id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 36
232
⌀ |
|---|---|---|---|---|---|---|---|---|
GHSA-f254-qfhg-6649
|
The xmlSAX2TextNode function in SAX2.c in the push interface in the HTML parser in libxml2 before 2.9.3 allows context-dependent attackers to cause a denial of service (stack-based buffer over-read and application crash) or obtain sensitive information via crafted XML data.
|
[] | null | null | null | null | null |
|
CVE-2005-0600
|
Cisco devices running Application and Content Networking System (ACNS) 5.0, 5.1 before 5.1.13.7, or 5.2 before 5.2.3.9 allow remote attackers to cause a denial of service (bandwidth consumption) via "crafted IP packets" that are continuously forwarded.
|
[
"cpe:2.3:a:cisco:application_and_content_networking_software:\\(acns\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_and_content_networking_software:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_and_content_networking_software:4.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_and_content_networking_software:4.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_and_content_networking_software:4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_and_content_networking_software:4.2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_and_content_networking_software:4.2.11:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_and_content_networking_software:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_and_content_networking_software:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_and_content_networking_software:5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_and_content_networking_software:5.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_and_content_networking_software:5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:content_delivery_manager:4630:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:content_delivery_manager:4650:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:content_distribution_manager_4630:*:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:content_distribution_manager_4630:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:content_distribution_manager_4630:4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:content_distribution_manager_4650:*:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:content_distribution_manager_4650:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:content_distribution_manager_4650:4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:content_distribution_manager_4670:*:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:content_engine:507:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:content_engine:507_2.2_.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:content_engine:507_3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:content_engine:507_4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:content_engine:507_4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:content_engine:510:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:content_engine:560:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:content_engine:560_2.2_.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:content_engine:560_3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:content_engine:560_4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:content_engine:560_4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:content_engine:565:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:content_engine:590:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:content_engine:590_2.2_.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:content_engine:590_3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:content_engine:590_4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:content_engine:590_4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:content_engine:7320:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:content_engine:7320_2.2_.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:content_engine:7320_3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:content_engine:7320_4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:content_engine:7320_4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:content_engine:7325:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:content_engine_module_for_cisco_router:2600_series:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:content_engine_module_for_cisco_router:2800_series:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:content_engine_module_for_cisco_router:3600_series:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:content_engine_module_for_cisco_router:3700_series:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:content_engine_module_for_cisco_router:3800_series:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:enterprise_content_delivery_network_software:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:enterprise_content_delivery_network_software:4.1:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:content_router_4430:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:content_router_4450:*:*:*:*:*:*:*:*"
] | null | null | null | 5
| null |
|
CVE-2024-28283
|
There is stack-based buffer overflow vulnerability in pc_change_act function in Linksys E1000 router firmware version v.2.1.03 and before, leading to remote code execution.
|
[
"cpe:2.3:o:linksys:e1000_firmware:*:*:*:*:*:*:*:*"
] | null | 6.7
| null | null | null |
|
ICSA-22-286-01
|
Siemens LOGO!
|
Affected devices load firmware updates without checking the authenticity. Furthermore the integrity of the unencrypted firmware is only verified by a non-cryptographic method. This could allow an attacker to manipulate a firmware update and flash it to the device.
|
[] | null | 6.1
| null | null | null |
GHSA-7wcv-wc37-6cpx
|
SQL injection vulnerability in myLDlinker.php in the myLinksDump Plugin 1.2 for WordPress allows remote attackers to execute arbitrary SQL commands via the url parameter. NOTE: some of these details are obtained from third party information.
|
[] | null | null | null | null | null |
|
CVE-2025-10554
|
Stored Cross-site Scripting (XSS) vulnerability affecting Requirements in ENOVIA Product Manager from Release 3DEXPERIENCE R2023x through Release 3DEXPERIENCE R2025x
|
A stored Cross-site Scripting (XSS) vulnerability affecting Requirements in ENOVIA Product Manager from Release 3DEXPERIENCE R2023x through Release 3DEXPERIENCE R2025x allows an attacker to execute arbitrary script code in user's browser session.
|
[] | null | 8.7
| null | null | null |
GHSA-wm56-vm94-jrxr
|
An issue was discovered on Marbella KR8s Dashcam FF 2.0.8 devices. Via port 7777 without any need to pair or press a physical button, a remote attacker can disable recording, delete recordings, or even disable battery protection to cause a flat battery to essentially disable the car from being used. During the process of changing these settings, there are no indications or sounds on the dashcam to alert the dashcam owner that someone else is making those changes.
|
[] | null | 5.3
| null | null | null |
|
GHSA-36w9-v5c5-w4rg
|
Insecure access control in freeSSHd version 1.3.1 allows attackers to obtain the privileges of the freesshd.exe process by leveraging the ability to login to an unprivileged account on the server.
|
[] | null | null | 9.8
| null | null |
|
CVE-2024-45068
|
Authentication credentials leakage vulnerability in Hitachi Ops Center Common Services within Hitachi Ops Center OVA
|
Authentication credentials leakage vulnerability in Hitachi Ops Center Common Services within Hitachi Ops Center OVA.
