id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 36
232
⌀ |
|---|---|---|---|---|---|---|---|---|
RHSA-2021:3946
|
Red Hat Security Advisory: redis:5 security update
|
redis: Lua scripts can overflow the heap-based Lua stack redis: Integer overflow issue with Streams redis: Integer overflow bug in the ziplist data structure redis: Denial of service via Redis Standard Protocol (RESP) request redis: Integer overflow issue with intsets redis: Integer overflow issue with strings
|
[
"cpe:/a:redhat:rhel_eus:8.1::appstream"
] | null | 7.5
| null | null | null |
CVE-2006-6469
|
Xerox WorkCentre and WorkCentre Pro before 12.050.03.000, 13.x before 13.050.03.000, and 14.x before 14.050.03.000 do not block the postgres port (5432/tcp), which has unknown impact and remote attack vectors, probably related to unauthorized connections to a PostgreSQL daemon.
|
[
"cpe:2.3:h:xerox:workcentre:*:*:*:*:*:*:*:*",
"cpe:2.3:h:xerox:workcentre:*:*:pro:*:*:*:*:*"
] | null | null | null | 5.8
| null |
|
GHSA-9whh-jc85-fxmx
|
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.24. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox as well as unauthorized update, insert or delete access to some of Oracle VM VirtualBox accessible data and unauthorized read access to a subset of Oracle VM VirtualBox accessible data. Note: This vulnerability applies to Solaris x86 and Linux systems only. CVSS 3.1 Base Score 7.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:H).
|
[] | null | 7.3
| null | null | null |
|
CVE-2022-0660
|
Generation of Error Message Containing Sensitive Information in microweber/microweber
|
Generation of Error Message Containing Sensitive Information in Packagist microweber/microweber prior to 1.2.11.
|
[
"cpe:2.3:a:microweber:microweber:*:*:*:*:*:*:*:*"
] | null | null | 9.4
| null | null |
GHSA-vjh6-vph2-j2q4
|
The Integration for Pipedrive and Contact Form 7, WPForms, Elementor, Ninja Forms plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.2.3 via deserialization of untrusted input within the verify_field_val() function. This makes it possible for unauthenticated attackers to inject a PHP Object. The additional presence of a POP chain in the Contact Form 7 plugin, which is likely to be used alongside, allows attackers to delete arbitrary files, leading to a denial of service or remote code execution when the wp-config.php file is deleted.
|
[] | null | 9.8
| null | null | null |
|
CVE-2020-24406
|
Document root path disclosure on Maintenance page
|
When in maintenance mode, Magento version 2.4.0 and 2.3.4 (and earlier) are affected by an information disclosure vulnerability that could expose the installation path during build deployments. This information could be helpful to attackers if they are able to identify other exploitable vulnerabilities in the environment.
|
[
"cpe:2.3:a:magento:magento:*:*:*:*:commerce:*:*:*",
"cpe:2.3:a:magento:magento:*:*:*:*:open_source:*:*:*",
"cpe:2.3:a:magento:magento:2.4.0:*:*:*:commerce:*:*:*",
"cpe:2.3:a:magento:magento:2.4.0:*:*:*:open_source:*:*:*"
] | null | 3.7
| null | null | null |
GHSA-7xfw-m94r-38p2
|
Path traversal vulnerability in Cybozu Garoon 4.0.0 to 5.0.1 allows remote authenticated attackers to obtain unintended information via unspecified vectors.
|
[] | null | null | null | null | null |
|
CVE-2014-5026
|
Multiple cross-site scripting (XSS) vulnerabilities in Cacti 0.8.8b allow remote authenticated users with console access to inject arbitrary web script or HTML via a (1) Graph Tree Title in a delete or (2) edit action; (3) CDEF Name, (4) Data Input Method Name, or (5) Host Templates Name in a delete action; (6) Data Source Title; (7) Graph Title; or (8) Graph Template Name in a delete or (9) duplicate action.
|
[
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cacti:cacti:0.8.8b:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*"
] | null | null | null | 3.5
| null |
|
GHSA-c9gr-fm33-6r9r
|
The Ads Pro Plugin - Multi-Purpose WordPress Advertising Manager plugin for WordPress is vulnerable to Local File Inclusion which leads to Remote Code Execution in all versions up to, and including, 4.89. This is due to the presence of a SQL Injection vulnerability and Local File Inclusion vulnerability that can be chained with an image upload. This makes it possible for unauthenticated attackers to execute code on the server upload image files on the server than can be fetched via a SQL injection vulnerability, and ultimately executed as PHP code through the local file inclusion vulnerability.
|
[] | null | 9.8
| null | null | null |
|
RHSA-2021:2475
|
Red Hat Security Advisory: Red Hat Process Automation Manager 7.11.0 security update
|
xmlgraphics-commons: SSRF due to improper input validation by the XMPParser jackson-databind: FasterXML DOMDeserializer insecure entity expansion is vulnerable to XML external entity (XXE) XStream: Server-Side Forgery Request vulnerability can be activated when unmarshalling XStream: arbitrary file deletion on the local host when unmarshalling XStream: allow a remote attacker to cause DoS only by manipulating the processed input stream XStream: SSRF via crafted input stream XStream: arbitrary file deletion on the local host via crafted input stream XStream: Unsafe deserizaliation of javax.sql.rowset.BaseRowSet XStream: Unsafe deserizaliation of com.sun.corba.se.impl.activation.ServerTableEntry XStream: Unsafe deserizaliation of sun.swing.SwingLazyValue XStream: Unsafe deserizaliation of com.sun.tools.javac.processing.JavacProcessingEnvironment NameProcessIterator XStream: ReDoS vulnerability XStream: SSRF can be activated unmarshalling with XStream to access data streams from an arbitrary URL referencing a resource in an intranet or the local host XStream: Unsafe deserizaliation of com.sun.org.apache.bcel.internal.util.ClassLoader XStream: allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream
|
[
"cpe:/a:redhat:jboss_enterprise_bpms_platform:7.11"
] | null | 8
| null | null | null |
CVE-2025-56499
|
Incorrect access control in mihomo v1.19.11 allows authenticated attackers with low-level privileges to read arbitrary files with elevated privileges via obtaining the external control key from the config file.
|
[] | null | null | null | null | null |
|
GHSA-6qxv-37xg-xg4w
|
Certain HP Enterprise LaserJet and HP LaserJet Managed Printers are potentially vulnerable to information disclosure when IPsec is enabled with FutureSmart version 5.6.
