id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 38
232
⌀ |
|---|---|---|---|---|---|---|---|---|
ICSA-24-256-22
|
Rockwell Automation FactoryTalk Batch View
|
An authentication bypass vulnerability exists in the affected product. The vulnerability exists due to shared secrets across accounts and could allow a threat actor to impersonate a user if the threat actor is able to enumerate additional information required during authentication.
|
[] | null | 8.1
| null | null | null |
RHSA-2017:2838
|
Red Hat Security Advisory: dnsmasq security update
|
dnsmasq: heap overflow in the code responsible for building DNS replies
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 9.8
| null | null |
GHSA-pr55-xhmq-xc23
|
Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 SP2 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, and Windows 10 Gold, 1511, 1607, 1703, 1709, Windows Server 2016 and Windows Server, version 1709 allows an attacker to obtain information to further compromise the user's system, due to how the scripting engine handles objects in memory, aka "Scripting Engine Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-11791.
|
[] | null | null | 5.3
| null | null |
|
GHSA-797x-6m3w-gjc3
|
SQL injection vulnerability in modules/news/rss.php in LEPTON before 1.1.4 allows remote attackers to execute arbitrary SQL commands via the group_id parameter.
|
[] | null | null | null | null | null |
|
RHSA-2021:1007
|
Red Hat Security Advisory: OpenShift Container Platform 4.7.5 security and bug fix update
|
gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation containernetworking-cni: Arbitrary path injection via type field in CNI configuration
|
[
"cpe:/a:redhat:openshift:4.7::el8"
] | null | 7.2
| null | null | null |
CVE-2025-22740
|
WordPress Sensei LMS plugin <= 4.24.4 - Broken Access Control vulnerability
|
Missing Authorization vulnerability in Automattic Sensei LMS allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Sensei LMS: from n/a through 4.24.4.
|
[] | null | 5.3
| null | null | null |
GHSA-p6jf-pv8c-623c
|
A heap buffer overflow vulnerability was discovered in Perl.When there are non-ASCII bytes in the left-hand-side of the `tr` operator, `S_do_trans_invmap` can overflow the destination pointer `d`.$ perl -e '$_ = "\x{FF}" x 1000000; tr/\xFF/\x{100}/;'
Segmentation fault (core dumped)It is believed that this vulnerability can enable Denial of Service and possibly Code Execution attacks on platforms that lack sufficient defenses.
|
[] | null | 8.6
| null | null | null |
|
GHSA-qh8r-p5cp-mcqw
|
Vulnerability in the Identity Manager product of Oracle Fusion Middleware (component: Advanced Console). Supported versions that are affected are 11.1.2.3.0 and 12.2.1.3.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Identity Manager. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Identity Manager accessible data as well as unauthorized read access to a subset of Identity Manager accessible data. CVSS 3.0 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N).
|
[] | null | 5.4
| null | null | null |
|
GHSA-2mmx-452m-3qmq
|
Cross-site scripting vulnerability in Cybozu Garoon 3.0.0 to 4.2.5 allows an attacker to inject arbitrary web script or HTML via "Rich text" function of the application "Memo".
|
[] | null | null | 5.4
| null | null |
|
GHSA-4p8v-v3vv-84rr
|
Cross-site scripting (XSS) vulnerability in PHPKIT 1.6.03 allows remote attackers to inject arbitrary web script or HTML via the error parameter to include.php, possibly due to a problem in login/login.php.
|
[] | null | null | null | null | null |
|
GHSA-g9xm-ww44-j6j9
|
Horde IMP 4.3.6 and earlier does not request that the web browser avoid DNS prefetching of domain names contained in e-mail messages, which makes it easier for remote attackers to determine the network location of the webmail user by logging DNS requests.
|
[] | null | null | null | null | null |
|
GHSA-xx34-qq6x-qvv2
|
IBM Cognos Controller 10.3.0, 10.3.1, 10.4.0, and 10.4.1 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 158880.
|
[] | null | 7.5
| null | null | null |
|
GHSA-vwf8-rq93-5m8v
|
In the Linux kernel, the following vulnerability has been resolved:hfs: fix slab-out-of-bounds in hfs_bnode_read()This patch introduces is_bnode_offset_valid() method that checks
the requested offset value. Also, it introduces
check_and_correct_requested_length() method that checks and
correct the requested length (if it is necessary). These methods
are used in hfs_bnode_read(), hfs_bnode_write(), hfs_bnode_clear(),
hfs_bnode_copy(), and hfs_bnode_move() with the goal to prevent
the access out of allocated memory and triggering the crash.
|
[] | null | null | null | null | null |
|
GHSA-8p46-3hgg-m4mc
|
The Contact Form Check Tester WordPress plugin through 1.0.2 settings are visible to all registered users in the dashboard and are lacking any sanitisation. As a result, any registered user, such as subscriber, can leave an XSS payload in the plugin settings, which will be triggered by any user visiting them, and could allow for privilege escalation. The vendor decided to close the plugin.
