwise run, and would not be convinced to run by untrusted instructions, seems reasonable when a trusted application such as `gix` appears to recommend it. The user may then be misled into running an attacker's command.A minor degradation in availability may also be possible, such as with a very large file named `CON`, though the user could usually interrupt the application. | [] | 5.1 | 5.4 | null | null |
GHSA-8gp7-gq2p-694f | Improper log management vulnerability in Galaxy Watch3 PlugIn prior to version 2.2.09.21033151 allows attacker with log permissions to leak Wi-Fi password connected to the user smartphone within log. | [] | null | null | null | null |
|
CVE-2022-30352 | phpABook 0.9i is vulnerable to SQL Injection due to insufficient sanitization of user-supplied data in the "auth_user" parameter in index.php script. | [
"cpe:2.3:a:phpabook_project:phpabook:0.9i:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
|
GHSA-v867-c875-j3hh | SeedDMS v6.0.15 was discovered to contain an open redirect vulnerability. An attacker may exploit this vulnerability to redirect users to arbitrary web URLs by tricking the victim users to click on crafted links. | [] | null | 6.1 | null | null |
|
CVE-2025-30112 | On 70mai Dash Cam 1S devices, by connecting directly to the dashcam's network and accessing the API on port 80 and RTSP on port 554, an attacker can bypass the device authorization mechanism from the official mobile app that requires a user to physically press on the power button during a connection. | [] | null | 7.1 | null | null |
|
GHSA-g4hp-fw6r-gm2q | IBM Datacap Fastdoc Capture 9.1.1, 9.1.3, and 9.1.4 could allow an authenticated user to bypass future authentication mechanisms once the initial login is completed. IBM X-Force ID: 148691. | [] | null | null | 4.3 | null |
|
GHSA-33f4-9hr4-253g | A vulnerability in the statistics collection service of Cisco HyperFlex Software could allow an unauthenticated, remote attacker to inject arbitrary values on an affected device. The vulnerability is due to insufficient authentication for the statistics collection service. An attacker could exploit this vulnerability by sending properly formatted data values to the statistics collection service of an affected device. A successful exploit could allow the attacker to cause the web interface statistics view to present invalid data to users. | [] | null | 5.3 | null | null |
|
CVE-2007-5117 | Multiple PHP remote file inclusion vulnerabilities in FrontAccounting (FA) 1.13, when register_globals is enabled, allow remote attackers to execute arbitrary PHP code via a URL in the path_to_root parameter to (1) access/login.php and (2) includes/lang/language.php, different vectors than CVE-2007-4279. | [
"cpe:2.3:a:frontaccounting:frontaccounting:1.13:*:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
GHSA-jpr3-gccf-cvp4 | Multiple SQL injection vulnerabilities in ParsCMS allow remote attackers to execute arbitrary SQL commands via the RP parameter to (1) fa_default.asp and (2) en_default.asp. | [] | null | null | null | null |
|
RHSA-2014:1955 | Red Hat Security Advisory: wget security update | wget: FTP symlink arbitrary filesystem access | [
"cpe:/o:redhat:rhel_eus:6.5::computenode",
"cpe:/o:redhat:rhel_eus:6.5::server"
] | null | null | null | null |
GHSA-g68q-7w7c-r57j | Multiple SQL injection vulnerabilities in login_verif.asp in Digiappz Freekot 1.01 allow remote attackers to execute arbitrary SQL commands via the (1) login or (2) password parameters. NOTE: some of these details are obtained from third party information. | [] | null | null | null | null |
|
GHSA-mv26-57j8-pqhr | Tenda FH1203 v2.0.1.6 firmware has a stack overflow vulnerability in the security parameter of the formWifiBasicSet function. | [] | null | 6.5 | null | null |
|
CVE-2005-2091 | IBM WebSphere 5.1 and WebSphere 5.0 allows remote attackers to poison the web cache, bypass web application firewall protection, and conduct XSS attacks via an HTTP request with both a "Transfer-Encoding: chunked" header and a Content-Length header, which causes WebSphere to incorrectly handle and forward the body of the request in a way that causes the receiving server to process it as a separate HTTP request, aka "HTTP Request Smuggling." | [
"cpe:2.3:a:ibm:websphere_application_server:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:5.1.0:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
RHSA-2018:0582 | Red Hat Security Advisory: rh-maven35-slf4j security update | slf4j: Deserialisation vulnerability in EventData constructor can allow for arbitrary code execution | [