This issue affects Hitachi Ops Center Common Services: from 10.9.3-00 before 11.0.3-00; Hitachi Ops Center OVA: from 10.9.3-00 before 11.0.2-01.
|
[
"cpe:2.3:a:hitachi:ops_center_ova:*:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachi:ops_center_common_services:-:*:*:*:*:*:*:*"
] | null | 7.1
| null | null | null |
CVE-2018-10253
|
Paessler PRTG Network Monitor before 18.1.39.1648 mishandles stack memory during unspecified API calls.
|
[
"cpe:2.3:a:paessler:prtg_network_monitor:*:*:*:*:*:*:*:*"
] | null | null | 7.5
| 5
| null |
|
GHSA-p4hg-g7q8-w89x
|
Missing Authorization vulnerability in alexvtn Chatbox Manager allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Chatbox Manager: from n/a through 1.2.5.
|
[] | null | 5.4
| null | null | null |
|
CVE-2013-2860
|
Use-after-free vulnerability in Google Chrome before 27.0.1453.110 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving access to a database API by a worker process.
|
[
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.3:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.4:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.5:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.6:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.7:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.8:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.9:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.10:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.11:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.12:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.13:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.15:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.34:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.35:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.36:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.37:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.38:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.39:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.40:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.41:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.42:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.43:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.44:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.45:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.46:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.47:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.49:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.50:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.51:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.52:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.54:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.55:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.56:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.57:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.58:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.59:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.60:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.61:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.62:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.63:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.64:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.65:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.66:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.67:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.68:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.69:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.70:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.71:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.72:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.73:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.74:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.75:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.76:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.77:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.78:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.79:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.80:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.81:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.82:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.83:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.84:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.85:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.86:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.87:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.88:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.89:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.90:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.91:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.93:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.94:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.102:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.103:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.104:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.105:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.106:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.107:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:27.0.1453.108:*:*:*:*:*:*:*"
] | null | null | null | 7.5
| null |
|
CVE-2025-27933
|
Unauthorized Private-to-Public Channel Conversion
|
Mattermost versions 10.4.x <= 10.4.2, 10.3.x <= 10.3.3, 9.11.x <= 9.11.8 fail to fail to enforce channel conversion restrictions, which allows members with permission to convert public channels to private ones to also convert private ones to public
|
[] | null | 5.4
| null | null | null |
CVE-2024-4226
|
It was identified that in certain versions of Octopus Server, that a user created with no permissions could view all users, user roles and permissions. This functionality was removed in versions of Octopus Server after the fixed versions listed.
|
[] | null | 3.5
| null | null | null |
|
GHSA-jpqx-f853-g2j5
|
A command injection vulnerability in install package validation subsystem of Juniper Networks Junos OS that may allow a locally authenticated attacker with privileges to execute commands with root privilege. To validate a package in Junos before installation, an administrator executes the command 'request system software add validate-on-host' via the CLI. An attacker with access to this CLI command may be able to exploit this vulnerability. This issue affects Juniper Networks Junos OS: all versions prior to 17.3R3-S10; 17.4 versions prior to 17.4R2-S12, 17.4R3-S3; 18.1 versions prior to 18.1R3-S11; 18.2 versions prior to 18.2R2-S8, 18.2R3-S6; 18.3 versions prior to 18.3R3-S4; 18.4 versions prior to 18.4R1-S8, 18.4R2-S7, 18.4R3-S6; 19.1 versions prior to 19.1R1-S6, 19.1R2-S2, 19.1R3-S3; 19.2 versions prior to 19.2R3-S1; 19.3 versions prior to 19.3R2-S5, 19.3R3-S1; 19.4 versions prior to 19.4R2-S2, 19.4R3-S1; 20.1 versions prior to 20.1R2; 20.2 versions prior to 20.2R1-S2, 20.2R2; 20.3 versions prior to 20.3R1-S1, 20.3R2.
|
[] | null | null | null | null | null |
|
RHEA-2021:5066
|
Red Hat Enhancement Advisory: MTV 2.2.0 Images
|
nodejs-axios: Regular expression denial of service in trim function moby: `docker cp` allows unexpected chmod of host file
|
[
"cpe:/a:redhat:migration_toolkit_virtualization:2.2::el8"
] | null | 5.3
| null | null | null |
GHSA-qv63-549v-v8wj
|
ManageEngine AppManager15 (Build No:15510) allows an authenticated admin user to upload a DLL file to perform a DLL hijack attack inside the 'working' folder through the 'Upload Files / Binaries' functionality.
|
[] | null | 7.2
| null | null | null |
|
GHSA-xwqg-f8mp-8w9c
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in falselight Exchange Rates allows Stored XSS. This issue affects Exchange Rates: from n/a through 1.2.5.
|
[] | null | 6.5
| null | null | null |
|
GHSA-58rv-96r6-2cpw
|
The Ping() function in ui/api/target.go in Harbor through 1.3.0-rc4 has SSRF via the endpoint parameter to /api/targets/ping.
|
[] | null | 8.6
| null | null | null |
|
CVE-2022-29207
|
Undefined behavior when users supply invalid resource handles in TensorFlow
|
TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, multiple TensorFlow operations misbehave in eager mode when the resource handle provided to them is invalid. In graph mode, it would have been impossible to perform these API calls, but migration to TF 2.x eager mode opened up this vulnerability. If the resource handle is empty, then a reference is bound to a null pointer inside TensorFlow codebase (various codepaths). This is undefined behavior. Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 contain a patch for this issue.
|
[
"cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*",
"cpe:2.3:a:google:tensorflow:2.7.0:rc0:*:*:*:*:*:*",
"cpe:2.3:a:google:tensorflow:2.7.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:google:tensorflow:2.8.0:-:*:*:*:*:*:*",
"cpe:2.3:a:google:tensorflow:2.8.0:rc0:*:*:*:*:*:*",
"cpe:2.3:a:google:tensorflow:2.8.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:google:tensorflow:2.9.0:rc0:*:*:*:*:*:*",
"cpe:2.3:a:google:tensorflow:2.9.0:rc1:*:*:*:*:*:*"
] | null | 5.5
| null | null | null |
GHSA-98r7-98px-p4mx
|
Multiple plugins and/or themes for WordPress are vulnerable to unauthorized access due to a missing capability check on several AJAX actions like 'gsf_reset_section_options', 'gsf_reset_section_options', 'gsf_create_preset_options' and more in various versions. This makes it possible for authenticated attackers, with Subscriber-level access and above, to reset and modify some of the plugin/theme settings. This issue was escalated to Envato over two months from the date of this disclosure and the issues, while partially patched, are still vulnerable.