|
[] | null | null | null | null | null |
|
GHSA-rpjg-xjwq-x9h7
|
Buffalo NC01WH devices with firmware version 1.0.0.8 and earlier allows authenticated attackers to bypass access restriction to enable the debug option via unspecified vectors.
|
[] | null | null | 8.8
| null | null |
|
GHSA-97m3-52wr-xvv2
|
Dompdf's usage of vulnerable version of phenx/php-svg-lib leads to restriction bypass and potential RCE
|
SummaryA lack of sanitization/check in the font path returned by php-svg-lib, in the case of a inline CSS font defined, that will be used by Cpdf to open a font will be passed to a `file_exists` call, which is sufficient to trigger metadata unserializing on a PHAR file, through the phar:// URL handler on PHP < 8.0. On other versions, it might be used as a way to get a SSRF through, for example, ftp, not restricted by authorized protocols configured on dompdf.DetailsThe problem lies on the `openFont` function of the `lib/Cpdf.php` library, when the `$font` variable passed by php-svg-lib isn't checked correctly. A path is crafted through $name and $dir, which are two values that can be controlled through CSS :Passing a font named `phar:///foo/bar/baz.phar/test` will set the value of $name to `test` and $dir to `phar:///foo/bar/baz.phar`, which once reconstructed will call file_exists on `phar:///foo/bar/baz.phar/test.ufm`. That allows to deserialize the `baz.phar` arbitrary file that contains a `test.ufm` file in the archive.PoCConsider the following, minimal PHP code :With payload being this html file :with the base64 image being :A connection on ftp://blakl.is:21/ will occur, bypassing the allowed protocols.ImpactAn attacker might be able to exploit the vulnerability to call arbitrary URL with arbitrary protocols, if they can force dompdf to parse a SVG with an inline CSS property using a malicious font-family. In PHP versions before 8.0.0, it leads to arbitrary unserialize, that will leads at the very least to an arbitrary file deletion, and might leads to remote code execution, depending on classes that are available.
|
[] | null | 10
| null | null | null |
CVE-2011-0666
|
Use-after-free vulnerability in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that leverages incorrect driver object management, a different vulnerability than other "Vulnerability Type 1" CVEs listed in MS11-034, aka "Win32k Use After Free Vulnerability."
|
[
"cpe:2.3:o:microsoft:windows_2003_server:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:x86:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:*:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:*:x32:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:*:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x32:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:*:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:*:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:*"
] | null | null | null | 7.2
| null |
|
CVE-2014-5788
|
The Ninja Chicken Adventure Island (aka mominis.Generic_Android.Ninja_Chicken_Adventure_Island) application 1.1.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
|
[
"cpe:2.3:a:playscape:ninja_chicken_adventure_island_:1.1.1:*:*:*:*:android:*:*"
] | null | null | null | 5.4
| null |
|
CVE-2014-7778
|
The Epc World (aka com.magzter.epcworld) application 3.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
|
[
"cpe:2.3:a:magzter:epc_world:3.1:*:*:*:*:android:*:*"
] | null | null | null | 5.4
| null |
|
RHSA-2008:0515
|
Red Hat Security Advisory: evolution28 security update
|
evolution: iCalendar buffer overflow via large timezone specification evolution: iCalendar buffer overflow via large description parameter
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null | null |
GHSA-p9j4-9vfh-gj5c
|
SmarterTools SmarterMail 16.x through 100.x before 100.0.7803 allows XSS.
|
[] | null | 6.1
| null | null | null |
|
CVE-2020-19951
|
A cross-site request forgery (CSRF) in /controller/pay.class.php of YzmCMS v5.5 allows attackers to access sensitive components of the application.
|
[
"cpe:2.3:a:yzmcms:yzmcms:5.5:*:*:*:*:*:*:*"
] | null | 8.8
| null | 6.8
| null |
|
CVE-2012-2417
|
PyCrypto before 2.6 does not produce appropriate prime numbers when using an ElGamal scheme to generate a key, which reduces the signature space or public key space and makes it easier for attackers to conduct brute force attacks to obtain the private key.