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | null | 8.1 | null |
GHSA-f7pp-x8v9-66hm | Unspecified vulnerability in the Oracle Secure Backup component in Oracle Secure Backup 10.2.0.2 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors, a different vulnerability than CVE-2008-5448 and CVE-2008-5449. | [] | null | null | null | null |
|
GHSA-3j5v-hj4j-5rm9 | Unspecified vulnerability in the Agile Engineering Data Management (EDM) component in Oracle E-Business Suite 6.1.0.0 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. | [] | null | null | null | null |
|
GHSA-m3rx-w78v-9p56 | Vulnerability in the Oracle Enterprise Manager Fusion Middleware Control product of Oracle Fusion Middleware (component: FMW Control Plugin). The supported version that is affected is 12.2.1.4.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Enterprise Manager Fusion Middleware Control. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Enterprise Manager Fusion Middleware Control, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Enterprise Manager Fusion Middleware Control accessible data as well as unauthorized update, insert or delete access to some of Oracle Enterprise Manager Fusion Middleware Control accessible data. CVSS 3.1 Base Score 7.6 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N). | [] | null | 7.6 | null | null |
|
GHSA-349j-r63j-r5g7 | A vulnerability in the web-based management interface of Cisco Catalyst SD-WAN Manager, formerly Cisco SD-WAN vManage, could allow an authenticated, remote attacker to conduct a stored cross-site scripting attack (XSS) on an affected system. This vulnerability is due to improper sanitization of user input to the web-based management interface. An attacker could exploit this vulnerability by submitting a malicious script through the interface. A successful exploit could allow the attacker to conduct a stored XSS attack on the affected system. | [] | null | 5.4 | null | null |
|
GHSA-v8v4-f4rj-qhhf | A plaintext storage of a password vulnerability [CWE-256] in FortiSIEM 6.7 all versions, 6.6 all versions, 6.5 all versions, 6.4 all versions, 6.3 all versions, 6.2 all versions, 6.1 all versions, 5.4 all versions, 5.3 all versions may allow an attacker able to access user DB content to impersonate any admin user on the device GUI. | [] | null | 3.7 | null | null |
|
GHSA-9723-74jg-9vf6 | index.php in Enano CMS 1.1.7pl1, and possibly other versions before 1.1.8, 1.0.6pl3, and 1.1.7pl2, allows remote attackers to obtain sensitive information via a crafted title parameter, which reveals the installation path in an error message. | [] | null | null | null | null |
|
GHSA-3rpf-hx7x-258c | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in jajapagamentos Já-Já Pagamentos for WooCommerce allows Reflected XSS. This issue affects Já-Já Pagamentos for WooCommerce: from n/a through 1.3.0. | [] | null | 7.1 | null | null |
|
GHSA-qw38-ppmm-fjpw | In the Linux kernel, the following vulnerability has been resolved:perf: Fix perf_pending_task() UaFPer syzbot it is possible for perf_pending_task() to run after the
event is free()'d. There are two related but distinct cases:the task_work was already queued before destroying the event;destroying the event itself queues the task_work.The first cannot be solved using task_work_cancel() since
perf_release() itself might be called from a task_work (____fput),
which means the current->task_works list is already empty and
task_work_cancel() won't be able to find the perf_pending_task()
entry.The simplest alternative is extending the perf_event lifetime to cover
the task_work.The second is just silly, queueing a task_work while you know the
event is going away makes no sense and is easily avoided by
re-arranging how the event is marked STATE_DEAD and ensuring it goes
through STATE_OFF on the way down. | [] | null | 7.8 | null | null |
|
GHSA-94c6-66pj-36g9 | Desktop component service allows lateral movement between sessions in M-Files before 23.4.12455.0. | [] | null | 3.6 | null | null |
|
GHSA-3hc7-7vjp-8x77 | The WP SMS WordPress plugin before 5.4.13 does not sanitise the "wp_group_name" parameter before outputting it back in the "Groups" page, leading to an Authenticated Stored Cross-Site Scripting issue | [] | null | 5.4 | null | null |
|
CVE-2021-0897 | In apusys, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05672107; Issue ID: ALPS05670549. | [
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*"
] | null | 6.7 | null | 4.6 |
|
GHSA-f6g9-34fc-hhvx | Spider Sales shopping cart stores the private key in the same database and table as the public key, which allows local users with access to the database to decrypt data. | [] | null | null | null | null |
