id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-jh6f-6q67-5q7v | Due to lack of server-side input validation, attackers can inject malicious JavaScript code into users personal spaces of the web portal. | [] | 9.3 | 9.8 | null | null |
|
GHSA-rjfv-5xmq-8rm7 | Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.28 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.0 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H). | [] | null | 5 | null | null |
|
CVE-2014-6702 | The StarSat International (aka com.conduit.app_b15a1814d2d840198e70e3c235af5e8b.app) application 1.41.54.9222 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [
"cpe:2.3:a:starsat:starsat_international:1.41.54.9222:*:*:*:*:android:*:*"
] | null | null | null | 5.4 |
|
CVE-2010-3346 | Microsoft Internet Explorer 6, 7, and 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, leading to memory corruption, aka "HTML Element Memory Corruption Vulnerability." | [
"cpe:2.3:a:microsoft:internet_explorer:6:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:-:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:x64:*",
"cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
GHSA-vx2v-mjff-9hjf | In the Linux kernel, the following vulnerability has been resolved:crypto: safexcel - Add error handling for dma_map_sg() callsMacro dma_map_sg() may return 0 on error. This patch enables
checks in case of the macro failure and ensures unmapping of
previously mapped buffers with dma_unmap_sg().Found by Linux Verification Center (linuxtesting.org) with static
analysis tool SVACE. | [] | null | 5.5 | null | null |
|
GHSA-p7qf-46x2-8wwx | SAPLPD 6.28 and earlier included in SAP GUI 7.10 and SAPSprint before 1018 allows remote attackers to cause a denial of service (crash) via a 0x53 LPD command, which causes the server to terminate. | [] | null | null | null | null |
|
GHSA-pm8j-q65p-vpvx | SQL injection vulnerability in index.php in ScriptMagix Jokes 2.0 and earlier allows remote attackers to execute arbitrary SQL commands via the catid parameter. | [] | null | null | null | null |
|
CVE-2017-11455 | diag.cgi in Pulse Connect Secure 8.2R1 through 8.2R5, 8.1R1 through 8.1R10 and Pulse Policy Secure 5.3R1 through 5.3R5, 5.2R1 through 5.2R8, and 5.1R1 through 5.1R10 allow remote attackers to hijack the authentication of administrators for requests to start tcpdump, related to the lack of anti-CSRF tokens. | [
"cpe:2.3:a:ivanti:connect_secure:8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:pulsesecure:pulse_connect_secure:8.1r1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:pulsesecure:pulse_connect_secure:8.2r1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:pulsesecure:pulse_connect_secure:8.2r1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:pulsesecure:pulse_connect_secure:8.2r2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:pulsesecure:pulse_connect_secure:8.2r3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:pulsesecure:pulse_connect_secure:8.2r3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:pulsesecure:pulse_connect_secure:8.2r4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:pulsesecure:pulse_connect_secure:8.2r4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:pulsesecure:pulse_connect_secure:8.2r5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:pulsesecure:pulse_policy_secure:5.1r1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:pulsesecure:pulse_policy_secure:5.1r1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:pulsesecure:pulse_policy_secure:5.1r2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:pulsesecure:pulse_policy_secure:5.1r2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:pulsesecure:pulse_policy_secure:5.1r3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:pulsesecure:pulse_policy_secure:5.1r3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:pulsesecure:pulse_policy_secure:5.1r4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:pulsesecure:pulse_policy_secure:5.1r5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:pulsesecure:pulse_policy_secure:5.1r6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:pulsesecure:pulse_policy_secure:5.1r7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:pulsesecure:pulse_policy_secure:5.1r7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:pulsesecure:pulse_policy_secure:5.1r8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:pulsesecure:pulse_policy_secure:5.1r9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:pulsesecure:pulse_policy_secure:5.1r10:*:*:*:*:*:*:*",
"cpe:2.3:a:pulsesecure:pulse_policy_secure:5.2r1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:pulsesecure:pulse_policy_secure:5.2r2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:pulsesecure:pulse_policy_secure:5.2r3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:pulsesecure:pulse_policy_secure:5.2r3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:pulsesecure:pulse_policy_secure:5.2r4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:pulsesecure:pulse_policy_secure:5.2r5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:pulsesecure:pulse_policy_secure:5.2r6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:pulsesecure:pulse_policy_secure:5.2r7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:pulsesecure:pulse_policy_secure:5.2r7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:pulsesecure:pulse_policy_secure:5.2r8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:pulsesecure:pulse_policy_secure:5.3r1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:pulsesecure:pulse_policy_secure:5.3r1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:pulsesecure:pulse_policy_secure:5.3r2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:pulsesecure:pulse_policy_secure:5.3r3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:pulsesecure:pulse_policy_secure:5.3r3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:pulsesecure:pulse_policy_secure:5.3r4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:pulsesecure:pulse_policy_secure:5.3r4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:pulsesecure:pulse_policy_secure:5.3r5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:pulsesecure:pulse_policy_secure:5.3r5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:pulsesecure:pulse_policy_secure:5.3r5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:pulsesecure:pulse_policy_secure:5.3r6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:pulsesecure:pulse_policy_secure:5.3r7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:pulsesecure:pulse_policy_secure:5.3r8.0:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.8 |
|
GHSA-qjw8-8m2x-jvh6 | Online Examination System v1.0 is vulnerable to multiple Authenticated SQL Injection vulnerabilities. The 'eid' parameter of the update.php resource does not validate the characters received and they are sent unfiltered to the database. | [] | null | 9.8 | null | null |
|
GHSA-66vf-xw82-p57g | Weak ciphers in Softing smartLink SW-HT before 1.30 are enabled during secure communication (SSL). | [] | null | 5.9 | null | null |