|
[] | null | 7.5
| null | null | null |
|
CVE-2017-7067
|
An issue was discovered in certain Apple products. macOS before 10.12.6 is affected. The issue involves the "Kernel" component. It allows attackers to bypass intended memory-read restrictions via a crafted app.
|
[
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
] | null | null | 5.5
| 4.3
| null |
|
GHSA-v9vm-w355-5p8c
|
The administrative linker functionality in Atlassian Fisheye and Crucible before version 4.7.0 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the href parameter.
|
[] | null | null | 4.8
| null | null |
|
CVE-2023-1908
|
SourceCodester Simple Mobile Comparison Website GET Parameter view_category.php sql injection
|
A vulnerability was found in SourceCodester Simple Mobile Comparison Website 1.0. It has been classified as critical. Affected is an unknown function of the file /admin/categories/view_category.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-225150 is the identifier assigned to this vulnerability.
|
[
"cpe:2.3:a:simple_mobile_comparison_website_project:simple_mobile_comparison_website:1.0:*:*:*:*:*:*:*"
] | null | 6.3
| 6.3
| 6.5
| null |
GHSA-7v3x-w835-5wrm
|
Cisco IOS 12.4 and 15.0 through 15.6 and IOS XE 3.1 through 3.18 and 16.1 allow remote attackers to cause a denial of service (memory consumption or device reload) via fragmented IKEv1 packets, aka Bug ID CSCuy47382.
|
[] | null | null | 7.5
| null | null |
|
CVE-2006-4464
|
The Nokia Browser, possibly Nokia Symbian 60 Browser 3rd edition, allows remote attackers to cause a denial of service (crash) via JavaScript that constructs a large Unicode string.
|
[
"cpe:2.3:a:nokia:symbian:s60:3:*:*:*:*:*:*"
] | null | null | null | 5
| null |
|
CVE-2020-14536
|
Vulnerability in the Oracle Commerce Guided Search / Oracle Commerce Experience Manager product of Oracle Commerce (component: Workbench). Supported versions that are affected are 11.0, 11.1, 11.2 and prior to 11.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Commerce Guided Search / Oracle Commerce Experience Manager. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Commerce Guided Search / Oracle Commerce Experience Manager accessible data as well as unauthorized access to critical data or complete access to all Oracle Commerce Guided Search / Oracle Commerce Experience Manager accessible data. CVSS 3.1 Base Score 7.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N).
|
[
"cpe:2.3:a:oracle:commerce_experience_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:commerce_guided_search:*:*:*:*:*:*:*:*"
] | null | 7.4
| null | null | null |
|
CVE-2024-6292
|
Use after free in Dawn in Google Chrome prior to 126.0.6478.126 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*"
] | null | 7.5
| null | null | null |
|
CVE-2022-1071
|
User after free in mrb_vm_exec in mruby/mruby
|
User after free in mrb_vm_exec in GitHub repository mruby/mruby prior to 3.2.
|
[
"cpe:2.3:a:mruby:mruby:*:*:*:*:*:*:*:*"
] | null | null | 7.7
| null | null |
CVE-2022-48851
|
staging: gdm724x: fix use after free in gdm_lte_rx()
|
In the Linux kernel, the following vulnerability has been resolved:
staging: gdm724x: fix use after free in gdm_lte_rx()
The netif_rx_ni() function frees the skb so we can't dereference it to
save the skb->len.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | 7.8
| null | null | null |
GHSA-r7xh-cr9c-6wxq
|
In the Linux kernel, the following vulnerability has been resolved:staging: vt6655: fix some erroneous memory clean-up loopsIn some initialization functions of this driver, memory is allocated with
'i' acting as an index variable and increasing from 0. The commit in
"Fixes" introduces some clean-up codes in case of allocation failure,
which free memory in reverse order with 'i' decreasing to 0. However,
there are some problems:The case i=0 is left out. Thus memory is leaked.In case memory allocation fails right from the start, the memory
freeing loops will start with i=-1 and invalid memory locations will
be accessed.One of these loops has been fixed in commit c8ff91535880 ("staging:
vt6655: fix potential memory leak"). Fix the remaining erroneous loops.
|
[] | null | null | null | null | null |
|
GHSA-8mxj-8hjq-5r24
|
Unspecified vulnerability in the Oracle Applications Framework component in Oracle E-Business Suite 11.5.10.2, 12.0.6, and 12.1.2 allows remote authenticated users to affect confidentiality via unknown vectors.
|
[] | null | null | null | null | null |
|
GHSA-g56j-5qqv-7cxw
|
Multiple cross-site request forgery (CSRF) vulnerabilities in the admin panel in osCMax before 2.5.1 allow remote attackers to hijack the authentication of administrators for requests that conduct SQL injection attacks via the (1) status parameter to admin/stats_monthly_sales.php or (2) country parameter in a process action to admin/create_account_process.php.
|
[] | null | null | null | null | null |
|
GHSA-g3h3-m2g5-25f2
|
A vulnerability, which was classified as critical, was found in WoWonder. Affected is the file /requests.php which is responsible to handle group messages. The manipulation of the argument group_id allows posting messages in other groups. It is possible to launch the attack remotely but it might require authentication. A video explaining the attack has been disclosed to the public.
|
[] | null | 4.3
| null | null | null |
|
GHSA-975p-qpvw-m767
|
Out-of-bounds write in Linux kernel mode driver for some Intel(R) Ethernet Network Controllers and Adapters before version 28.3 may allow an authenticated user to potentially enable escalation of privilege via local access.
|
[] | 9.3
| 8.8
| null | null | null |
|
CVE-2010-0578
|
The IKE implementation in Cisco IOS 12.2 through 12.4 on Cisco 7200 and 7301 routers with VAM2+ allows remote attackers to cause a denial of service (device reload) via a malformed IKE packet, aka Bug ID CSCtb13491.