|
CVE-2024-41347 | openflights commit 5234b5b is vulnerable to Cross-Site Scripting (XSS) via php/settings.php | [
"cpe:2.3:a:jpatokal:openflights:*:*:*:*:*:*:*:*",
"cpe:2.3:a:jpatokal:openflights:2024-08-20:*:*:*:*:*:*:*"
] | null | 6.1 | null | null |
|
GHSA-rfxc-wgf7-qphr | Multiple buffer overflows in Ethereal 0.8.13 to 0.10.2 allow remote attackers to cause a denial of service and possibly execute arbitrary code via the (1) NetFlow, (2) IGAP, (3) EIGRP, (4) PGM, (5) IrDA, (6) BGP, (7) ISUP, or (8) TCAP dissectors. | [] | null | null | null | null |
|
GHSA-c88p-x2w3-699v | A vulnerability in the Spectrum Scale 5.1 core component and IBM Elastic Storage System 6.1 could allow unauthorized access to user data or injection of arbitrary data in the communication protocol. IBM X-Force ID: 191600. | [] | null | 9.1 | null | null |
|
GHSA-gxr3-gj4w-43g4 | A vulnerability in the Clientless SSL VPN (WebVPN) portal of Cisco Adaptive Security Appliance (ASA) and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or allow the attacker to access sensitive browser-based information. | [] | null | 6.1 | null | null |
|
GHSA-q6rf-9rw8-vqf5 | Improper buffer restrictions in the Intel(R) Media SDK software before version 22.2.2 may allow an authenticated user to potentially enable escalation of privilege via local access. | [] | null | 7.8 | null | null |
|
GHSA-r246-284m-857j | An exploitable sql injection vulnerability exists in the email parameter functionality of OS4Ed openSIS 7.3. The email parameter in the page EmailCheckOthers.php is vulnerable to SQL injection. An attacker can make an authenticated HTTP request to trigger this vulnerability. | [] | null | 8.8 | null | null |
|
GHSA-pjg3-3q79-q39r | An issue was discovered in Squid before 4.10. It allows a crafted FTP server to trigger disclosure of sensitive information from heap memory, such as information associated with other users' sessions or non-Squid processes. | [] | null | 7.5 | null | null |
|
CVE-2019-5585 | An improper access control vulnerability in FortiClientMac before 6.0.5 may allow an attacker to affect the application's performance via modifying the contents of a file used by several FortiClientMac processes. | [
"cpe:2.3:a:forticlient:forticlient:6.0.1:*:*:*:*:mac_os_x:*:*",
"cpe:2.3:a:forticlient:forticlient:6.0.2:*:*:*:*:mac_os_x:*:*",
"cpe:2.3:a:forticlient:forticlient:6.0.3:*:*:*:*:mac_os_x:*:*",
"cpe:2.3:a:forticlient:forticlient:6.0.4:*:*:*:*:mac_os_x:*:*"
] | null | null | 6.1 | 3.6 |
|
CVE-2018-14707 | Directory traversal in the Drobo Pix web application on Drobo 5N2 NAS version 4.0.5-13.28.96115 allows unauthenticated attackers to upload files to arbitrary locations. | [
"cpe:2.3:o:drobo:5n2_firmware:4.0.5-13.28.96115:*:*:*:*:*:*:*",
"cpe:2.3:h:drobo:5n2:-:*:*:*:*:*:*:*"
] | null | null | 7.5 | 7.8 |
|
CVE-2006-4499 | ModernBill 5.0.4 and earlier uses cURL with insecure settings for CURLOPT_SSL_VERIFYPEER and CURLOPT_SSL_VERIFYHOST that do not verify SSL certificates, which allows remote attackers to read network traffic via a man-in-the-middle (MITM) attack. | [
"cpe:2.3:a:moderngigabyte:modernbill:*:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2007-3562 | SQL injection vulnerability in videos.php in PHP Director 0.21 and earlier allows remote attackers to execute arbitrary SQL commands via the id parameter. | [
"cpe:2.3:a:php_director:php_director:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-fhwg-33jq-7fjq | A Password in Configuration File issue was discovered in Smiths Medical Medfusion 4000 Wireless Syringe Infusion Pump, Version 1.1, 1.5, and 1.6. The pump stores some passwords in the configuration file, which are accessible if the pump is configured to allow external communications. | [] | null | null | 3.7 | null |
|
CVE-2024-7480 | Improper access control in Avaya Aura System Manager | An Improper access control vulnerability was found in Avaya Aura System Manager which could allow a command-line interface (CLI) user with administrative privileges to read arbitrary files on the system. Affected versions include 10.1.x.x and 10.2.x.x. Versions prior to 10.1 are end of manufacturer support. | [
"cpe:2.3:a:avaya:aura_system_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:avaya:aura_system_manager:10.2:*:*:*:*:*:*:*"
] | null | 4.2 | null | null |