|
[] | null | 4.3
| null | null | null |
|
GHSA-9rp4-3rch-r229
|
SQL injection vulnerability in poll_vote.php in iGaming CMS 1.5 allows remote attackers to execute arbitrary SQL commands via the id parameter.
|
[] | null | null | null | null | null |
|
CVE-2021-3547
|
OpenVPN 3 Core Library version 3.6 and 3.6.1 allows a man-in-the-middle attacker to bypass the certificate authentication by issuing an unrelated server certificate using the same hostname found in the verify-x509-name option in a client configuration.
|
[
"cpe:2.3:a:openvpn:openvpn:3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:openvpn:openvpn:3.6.1:*:*:*:*:*:*:*"
] | null | 7.4
| null | 5.8
| null |
|
CVE-2013-1114
|
Multiple cross-site scripting (XSS) vulnerabilities in Cisco Unity Express before 8.0 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka Bug ID CSCud87527.
|
[
"cpe:2.3:a:cisco:unity_express_software:*:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unity_express_software:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unity_express_software:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unity_express_software:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unity_express_software:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unity_express_software:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unity_express_software:2.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unity_express_software:2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unity_express_software:2.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unity_express_software:2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unity_express_software:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unity_express_software:3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unity_express_software:3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unity_express_software:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unity_express_software:7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unity_express_software:7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unity_express_software:7.3:*:*:*:*:*:*:*"
] | null | null | null | 4.3
| null |
|
CVE-2022-34188
|
Jenkins Hidden Parameter Plugin 0.0.4 and earlier does not escape the name and description of Hidden Parameter parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
|
[
"cpe:2.3:a:jenkins:hidden_parameter:*:*:*:*:*:jenkins:*:*"
] | null | 5.4
| null | 3.5
| null |
|
CVE-2023-0353
|
CVE-2023-0353
|
Akuvox E11 uses a weak encryption algorithm for stored passwords and uses a hard-coded password for decryption which could allow the encrypted passwords to be decrypted from the configuration file.
|
[
"cpe:2.3:o:akuvox:e11_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:akuvox:e11:-:*:*:*:*:*:*:*"
] | null | 7.2
| null | null | null |
GHSA-g3r4-3cw9-j3p7
|
A cleartext transmission of sensitive information vulnerability exists in Schneider Electric's 66074 MGE Network Management Card Transverse installed in MGE UPS and MGE STS. he integrated web server (Port 80/443/TCP) of the affected devices could allow remote attackers to discover an administrative account. If default on device, it is not using a SSL in settings and if multiple request of the page "Access Control" (IP-address device/ups/pas_cont.htm) account data will be sent in cleartext
|
[] | null | null | 9.8
| null | null |
|
GHSA-jw48-cfqw-3fqv
|
Solidity 0.7.5 has a stack-use-after-return issue in smtutil::CHCSmtLib2Interface::querySolver. NOTE: c39a5e2b7a3fabbf687f53a2823fc087be6c1a7e is cited in the OSV "fixed" field but does not have a code change.
|
[] | null | null | null | null | null |
|
CVE-2019-4103
|
IBM Tivoli Netcool/Impact 7.1.0 allows for remote execution of command by low privileged User. Remote code execution allow to execute arbitrary code on system which lead to take control over the system. IBM X-Force ID: 158094.
|
[
"cpe:2.3:a:ibm:tivoli_netcool\\/impact:7.1.0:*:*:*:*:*:*:*"
] | null | null | 8
| null | null |
|
GHSA-jvhx-hc7j-xvxh
|
Server-side request forgery (SSRF) vulnerability in GroupSession (GroupSession Free edition from ver2.2.0 to the version prior to ver5.1.0, GroupSession byCloud from ver3.0.3 to the version prior to ver5.1.0, and GroupSession ZION from ver3.0.3 to the version prior to ver5.1.0) allows a remote authenticated attacker to conduct a port scan from the product and/or obtain information from the internal Web server.
|
[] | null | null | null | null | null |
|
CVE-2024-40853
|
This issue was addressed by restricting options offered on a locked device. This issue is fixed in iOS 18 and iPadOS 18. An attacker may be able to use Siri to enable Auto-Answer Calls.
|
[
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"
] | null | 5.9
| null | null | null |
|
CVE-2017-0730
|
A denial of service vulnerability in the Android media framework (h264 decoder). Product: Android. Versions: 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2. Android ID: A-36279112.
|
[
"cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:*"
] | null | null | 5.5
| 4.3
| null |
|
CVE-2018-7992
|
Mdapt Driver of Huawei MediaPad M3 BTV-W09C128B353CUSTC128D001; Mate 9 Pro versions earlier than 8.0.0.356(C00); P10 Plus versions earlier than 8.0.0.357(C00) has a buffer overflow vulnerability. The driver does not sufficiently validate the input, an attacker could trick the user to install a malicious application which would send crafted parameters to the driver. Successful exploit could cause a denial of service condition.