|
[
"cpe:2.3:o:cisco:ios:12.2sb:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2sca:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2scb:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2scc:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2sra:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3t:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3xe:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3xj:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3xr:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3xu:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3xw:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3xx:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3yf:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3yg:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3yk:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3yq:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3ys:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3yu:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3yx:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3za:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4gc:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4ja:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4jda:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4jdc:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4jdd:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4jk:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4jl:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4jma:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4jmb:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4jx:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4md:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4mda:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4mr:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4sw:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4t:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4xa:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4xb:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4xc:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4xd:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4xe:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4xf:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4xg:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4xj:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4xk:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4xl:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4xm:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4xn:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4xp:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4xq:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4xr:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4xt:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4xv:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4xw:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4xy:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4xz:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4ya:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4yb:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4yd:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4ye:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4yg:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:7200_router:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:7301_router:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:router_7200:*:*:*:*:*:*:*:*"
] | null | null | null | 7.8
| null |
|
GHSA-5mjw-pmfh-7vh5
|
Multiple cross-site scripting (XSS) vulnerabilities in qdPM 8.3 allow remote attackers to inject arbitrary web script or HTML via the (1) search[keywords] parameter to index.php/users page; the (2) "Name of application" on index.php/configuration; (3) a new project name on index.php/projects; (4) the task name on index.php/tasks; (5) ticket name on index.php/tickets; (6) discussion name on index.php/discussions; (7) report name on index.php/projectReports; or (8) event name on index.php/scheduler/personal.
|
[] | null | null | 6.1
| null | null |
|
CVE-2021-26989
|
Clustered Data ONTAP versions prior to 9.3P21, 9.5P16, 9.6P12, 9.7P9 and 9.8 are susceptible to a vulnerability which could allow a remote authenticated attacker to cause a Denial of Service (DoS) on clustered Data ONTAP configured for SMB access.
|
[
"cpe:2.3:o:netapp:data_ontap:9.3.0:-:*:*:*:*:*:*",
"cpe:2.3:o:netapp:data_ontap:9.3.0:p1:*:*:*:*:*:*",
"cpe:2.3:o:netapp:data_ontap:9.3.0:p10:*:*:*:*:*:*",
"cpe:2.3:o:netapp:data_ontap:9.3.0:p11:*:*:*:*:*:*",
"cpe:2.3:o:netapp:data_ontap:9.3.0:p12:*:*:*:*:*:*",
"cpe:2.3:o:netapp:data_ontap:9.3.0:p13:*:*:*:*:*:*",
"cpe:2.3:o:netapp:data_ontap:9.3.0:p14:*:*:*:*:*:*",
"cpe:2.3:o:netapp:data_ontap:9.3.0:p15:*:*:*:*:*:*",
"cpe:2.3:o:netapp:data_ontap:9.3.0:p16:*:*:*:*:*:*",
"cpe:2.3:o:netapp:data_ontap:9.3.0:p17:*:*:*:*:*:*",
"cpe:2.3:o:netapp:data_ontap:9.3.0:p18:*:*:*:*:*:*",
"cpe:2.3:o:netapp:data_ontap:9.3.0:p19:*:*:*:*:*:*",
"cpe:2.3:o:netapp:data_ontap:9.3.0:p2:*:*:*:*:*:*",
"cpe:2.3:o:netapp:data_ontap:9.3.0:p20:*:*:*:*:*:*",
"cpe:2.3:o:netapp:data_ontap:9.3.0:p3:*:*:*:*:*:*",
"cpe:2.3:o:netapp:data_ontap:9.3.0:p4:*:*:*:*:*:*",
"cpe:2.3:o:netapp:data_ontap:9.3.0:p5:*:*:*:*:*:*",
"cpe:2.3:o:netapp:data_ontap:9.3.0:p6:*:*:*:*:*:*",
"cpe:2.3:o:netapp:data_ontap:9.3.0:p7:*:*:*:*:*:*",
"cpe:2.3:o:netapp:data_ontap:9.3.0:p8:*:*:*:*:*:*",
"cpe:2.3:o:netapp:data_ontap:9.3.0:p9:*:*:*:*:*:*",
"cpe:2.3:o:netapp:data_ontap:9.5.0:-:*:*:*:*:*:*",
"cpe:2.3:o:netapp:data_ontap:9.5.0:p1:*:*:*:*:*:*",
"cpe:2.3:o:netapp:data_ontap:9.5.0:p10:*:*:*:*:*:*",
"cpe:2.3:o:netapp:data_ontap:9.5.0:p11:*:*:*:*:*:*",
"cpe:2.3:o:netapp:data_ontap:9.5.0:p12:*:*:*:*:*:*",
"cpe:2.3:o:netapp:data_ontap:9.5.0:p13:*:*:*:*:*:*",
"cpe:2.3:o:netapp:data_ontap:9.5.0:p14:*:*:*:*:*:*",
"cpe:2.3:o:netapp:data_ontap:9.5.0:p15:*:*:*:*:*:*",
"cpe:2.3:o:netapp:data_ontap:9.5.0:p2:*:*:*:*:*:*",
"cpe:2.3:o:netapp:data_ontap:9.5.0:p3:*:*:*:*:*:*",
"cpe:2.3:o:netapp:data_ontap:9.5.0:p4:*:*:*:*:*:*",
"cpe:2.3:o:netapp:data_ontap:9.5.0:p5:*:*:*:*:*:*",
"cpe:2.3:o:netapp:data_ontap:9.5.0:p6:*:*:*:*:*:*",
"cpe:2.3:o:netapp:data_ontap:9.5.0:p7:*:*:*:*:*:*",
"cpe:2.3:o:netapp:data_ontap:9.5.0:p8:*:*:*:*:*:*",
"cpe:2.3:o:netapp:data_ontap:9.5.0:p9:*:*:*:*:*:*",
"cpe:2.3:o:netapp:data_ontap:9.6.0:-:*:*:*:*:*:*",
"cpe:2.3:o:netapp:data_ontap:9.6.0:p1:*:*:*:*:*:*",
"cpe:2.3:o:netapp:data_ontap:9.6.0:p10:*:*:*:*:*:*",
"cpe:2.3:o:netapp:data_ontap:9.6.0:p11:*:*:*:*:*:*",
"cpe:2.3:o:netapp:data_ontap:9.6.0:p2:*:*:*:*:*:*",
"cpe:2.3:o:netapp:data_ontap:9.6.0:p3:*:*:*:*:*:*",
"cpe:2.3:o:netapp:data_ontap:9.6.0:p4:*:*:*:*:*:*",
"cpe:2.3:o:netapp:data_ontap:9.6.0:p5:*:*:*:*:*:*",
"cpe:2.3:o:netapp:data_ontap:9.6.0:p6:*:*:*:*:*:*",
"cpe:2.3:o:netapp:data_ontap:9.6.0:p7:*:*:*:*:*:*",
"cpe:2.3:o:netapp:data_ontap:9.6.0:p8:*:*:*:*:*:*",
"cpe:2.3:o:netapp:data_ontap:9.6.0:p9:*:*:*:*:*:*",
"cpe:2.3:o:netapp:data_ontap:9.7.0:-:*:*:*:*:*:*",
"cpe:2.3:o:netapp:data_ontap:9.7.0:p1:*:*:*:*:*:*",
"cpe:2.3:o:netapp:data_ontap:9.7.0:p2:*:*:*:*:*:*",
"cpe:2.3:o:netapp:data_ontap:9.7.0:p3:*:*:*:*:*:*",
"cpe:2.3:o:netapp:data_ontap:9.7.0:p4:*:*:*:*:*:*",
"cpe:2.3:o:netapp:data_ontap:9.7.0:p5:*:*:*:*:*:*",
"cpe:2.3:o:netapp:data_ontap:9.7.0:p6:*:*:*:*:*:*",
"cpe:2.3:o:netapp:data_ontap:9.7.0:p7:*:*:*:*:*:*",
"cpe:2.3:o:netapp:data_ontap:9.8.0:-:*:*:*:*:*:*"
] | null | 6.5
| null | 3.5
| null |
|
GHSA-2rmr-49w2-jxx7
|
Data Illusion Survey Software Solutions ngSurvey version 2.4.28 and below is vulnerable to Denial of Service if a survey contains a "Text Field", "Comment Field" or "Contact Details".