GHSA-gcf5-h6fj-9pq8 | An issue was discovered in Responsive Filemanager through 9.14.0. In the dialog.php page, the session variable $_SESSION['RF']["view_type"] wasn't sanitized if it was already set. This made stored XSS possible if one opens ajax_calls.php and uses the "view" action and places a payload in the type parameter, and then returns to the dialog.php page. This occurs because ajax_calls.php was also able to set the $_SESSION['RF']["view_type"] variable, but there it wasn't sanitized. | [] | null | null | null | null |
|
GHSA-pcgq-p35j-9wq3 | A reflected cross-site scripting (XSS) vulnerability in the Community Edition version 9.0 of OS4ED's openSIS Classic allows remote attackers to execute arbitrary JavaScript in the web browser of a user, by including a malicious payload into the 'ajax' parameter in 'ParentLookup.php'. | [] | null | 6.1 | null | null |
|
CVE-2022-31367 | Strapi before 3.6.10 and 4.x before 4.1.10 mishandles hidden attributes within admin API responses. | [
"cpe:2.3:a:strapi:strapi:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
|
CVE-2008-7144 | Multiple unspecified vulnerabilities in RARLAB WinRAR before 3.71 have unknown impact and attack vectors related to crafted (1) ACE, (2) ARJ, (3) BZ2, (4) CAB, (5) GZ, (6) LHA, (7) RAR, (8) TAR, or (9) ZIP files, as demonstrated by the OUSPG PROTOS GENOME test suite for Archive Formats. | [
"cpe:2.3:a:rarlab:winrar:*:*:*:*:*:*:*:*",
"cpe:2.3:a:rarlab:winrar:2.90:*:*:*:*:*:*:*",
"cpe:2.3:a:rarlab:winrar:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:rarlab:winrar:3.10:*:*:*:*:*:*:*",
"cpe:2.3:a:rarlab:winrar:3.10_beta3:*:*:*:*:*:*:*",
"cpe:2.3:a:rarlab:winrar:3.10_beta5:*:*:*:*:*:*:*",
"cpe:2.3:a:rarlab:winrar:3.11:*:*:*:*:*:*:*",
"cpe:2.3:a:rarlab:winrar:3.20:*:*:*:*:*:*:*",
"cpe:2.3:a:rarlab:winrar:3.30:*:*:*:*:*:*:*",
"cpe:2.3:a:rarlab:winrar:3.40:*:*:*:*:*:*:*",
"cpe:2.3:a:rarlab:winrar:3.41:*:*:*:*:*:*:*",
"cpe:2.3:a:rarlab:winrar:3.42:*:*:*:*:*:*:*",
"cpe:2.3:a:rarlab:winrar:3.50:*:*:*:*:*:*:*",
"cpe:2.3:a:rarlab:winrar:3.51:*:*:*:*:*:*:*",
"cpe:2.3:a:rarlab:winrar:3.60_beta1:*:*:*:*:*:*:*",
"cpe:2.3:a:rarlab:winrar:3.60_beta2:*:*:*:*:*:*:*",
"cpe:2.3:a:rarlab:winrar:3.60_beta3:*:*:*:*:*:*:*",
"cpe:2.3:a:rarlab:winrar:3.60_beta4:*:*:*:*:*:*:*",
"cpe:2.3:a:rarlab:winrar:3.60_beta5:*:*:*:*:*:*:*",
"cpe:2.3:a:rarlab:winrar:3.60_beta6:*:*:*:*:*:*:*",
"cpe:2.3:a:rarlab:winrar:3.60_beta7:*:*:*:*:*:*:*",
"cpe:2.3:a:rarlab:winrar:3.60_beta8:*:*:*:*:*:*:*",
"cpe:2.3:a:rarlab:winrar:3.61:*:*:*:*:*:*:*",
"cpe:2.3:a:rarlab:winrar:3.62:*:*:*:*:*:*:*",
"cpe:2.3:a:rarlab:winrar:3.70_beta1:*:*:*:*:*:*:*",
"cpe:2.3:a:rarlab:winrar:3.70_beta2:*:*:*:*:*:*:*",
"cpe:2.3:a:rarlab:winrar:3.70_beta3:*:*:*:*:*:*:*",
"cpe:2.3:a:rarlab:winrar:3.70_beta4:*:*:*:*:*:*:*",
"cpe:2.3:a:rarlab:winrar:3.70_beta5:*:*:*:*:*:*:*",
"cpe:2.3:a:rarlab:winrar:3.70_beta6:*:*:*:*:*:*:*",
"cpe:2.3:a:rarlab:winrar:3.70_beta7:*:*:*:*:*:*:*",
"cpe:2.3:a:rarlab:winrar:3.70_beta8:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
GHSA-8g22-628c-4vg2 | In Avast Premium Security 19.8.2393, attackers can send a specially crafted request to the local web server run by Avast Antivirus on port 27275 to support Bank Mode functionality. A flaw in the processing of a command allows execution of arbitrary OS commands with the privileges of the currently logged in user. This allows for example attackers who compromised a browser extension to escape from the browser sandbox. | [] | null | null | null | null |
|
CVE-2015-8801 | Race condition in the client in Symantec Endpoint Protection (SEP) 12.1 before RU6 MP5 allows local users to bypass intended restrictions on USB file transfer by conducting filesystem operations before the SEP device manager recognizes a new USB device. | [
"cpe:2.3:a:symantec:endpoint_protection_manager:*:mp4:*:*:*:*:*:*"
] | null | null | 2.9 | 3.3 |
|
GHSA-f494-3xww-3vw5 | Vulnerability in the Sun ZFS Storage Appliance Kit (AK) component of Oracle Sun Systems Products Suite (subcomponent: User Interface). The supported version that is affected is Prior to 8.7.19. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Sun ZFS Storage Appliance Kit (AK). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Sun ZFS Storage Appliance Kit (AK) accessible data. CVSS 3.0 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N). | [] | null | null | 5.3 | null |
|
CVE-2012-4283 | Cross-site scripting (XSS) vulnerability in the Login With Ajax plugin before 3.0.4.1 for WordPress allows remote attackers to inject arbitrary web script or HTML via the callback parameter. | [