|
CVE-2020-1785 | Mate 10 Pro;Honor V10;Honor 10;Nova 4 smartphones have a denial of service vulnerability. The system does not properly check the status of certain module during certain operations, an attacker should trick the user into installing a malicious application, successful exploit could cause reboot of the smartphone. | [
"cpe:2.3:o:huawei:mate_10_pro_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:mate_10_pro:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:honor_v10_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:honor_v10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:honor_10_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:honor_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:nova_4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:nova_4:-:*:*:*:*:*:*:*"
] | null | 5.5 | null | 7.1 |
|
GHSA-822x-846c-2c22 | A potential vulnerability has been reported in Lenovo Power Management Driver versions prior to 1.67.17.48 leading to a buffer overflow which could cause a denial of service. | [] | null | null | null | null |
|
GHSA-4h79-c4ph-6hc8 | TYPSoft FTP Server 1.10 allows remote authenticated users to cause a denial of service (crash) by sending an APPE (append) command immediately followed by a DELE (delete) command without sending file data in between these two commands. | [] | null | null | null | null |
|
GHSA-jm6p-x3m4-xf2r | An information disclosure vulnerability exists when the Windows Runtime improperly handles objects in memory, aka 'Windows Runtime Information Disclosure Vulnerability'. | [] | null | null | null | null |
|
CVE-2024-28320 | Insecure Direct Object References (IDOR) vulnerability in Hospital Management System 1.0 allows attackers to manipulate user parameters for unauthorized access and modifications via crafted POST request to /patient/edit-user.php. | [
"cpe:2.3:a:hospital_management_system_project:hospital_management_system:1.0:*:*:*:*:*:*:*"
] | null | 7.6 | null | null |
|
CVE-2021-36914 | WordPress CalderaWP License Manager plugin <= 1.2.11 - Cross-Site Request Forgery (CSRF) vulnerability leading to Reflected Cross-Site Scripting (XSS) | Cross-Site Request Forgery (CSRF) vulnerability leading to Reflected Cross-Site Scripting (XSS) in CalderaWP License Manager (WordPress plugin) <= 1.2.11. | [
"cpe:2.3:a:claderaform:calderawp_license_manager:*:*:*:*:*:wordpress:*:*"
] | null | 6.1 | null | null |
CVE-2023-23994 | WordPress Auto Hide Admin Bar Plugin <= 1.6.1 is vulnerable to Cross Site Scripting (XSS) | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Marcel Bootsman Auto Hide Admin Bar plugin <= 1.6.1 versions. | [
"cpe:2.3:a:auto_hide_admin_bar_project:auto_hide_admin_bar:*:*:*:*:*:wordpress:*:*"
] | null | 5.9 | null | null |
CVE-2022-4537 | The Hide My WP Ghost – Security Plugin plugin for WordPress is vulnerable to IP Address Spoofing in versions up to, and including, 5.0.18. This is due to insufficient restrictions on where the IP Address information is being retrieved for request logging and login restrictions. Attackers can supply the X-Forwarded-For header with with a different IP Address that will be logged and can be used to bypass settings that may have blocked out an IP address from logging in. | [
"cpe:2.3:a:wpplugins:hide_my_wp_ghost:*:*:*:*:*:wordpress:*:*"
] | null | 6.5 | null | null |
|
GHSA-8462-q7x7-g2x4 | js-bson vulnerable to REDoS | The MongoDB bson JavaScript module (also known as js-bson) versions 0.5.0 to 1.0.x before 1.0.5 is vulnerable to a Regular Expression Denial of Service (ReDoS) in lib/bson/decimal128.js. The flaw is triggered when the Decimal128.fromString() function is called to parse a long untrusted string. | [] | null | null | 7.5 | null |
GHSA-r489-wv9g-p54f | An issue was discovered in Alfresco Community Edition versions below 5.2.6, 6.0.N and 6.1.N. The Alfresco Share application is vulnerable to an Open Redirect attack via a crafted POST request. By manipulating the POST parameters, an attacker can redirect a victim to a malicious website over any protocol the attacker desires (e.g.,http, https, ftp, smb, etc.). | [] | null | null | null | null |
|
GHSA-3gfw-xw8c-gm3c | Cross-Site Request Forgery (CSRF) vulnerability in Really Simple Plugins Complianz, Really Simple Plugins Complianz Premium allows Cross-Site Request Forgery.This issue affects Complianz: from n/a through 6.4.5; Complianz Premium: from n/a through 6.4.7. | [] | null | 6.5 | null | null |
|
CVE-2020-9318 | Red Gate SQL Monitor 9.0.13 through 9.2.14 allows an administrative user to perform a SQL injection attack by configuring the SNMP alert settings in the UI. This is fixed in 9.2.15. | [
"cpe:2.3:a:red-gate:sql_monitor:*:*:*:*:*:*:*:*"
] | null | 7.2 | null | 6.5 |
|
GHSA-v584-fchc-ccv3 | The Spacer plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the motech_spacer_callback() function in all versions up to, and including, 3.0.7. This makes it possible for authenticated attackers, with Subscriber-level access and above, to view limited setting information. | [] | null | 3.1 | null | null |
|
CVE-2022-39377 | sysstat Incorrect Buffer Size calculation on 32-bit systems results in RCE via buffer overflow | sysstat is a set of system performance tools for the Linux operating system. On 32 bit systems, in versions 9.1.16 and newer but prior to 12.7.1, allocate_structures contains a size_t overflow in sa_common.c. The allocate_structures function insufficiently checks bounds before arithmetic multiplication, allowing for an overflow in the size allocated for the buffer representing system activities. This issue may lead to Remote Code Execution (RCE). This issue has been patched in version 12.7.1. | [
"cpe:2.3:a:sysstat_project:sysstat:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*"
] | null | 7 | null | null |
GHSA-447v-pq45-237q | Insufficient boundary checks when processing a string in mb_ereg_replace allows access to out-of-bounds memory. This issue affects HHVM versions prior to 3.30.12, all versions between 4.0.0 and 4.8.5, all versions between 4.9.0 and 4.23.1, as well as 4.24.0, 4.25.0, 4.26.0, 4.27.0, 4.28.0, and 4.28.1. | [] | null | null | null | null |
|
RHSA-2024:8533 | Red Hat Security Advisory: Multicluster Engine for Kubernetes 2.4.6 security updates and bug fixes | elliptic: nodejs/elliptic: EDDSA signature malleability due to missing signature length check elliptic: nodejs/elliptic: ECDSA signature malleability due to missing checks elliptic: nodejs/elliptic: ECDSA implementation malleability due to BER-enconded signatures being allowed elliptic: Missing Validation in Elliptic's EDDSA Signature Verification | [
"cpe:/a:redhat:multicluster_engine:2.4::el8"
] | null | 8.2 | null | null |
CVE-2023-4734 | Integer Overflow or Wraparound in vim/vim | Integer Overflow or Wraparound in GitHub repository vim/vim prior to 9.0.1846. | [
"cpe:2.3:a:vim:vim:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | null |
GHSA-75mx-c32q-gr7g | In kisd, there is a possible out of bounds read due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Product: Android; Versions: Android-11; Patch ID: ALPS05449968. | [] | null | null | null | null |