|
[] | null | 7.5
| null | null | null |
|
CVE-2018-1524
|
IBM Maximo Asset Management 7.6 through 7.6.3 installs with a default administrator account that a remote intruder could use to gain administrator access to the system. This vulnerability is due to an incomplete fix for CVE-2015-4966. IBM X-Force ID: 142116.
|
[
"cpe:2.3:a:ibm:maximo_asset_management:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_for_aviation:7.6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_for_aviation:7.6.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_for_aviation:7.6.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_for_aviation:7.6.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_for_aviation:7.6.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_for_life_sciences:7.6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_for_nuclear_power:7.6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_for_oil_and_gas:7.5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_for_oil_and_gas:7.6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_for_transportation:7.6.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_for_transportation:7.6.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_for_transportation:7.6.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_for_transportation:7.6.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_for_transportation:7.6.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_for_transportation:7.6.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_for_utilities:7.6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:smartcloud_control_desk:7.6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:smartcloud_control_desk:7.6.0.1:*:*:*:*:*:*:*"
] | null | null | 8.8
| null | null |
|
CVE-2005-1478
|
Format string vulnerability in dSMTP (dsmtp.exe) in DMail 3.1a allows remote attackers to execute arbitrary code via format string specifiers in the xtellmail command.
|
[
"cpe:2.3:a:netwin:dmail:3.1a:*:*:*:*:*:*:*",
"cpe:2.3:a:netwin:dmail:3.1b:*:*:*:*:*:*:*"
] | null | null | null | 7.5
| null |
|
GHSA-xv4c-h899-8cjv
|
A vulnerability was found in code-projects E-Commerce Website 1.0. Affected is an unknown function of the file /pages/product_add.php. The manipulation of the argument prod_name/prod_desc/prod_cost results in cross site scripting. It is possible to launch the attack remotely. The exploit has been made public and could be used.
|
[] | 2.1
| 4.3
| null | null | null |
|
GHSA-vv4q-84xw-r5qv
|
The BoomBox Theme Extensions plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1.8.0 via the 'boombox_listing' shortcode 'type' attribute. This makes it possible for authenticated attackers, with contributor-level and above permissions, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where php file type can be uploaded and included.
|
[] | null | 8.8
| null | null | null |
|
CVE-2022-39915
|
Improper access control vulnerability in Calendar prior to versions 11.6.08.0 in Android Q(10), 12.2.11.3000 in Android R(11), 12.3.07.2000 in Android S(12), and 12.4.02.0 in Android T(13) allows attackers to access sensitive information via implicit intent.
|
[
"cpe:2.3:a:samsung:calendar:*:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*"
] | null | 3.3
| null | null | null |
|
GHSA-3867-jc5c-66qf
|
Broken Access Control order API in Shopware
|
ImpactIn the Shopware CMS, the state handler for orders fails to sufficiently verify user authorizations for actions that modify the payment, delivery, and/or order status. Due to this inadequate implementation, users lacking 'write' permissions for orders are still able to change the order state.PatchesUpdate to Shopware 6.5.7.4WorkaroundsFor older versions of 6.1, 6.2, 6.3 and 6.4 corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version.
|
[] | null | 4.9
| null | null | null |
GHSA-4vrx-hp2c-wxxw
|
A vulnerability, which was classified as critical, has been found in SourceCodester Client Database Management System 1.0. This issue affects some unknown processing of the file /user_customer_create_order.php. The manipulation of the argument user_id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
|
[] | 5.5
| 7.3
| null | null | null |
|
PYSEC-2021-651
| null |
TensorFlow is an end-to-end open source platform for machine learning. An attacker can trigger a division by 0 in `tf.raw_ops.Conv2DBackpropInput`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/b40060c9f697b044e3107917c797ba052f4506ab/tensorflow/core/kernels/conv_grad_input_ops.h#L625-L655) does a division by a quantity that is controlled by the caller. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
|
[] | null | null | null | null | null |
ICSA-22-342-03
|
Rockwell Automation Logix controllers
|
An unauthorized user could use a specially crafted sequence of Ethernet and IP messages and combine them with heavy traffic loading to cause a denial-of-service condition in Rockwell Automation Logix controllers, resulting in a denial-of-service condition. If the target device becomes unavailable in this condition, a user would have to clear and redownload the user project file to bring the device back online.CVE-2022-3752 has been assigned to this vulnerability. A CVSS v3 base score of 8.6 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H).
|
[] | null | null | 8.6
| null | null |
CVE-2023-38230
|
ZDI-CAN-21318: Adobe Acrobat Reader DC Font Parsing Use-After-Free Information Disclosure Vulnerability
|
Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by a Use-After-Free vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*"
] | null | 5.5
| null | null | null |
GHSA-9pj4-3hjv-frj6
|
Unspecified vulnerability in the PeopleSoft Enterprise FMS - Cash Management component in Oracle PeopleSoft and JDEdwards Suite 8.9 Bundle #38, 9.0 Bundle #31, and 9.1 Bundle #6 allows remote authenticated users to affect confidentiality and integrity via unknown vectors.