"cpe:2.3:a:netweblogic:login_with_ajax:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netweblogic:login_with_ajax:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:netweblogic:login_with_ajax:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:netweblogic:login_with_ajax:2.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:netweblogic:login_with_ajax:2.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:netweblogic:login_with_ajax:2.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:netweblogic:login_with_ajax:2.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:netweblogic:login_with_ajax:2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:netweblogic:login_with_ajax:2.21:*:*:*:*:*:*:*",
"cpe:2.3:a:netweblogic:login_with_ajax:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:netweblogic:login_with_ajax:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:netweblogic:login_with_ajax:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:netweblogic:login_with_ajax:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:netweblogic:login_with_ajax:3.0b:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:-:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-rwjm-353c-64rx | An exploitable use-after-free vulnerability exists in the HTTP server implementation of Cesanta Mongoose 6.8. An ordinary HTTP POST request with a CGI target can cause a reuse of previously freed pointer potentially resulting in remote code execution. An attacker needs to send this HTTP request over the network to trigger this vulnerability. | [] | null | null | 9.8 | null |
|
CVE-2022-38485 | A directory traversal vulnerability exists in the AgeVolt Portal prior to version 0.1 that leads to Information Disclosure. A remote authenticated attacker could leverage this vulnerability to read files from any location on the target operating system with web server privileges. | [
"cpe:2.3:a:agevolt:agevolt:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | null |
|
CVE-2023-30683 | Improper access control in Telecom prior to SMR Aug-2023 Release 1 allows local attackers to call endCall API without permission. | [
"cpe:2.3:o:samsung:android:13.0:-:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-apr-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-dec-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-feb-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-jan-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-jul-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-jun-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-mar-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-may-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-nov-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-oct-2022-r1:*:*:*:*:*:*"
] | null | 4.3 | null | null |
|
CVE-2018-8171 | A Security Feature Bypass vulnerability exists in ASP.NET when the number of incorrect login attempts is not validated, aka "ASP.NET Security Feature Bypass Vulnerability." This affects ASP.NET, ASP.NET Core 1.1, ASP.NET Core 1.0, ASP.NET Core 2.0, ASP.NET MVC 5.2. | [
"cpe:2.3:a:microsoft:asp.net_core:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:asp.net_core:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:asp.net_core:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:asp.net_model_view_controller:5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:asp.net_webpages:3.2.3:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
CVE-2014-9183 | ZTE ZXDSL 831CII has a default password of admin for the admin account, which allows remote attackers to gain administrator privileges. | [
"cpe:2.3:h:zte:zxdsl:831cii:-:*:*:*:*:*:*"
] | null | null | null | 10 |
|
GHSA-q2x7-gx3x-j7wv | The mintToken function of a smart contract implementation for CryptoABS (ABS), an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value. | [] | null | null | 7.5 | null |
|
GHSA-mf28-xm36-jhfj | PC-Doctor Toolbox before 7.3 has an Uncontrolled Search Path Element. | [] | null | null | 7.8 | null |
|
GHSA-8c5q-q8rm-6hhr | SQL injection vulnerability in api/ice_media.cfc in Lingxia I.C.E CMS 1.0 allows remote attackers to execute arbitrary SQL commands via the session.user_id parameter to media.cfm. | [] | null | null | null | null |
|
CVE-2025-31576 | WordPress PostmarkApp Email Integrator plugin <= 2.4 - Broken Access Control vulnerability | Missing Authorization vulnerability in Gagan Deep Singh PostmarkApp Email Integrator allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects PostmarkApp Email Integrator: from n/a through 2.4. | [] | null | 4.3 | null | null |
CVE-2024-32961 | WordPress Blocksy theme <= 2.0.33 - Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Creative Themes HQ Blocksy allows Stored XSS.This issue affects Blocksy: from n/a through 2.0.33.