|
CVE-2022-24632 | An issue was discovered in AudioCodes Device Manager Express through 7.8.20002.47752. It is directory traversal during file download via the BrowseFiles.php view parameter. | [
"cpe:2.3:a:audiocodes:device_manager_express:*:*:*:*:*:*:*:*"
] | null | 5.3 | null | null |
|
CVE-2009-4109 | The install wizard in DotNetNuke 4.0 through 5.1.4 does not prevent anonymous users from accessing functionality related to determination of the need for an upgrade, which allows remote attackers to access version information and possibly other sensitive information. | [
"cpe:2.3:a:dotnetnuke:dotnetnuke:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:dotnetnuke:dotnetnuke:4.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:dotnetnuke:dotnetnuke:4.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:dotnetnuke:dotnetnuke:4.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:dotnetnuke:dotnetnuke:4.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:dotnetnuke:dotnetnuke:4.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:dotnetnuke:dotnetnuke:4.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:dotnetnuke:dotnetnuke:4.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:dotnetnuke:dotnetnuke:4.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:dotnetnuke:dotnetnuke:4.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:dotnetnuke:dotnetnuke:4.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:dotnetnuke:dotnetnuke:4.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:dotnetnuke:dotnetnuke:4.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:dotnetnuke:dotnetnuke:4.8.3:*:*:*:*:*:*:*",
"cpe:2.3:a:dotnetnuke:dotnetnuke:4.8.4:*:*:*:*:*:*:*",
"cpe:2.3:a:dotnetnuke:dotnetnuke:4.9:*:*:*:*:*:*:*",
"cpe:2.3:a:dotnetnuke:dotnetnuke:4.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:dotnetnuke:dotnetnuke:4.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:dotnetnuke:dotnetnuke:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:dotnetnuke:dotnetnuke:5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:dotnetnuke:dotnetnuke:5.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:dotnetnuke:dotnetnuke:5.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:dotnetnuke:dotnetnuke:5.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:dotnetnuke:dotnetnuke:5.1.4:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2022-48333 | Widevine Trusted Application (TA) 5.0.0 through 5.1.1 has a drm_verify_keys prefix_len+feature_name_len integer overflow and resultant buffer overflow. | [
"cpe:2.3:a:widevine:trusted_application:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
GHSA-9x44-9pgq-cf45 | avro vulnerable to denial of service via attacker-controlled parameter | SummaryA well-crafted string passed to avro's `github.com/hamba/avro/v2.Unmarshal()` can throw a `fatal error: runtime: out of memory` which is unrecoverable and can cause denial of service of the consumer of avro.DetailsThe root cause of the issue is that avro uses part of the input to `Unmarshal()` to determine the size when creating a new slice.In the reproducer below, the first few bytes determine the size of the slice.The root cause is on line 239 here:
https://github.com/hamba/avro/blob/3abfe1e6382c5dccf2e1a00260c51a64bc1f1ca1/reader.go#L216-L242PoCThe issue was found during a security audit of Dapr, and I attach a reproducer that shows how the issue affects Dapr.Dapr uses an older version of the avro library, but it is also affected if bumping avro to latest.To reproduce:now add this test to the `pulsar_test.go`:run the test with `go test -run=TestParsePublishMetadata2`.You should see this stacktrace:ImpactAny use case of the avro Unmarshalling routine that accepts untrusted input is affected.The impact is that an attacker can crash the running application and cause denial of service. | [] | null | 7.5 | null | null |
GHSA-j6wf-jr95-r768 | The vulnerability have been reported to affect earlier versions of Helpdesk. If exploited, this improper certificate validation vulnerability could allow an attacker to spoof a trusted entity by interfering in the communication path between the host and client. QNAP has already fixed the issue in Helpdesk 3.0.3 and later. | [] | null | null | null | null |
|
CVE-2021-46558 | Multiple cross-site scripting (XSS) vulnerabilities in the Add User module of Issabel PBX 20200102 allows attackers to execute arbitrary web scripts or HTML via a crafted payload inserted into the username and password fields. | [
"cpe:2.3:a:issabel:pbx:20200102:*:*:*:*:*:*:*"
] | null | 5.4 | null | 3.5 |
|
RHSA-2025:3801 | Red Hat Security Advisory: RHEL AI 1.5 hdf5 security update | hdf5: heap buffer overread hdf5: multiple CVEs hdf5: multiple CVEs hdf5: multiple CVEs hdf5: multiple CVEs hdf5: multiple CVEs hdf5: multiple CVEs hdf5: multiple CVEs hdf5: multiple CVEs hdf5: multiple CVEs hdf5: multiple CVEs hdf5: multiple CVEs hdf5: multiple CVEs hdf5: multiple CVEs hdf5: multiple CVEs hdf5: multiple CVEs hdf5: multiple CVEs hdf5: multiple CVEs hdf5: multiple CVEs hdf5: multiple CVEs hdf5: multiple CVEs hdf5: multiple CVEs hdf5: multiple CVEs hdf5: multiple CVEs hdf5: multiple CVEs hdf5: multiple CVEs hdf5: multiple CVEs hdf5: multiple CVEs hdf5: multiple CVEs hdf5: multiple CVEs | [
"cpe:/a:redhat:enterprise_linux_ai:1.5::el9"
] | null | 4.8 | null | null |
CVE-2018-10371 | An issue was discovered in the wunderfarm WF Cookie Consent plugin 1.1.3 for WordPress. A persistent cross-site scripting vulnerability has been identified in the web interface of the plugin that allows the execution of arbitrary HTML/script code to be executed in a victim's web browser via a page title. | [
"cpe:2.3:a:wunderfarm:wf_cookie_consent:1.1.3:*:*:*:*:wordpress:*:*"
] | null | null | 6.1 | 4.3 |
|
GHSA-fcmm-5r7x-9cpv | Absolute path traversal vulnerability in the Systematica SMTP Adapter component (up to v2.0.1.101) in Systematica Radius (up to v.3.9.256.777) allows remote attackers to read arbitrary files via a full pathname in GET parameter "file" in URL. Also: affected components in same product - HTTP Adapter (up to v.1.8.0.15), MSSQL MessageBus Proxy (up to v.1.1.06), Financial Calculator (up to v.1.3.05), FIX Adapter (up to v.2.4.0.25) | [] | null | 5.3 | null | null |
|
CVE-2004-0821 | The CFPlugIn in Core Foundation framework in Mac OS X allows user supplied libraries to be loaded, which could allow local users to gain privileges. | [
"cpe:2.3:o:apple:mac_os_x:10.2.8:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.3.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.3.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.2.8:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.3.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.3.5:*:*:*:*:*:*:*"
] | null | null | null | 7.2 |
|
GHSA-7733-wh9m-x4gj | IBM Security Guardium Key Lifecycle Manager 3.0, 3.0.1, 4.0, 4.1, and 4.1.1 could allow an authenticated user to perform actions that they should not have access to due to improper authorization. IBM X-Force ID: 247630. | [] | null | 8.8 | null | null |