|
[] | null | null | null | null | null |
|
CVE-2018-15995
|
Adobe Acrobat and Reader versions 2019.008.20081 and earlier, 2019.008.20080 and earlier, 2019.008.20081 and earlier, 2017.011.30106 and earlier version, 2017.011.30105 and earlier version, 2015.006.30457 and earlier, and 2015.006.30456 and earlier have an integer overflow vulnerability. Successful exploitation could lead to information disclosure.
|
[
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*"
] | null | null | 6.5
| 4.3
| null |
|
GHSA-7f7j-qrh6-xj4j
|
CuteNews 2.0.1 allows remote authenticated attackers to execute arbitrary PHP code via unspecified vectors.
|
[] | null | null | null | null | null |
|
CVE-2025-20218
|
Cisco Secure Firepower Management Center Software XPATH Injection Vulnerability
|
A vulnerability in the web-based management interface of Cisco Secure Firewall Management Center (FMC) Software could allow an authenticated, remote attacker to retrieve sensitive information from an affected device.
This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending a crafted request to the web-based management interface of an affected device. A successful exploit could allow the attacker to retrieve sensitive information from the affected device.
To exploit this vulnerability, the attacker must have valid administrative credentials.
|
[] | null | 4.9
| null | null | null |
CVE-2022-40144
|
A vulnerability in Trend Micro Apex One and Trend Micro Apex One as a Service could allow an attacker to bypass the product's login authentication by falsifying request parameters on affected installations.
|
[
"cpe:2.3:a:trendmicro:apex_one:-:*:*:*:*:saas:*:*",
"cpe:2.3:a:trendmicro:apex_one:2019:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 9.8
| null | null | null |
|
GHSA-xgmg-7q7c-fhxx
|
The AI ChatBot for WordPress – WPBot plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 5.5.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
|
[] | null | 5.5
| null | null | null |
|
GHSA-gj9x-3fhj-p23h
|
The CIDAM Protocol on some Huawei Products has multiple input validation vulnerabilities due to insufficient validation of specific messages when the protocol is implemented. An authenticated remote attacker could send a malicious message to a target system. Successful exploit could allow the attacker to tamper with business and make the system abnormal. Affected Huawei Products are: DP300 versions V500R002C00, V500R002C00B010, V500R002C00B011, V500R002C00B012, V500R002C00B013, V500R002C00B014, V500R002C00B017, V500R002C00B018, V500R002C00SPC100, V500R002C00SPC200, V500R002C00SPC300, V500R002C00SPC400, V500R002C00SPC500, V500R002C00SPC600, V500R002C00SPC800, V500R002C00SPC900, V500R002C00SPCa00; RP200 versions V500R002C00SPC200, V600R006C00, V600R006C00SPC200, V600R006C00SPC300, V600R006C00SPC400, V600R006C00SPC500; TE30 versions V100R001C10SPC300, V100R001C10SPC500, V100R001C10SPC600, V100R001C10SPC700B010, V500R002C00SPC200, V500R002C00SPC500, V500R002C00SPC600, V500R002C00SPC700, V500R002C00SPC900, V500R002C00SPCb00, V600R006C00, V600R006C00SPC200, V600R006C00SPC300, V600R006C00SPC400, V600R006C00SPC500; TE40 versions V500R002C00SPC600, V500R002C00SPC700, V500R002C00SPC900, V500R002C00SPCb00, V600R006C00, V600R006C00SPC200, V600R006C00SPC300, V600R006C00SPC400, V600R006C00SPC500; TE50 versions V500R002C00SPC600, V500R002C00SPC700, V500R002C00SPCb00, V600R006C00, V600R006C00SPC200, V600R006C00SPC300, V600R006C00SPC400, V600R006C00SPC500; TE60 versions V100R001C10, V100R001C10B001, V100R001C10B002, V100R001C10B010, V100R001C10B011, V100R001C10B012, V100R001C10B013, V100R001C10B014, V100R001C10B016, V100R001C10B017, V100R001C10B018, V100R001C10B019, V100R001C10SPC400, V100R001C10SPC500, V100R001C10SPC600, V100R001C10SPC700, V100R001C10SPC800B011, V100R001C10SPC900, V500R002C00, V500R002C00B010, V500R002C00B011, V500R002C00SPC100, V500R002C00SPC200, V500R002C00SPC300, V500R002C00SPC600, V500R002C00SPC700, V500R002C00SPC800, V500R002C00SPC900, V500R002C00SPCa00, V500R002C00SPCb00, V500R002C00SPCd00, V500R002C00SPCe00, V600R006C00, V600R006C00SPC100, V600R006C00SPC200, V600R006C00SPC300, V600R006C00SPC400, V600R006C00SPC500; eSpace U1981 version V200R003C20SPC900.
|
[] | null | null | 6.5
| null | null |
|
GHSA-66h3-v5f7-5w52
|
PHP Scripts Mall PHP Multivendor Ecommerce has SQL Injection via the shopping-cart.php cusid parameter.
|
[] | null | null | 9.8
| null | null |
|
CVE-2023-29108
|
IP filter vulnerability in ABAP Platform and SAP Web Dispatcher
|
The IP filter in ABAP Platform and SAP Web Dispatcher - versions WEBDISP 7.85, 7.89, KERNEL 7.85, 7.89, 7.91, may be vulnerable by erroneous IP netmask handling. This may enable access to backend applications from unwanted sources.
|
[
"cpe:2.3:a:sap:abap_platform_kernel:7.85:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:abap_platform_kernel:7.89:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:abap_platform_kernel:7.91:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:web_dispatcher:7.85:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:web_dispatcher:7.89:*:*:*:*:*:*:*"
] | null | 5
| null | null | null |
CVE-2022-26301
|
TuziCMS v2.0.6 was discovered to contain a SQL injection vulnerability via the component App\Manage\Controller\ZhuantiController.class.php.
|
[
"cpe:2.3:a:yejiao:tuzicms:2.0.6:*:*:*:*:*:*:*"
] | null | 9.8
| null | 7.5
| null |
|
GHSA-77wf-92x9-j58v
|
Huawei USG5500, USG2100, USG2200, and USG5100 unified security gateways with software before V300R001C10SPC600, when "DHCP Snooping" is enabled and either "option82 insert" or "option82 rebuild" is enabled on an interface, allow remote attackers to cause a denial of service (reboot) via crafted DHCP packets.