| [] | null | 6.5 | null | null |
CVE-2009-0827 | PollHelper stores poll.inc under the web root with insufficient access control, which allows remote attackers to download the database file containing user credentials via a direct request. | [
"cpe:2.3:a:freedville:pollhelper:-:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-r44r-7g3x-49c3 | Tenda G3 v3.0 v15.11.0.20 was discovered to contain a stack overflow via the formSetPortMapping function. | [] | null | 8.8 | null | null |
|
CVE-2007-4709 | Directory traversal vulnerability in CFNetwork in Apple Mac OS X 10.5.1 allows remote attackers to overwrite arbitrary files via a crafted HTTP response. | [
"cpe:2.3:o:apple:mac_os_x:10.5.1:*:*:*:*:*:*:*"
] | null | null | null | 8.8 |
|
ICSA-21-131-01 | Omron CX-One | The affected product is vulnerable to a stack-based buffer overflow, which may allow an attacker to execute arbitrary code.CVE-2021-27413 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). | [] | null | null | 7.8 | null |
GHSA-mmc6-ggcm-7jp9 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Radical Web Design GDPR Cookie Consent Notice Box plugin <= 1.1.6 versions. | [] | null | 5.9 | null | null |
|
CVE-2008-0701 | ActivationHandler in Magnolia CE 3.5.x before 3.5.4 does not check permissions during importing, which allows remote attackers to have an unknown impact via activation of a new item, possibly involving addition of arbitrary new content. | [
"cpe:2.3:a:magnolia:ce:3.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:magnolia:ce:3.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:magnolia:ce:3.5.3:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2023-6931 | Out-of-bounds write in Linux kernel's Performance Events system component | A heap out-of-bounds write vulnerability in the Linux kernel's Performance Events system component can be exploited to achieve local privilege escalation.
A perf_event's read_size can overflow, leading to an heap out-of-bounds increment or write in perf_read_group().
We recommend upgrading past commit 382c27f4ed28f803b1f1473ac2d8db0afc795a1b. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
CVE-2024-50294 | rxrpc: Fix missing locking causing hanging calls | In the Linux kernel, the following vulnerability has been resolved:
rxrpc: Fix missing locking causing hanging calls
If a call gets aborted (e.g. because kafs saw a signal) between it being
queued for connection and the I/O thread picking up the call, the abort
will be prioritised over the connection and it will be removed from
local->new_client_calls by rxrpc_disconnect_client_call() without a lock
being held. This may cause other calls on the list to disappear if a race
occurs.
Fix this by taking the client_call_lock when removing a call from whatever
list its ->wait_link happens to be on. | [] | null | null | null | null |
GHSA-w7vm-4v3j-vgpw | PyroCMS remote code execution vulnerability | PyroCMS 3.9 contains a remote code execution (RCE) vulnerability that can be exploited through a server-side template injection (SSTI) flaw. This vulnerability allows a malicious attacker to send customized commands to the server and execute arbitrary code on the affected system. | [] | null | 9.8 | null | null |
CVE-2018-3006 | Vulnerability in the JD Edwards EnterpriseOne Tools component of Oracle JD Edwards Products (subcomponent: Web Runtime). The supported version that is affected is 9.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise JD Edwards EnterpriseOne Tools. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in JD Edwards EnterpriseOne Tools, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of JD Edwards EnterpriseOne Tools accessible data as well as unauthorized read access to a subset of JD Edwards EnterpriseOne Tools accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N). | [
"cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:9.2:*:*:*:*:*:*:*"
] | null | null | 6.1 | 5.8 |
|
GHSA-85vj-h537-h9hr | Integer format vulnerability in the ticket number generator in Enhancesoft osTicket before 1.10.2 allows remote attackers to cause a denial-of-service (preventing the creation of new tickets) via a large number of digits in the ticket number format setting. | [] | null | null | 4.9 | null |
|
CVE-2016-7099 | The tls.checkServerIdentity function in Node.js 0.10.x before 0.10.47, 0.12.x before 0.12.16, 4.x before 4.6.0, and 6.x before 6.7.0 does not properly handle wildcards in name fields of X.509 certificates, which allows man-in-the-middle attackers to spoof servers via a crafted certificate. | [
"cpe:2.3:a:nodejs:node.js:0.10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.2:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.3:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.4:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.5:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.6:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.7:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.8:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.9:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.10:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.11:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.12:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.13:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.14:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.15:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.16:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.16-isaacs-manual:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.17:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.18:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.19:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.20:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.21:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.22:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.23:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.24:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.25:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.26:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.27:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.28:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.29:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.30:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.31:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.32:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.33:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.34:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.35:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.36:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.37:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.38:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.39:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.40:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.41:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.42:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.43:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.44:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.45:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.10.46:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:6.