|
[
"cpe:2.3:o:huawei:mediapad_m3_firmware:btv-w09c128b353custc128d001:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:mediapad_m3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:mate_9_pro_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:mate_9_pro:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:p10_plus_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:p10_plus:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:mate_9_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:mate_9:-:*:*:*:*:*:*:*"
] | null | null | 5.5
| 4.3
| null |
|
CVE-2013-0625
|
Adobe ColdFusion 9.0, 9.0.1, and 9.0.2, when a password is not configured, allows remote attackers to bypass authentication and possibly execute arbitrary code via unspecified vectors, as exploited in the wild in January 2013.
|
[
"cpe:2.3:a:adobe:coldfusion:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:9.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:9.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:o:opengroup:unix:-:*:*:*:*:*:*:*"
] | null | 9.8
| null | 6.8
| null |
|
CVE-2006-2154
|
EMC Retrospect for Windows 6.5 before 6.5.382, 7.0 before 7.0.344, and 7.5 before 7.5.1.105 does not drop privileges before opening files, which allows local users to execute arbitrary code via the File>Open dialog.
|
[
"cpe:2.3:a:emc:retrospect:*:*:windows:*:*:*:*:*"
] | null | null | null | 7.2
| null |
|
CVE-2018-16632
|
Mezzanine CMS v4.3.1 allows XSS via the /admin/blog/blogcategory/add/?_to_field=id&_popup=1 title parameter at admin/blog/blogpost/add/.
|
[
"cpe:2.3:a:jupo:mezzanine:4.3.1:*:*:*:*:*:*:*"
] | null | null | 4.8
| 3.5
| null |
|
GHSA-j4pj-4grx-6wvq
|
The PlayScape (aka playscape.mominis.gameconsole.com) application 9.3.3 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
|
[] | null | null | null | null | null |
|
CVE-2018-6441
|
A vulnerability in Secure Shell implementation of Brocade Fabric OS versions before 8.2.1, 8.1.2f, 8.0.2f, 7.4.2d could allow a local attacker to provide arbitrary environment variables, and bypass the restricted configuration shell.
|
[
"cpe:2.3:o:broadcom:fabric_operating_system:*:*:*:*:*:*:*:*"
] | null | null | 7.8
| 7.2
| null |
|
CVE-2018-17680
|
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the style property of a Field object. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-6915.
|
[
"cpe:2.3:a:foxitsoftware:phantompdf:*:*:*:*:*:*:*:*",
"cpe:2.3:a:foxitsoftware:reader:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | null | 8.8
| 6.8
| null |
|
CVE-2021-24900
|
Ninja Tables < 4.1.8 - Admin+ Stored Cross-Site Cross-Site Scripting
|
The Ninja Tables WordPress plugin before 4.1.8 does not sanitise and escape some of its table fields, which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed
|
[
"cpe:2.3:a:wpmanageninja:ninja_tables:*:*:*:*:*:wordpress:*:*"
] | null | 4.8
| null | 3.5
| null |
GHSA-fv46-529r-fc72
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in janekniefeldt My Custom Widgets allows Reflected XSS. This issue affects My Custom Widgets: from n/a through 2.0.5.
|
[] | null | 7.1
| null | null | null |
|
GHSA-v9x9-h4qh-g2w7
|
Adobe Acrobat and Reader versions 2019.008.20081 and earlier, 2019.008.20080 and earlier, 2019.008.20081 and earlier, 2017.011.30106 and earlier version, 2017.011.30105 and earlier version, 2015.006.30457 and earlier, and 2015.006.30456 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
|
[] | null | null | 6.5
| null | null |
|
CVE-2020-27777
|
A flaw was found in the way RTAS handled memory accesses in userspace to kernel communication. On a locked down (usually due to Secure Boot) guest system running on top of PowerVM or KVM hypervisors (pseries platform) a root like local user could use this flaw to further increase their privileges to that of a running kernel.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openshift_container_platform:4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openshift_container_platform:4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openshift_container_platform:4.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*"
] | null | 6.7
| null | 7.2
| null |
|
CVE-2002-2126
|
restrictEnabled in Integrity Protection Driver (IPD) 1.2 delays driver installation for 20 minutes, which allows local users to insert malicious code by setting system clock to an earlier time.
|
[
"cpe:2.3:a:pedestal_software:integrity_protection_driver:1.2:*:*:*:*:*:*:*"
] | null | null | null | 2.1
| null |
|
CVE-2013-3648
|
Cross-site scripting (XSS) vulnerability in KENT-WEB POST-MAIL before 6.7, when Internet Explorer 7 or earlier is used, allows remote attackers to inject arbitrary web script or HTML via an unspecified form field.
|
[
"cpe:2.3:a:kent-web:post-mail:*:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3
| null |
|
GHSA-cqf9-x3gp-3x2q
|
Tenda AC1206 V15.03.06.23 was discovered to contain a command injection vulnerability via the mac parameter in the function formWriteFacMac.
|
[] | null | 9.8
| null | null | null |
|
GHSA-c962-g533-823f
|
Cross-site Scripting in Bagisto
|
Cross Site Scripting vulnerability in webkil Bagisto v1.3.1 and before allows an attacker to execute arbitrary code via a crafted SVG file uplad.
|
[] | null | 4.8
| null | null | null |
GHSA-h7wh-5h69-49xf
|
The OneClick Chat to Order WordPress plugin before 1.0.4.2 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins.
|
[] | null | 5.4
| null | null | null |
|
GHSA-2rff-fcfm-wv2q
|
In the Linux kernel, the following vulnerability has been resolved:net: ftgmac100: fix potential NULL pointer access in ftgmac100_phy_disconnectAfter the call to phy_disconnect() netdev->phydev is reset to NULL.