|
[] | null | null | null | null | null |
|
CVE-2006-0190
|
Unspecified vulnerability in Sun Solaris 9 and 10 for the x86 platform allows local users to gain privileges or cause a denial of service (panic) via unspecified vectors, possibly involving functions from the mm driver.
|
[
"cpe:2.3:o:sun:solaris:9.0:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:10.0:*:sparc:*:*:*:*:*"
] | null | null | null | 7.2
| null |
|
GHSA-v4g5-82wj-3j9w
|
An issue was discovered in certain Apple products. iOS before 11.4 is affected. Safari before 11.1.1 is affected. iCloud before 7.5 on Windows is affected. iTunes before 12.7.5 on Windows is affected. tvOS before 11.4 is affected. watchOS before 4.3.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site that triggers an @generatorState use-after-free.
|
[] | null | null | 8.8
| null | null |
|
CVE-2023-37982
|
WordPress Integration for Contact Form 7 and Salesforce Plugin <= 1.3.3 is vulnerable to Open Redirection
|
URL Redirection to Untrusted Site ('Open Redirect') vulnerability in CRM Perks Integration for Salesforce and Contact Form 7, WPForms, Elementor, Ninja Forms.This issue affects Integration for Salesforce and Contact Form 7, WPForms, Elementor, Ninja Forms: from n/a through 1.3.3.
|
[
"cpe:2.3:a:crmperks:integration_for_salesforce_and_contact_form_7\\,_wpforms\\,_elementor\\,_ninja_forms:*:*:*:*:*:wordpress:*:*"
] | null | 4.7
| null | null | null |
CVE-2021-31798
|
The effective key space used to encrypt the cache in CyberArk Credential Provider prior to 12.1 has low entropy, and under certain conditions a local malicious user can obtain the plaintext of cache files.
|
[
"cpe:2.3:a:cyberark:credential_provider:*:*:*:*:*:*:*:*"
] | null | 4.4
| null | 1.9
| null |
|
CVE-2023-34998
|
An authentication bypass vulnerability exists in the OAS Engine functionality of Open Automation Software OAS Platform v18.00.0072. A specially crafted series of network requests can lead to arbitrary authentication. An attacker can sniff network traffic to trigger this vulnerability.
|
[
"cpe:2.3:a:openautomationsoftware:oas_platform:18.00.0072:*:*:*:*:*:*:*"
] | null | 8.1
| null | null | null |
|
CVE-2024-8300
|
Malicious Code Execution Vulnerability in GENESIS64
|
Dead Code vulnerability in ICONICS GENESIS64 Version 10.97.2, 10.97.2 CFR1, 10.97.2 CRF2 and 10.97.3 and Mitsubishi Electric GENESIS64 Version 10.97.2, 10.97.2 CFR1, 10.97.2 CRF2 and 10.97.3 allows a local authenticated attacker to execute a malicious code by tampering with a specially crafted DLL. This could lead to disclose, tamper with, destroy, or delete information in the affected products, or cause a denial of service (DoS) condition on the products.
|
[
"cpe:2.3:a:iconics:genesis64:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mitsubishielectric:genesis64:*:*:*:*:*:*:*:*"
] | null | 7
| null | null | null |
CVE-2019-20145
|
An issue was discovered in GitLab Community Edition (CE) and Enterprise Edition (EE) 11.4 through 12.6.1. It has Incorrect Access Control.
|
[
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*"
] | null | 4.3
| null | 4
| null |
|
GHSA-f37f-9mx7-xgw5
|
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the rotate property of a TimeField. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-6485.
|
[] | null | null | 8.8
| null | null |
|
GHSA-rj65-h7q6-63qc
|
Windows DWM Core Library Information Disclosure Vulnerability
|
[] | null | 5.5
| null | null | null |
|
CVE-2008-0500
|
Multiple unspecified vulnerabilities in Mambo LaiThai 4.5.5 have unknown impact and attack vectors related to (1) mod_login and (2) mod_template_chooser.
|
[
"cpe:2.3:a:mamboxchange:laithai:4.5.5:*:*:*:*:*:*:*"
] | null | null | null | 10
| null |
|
GHSA-pqc6-v3x2-rr5p
|
Unspecified vulnerability in Oracle Sun Solaris 9 and 10 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Utility/Umount.
|
[] | null | null | null | null | null |
|
GHSA-533p-g2hq-qr26
|
Command Injection in treekill
|
All versions of `treekill` are vulnerable to Command Injection. The package fails to sanitize values passed to the `kill` function. If this value is user-controlled it may allow attackers to run arbitrary commands in the server. The issue only affects Windows systems.RecommendationNo fix is currently available. Consider using an alternative package until a fix is made available.
|
[] | null | null | null | null | null |
GHSA-qqpc-2hm2-rq5r
|
Netscape Enterprise servers may list files through the PageServices query.
|
[] | null | null | null | null | null |
|
RHSA-2025:6977
|
Red Hat Security Advisory: python3.9 security update
|
python: cpython: URL parser allowed square brackets in domain names
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 6.8
| null | null | null |
CVE-2017-6359
|
QNAP QTS before 4.2.4 Build 20170313 allows attackers to gain administrator privileges and execute arbitrary commands via unspecified vectors.
|
[
"cpe:2.3:o:qnap:qts:*:*:*:*:*:*:*:*"
] | null | null | 9.8
| 10
| null |
|
GHSA-4q79-qphh-pxpm
|
Integer overflow in the COFF/EPOC/EXPLOAD input file loaders in Hex-Rays IDA Pro 5.7 and 6.0 has unknown impact and attack vectors related to memory allocation.
|
[] | null | null | null | null | null |
|
GHSA-g4xv-r3qw-v3q2
|
typo3 Information Disclosure Security Note
|
Due to reports it has been validated that internal workspaces in Neos are accessible without authentication. Some users assumed this is a planned feature but it is not. A workspace preview should be an additional feature with respective security measures in place.Note that this only allows reading of internal workspaces not writing. And for clarification, an internal workspace is a workspace that is non public and doesn't have an owner.Given that an internal workspace exists in your installation, it is possible to view a page in context of that workspace by opening a link in this format:https://domain/path/to/page.html@workspace-nameThe issue is quite problematic when exploited but at the same time slightly less impactful than it sounds. First of all there is no default internal workspace, so the issue affects only workspaces created by users. That also means the workspace-name, which will also always include a hash is individual to a project and an exploiter must get hold of the workspace-name including the hash. This is non trivial as there is no indication of the existence of it, but obviously brute force and educated guessed can be made.