|
RHSA-2023:4030 | Red Hat Security Advisory: grafana security update | grafana: account takeover possible when using Azure AD OAuth | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 9.8 | null | null |
CVE-2005-2042 | Cross-site scripting (XSS) vulnerability in ajax-spell before 1.8 allows remote attackers to inject arbitrary web script or HTML via onmouseover or other events in HTML tags. | [
"cpe:2.3:a:ajax-spell:ajax-spell:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ajax-spell:ajax-spell:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ajax-spell:ajax-spell:1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ajax-spell:ajax-spell:1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ajax-spell:ajax-spell:1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ajax-spell:ajax-spell:1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ajax-spell:ajax-spell:1.7:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2020-2911 | Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.40, prior to 6.0.20 and prior to 6.1.6. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H). | [
"cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"
] | null | null | 7.5 | null |
|
CVE-2022-32033 | Tenda AX1806 v1.0.0.1 was discovered to contain a stack overflow via the function formSetVirtualSer. | [
"cpe:2.3:o:tenda:ax1806_firmware:1.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:h:tenda:ax1806:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | 7.8 |
|
GHSA-797h-77wr-83m6 | The Royal Elementor Addons plugin for WordPress is vulnerable to insufficient access control in the 'wpr_final_settings_setup' AJAX action in versions up to, and including, 1.3.59. This allows any authenticated user, including those with subscriber-level permissions, to finalize activation of preset site configuration templates, which can be chosen and imported via a separate action documented in CVE-2022-4704. | [] | null | 4.3 | null | null |
|
GHSA-3672-825v-3jr7 | 'Yahoo! JAPAN' App for Android v2.3.1 to v3.161.1 and 'Yahoo! JAPAN' App for iOS v3.2.2 to v4.109.0 contain a cross-site scripting vulnerability. If this vulnerability is exploited, an arbitrary script may be executed on the WebView of 'Yahoo! JAPAN' App via other app installed on the user's device. | [] | null | 6.1 | null | null |
|
GHSA-33j8-9xqj-q27p | This vulnerability allows remote attackers to bypass authentication on affected installations of Ivanti Avalanche 6.3.2.3490. The specific flaw exists within the ProfileDaoImpl class. A crafted request can trigger execution of SQL queries composed from a user-supplied string. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-15328. | [] | null | 9.8 | null | null |
|
GHSA-6c4j-fhmx-54hj | Uniscribe in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, and 1607, and Windows Server 2016 allows remote attackers to execute arbitrary code via a crafted web site, aka "Windows Uniscribe Remote Code Execution Vulnerability." This vulnerability is different from those described in CVE-2017-0072, CVE-2017-0083, CVE-2017-0086, CVE-2017-0087, CVE-2017-0088, CVE-2017-0089, and CVE-2017-0090. | [] | null | null | 8.8 | null |
|
RHSA-2009:1180 | Red Hat Security Advisory: bind security and bug fix update | bind: DoS (assertion failure) via nsupdate packets | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
GHSA-6j78-9283-gj3w | In MuPDF 1.12.0, there is an infinite loop vulnerability and application hang in the pdf_parse_array function (pdf/pdf-parse.c) because EOF is not considered. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted pdf file. | [] | null | 5.5 | null | null |
|
CVE-2009-0351 | Stack-based buffer overflow in WFTPSRV.exe in WinFTP 2.3.0 allows remote authenticated users to execute arbitrary code via a long LIST argument beginning with an * (asterisk) character. | [
"cpe:2.3:a:wftpserver:winftp_ftp_server:2.3.0:*:*:*:*:*:*:*"
] | null | null | null | 9 |
|
GHSA-8v76-643q-v8h8 | ** DISPUTED ** Adobe ColdFusion 9.0.1 CHF1 and earlier, when a web application is configured to use a DBMS, allows remote attackers to obtain potentially sensitive information about the database structure via an id=- query to a .cfm file. NOTE: the vendor disputes the significance of this issue because the Site-wide Error Handler and Debug Output Settings sections of the ColdFusion Lockdown guide explain the requirement for settings that prevent this information disclosure. | [] | null | 5.3 | null | null |
|
GHSA-g8q4-vx2r-28r6 | CA Unified Infrastructure Management (Nimsoft/UIM) 9.20 and below contains an improper ACL handling vulnerability in the robot (controller) component. A remote attacker can execute commands, read from, or write to the target system. | [] | null | 9.8 | null | null |
|
RHSA-2010:0489 | Red Hat Security Advisory: java-1.5.0-ibm security update | OpenJDK Applet Trusted Methods Chaining Privilege Escalation Vulnerability (6904691) OpenJDK JPEGImageReader stepX Integer Overflow Vulnerability (6909597) JDK multiple unspecified vulnerabilities JDK multiple unspecified vulnerabilities JDK multiple unspecified vulnerabilities JDK unspecified vulnerability in ImageIO component OpenJDK ImagingLib arbitrary code execution vulnerability (6914866) OpenJDK AWT Library Invalid Index Vulnerability (6914823) JDK unspecified vulnerability in Java2D component | [
"cpe:/a:redhat:rhel_extras:4",
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
] | null | null | null | null |
GHSA-c49p-76wp-8wwx | An issue was discovered in datafile.c in Gnuplot 5.2.5. This issue allows an attacker to conduct a heap-based buffer overflow with an arbitrary amount of data in df_generate_ascii_array_entry. To exploit this vulnerability, an attacker must pass an overlong string as the right bound of the range argument that is passed to the plot function. | [] | null | null | 7.8 | null |
|
CVE-2019-11162 | Insufficient access control in hardware abstraction in SEMA driver for Intel(R) Computing Improvement Program before version 2.4.0.04733 may allow an authenticated user to potentially enable escalation of privilege, denial of service or information disclosure via local access. | [
"cpe:2.3:a:intel:computing_improvement_program:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | 4.6 |
|
GHSA-hvf8-h2qh-37m9 | IPC messages delivered to the wrong frame in Electron | ImpactIPC messages sent from the main process to a subframe in the renderer process, through `webContents.sendToFrame`, `event.reply` or when using the `remote` module, can in some cases be delivered to the wrong frame.If your app does ANY of the following, then it is impacted by this issue:Uses `remote`Calls `webContents.sendToFrame`Calls `event.reply` in an IPC message handlerPatchesThis has been fixed in the following versions:9.4.010.2.011.1.012.0.0-beta.9WorkaroundsThere are no workarounds for this issue.For more informationIf you have any questions or comments about this advisory, email us at [security@electronjs.org](mailto:security@electronjs.org). | [] | null | 5.4 | null | null |