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:6.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:6.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:6.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:6.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:6.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:6.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:6.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:6.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.12.0:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.12.1:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.12.2:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.12.3:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.12.4:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.12.5:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.12.6:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.12.7:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.12.8:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.12.9:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.12.10:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.12.11:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.12.12:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.12.13:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.12.14:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:0.12.15:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:4.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:4.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:4.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:4.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:4.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:4.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:4.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:4.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:4.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:4.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:4.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:4.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:4.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:4.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:4.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:4.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:4.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:4.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:4.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:4.5.0:*:*:*:*:*:*:*"
] | null | null | 5.9 | 4.3 |
|
GHSA-q95x-xfrq-rfmg | AOSP Mail in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-09-01 allows attackers to obtain sensitive EmailAccountCacheProvider information via a crafted application, aka internal bug 29767043. | [] | null | null | 5.5 | null |
|
GHSA-prgj-fx3q-8ffq | A CSRF vulnerability exists in the Web File Manager's Network Setting functionality of Rumpus FTP Server 8.2.9.1. By exploiting it, an attacker can manipulate the SMTP setting and other network settings via RAPR/NetworkSettingsSet.html. | [] | null | null | null | null |
|
GHSA-2jhq-65q3-jpx9 | The affected application lacks proper validation of user-supplied data when parsing project files (e.g., CSP). This could lead to an out-of-bounds read in the FontManager. An attacker could leverage this vulnerability to execute arbitrary code in the context of the current process. | [] | null | 7.8 | null | null |
|
GHSA-rqv4-4ww5-pmv5 | Windows Services and Controller App Elevation of Privilege Vulnerability | [] | null | 7.8 | null | null |
|
CVE-2019-5383 | A remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09. | [
"cpe:2.3:a:hp:intelligent_management_center:*:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:-:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0503:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0504:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0504p02:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0504p04:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0506:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0506p03:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0506p07:*:*:*:*:*:*"
] | null | null | 8.8 | 9 |
|
GHSA-jmq5-vh92-gvhq | Directory traversal vulnerability in search engine for iPlanet web server 6.0 SP2 and 4.1 SP9, and Netscape Enterprise Server 3.6, when running on Windows platforms, allows remote attackers to read arbitrary files via ..\ (dot-dot backslash) sequences in the NS-query-pat parameter. | [] | null | null | null | null |
|
CVE-2018-3918 | An exploitable vulnerability exists in the remote servers of Samsung SmartThings Hub STH-ETH-250 - Firmware version 0.20.17. The hubCore process listens on port 39500 and relays any unauthenticated messages to SmartThings' remote servers, which incorrectly handle camera IDs for the 'sync' operation, leading to arbitrary deletion of cameras. An attacker can send an HTTP request to trigger this vulnerability. | [
"cpe:2.3:o:samsung:sth-eth-250_firmware:0.20.17:*:*:*:*:*:*:*",
"cpe:2.3:h:samsung:sth-eth-250:-:*:*:*:*:*:*:*"
] | null | null | 6.5 | null |
|
GHSA-6w2j-4h6c-6wqg | Use-after-free vulnerability in the DesktopDisplayDevice class in the WebRTC implementation in Mozilla Firefox before 45.0 on Windows might allow remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors. | [] | null | null | 5.5 | null |
|
GHSA-5rxg-w5rp-9mcr | A vulnerability, which was classified as critical, was found in RockOA 2.3.2. This affects the function runAction of the file acloudCosAction.php.SQL. The manipulation of the argument fileid leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-223401 was assigned to this vulnerability. | [] | null | 8.8 | null | null |
|
GHSA-gxjw-hv3q-88gf | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in CurrencyRate.Today Crypto Converter Widget allows Stored XSS.This issue affects Crypto Converter Widget: from n/a through 1.8.4. | [] | null | 6.5 | null | null |
|
CVE-2006-0134 | Cross-site scripting (XSS) vulnerability in register.php in TheWebForum (twf) 1.2.1 allows remote attackers to inject arbitrary web script or HTML via the www parameter. | [
"cpe:2.3:a:thewebforum:thewebforum:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-m3qr-mjwp-7555 | A vulnerability has been identified in SINEC NMS (All versions < V3.0). The affected application does not properly validate user input to a privileged command queue. This could allow an authenticated attacker to execute OS commands with elevated privileges. | [] | 9.4 | 9.1 | null | null |