|
[] | null | null | null | null | null |
CVE-2022-32149
|
Denial of service via crafted Accept-Language header in golang.org/x/text/language
|
An attacker may cause a denial of service by crafting an Accept-Language header which ParseAcceptLanguage will take significant time to parse.
|
[
"cpe:2.3:a:golang:text:*:*:*:*:*:*:*:*"
] | null | 7.5
| null | null | null |
CVE-2025-52043
|
In Frappe ERPNext v15.57.5, the function import_coa() at erpnext/accounts/doctype/chart_of_accounts_importer/chart_of_accounts_importer.py is vulnerable to SQL injection, which allows an attacker to extract all information from databases by injecting a SQL query into the company parameter.
|
[] | null | 6.5
| null | null | null |
|
GHSA-5768-4xxg-h24c
|
Cisco WebEx Meetings Server 2.6 allows remote authenticated users to conduct command-injection attacks via vectors related to an upload's file type, aka Bug ID CSCuy92715.
|
[] | null | null | 7.5
| null | null |
|
CVE-2025-58833
|
WordPress Invelity MyGLS connect Plugin <= 1.1.1 - Cross Site Request Forgery (CSRF) Vulnerability
|
Cross-Site Request Forgery (CSRF) vulnerability in INVELITY Invelity MyGLS connect allows Object Injection. This issue affects Invelity MyGLS connect: from n/a through 1.1.1.
|
[] | null | 8.8
| null | null | null |
RHSA-2017:2704
|
Red Hat Security Advisory: kernel-rt security update
|
kernel: stack buffer overflow in the native Bluetooth stack
|
[
"cpe:/a:redhat:rhel_extras_rt:7"
] | null | null | 7.5
| null | null |
GHSA-54rx-gp68-xqw5
|
Cross-site scripting (XSS) vulnerability in the Messages functionality in Cybozu Garoon 3.1.x, 3.5.x, and 3.7.x before 3.7 SP4 allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors.
|
[] | null | null | null | null | null |
|
GHSA-g76j-9r88-7qvg
|
Deserialization of Untrusted Data vulnerability in uxper Nuss allows Object Injection. This issue affects Nuss: from n/a through 1.3.3.
|
[] | null | 8.8
| null | null | null |
|
CVE-2023-45751
|
WordPress Nexter Extension Plugin <= 2.0.3 is vulnerable to Remote Code Execution (RCE)
|
Improper Control of Generation of Code ('Code Injection') vulnerability in POSIMYTH Nexter Extension.This issue affects Nexter Extension: from n/a through 2.0.3.
|
[
"cpe:2.3:a:posimyth:nexter_extension:*:*:*:*:*:wordpress:*:*"
] | null | 9.1
| null | null | null |
CVE-2023-40055
|
SolarWinds Network Configuration Manager Directory Traversal Remote Code Execution Vulnerability
|
The Network Configuration Manager was susceptible to a Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows a low-level user to perform the actions with SYSTEM privileges. We found this issue was not resolved in CVE-2023-33227
|
[
"cpe:2.3:a:solarwinds:network_configuration_manager:*:*:*:*:*:*:*:*"
] | null | 8
| null | null | null |
GHSA-gvr6-g64h-9mj2
|
When using X11, text selected by the page using the Selection API was erroneously copied into the primary selection, a temporary storage not unlike the clipboard.
*This bug only affects Thunderbird on X11. Other systems are unaffected.* This vulnerability affects Firefox < 120, Firefox < 115.5, and Thunderbird < 115.5.0.
|
[] | null | 8.8
| null | null | null |
|
CVE-2018-1644
|
IBM WebSphere Commerce Enterprise, Professional, Express, and Developer 9.0.0.0 - 9.0.0.4, 8.0.0.0 - 8.0.0.19, 8.0.1.0 - 8.0.1.13, 8.0.3.0 - 8.0.3.6, 8.0.4.0 - 8.0.4.14, and 7.0.0.0 Feature Pack 8 could allow an authenticated user to obtain sensitive information about another user.
|
[
"cpe:2.3:a:ibm:websphere_commerce:*:*:*:*:developer:*:*:*",
"cpe:2.3:a:ibm:websphere_commerce:*:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:ibm:websphere_commerce:*:*:*:*:express:*:*:*",
"cpe:2.3:a:ibm:websphere_commerce:*:*:*:*:professional:*:*:*",
"cpe:2.3:a:ibm:websphere_commerce:7.0:feature_pack_8:*:*:*:*:*:*"
] | null | null | 3.1
| null | null |
|
GHSA-gc2x-3pv6-xhfw
|
Unspecified vulnerability in the Oracle Common Applications Calendar component in Oracle E-Business Suite 12.1.1, 12.1.2, and 12.1.3 allows remote attackers to affect confidentiality and integrity via vectors related to Tasks.
|
[] | null | null | 8.2
| null | null |
|
GHSA-4xqq-q6wp-w8h4
|
A use-after-free exists in drivers/tee/tee_shm.c in the TEE subsystem in the Linux kernel through 5.15.11. This occurs because of a race condition in tee_shm_get_from_id during an attempt to free a shared memory object.
|
[] | null | 7
| null | null | null |
|
CVE-2018-18578
|
DedeCMS 5.7 SP2 allows XSS via the plus/qrcode.php type parameter.
|
[
"cpe:2.3:a:dedecms:dedecms:5.7:sp2:*:*:*:*:*:*"
] | null | null | 6.1
| 4.3
| null |
|
CVE-2022-47450
|
In wlan driver, there is a possible missing permission check. This could lead to local information disclosure.
|
[
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc7731e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc9832e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t310:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*"
] | null | 5.5
| null | null | null |
|
GHSA-69hj-qg9v-rx7w
|
IBM Security Guardium 11.3, 11.4, and 11.5 could allow an unauthorized user to enumerate usernames by sending a specially crafted HTTP request. IBM X-Force ID: 252293.