So fixed_phy_unregister() would be called with a NULL pointer as argument.
Therefore cache the phy_device before this call.
|
[] | null | 5.5
| null | null | null |
|
CVE-2007-3047
|
The Vonage VoIP Telephone Adapter has a default administrator username "user" and password "user," which allows remote attackers to obtain administrative access.
|
[
"cpe:2.3:h:vonage:voip_telephone_adapter:*:*:*:*:*:*:*:*"
] | null | null | null | 10
| null |
|
CVE-2022-45049
|
Reflected XSS in Axiell Iguana CMS
|
A reflected XSS vulnerability has been found in Axiell Iguana CMS, allowing an attacker to execute code in a victim's browser. The url parameter on the novelist.php endpoint does not properly neutralise user input, resulting in the vulnerability.
|
[
"cpe:2.3:a:axiell:iguana:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 6.1
| null | null | null |
GHSA-m56r-58xw-w6ch
|
In DLSParser of the sonivox library, there is possible resource exhaustion due to a memory leak. This could lead to remote temporary denial of service with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android. Versions: 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1. Android ID: A-68159767.
|
[] | null | null | 6.5
| null | null |
|
CVE-2023-6528
|
Slider Revolution < 6.6.19 - Author+ Insecure Deserialization leading to RCE
|
The Slider Revolution WordPress plugin before 6.6.19 does not prevent users with at least the Author role from unserializing arbitrary content when importing sliders, potentially leading to Remote Code Execution.
|
[
"cpe:2.3:a:themepunch:slider_revolution:*:*:*:*:*:wordpress:*:*"
] | null | 8.8
| null | null | null |
GHSA-x767-vgjw-4wwh
|
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_conn: Fix crash on hci_create_cis_syncWhen attempting to connect multiple ISO sockets without using
DEFER_SETUP may result in the following crash:BUG: KASAN: null-ptr-deref in hci_create_cis_sync+0x18b/0x2b0
Read of size 2 at addr 0000000000000036 by task kworker/u3:1/50CPU: 0 PID: 50 Comm: kworker/u3:1 Not tainted
6.0.0-rc7-02243-gb84a13ff4eda #4373
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009),
BIOS 1.16.0-1.fc36 04/01/2014
Workqueue: hci0 hci_cmd_sync_work
Call Trace:
<TASK>
dump_stack_lvl+0x19/0x27
kasan_report+0xbc/0xf0
? hci_create_cis_sync+0x18b/0x2b0
hci_create_cis_sync+0x18b/0x2b0
? get_link_mode+0xd0/0xd0
? __ww_mutex_lock_slowpath+0x10/0x10
? mutex_lock+0xe0/0xe0
? get_link_mode+0xd0/0xd0
hci_cmd_sync_work+0x111/0x190
process_one_work+0x427/0x650
worker_thread+0x87/0x750
? process_one_work+0x650/0x650
kthread+0x14e/0x180
? kthread_exit+0x50/0x50
ret_from_fork+0x22/0x30
</TASK>
|
[] | null | null | null | null | null |
|
GHSA-whx8-g4mc-7mcq
|
A flaw was discovered in OpenLDAP before 2.4.57 leading to a double free and slapd crash in the saslAuthzTo processing, resulting in denial of service.
|
[] | null | 7.5
| null | null | null |
|
GHSA-ggj8-6hrc-qfgr
|
Multiple vulnerabilities in the web-based user interface of certain Cisco Small Business Series Switches could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition or execute arbitrary code with root privileges on an affected device. These vulnerabilities are due to improper validation of requests that are sent to the web interface. For more information about these vulnerabilities, see the Details section of this advisory.
|
[] | null | null | 8.6
| null | null |
|
GHSA-27p6-h842-m2mx
|
A Stored Cross-Site Scripting (XSS) vulnerability was found in /lms/admin/calendar_of_events.php in KASHIPARA E-learning Management System pProject 1.0. This vulnerability allows remote attackers to execute arbitrary scripts via the date_start, date_end, and title parameters in a POST HTTP request.
|
[] | null | 5.4
| null | null | null |
|
GHSA-6mwq-pmcg-4v8q
|
The preview_review function in the Reviews module in PHP-Nuke 6.0 to 7.3, when running on Windows systems, allows remote attackers to obtain sensitive information via an invalid date parameter, which generates an error message.
|
[] | null | null | null | null | null |
|
CVE-2022-3543
|
Linux Kernel BPF af_unix.c unix_release_sock memory leak
|
A vulnerability, which was classified as problematic, has been found in Linux Kernel. This issue affects the function unix_sock_destructor/unix_release_sock of the file net/unix/af_unix.c of the component BPF. The manipulation leads to memory leak. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211043.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | 3.5
| null | null | null |
GHSA-jm98-mxmf-qcjw
|
TOTOLINK A3300R V17.0.0cu.557_B20221024 was discovered to contain a command injection vulnerability via the port or enable parameter in the setRemoteCfg function.
|
[] | null | 9.8
| null | null | null |
|
GHSA-gxjc-3gfg-2x5c
|
The commons_discussion_views_default_views function in modules/features/commons_discussion/commons_discussion.views_default.inc in the Drupal Commons module 6.x-2.x before 6.x-2.8 for Drupal does not properly enforce intended node access restrictions, which might allow remote attackers to obtain sensitive information via the recent comments listing.
|
[] | null | null | null | null | null |
|
GHSA-5jv6-mmqm-cjvm
|
The get_resource function in repos.c in the mod_dav_svn module in Apache Subversion before 1.7.15 and 1.8.x before 1.8.6, when SVNListParentPath is enabled, allows remote attackers to cause a denial of service (crash) via vectors related to the server root and request methods other than GET, as demonstrated by the "svn ls http://svn.example.com" command.