|
CVE-2022-40534 | Improper Validation of Array Index in Audio | Memory corruption due to improper validation of array index in Audio. | [
"cpe:2.3:o:qualcomm:wcn685x-5_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn685x-5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn685x-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn685x-1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn785x-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn785x-1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn785x-5_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn785x-5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_w5\\+_gen_1_wearable_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_w5\\+_gen_1_wearable_platform:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sw5100_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sw5100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sw5100p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sw5100p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sxr2230p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sxr2230p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8832_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8832:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*"
] | null | 8.4 | null | null |
GHSA-fpgj-7jhh-pchm | Cross-Site Request Forgery (CSRF) vulnerability in Coachify Coachify allows Cross Site Request Forgery.This issue affects Coachify: from n/a through 1.0.7. | [] | null | 4.3 | null | null |
|
GHSA-pmwg-qm4w-3cmq | The notification emails sent by Soar Cloud HR Portal contain a link with a embedded session. These emails are sent without using an encrypted transmission protocol. If an attacker intercepts the packets, they can obtain the plaintext session information and use it to log into the system. | [] | null | 8.8 | null | null |
|
CVE-2012-2283 | The Iomega Home Media Network Hard Drive with EMC Lifeline firmware before 2.104, Home Media Network Hard Drive Cloud Edition with EMC Lifeline firmware before 3.2.3.15290, iConnect with EMC Lifeline firmware before 2.5.26.18966, and StorCenter with EMC Lifeline firmware before 2.0.18.23122, 2.1.x before 2.1.42.18967, and 3.x before 3.2.3.15290 allow remote authenticated users to read or modify data on arbitrary remote shares via unspecified vectors. | [
"cpe:2.3:o:emc:lifeline:*:*:*:*:*:*:*:*",
"cpe:2.3:h:iomega:home_media_network_hard_drive:*:*:*:*:*:*:*:*",
"cpe:2.3:h:iomega:home_media_network_hard_drive:*:*:cloud:*:*:*:*:*",
"cpe:2.3:h:iomega:iconnect:*:*:*:*:*:*:*:*",
"cpe:2.3:o:emc:lifeline:23.2.3.15289:*:*:*:*:*:*:*",
"cpe:2.3:h:iomega:storcenter:*:*:*:*:*:*:*:*"
] | null | null | null | 5.5 |
|
GHSA-xhjj-qrrg-5524 | GE UR firmware versions prior to version 8.1x supports web interface with read-only access. The device fails to properly validate user input, making it possible to perform cross-site scripting attacks, which may be used to send a malicious script. Also, UR Firmware web server does not perform HTML encoding of user-supplied strings. | [] | null | 6.1 | null | null |
|
GHSA-55mr-49mr-xcvc | A specially crafted message can be sent to the TTLock App that downgrades the encryption protocol used for communication, and can be utilized to compromise the lock, such as through revealing the unlockKey field. | [] | null | 7.5 | null | null |
|
RHBA-2022:5454 | Red Hat Bug Fix Advisory: Red Hat Single Sign-On 7.6.0 update on RHEL 8 | keycloak-services: ClassLoaderTheme and ClasspathThemeResourceProviderFactory allows reading any file available as a resource to the classloader liquibase: Improper Restriction of XML External Entity | [
"cpe:/a:redhat:red_hat_single_sign_on:7.6::el8"
] | null | 7.3 | null | null |
CVE-2022-45821 | WordPress NOO Timetable Plugin <= 2.1.3 is vulnerable to Cross Site Scripting (XSS) | Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in NooTheme Noo Timetable plugin <= 2.1.3 versions. | [
"cpe:2.3:a:nootheme:noo_timetable:*:*:*:*:*:wordpress:*:*"
] | null | 6.5 | null | null |
RHSA-2020:5399 | Red Hat Security Advisory: thunderbird security update | Mozilla: Stack overflow due to incorrect parsing of SMTP server response codes | [
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 8.8 | null | null |
GHSA-8mg3-xpwr-h867 | An issue was discovered in Kaseya Unitrends Backup Appliance before 10.5.5. The Unitrends Windows agent was vulnerable to DLL injection and binary planting due to insecure default permissions. This allowed privilege escalation from an unprivileged user to SYSTEM. | [] | null | 7.8 | null | null |
|
GHSA-mwvx-wp54-2xv5 | Exposure of resource to wrong sphere issue exists in WL-WN531AX2 firmware versions prior to 2023526, which may allow a network-adjacent attacker to use functions originally available after login without logging in. | [] | null | 8.1 | null | null |
|
CVE-2024-20058 | In keyInstall, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08580204; Issue ID: ALPS08580204. | [
"cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
"cpe:2.3:a:mediatek:mt6768:*:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8755:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8771:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8792:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8795t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8796:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*"
] | null | 4.4 | null | null |
|
CVE-2014-5196 | Cross-site request forgery (CSRF) vulnerability in improved-user-search-in-backend.php in the backend in the Improved user search in backend plugin before 1.2.5 for WordPress allows remote attackers to hijack the authentication of administrators for requests that insert XSS sequences via the iusib_meta_fields parameter. | [
"cpe:2.3:a:improved_user_search_in_backend_project:improved_user_search_in_backend:*:-:-:*:-:wordpress:*:*"
] | null | null | null | 4.3 |
|
GHSA-c9v6-pvjj-3wqc | epan/proto.c in Wireshark 1.12.x before 1.12.11 and 2.0.x before 2.0.3 does not limit the protocol-tree depth, which allows remote attackers to cause a denial of service (stack memory consumption and application crash) via a crafted packet. | [] | null | null | 5.9 | null |
|
GHSA-hvwc-2mrx-9ggw | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Perfmatters allows Stored XSS.This issue affects Perfmatters: from n/a before 2.2.0. | [] | null | 6.5 | null | null |
|
GHSA-xq6g-x53r-cw4c | Multiple stack-based buffer overflows in msg_server.exe in SAP NetWeaver ABAP 7.x allow remote attackers to cause a denial of service (crash) and execute arbitrary code via a (1) long parameter value, (2) crafted string size field, or (3) long Parameter Name string in a package with opcode 0x43 and sub opcode 0x4 to TCP port 3900. | [] | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.