CVE-2011-3396 | Untrusted search path vulnerability in Microsoft PowerPoint 2007 SP2 and 2010 allows local users to gain privileges via a Trojan horse DLL in the current working directory, aka "PowerPoint Insecure Library Loading Vulnerability." | [
"cpe:2.3:a:microsoft:powerpoint:2007:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:powerpoint:2010:*:x32:*:*:*:*:*",
"cpe:2.3:a:microsoft:powerpoint:2010:*:x64:*:*:*:*:*"
] | null | null | null | 9.3 |
|
CVE-2018-8165 | An elevation of privilege vulnerability exists when the DirectX Graphics Kernel (DXGKRNL) driver improperly handles objects in memory, aka "DirectX Graphics Kernel Elevation of Privilege Vulnerability." This affects Windows Server 2016, Windows 10, Windows 10 Servers. | [
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*"
] | null | null | 7.8 | 7.2 |
|
CVE-2018-15728 | Couchbase Server exposed the '/diag/eval' endpoint which by default is available on TCP/8091 and/or TCP/18091. Authenticated users that have 'Full Admin' role assigned could send arbitrary Erlang code to the 'diag/eval' endpoint of the API and the code would subsequently be executed in the underlying operating system with privileges of the user which was used to start Couchbase. Affects Version: 4.0.0, 4.1.2, 4.5.1, 5.0.0, 4.6.5, 5.0.1, 5.1.1, 5.5.0, 5.5.1. Fix Version: 6.0.0, 5.5.2 | [
"cpe:2.3:a:couchbase:couchbase_server:-:*:*:*:*:*:*:*"
] | null | null | 8.8 | 9 |
|
CVE-2003-0045 | Jakarta Tomcat before 3.3.1a on certain Windows systems may allow remote attackers to cause a denial of service (thread hang and resource consumption) via a request for a JSP page containing an MS-DOS device name, such as aux.jsp. | [
"cpe:2.3:a:apache:tomcat:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:3.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:3.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:3.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:3.3.1:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-pwj5-gqjx-3gmw | Microsoft Excel Remote Code Execution Vulnerability | [] | null | 7.8 | null | null |
|
GHSA-ch39-559f-wp4m | There are two denial of service vulnerabilities on some Huawei smartphones. An attacker may send specially crafted TD-SCDMA messages from a rogue base station to the affected devices. Due to insufficient input validation of two values when parsing the messages, successful exploit may cause device abnormal. This is 1 out of 2 vulnerabilities. Different than CVE-2020-5303. Affected products are: ALP-AL00B: earlier than 9.1.0.333(C00E333R2P1T8) ALP-L09: earlier than 9.1.0.300(C432E4R1P9T8) ALP-L29: earlier than 9.1.0.315(C636E5R1P13T8) BLA-L29C: earlier than 9.1.0.321(C636E4R1P14T8), earlier than 9.1.0.330(C432E6R1P12T8), earlier than 9.1.0.302(C635E4R1P13T8) Berkeley-AL20: earlier than 9.1.0.333(C00E333R2P1T8) Berkeley-L09: earlier than 9.1.0.350(C10E3R1P14T8), earlier than 9.1.0.351(C432E5R1P13T8), earlier than 9.1.0.350(C636E4R1P13T8) Charlotte-L09C: earlier than 9.1.0.311(C185E4R1P11T8), earlier than 9.1.0.345(C432E8R1P11T8) Charlotte-L29C: earlier than 9.1.0.325(C185E4R1P11T8), earlier than 9.1.0.335(C636E3R1P13T8), earlier than 9.1.0.345(C432E8R1P11T8), earlier than 9.1.0.336(C605E3R1P12T8) Columbia-AL10B: earlier than 9.1.0.333(C00E333R1P1T8) Columbia-L29D: earlier than 9.1.0.350(C461E3R1P11T8), earlier than 9.1.0.350(C185E3R1P12T8), earlier than 9.1.0.350(C10E5R1P14T8), earlier than 9.1.0.351(C432E5R1P13T8) Cornell-AL00A: earlier than 9.1.0.333(C00E333R1P1T8) Cornell-L29A: earlier than 9.1.0.328(C185E1R1P9T8), earlier than 9.1.0.328(C432E1R1P9T8), earlier than 9.1.0.330(C461E1R1P9T8), earlier than 9.1.0.328(C636E2R1P12T8) Emily-L09C: earlier than 9.1.0.336(C605E4R1P12T8), earlier than 9.1.0.311(C185E2R1P12T8), earlier than 9.1.0.345(C432E10R1P12T8) Emily-L29C: earlier than 9.1.0.311(C605E2R1P12T8), earlier than 9.1.0.311(C636E7R1P13T8), earlier than 9.1.0.311(C432E7R1P11T8) Ever-L29B: earlier than 9.1.0.311(C185E3R3P1), earlier than 9.1.0.310(C636E3R2P1), earlier than 9.1.0.310(C432E3R1P12) HUAWEI Mate 20: earlier than 9.1.0.131(C00E131R3P1) HUAWEI Mate 20 Pro: earlier than 9.1.0.310(C185E10R2P1) HUAWEI Mate 20 RS: earlier than 9.1.0.135(C786E133R3P1) HUAWEI Mate 20 X: earlier than 9.1.0.135(C00E133R2P1) HUAWEI P20: earlier than 9.1.0.333(C00E333R1P1T8) HUAWEI P20 Pro: earlier than 9.1.0.333(C00E333R1P1T8) HUAWEI P30: earlier than 9.1.0.193 HUAWEI P30 Pro: earlier than 9.1.0.186(C00E180R2P1) HUAWEI Y9 2019: earlier than 9.1.0.220(C605E3R1P1T8) HUAWEI nova lite 3: earlier than 9.1.0.305(C635E8R2P2) Honor 10 Lite: earlier than 9.1.0.283(C605E8R2P2) Honor 8X: earlier than 9.1.0.221(C461E2R1P1T8) Honor View 20: earlier than 9.1.0.238(C432E1R3P1) Jackman-L22: earlier than 9.1.0.247(C636E2R4P1T8) Paris-L21B: earlier than 9.1.0.331(C432E1R1P2T8) Paris-L21MEB: earlier than 9.1.0.331(C185E4R1P3T8) Paris-L29B: earlier than 9.1.0.331(C636E1R1P3T8) Sydney-AL00: earlier than 9.1.0.212(C00E62R1P7T8) Sydney-L21: earlier than 9.1.0.215(C432E1R1P1T8), earlier than 9.1.0.213(C185E1R1P1T8) Sydney-L21BR: earlier than 9.1.0.213(C185E1R1P2T8) Sydney-L22: earlier than 9.1.0.258(C636E1R1P1T8) Sydney-L22BR: earlier than 9.1.0.258(C636E1R1P1T8) SydneyM-AL00: earlier than 9.1.0.228(C00E78R1P7T8) SydneyM-L01: earlier than 9.1.0.215(C782E2R1P1T8), earlier than 9.1.0.213(C185E1R1P1T8), earlier than 9.1.0.270(C432E3R1P1T8) SydneyM-L03: earlier than 9.1.0.217(C605E1R1P1T8) SydneyM-L21: earlier than 9.1.0.221(C461E1R1P1T8), earlier than 9.1.0.215(C432E4R1P1T8) SydneyM-L22: earlier than 9.1.0.259(C185E1R1P2T8), earlier than 9.1.0.220(C635E1R1P2T8), earlier than 9.1.0.216(C569E1R1P1T8) SydneyM-L23: earlier than 9.1.0.226(C605E2R1P1T8) Yale-L21A: earlier than 9.1.0.154(C432E2R3P2), earlier than 9.1.0.154(C461E2R2P1), earlier than 9.1.0.154(C636E2R2P1) Honor 20: earlier than 9.1.0.152(C00E150R5P1) Honor Magic2: earlier than 10.0.0.187 Honor V20: earlier than 9.1.0.234(C00E234R4P3) | [] | null | null | null | null |
|
GHSA-c7f8-wqfw-qhrr | Heap-based buffer overflow in Red Hat adminutil 1.1.6 allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via % (percent) encoded HTTP input to unspecified CGI scripts in Fedora Directory Server. NOTE: this vulnerability exists because of an incorrect fix for CVE-2008-2929. | [] | null | null | null | null |
|
PYSEC-2021-388 | null | The parseXML function in Easy-XML 0.5.0 was discovered to have a XML External Entity (XXE) vulnerability which allows for an attacker to expose sensitive data or perform a denial of service (DOS) via a crafted external entity entered into the XML content as input. | [] | null | null | null | null |
CVE-2024-44029 | WordPress Viala theme <= 1.3.1 - Reflected Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in David Garlitz viala allows Reflected XSS.This issue affects viala: from n/a through 1.3.1. | [] | null | 7.1 | null | null |
CVE-2023-31617 | An issue in the dk_set_delete component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements. | [
"cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*"
] | null | 7.5 | null | null |
|
GHSA-9w5p-cfp8-w353 | Microsoft ODBC Driver Remote Code Execution Vulnerability | [] | null | 8 | null | null |