|
[] | null | null | null | null | null |
|
GHSA-jrjr-vf29-9976
|
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.12 and 7.2.2. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N).
|
[] | null | 6.5
| null | null | null |
|
GHSA-44xq-wgcc-3jwh
|
In the Linux kernel, the following vulnerability has been resolved:btrfs: clean up our handling of refs == 0 in snapshot deleteIn reada we BUG_ON(refs == 0), which could be unkind since we aren't
holding a lock on the extent leaf and thus could get a transient
incorrect answer. In walk_down_proc we also BUG_ON(refs == 0), which
could happen if we have extent tree corruption. Change that to return
-EUCLEAN. In do_walk_down() we catch this case and handle it correctly,
however we return -EIO, which -EUCLEAN is a more appropriate error code.
Finally in walk_up_proc we have the same BUG_ON(refs == 0), so convert
that to proper error handling. Also adjust the error message so we can
actually do something with the information.
|
[] | null | 5.5
| null | null | null |
|
GHSA-83hh-pj86-jr69
|
In the Linux kernel, the following vulnerability has been resolved:cachefiles: wait for ondemand_object_worker to finish when dropping objectWhen queuing ondemand_object_worker() to re-open the object,
cachefiles_object is not pinned. The cachefiles_object may be freed when
the pending read request is completed intentionally and the related
erofs is umounted. If ondemand_object_worker() runs after the object is
freed, it will incur use-after-free problem as shown below.process A processs B process C process Dcachefiles_ondemand_send_req()
// send a read req X
// wait for its completion// read req X is completed
// umount the erofs fs
cachefiles_put_object()
// object will be freed
cachefiles_ondemand_deinit_obj_info()
kmem_cache_free(object)
// both info and object are freed
ondemand_object_worker()When dropping an object, it is no longer necessary to reopen the object,
so use cancel_work_sync() to cancel or wait for ondemand_object_worker()
to finish.
|
[] | null | 7.8
| null | null | null |
|
CVE-2019-15949
|
Nagios XI before 5.6.6 allows remote command execution as root. The exploit requires access to the server as the nagios user, or access as the admin user via the web interface. The getprofile.sh script, invoked by downloading a system profile (profile.php?cmd=download), is executed as root via a passwordless sudo entry; the script executes check_plugin, which is owned by the nagios user. A user logged into Nagios XI with permissions to modify plugins, or the nagios user on the server, can modify the check_plugin executable and insert malicious commands to execute as root.
|
[
"cpe:2.3:a:nagios:nagios_xi:*:*:*:*:*:*:*:*"
] | null | 8.8
| null | 9
| null |
|
GHSA-f7pg-xgpm-7pv6
|
SQL injection vulnerability in Welcart e-Commerce prior to 2.11.2 allows an attacker who can login to the product to obtain or alter the information stored in the database.
|
[] | null | 8.8
| null | null | null |
|
GHSA-37jg-8f5h-cqw4
|
services/audioflinger/Effects.cpp in mediaserver in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, 6.x before 2016-10-01, and 7.0 before 2016-10-01 does not validate EFFECT_CMD_SET_PARAM and EFFECT_CMD_SET_PARAM_DEFERRED commands, which allows attackers to obtain sensitive information via a crafted application, aka internal bug 30204301.
|
[] | null | null | 5.5
| null | null |
|
GHSA-x9m9-3xvj-c28p
|
Dell EMC PowerStore versions 2.0.0.x, 2.0.1.x, and 2.1.0.x are vulnerable to a command injection flaw. An authenticated attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application's underlying OS, with the privileges of the vulnerable application. Exploitation may lead to a system takeover by an attacker.
|
[] | null | 7.8
| null | null | null |
|
GHSA-q8hf-p6h4-w2f9
|
Windows Console Driver Denial of Service Vulnerability This CVE ID is unique from CVE-2021-28438.
|
[] | null | 5.5
| null | null | null |
|
GHSA-77jf-5mcg-g6m9
|
A command injection vulnerability has been reported to affect QTS and QuTS hero. If exploited, this vulnerability allows attackers to execute arbitrary commands in a compromised application. We have already fixed this vulnerability in the following versions: QTS 4.5.2.1566 Build 20210202 and later QTS 4.5.1.1495 Build 20201123 and later QTS 4.3.6.1620 Build 20210322 and later QTS 4.3.4.1632 Build 20210324 and later QTS 4.3.3.1624 Build 20210416 and later QTS 4.2.6 Build 20210327 and later QuTS hero h4.5.1.1491 build 20201119 and later
|
[] | null | 9.8
| null | null | null |
|
CVE-2020-1057
|
Scripting Engine Memory Corruption Vulnerability
|
<p>A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user.</p>
<p>If the current user is logged on with administrative user rights, an attacker who successfully exploited the vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.</p>
<p>The security update addresses the vulnerability by modifying how the ChakraCore scripting engine handles objects in memory.</p>
|
[
"cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:chakracore:*:*:*:*:*:*:*:*"
] | null | 4.2
| null | null | null |
CVE-2023-6579
|
osCommerce POST Parameter shopping-cart sql injection
|
A vulnerability, which was classified as critical, has been found in osCommerce 4. Affected by this issue is some unknown functionality of the file /b2b-supermarket/shopping-cart of the component POST Parameter Handler. The manipulation of the argument estimate[country_id] leads to sql injection. The attack may be launched remotely. The identifier of this vulnerability is VDB-247160. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
|
[
"cpe:2.3:a:oscommerce:oscommerce:4.0:*:*:*:*:*:*:*"
] | null | 7.3
| 7.3
| 7.5
| null |
GHSA-r8g9-x5r3-7rc6
|
The IndexedDatabaseManager class in the IndexedDB implementation in Mozilla Firefox before 39.0 and Firefox ESR 31.x before 31.8 and 38.x before 38.1 misinterprets an unspecified IDBDatabase field as a pointer, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via unspecified vectors, related to a "type confusion" issue.