|
[] | null | 5.3
| null | null | null |
|
RHSA-2024:7481
|
Red Hat Security Advisory: linux-firmware security update
|
kernel: hw:amd:IOMMU improperly handles certain special address leading to a loss of guest integrity hw: amd: SMM Lock Bypass kernel: hw:amd: Incomplete system memory cleanup in SEV firmware corrupt guest private memory
|
[
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 4.4
| null | null | null |
CVE-2023-6081
|
Chart.js for WordPress <= 2023.2 - Editor+ Stored Cross-Site Scripting in New Chart
|
The chartjs WordPress plugin through 2023.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
|
[
"cpe:2.3:a:chartjs_project:chartjs:*:*:*:*:*:wordpress:*:*"
] | null | 5.4
| null | null | null |
CVE-2024-40522
|
There is a remote code execution vulnerability in SeaCMS 12.9. The vulnerability is caused by phomebak.php writing some variable names passed in without filtering them before writing them into the php file. An authenticated attacker can exploit this vulnerability to execute arbitrary commands and obtain system permissions.
|
[
"cpe:2.3:a:seacms:seacms:12.9:*:*:*:*:*:*:*"
] | null | 8.8
| null | null | null |
|
GHSA-gv3p-qv63-g8qx
|
An improper neutralization of special elements used in an OS command vulnerability [CWE-78] in the command line interpreter of FortiTester 2.3.0 through 7.2.3 may allow an authenticated attacker to execute unauthorized commands via specifically crafted arguments when running execute restore/backup .
|
[] | null | 6.7
| null | null | null |
|
CVE-2010-0125
|
RealNetworks RealPlayer 11.0 through 11.1, RealPlayer SP 1.0 through 1.1.4, RealPlayer Enterprise 2.1.2, and Mac RealPlayer 11.0 through 12.0.0.1444 do not properly parse spectral data in AAC files, which has unspecified impact and remote attack vectors.
|
[
"cpe:2.3:a:realnetworks:realplayer:11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:11.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:11.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:11.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:11.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:11.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:11.1:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer_sp:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer_sp:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer_sp:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer_sp:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer_sp:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer_sp:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer_sp:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer_sp:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer_sp:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:12.0.0.1444:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:2.1.2:*:enterprise:*:*:*:*:*"
] | null | null | null | 10
| null |
|
CVE-2025-52736
|
WordPress Finale Lite Plugin <= 2.20.0 - Cross Site Scripting (XSS) Vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Daman Jeet Finale Lite finale-woocommerce-sales-countdown-timer-discount allows Reflected XSS.This issue affects Finale Lite: from n/a through <= 2.20.0.
|
[] | null | 7.1
| null | null | null |
GHSA-h6wq-rhmx-rv6x
|
A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'UnlockProject' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with "NT AUTHORITY\NetworkService" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on.
|
[] | 8.7
| 8.8
| null | null | null |
|
GHSA-7v9p-w84p-x9qq
|
The DehoistArrayIndex function in hydrogen-dehoist.cc (aka hydrogen.cc) in Google V8 before 3.22.24.7, as used in Google Chrome before 31.0.1650.63, allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via JavaScript code that sets the value of an array element with a crafted index.
|
[] | null | null | null | null | null |
|
CVE-2004-1941
|
Fastream NETFile FTP/Web Server 6.5.1.980 allows remote attackers to cause a denial of service via a username that does not exist.
|
[
"cpe:2.3:a:fastream:netfile_ftp_web_server:6.5.1.980:*:*:*:*:*:*:*"
] | null | null | null | 5
| null |
|
RHSA-2016:0266
|
Red Hat Security Advisory: openstack-heat bug fix and security advisory
|
openstack-heat: Vulnerability in Heat template validation leading to DoS
|
[
"cpe:/a:redhat:openstack:7::el7"
] | null | null | null | null | null |
GHSA-5r59-c396-qwfm
|
Double-free vulnerability in mysqld for MySQL before 3.23.55 allows attackers with MySQL access to cause a denial of service (crash) via mysql_change_user.
|
[] | null | null | null | null | null |
|
GHSA-cxmj-72r8-rqj8
|
An issue was discovered in certain Apple products. iOS before 10.2.1 is affected. Safari before 10.0.3 is affected. iCloud before 6.1.1 is affected. iTunes before 12.5.5 is affected. tvOS before 10.1.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (uninitialized memory access and application crash) via a crafted web site.
|
[] | null | null | 8.8
| null | null |
|
CVE-2016-1197
|
Cross-site scripting (XSS) vulnerability in Cybozu Garoon 4.x before 4.2.1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2015-7775.
|
[
"cpe:2.3:a:cybozu:garoon:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:4.2.0:*:*:*:*:*:*:*"
] | null | null | 6.1
| 4.3
| null |
|
CVE-2019-9161
|
WAC on the Sangfor Sundray WLAN Controller version 3.7.4.2 and earlier has a Remote Code Execution issue allowing remote attackers to achieve full access to the system, because shell metacharacters in the nginx_webconsole.php Cookie header can be used to read an etc/config/wac/wns_cfg_admin_detail.xml file containing the admin password. (The password for root is the WebUI admin password concatenated with a static string.)
|
[
"cpe:2.3:o:xinruidz:sundray_wan_controller_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:xinruidz:sundray_wan_controller:-:*:*:*:*:*:*:*"
] | null | null | 9.8
| 10
| null |
|
CVE-2020-5417
|
Cloud Controller may allow developers to claim sensitive routes
|
Cloud Foundry CAPI (Cloud Controller), versions prior to 1.97.0, when used in a deployment where an app domain is also the system domain (which is true in the default CF Deployment manifest), were vulnerable to developers maliciously or accidentally claiming certain sensitive routes, potentially resulting in the developer's app handling some requests that were expected to go to certain system components.
|
[
"cpe:2.3:a:cloudfoundry:capi-release:*:*:*:*:*:*:*:*",
"cpe:2.3:a:cloudfoundry:cf-deployment:*:*:*:*:*:*:*:*"
] | null | null | 8.5
| null | null |
CVE-2023-1778
|
Default Credential Vulnerability in GajShield Data Security Firewall
|
This vulnerability exists in GajShield Data Security Firewall firmware versions prior to v4.28 (except v4.21) due to insecure default credentials which allows remote attacker to login as superuser by using default username/password via web-based management interface and/or exposed SSH port thereby enabling remote attackers to execute arbitrary commands with administrative/superuser privileges on the targeted systems.
The vulnerability has been addressed by forcing the user to change their default password to a new non-default password.
|
[
"cpe:2.3:o:gajshield:data_security_firewall_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:gajshield:data_security_firewall:-:*:*:*:*:*:*:*"
] | null | 10
| null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.