|
CVE-2016-8203 | A memory corruption in the IPsec code path of Brocade NetIron OS on Brocade MLXs 5.8.00 through 5.8.00e, 5.9.00 through 5.9.00bd, 6.0.00, and 6.0.00a images could allow attackers to cause a denial of service (line card reset) via certain constructed IPsec control packets. | [
"cpe:2.3:o:brocade:netiron_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:brocade:netiron_os:6.0.00:*:*:*:*:*:*:*",
"cpe:2.3:o:brocade:netiron_os:6.0.00a:*:*:*:*:*:*:*"
] | null | null | 7.5 | 7.8 |
|
GHSA-65v6-3c9m-hmrp | Arbitrary file write in net.mingsoft:ms-mcms | MCMS v5.2.10 and below was discovered to contain an arbitrary file write vulnerability via the component ms/template/writeFileContent.do. | [] | null | 8.8 | null | null |
GHSA-93qv-2hpr-4mmc | Unspecified vulnerability in the Portal component in Oracle Application Server 10.1.2.3 and 10.1.4.2 allows remote attackers to affect integrity via unknown vectors, a different vulnerability than CVE-2009-0974 and CVE-2009-0983. | [] | null | null | null | null |
|
CVE-2022-27645 | This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of NETGEAR R6700v3 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within readycloud_control.cgi. The issue results from the lack of authentication prior to allowing access to functionality. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-15762. | [
"cpe:2.3:o:netgear:lax20_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:lax20:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6400_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6400:v2:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6700_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6700:v3:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r7000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r7850_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7850:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r7900p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7900p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r7960p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7960p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r8000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r8000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r8000p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r8000p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r8500_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r8500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rax15_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rax15:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rax20_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rax20:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rax200_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rax200:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rax35_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rax35:v2:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rax38_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rax38:v2:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rax40_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rax40:v2:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rax42_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rax42:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rax43_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rax43:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rax45_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rax45:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rax48_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rax48:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rax50_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rax50:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rax50s_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rax50s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rax75_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rax75:-:*:*:*:*:*:*:*"
] | null | null | 8.8 | null |
|
RHSA-2023:6193 | Red Hat Security Advisory: thunderbird security update | An update for thunderbird is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
CVE-2024-29086 | Arkcompiler runtime has a stack overflow svulnerability | in OpenHarmony v3.2.4 and prior versions allow a local attacker cause DOS through stack overflow. | [
"cpe:2.3:o:openatom:openharmony:*:*:*:*:*:*:*:*"
] | null | 3.3 | null | null |
GHSA-fmf9-w3vw-96wq | The vid_dec_set_h264_mv_buffers function in drivers/video/msm/vidc/common/dec/vdec.c in the Qualcomm components in Android before 2016-07-05 on Nexus 5 and 7 (2013) devices does not validate the number of buffers, which allows attackers to gain privileges via a crafted application, aka Android internal bug 28598515 and Qualcomm internal bug CR563694. | [] | null | null | 7.8 | null |
|
CVE-2013-0214 | Cross-site request forgery (CSRF) vulnerability in the Samba Web Administration Tool (SWAT) in Samba 3.x before 3.5.21, 3.6.x before 3.6.12, and 4.x before 4.0.2 allows remote attackers to hijack the authentication of arbitrary users by leveraging knowledge of a password and composing requests that perform SWAT actions. | [
"cpe:2.3:a:samba:samba:3.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.6.7:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.6.8:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.6.9:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.6.10:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.6.11:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.2:a:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.2a:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.4:rc1:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.14:a:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.14a:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.20:a:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.20:b:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.20a:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.20b:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.21:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.21:a:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.21:b:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.21:c:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.21a:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.21b:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.21c:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.22:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.23:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.23:a:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.23:b:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.23:c:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.23:d:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.23a:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.23b:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.23c:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.23d:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.24:