|
[] | null | null | null | null | null |
|
GHSA-248r-2g9q-v634
|
win32k.sys in the kernel-mode drivers in Microsoft Windows 7 SP1 and Server 2008 R2 SP1 does not properly consider thread-owned objects during the processing of window handles, which allows local users to gain privileges via a crafted application, aka "Win32k Window Handle Vulnerability."
|
[] | null | null | null | null | null |
|
GHSA-6x56-7q94-5745
|
An os command injection vulnerability exists in the CWMP SelfDefinedTimeZone functionality of Grandstream GXP2135 1.0.9.129, 1.0.11.74 and 1.0.11.79. A specially crafted network packet can lead to arbitrary command execution. An attacker can send a sequence of malicious packets to trigger this vulnerability.
|
[] | null | 8.1
| null | null | null |
|
CVE-2007-5646
|
SQL injection vulnerability in Sources/Search.php in Simple Machines Forum (SMF) 1.1.3, when MySQL 5 is used, allows remote attackers to execute arbitrary SQL commands via the userspec parameter in a search2 action to index.php.
|
[
"cpe:2.3:a:simple_machines:simple_machines_forum:1.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:simple_machines:simple_machines_forum:1.1.3:*:*:*:*:*:*:*"
] | null | null | null | 6.8
| null |
|
CVE-2023-1757
|
Cross-site Scripting (XSS) - Stored in thorsten/phpmyfaq
|
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.12.
|
[
"cpe:2.3:a:phpmyfaq:phpmyfaq:*:*:*:*:*:*:*:*"
] | null | null | 8.1
| null | null |
GHSA-g6r4-56c3-fr2r
|
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in LOOS,Inc. Arkhe Blocks allows Stored XSS.This issue affects Arkhe Blocks: from n/a through 2.22.1.
|
[] | null | 6.5
| null | null | null |
|
CVE-2024-0020
|
In onActivityResult of NotificationSoundPreference.java, there is a possible way to hear audio files belonging to a different user due to a confused deputy. This could lead to local information disclosure across users of a device with no additional execution privileges needed. User interaction is not needed for exploitation.
|
[
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*"
] | null | 5.5
| null | null | null |
|
GHSA-78cg-rc3q-pv8q
|
CleverStupidDog yf-exam 1.8.0 is vulnerable to File Upload. There is no restriction on the suffix of the uploaded file, resulting in any file upload.
|
[] | null | 7.5
| null | null | null |
|
GHSA-6c88-gv2x-2fhc
|
Integer overflow in ColorSync in Apple Mac OS X before 10.6.8 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via an image containing a crafted embedded ColorSync profile that triggers a heap-based buffer overflow.
|
[] | null | null | null | null | null |
|
GHSA-g2gv-xj5r-wqxg
|
Acrobat Reader versions 20.005.30539, 23.008.20470 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[] | null | 7.8
| null | null | null |
|
GHSA-3h4r-2q6q-wfr8
|
VMware Cloud Director Availability contains an HTML injection vulnerability.
A
malicious actor with network access to VMware Cloud Director
Availability can craft malicious HTML tags to execute within replication
tasks.
|
[] | null | 6.4
| null | null | null |
|
CVE-2024-35197
|
gix refs and paths with reserved Windows device names access the devices
|
gitoxide is a pure Rust implementation of Git. On Windows, fetching refs that clash with legacy device names reads from the devices, and checking out paths that clash with such names writes arbitrary data to the devices. This allows a repository, when cloned, to cause indefinite blocking or the production of arbitrary message that appear to have come from the application, and potentially other harmful effects under limited circumstances. If Windows is not used, or untrusted repositories are not cloned or otherwise used, then there is no impact. A minor degradation in availability may also be possible, such as with a very large file named `CON`, though the user could interrupt the application.
|
[
"cpe:2.3:a:byron:gitoxide:*:*:*:*:*:*:*:*"
] | null | 5.4
| null | null | null |
GHSA-5jxr-9cqh-7q3m
|
Project files are stored memory objects in the form of binary serialized data that can later be read and deserialized again to instantiate the original objects in memory. Malicious manipulation of these files may allow an attacker to corrupt memory.
|
[] | null | null | null | null | null |
|
CVE-2010-4331
|
Multiple cross-site scripting (XSS) vulnerabilities in Seo Panel 2.2.0 allow remote attackers to inject arbitrary web script or HTML via the (1) default_news or (2) sponsors cookies, which are not properly handled by (a) controllers/index.ctrl.php or (b) controllers/settings.ctrl.php.
|
[
"cpe:2.3:a:seopanel:seopanel:2.2.0:*:*:*:*:*:*:*"
] | null | null | null | 4.3
| null |
|
ICSA-22-195-06
|
Siemens Mendix Excel Importer
|
The affected component is vulnerable to XML Entity Expansion Injection. An attacker may use this to compromise the availability of the affected component.