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.25:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.25:a:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.25:b:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.25:c:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.25:pre1:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.25:pre2:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.25:rc1:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.25:rc2:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.25:rc3:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.25a:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.25b:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.25c:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.26:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.26:a:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.26a:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.27:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.27:a:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.28:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.28:a:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.29:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.30:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.31:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.32:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.33:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.34:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.35:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.36:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.0.37:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.2.11:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.2.12:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.2.13:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.2.14:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.2.15:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.3.8:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.3.9:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.3.10:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.3.11:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.3.12:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.3.13:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.3.14:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.3.15:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.3.16:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.4.9:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.4.10:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.4.11:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.4.12:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.4.13:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.4.14:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.4.15:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.4.16:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.4.17:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.5.8:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.5.9:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.5.10:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.5.11:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.5.12:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.5.13:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.5.14:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.5.15:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.5.16:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.5.17:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.5.18:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.5.19:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.5.20:*:*:*:*:*:*:*"
] | null | null | null | 5.1 |
|
RHSA-2020:4687 | Red Hat Security Advisory: oddjob security, bug fix, and enhancement update | oddjob: race condition in oddjob_selinux_mkdir function in mkhomedir.c can lead to symlink attack | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 6.3 | null | null |
CVE-2019-3995 | ELOG 3.1.4-57bea22 and below is affected by a denial of service vulnerability due to a NULL pointer dereference. A remote unauthenticated attacker can crash the ELOG server by sending a crafted HTTP GET request. | [
"cpe:2.3:a:elog_project:elog:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
GHSA-2w9v-j4mv-6g6v | In JetBrains TeamCity before 2022.04 potential XSS via Referrer header was possible | [] | null | 6.1 | null | null |
|
CVE-2018-2400 | Under certain conditions SAP Business Process Automation (BPA) By Redwood, 9.00, 9.10, allows an attacker to access information which would otherwise be restricted. | [
"cpe:2.3:a:redwood:sap_business_process_automation:9.00:*:*:*:*:*:*:*",
"cpe:2.3:a:redwood:sap_business_process_automation:9.10:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
GHSA-fq36-pq82-f58m | A vulnerability was found in SourceCodester Simple E-Learning System. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file search.php. The manipulation of the argument searchPost leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-205819. | [] | null | 9.8 | null | null |
|
GHSA-jjjc-mwr7-6943 | A vulnerability was found in PHPGurukul Art Gallery Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /admin/admin-profile.php. The manipulation of the argument contactnumber leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well. | [] | 6.9 | 7.3 | null | null |
|
CVE-2012-2707 | The Hostmaster (Aegir) module 6.x-1.x before 6.x-1.9 for Drupal does not properly exit when users do not have access to package/task nodes, which allows remote attackers to bypass intended access restrictions and edit unauthorized nodes. | [
"cpe:2.3:a:antoine_beaupre:hostmaster:6.x-1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:antoine_beaupre:hostmaster:6.x-1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:antoine_beaupre:hostmaster:6.x-1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:antoine_beaupre:hostmaster:6.x-1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:antoine_beaupre:hostmaster:6.x-1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:antoine_beaupre:hostmaster:6.x-1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:antoine_beaupre:hostmaster:6.x-1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:antoine_beaupre:hostmaster:6.x-1.x:dev:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:-:*:*:*:*:*:*:*"
] | null | null | null | 5.8 |
|
CVE-2005-1645 | Keyvan1 ImageGallery stores the image.mdb database under the web document root with insufficient access control, which allows remote attackers to obtain sensitive information. | [
"cpe:2.3:a:keyvan1:imagegallery:*:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2005-2204 | Cross-site scripting (XSS) vulnerability in Computer Associates (CA) eTrust SiteMinder 5.5, when the "CSSChecking" parameter is set to "NO," allows remote attackers to inject arbitrary web script or HTML via the (1) PASSWORD or (2) BUFFER parameters to smpwservicescgi.exe, (3) the TARGET parameter to login.fcc, and possibly other vectors. | [
"cpe:2.3:a:broadcom:etrust_siteminder:5.5:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-6f2m-vhfx-gqwf | A stored cross site scripting (XSS) vulnerability in /administration/setting_security.php of PHP-Fusion 9.03.60 allows authenticated attackers to execute arbitrary web scripts or HTML via a crafted payload. | [] | null | null | null | null |
|
RHSA-2013:0123 | Red Hat Security Advisory: OpenIPMI security, bug fix, and enhancement update | OpenIPMI: IPMI event daemon creates PID file with world writeable permissions | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
CVE-2020-18705 | XML External Entities (XXE) in Quokka v0.4.0 allows remote attackers to execute arbitrary code via the component 'quokka/core/content/views.py'. | [
"cpe:2.3:a:quokka_project:quokka:0.4.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
|
CVE-2023-26564 | The Syncfusion EJ2 ASPCore File Provider 3ac357f is vulnerable to Models/PhysicalFileProvider.cs directory traversal. As a result, an unauthenticated attacker can list files within a directory, download any file, or upload any file to any directory accessible by the web server. | [
"cpe:2.3:a:syncfusion:ej2_aspcore_file_provider:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
CVE-2001-1440 | Unknown vulnerability in login for AIX 5.1L, when using loadable authentication modules, allows remote attackers to gain access to the system. | [
"cpe:2.3:o:ibm:aix:5.1l:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
CVE-2006-2029 | Multiple SQL injection vulnerabilities in Jeremy Ashcraft Simplog 0.9.3 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) tid parameter in (a) preview.php; the (2) cid, (3) pid, and (4) eid parameters in (b) archive.php; and the (5) pid parameter in (c) comments.php. | [
"cpe:2.3:a:simplog:simplog:*:*:*:*:*:*:*:*"
] | null | null | null | 6.4 |
|
CVE-2017-15997 | In the "NQ Contacts Backup & Restore" application 1.1 for Android, RC4 encryption is used to secure the user password locally stored in shared preferences. Because there is a static RC4 key, an attacker can gain access to user credentials more easily by leveraging access to the preferences XML file. | [
"cpe:2.3:a:nq:contacts_backup_\\&_restore:1.1:*:*:*:*:android:*:*"
] | null | null | 7.8 | 2.1 |
|
CVE-2009-0434 | PerfServlet in the PMI/Performance Tools component in IBM WebSphere Application Server (WAS) 6.0.x before 6.0.2.31, 6.1.x before 6.1.0.21, and 7.0.x before 7.0.0.1, when Performance Monitoring Infrastructure (PMI) is enabled, allows local users to obtain sensitive information by reading the (1) systemout.log and (2) ffdc files. NOTE: this is probably a duplicate of CVE-2008-5413. | [
"cpe:2.3:a:ibm:websphere_application_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.1.13:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.1.15:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.1.17:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.2.11:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.2.13:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.2.15:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.2.17:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.2.19:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.2.22:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.2.23:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.2.24:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.2.25:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.2.27:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.2.28:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.2.29:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.2.30:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.2.31:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.21:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0:*:*:*:*:*:*:*"
] | null | null | null | 1.9 |
|
GHSA-3qqr-67hg-8c4v | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Jon Bishop WP About Author allows DOM-Based XSS. This issue affects WP About Author: from n/a through 1.5. | [] | null | 6.5 | null | null |
|
GHSA-362p-9mx3-r47m | Multiple integer overflows in the strfmon implementation in the GNU C Library (aka glibc or libc6) 2.10.1 and earlier allow context-dependent attackers to cause a denial of service (memory consumption or application crash) via a crafted format string, as demonstrated by a crafted first argument to the money_format function in PHP, a related issue to CVE-2008-1391. | [] | null | null | null | null |
|
GHSA-x748-g8vm-gmhw | The Awesome Support WordPress plugin before 6.1.5 does not correctly authorize the wpas_edit_reply function, allowing users to edit posts for which they do not have permission. | [] | null | 4.3 | null | null |
|
CVE-2018-4084 | An issue was discovered in certain Apple products. macOS before 10.13.3 is affected. The issue involves the "Wi-Fi" component. It allows attackers to bypass intended memory-read restrictions via a crafted app. | [
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
] | null | null | 5.5 | 4.3 |
|
CVE-2023-31425 | Privilege escalation via the fosexec command | A vulnerability in the fosexec command of Brocade Fabric OS after Brocade Fabric OS v9.1.0 and, before Brocade Fabric OS v9.1.1 could allow a local authenticated user to perform privilege escalation to root by breaking the rbash shell. Starting with Fabric OS v9.1.0, “root” account access is disabled. | [
"cpe:2.3:o:broadcom:fabric_operating_system:9.1.0:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
GHSA-6cpp-p296-85wp | Buffer overflow in Adobe Acrobat ActiveX control (pdf.ocx, PDF.PdfCtrl.1) 1.3.188 for Acrobat Reader 4.0 allows remote attackers to execute arbitrary code via the pdf.setview method. | [] | null | null | null | null |
|
RHSA-2012:1569 | Red Hat Security Advisory: flash-plugin security update | flash-plugin: multiple code execution flaws (APSB12-27) flash-plugin: multiple code execution flaws (APSB12-27) flash-plugin: multiple code execution flaws (APSB12-27) | [
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
GHSA-fxq4-r6mr-9x64 | CSRF Vuln can expose user's QRcode | ImpactWhen a user is setting up two-factor authentication using an authenticator app, a QRcode is generated and made available via a GET request to /tf-qrcode. Since GETs do not have any CSRF protection, it is possible a malicious 3rd party could access the QRcode and therefore gain access to two-factor authentication codes. Note that the /tf-qrcode endpoint is ONLY accessible while the user is initially setting up their device. Once setup is complete, there is no vulnerability.PatchesThis is fixed in the upcoming 4.0.0 release.WorkaroundsYou can provide your own URL for fetching the QRcode by defining SECURITY_TWO_FACTOR_QRCODE_URL and providing your own implementation (that presumably required a POST with CSRF protection). This would require changing the two-factor setup template as well.ReferencesNone.For more informationIf you have any questions or comments about this advisory:Read this pull request: #423 | [] | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.