|
[] | null | 6.5
| null | null | null |
GHSA-2x5q-fj99-48h5
|
The BIG-IP 15.0.0-15.0.1, 14.0.0-14.1.2.2, 13.1.0-13.1.3.1, 12.1.0-12.1.5, and 11.5.1-11.6.5.1, BIG-IQ 7.0.0, 6.0.0-6.1.0, and 5.2.0-5.4.0, iWorkflow 2.3.0, and Enterprise Manager 3.1.1 configuration utility is vulnerable to Anti DNS Pinning (DNS Rebinding) attack.
|
[] | null | null | null | null | null |
|
GHSA-8ph8-qhj8-87rw
|
IBM Robotic Process Automation 21.0.0, 21.0.1, and 21.0.2 could allow a privileged user to obtain sensitive Azure bot credential information. IBM X-Force ID: 226342.
|
[] | null | 4.9
| null | null | null |
|
GHSA-wj3g-wf2v-qh3w
|
Multiple cross-site scripting vulnerabilities in Voxel Dot Net CBMS 0.7 and earlier allows remote attackers to execute arbitrary script as other CBMS users.
|
[] | null | null | null | null | null |
|
CVE-2009-3390
|
Multiple unspecified vulnerabilities in the (1) iscsiadm and (2) iscsitadm programs in Sun Solaris 10, and OpenSolaris snv_28 through snv_109, allow local users with certain RBAC execution profiles to gain privileges via unknown vectors related to the libima library.
|
[
"cpe:2.3:o:sun:opensolaris:snv_28:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_29:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_30:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_31:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_32:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_33:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_34:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_35:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_36:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_37:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_38:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_39:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_40:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_41:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_42:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_43:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_44:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_45:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_46:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_47:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_48:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_49:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_50:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_51:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_52:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_53:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_54:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_55:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_56:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_57:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_58:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_59:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_60:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_61:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_62:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_63:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_64:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_65:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_66:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_67:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_68:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_69:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_70:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_71:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_72:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_73:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_74:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_75:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_76:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_77:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_78:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_79:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_80:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_81:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_82:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_83:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_84:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_85:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_86:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_87:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_88:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_89:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_90:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_91:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_92:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_93:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_94:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_95:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_96:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_97:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_98:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_99:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_100:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_101:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_102:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_103:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_104:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_105:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_106:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_107:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_108:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_109:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:10:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_28:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_29:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_30:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_31:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_32:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_33:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_34:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_35:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_36:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_37:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_38:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_39:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_40:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_41:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_42:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_43:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_44:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_45:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_46:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_47:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_48:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_49:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_50:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_51:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_52:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_53:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_54:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_55:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_56:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_57:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_58:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_59:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_60:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_61:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_62:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_63:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_64:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_65:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_66:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_67:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_68:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_69:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_70:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_71:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_72:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_73:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_74:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_75:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_76:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_77:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_79:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_80:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_81:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_82:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_83:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_84:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_85:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_86:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_87:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_88:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_89:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_90:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_91:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_92:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_93:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_94:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_95:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_96:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_97:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_98:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_99:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_100:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_101:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_102:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_103:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_104:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_105:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_106:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_107:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_108:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_109:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:10:*:x86:*:*:*:*:*"
] | null | null | null | 7.2
| null |
|
CVE-2006-5621
|
PHP remote file inclusion vulnerability in end.php in ask_rave 0.9 PR, and other versions before 0.9b, allows remote attackers to execute arbitrary PHP code via a URL in the footfile parameter.
|
[
"cpe:2.3:a:ask_rave:ask_rave:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5
| null |
|
GHSA-2w48-ph92-rq3j
|
There is a heap-based buffer-overflow at generator_spgemm_csc_reader.c (function libxsmm_sparse_csc_reader) in LIBXSMM 1.10, a different vulnerability than CVE-2018-20541 (which is in a different part of the source code and is seen at a different address).
|
[] | null | null | 8.8
| null | null |
|
CVE-2024-25924
|
WordPress WP Testimonials plugin <= 1.4.3 - Auth. SQL Injection vulnerability
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Trustindex.Io WP Testimonials.This issue affects WP Testimonials: from n/a through 1.4.3.
|
[] | null | 7.6
| null | null | null |
CVE-2025-53269
|
WordPress My Wp Brand plugin <= 1.1.3 - Cross Site Request Forgery (CSRF) Vulnerability
|
Cross-Site Request Forgery (CSRF) vulnerability in imw3 My Wp Brand allows Cross Site Request Forgery. This issue affects My Wp Brand: from n/a through 1.1.3.
|
[] | null | 4.3
| null | null | null |
GHSA-c978-j9mm-m34q
|
A stack-based buffer overflow vulnerability in /bin/webs binary in Edimax BR6478AC V2 firmware veraion v1.23 allows attackers to overwrite other values located on the stack due to an incorrect use of the strcpy() function.
|
[] | null | 9.8
| null | null | null |
|
CVE-2023-43079
|
Dell OpenManage Server Administrator, versions 11.0.0.0 and prior, contains an Improper Access Control vulnerability. A local low-privileged malicious user could potentially exploit this vulnerability to execute arbitrary code in order to elevate privileges on the system. Exploitation may lead to a complete system compromise.
|
[
"cpe:2.3:a:dell:emc_openmanage_server_administrator:*:*:*:*:*:*:*:*"
] | null | 7.3
| null | null | null |
|
GHSA-rfhr-47j6-q56h
|
Cross-site scripting (XSS) vulnerability in index.php in phpGroupWare 0.9.14.005 and earlier allows remote attackers to inject arbitrary web script or HTML via the date parameter in a calendar.uicalendar.planner menuaction.
|
[] | null | null | null | null | null |
|
GHSA-qvp5-638g-h6h3
|
Information disclosure
|
[] | null | 5.3
| null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.