|
[
"cpe:2.3:a:dlitz:pycrypto:*:*:*:*:*:*:*:*",
"cpe:2.3:a:dlitz:pycrypto:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:dlitz:pycrypto:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:dlitz:pycrypto:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:dlitz:pycrypto:1.1:alpha2:*:*:*:*:*:*",
"cpe:2.3:a:dlitz:pycrypto:1.9:alpha1:*:*:*:*:*:*",
"cpe:2.3:a:dlitz:pycrypto:1.9:alpha2:*:*:*:*:*:*",
"cpe:2.3:a:dlitz:pycrypto:1.9:alpha3:*:*:*:*:*:*",
"cpe:2.3:a:dlitz:pycrypto:1.9:alpha4:*:*:*:*:*:*",
"cpe:2.3:a:dlitz:pycrypto:1.9:alpha5:*:*:*:*:*:*",
"cpe:2.3:a:dlitz:pycrypto:1.9:alpha6:*:*:*:*:*:*",
"cpe:2.3:a:dlitz:pycrypto:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:dlitz:pycrypto:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:dlitz:pycrypto:2.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:dlitz:pycrypto:2.1.0:alpha1:*:*:*:*:*:*",
"cpe:2.3:a:dlitz:pycrypto:2.1.0:alpha2:*:*:*:*:*:*",
"cpe:2.3:a:dlitz:pycrypto:2.1.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:dlitz:pycrypto:2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:dlitz:pycrypto:2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:dlitz:pycrypto:2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:dlitz:pycrypto:2.4.1:*:*:*:*:*:*:*"
] | null | null | null | 4.3
| null |
|
CVE-2017-2540
|
An issue was discovered in certain Apple products. macOS before 10.12.5 is affected. The issue involves the "WindowServer" component. It allows attackers to bypass intended memory-read restrictions via a crafted app.
|
[
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
] | null | null | 5.5
| 4.3
| null |
|
GHSA-7g5h-ch9j-4fj2
|
TRENDnet TEW-827DRU with firmware up to and including 2.04B03 allows an unauthenticated attacker to execute setup wizard functionality, giving this attacker the ability to change configuration values, potentially leading to a denial of service. The request can be made on the local intranet or remotely if remote administration is enabled.
|
[] | null | null | null | null | null |
|
CVE-2018-13198
|
The sell function of a smart contract implementation for STeX Exchange ICO (STE), an Ethereum token, has an integer overflow in which "amount * sellPrice" can be zero, consequently reducing a seller's assets.
|
[
"cpe:2.3:a:stex_exchange_ico_project:stex_exchange_ico:-:*:*:*:*:*:*:*"
] | null | null | 7.5
| 5
| null |
|
GHSA-qp39-432q-7hv9
|
Unspecified vulnerability in JD Edwards HTML Server for Oracle OneWorld Tools EnterpriseOne Tools 8.95 and 8.96 has unknown impact and attack vectors, aka Oracle Vuln# JDE01.
|
[] | null | null | null | null | null |
|
CVE-2014-2575
|
Directory traversal vulnerability in the File Manager component in DevExpress ASPxFileManager Control for ASP.NET WebForms and MVC before 13.1.10 and 13.2.x before 13.2.9 allows remote authenticated users to read or write arbitrary files via a .. (dot dot) in the __EVENTARGUMENT parameter.
|
[
"cpe:2.3:a:devexpress:aspxfilemanager_control_for_webforms_and_mvc:*:*:*:*:*:*:*:*",
"cpe:2.3:a:devexpress:aspxfilemanager_control_for_webforms_and_mvc:10.2:*:*:*:*:*:*:*",
"cpe:2.3:a:devexpress:aspxfilemanager_control_for_webforms_and_mvc:10.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:devexpress:aspxfilemanager_control_for_webforms_and_mvc:10.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:devexpress:aspxfilemanager_control_for_webforms_and_mvc:10.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:devexpress:aspxfilemanager_control_for_webforms_and_mvc:10.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:devexpress:aspxfilemanager_control_for_webforms_and_mvc:10.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:devexpress:aspxfilemanager_control_for_webforms_and_mvc:10.2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:devexpress:aspxfilemanager_control_for_webforms_and_mvc:10.2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:devexpress:aspxfilemanager_control_for_webforms_and_mvc:10.2.11:*:*:*:*:*:*:*",
"cpe:2.3:a:devexpress:aspxfilemanager_control_for_webforms_and_mvc:11.1:*:*:*:*:*:*:*",
"cpe:2.3:a:devexpress:aspxfilemanager_control_for_webforms_and_mvc:11.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:devexpress:aspxfilemanager_control_for_webforms_and_mvc:11.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:devexpress:aspxfilemanager_control_for_webforms_and_mvc:11.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:devexpress:aspxfilemanager_control_for_webforms_and_mvc:11.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:devexpress:aspxfilemanager_control_for_webforms_and_mvc:11.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:devexpress:aspxfilemanager_control_for_webforms_and_mvc:11.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:devexpress:aspxfilemanager_control_for_webforms_and_mvc:11.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:devexpress:aspxfilemanager_control_for_webforms_and_mvc:11.1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:devexpress:aspxfilemanager_control_for_webforms_and_mvc:11.1.12:*:*:*:*:*:*:*",
"cpe:2.3:a:devexpress:aspxfilemanager_control_for_webforms_and_mvc:11.2:*:*:*:*:*:*:*",
"cpe:2.3:a:devexpress:aspxfilemanager_control_for_webforms_and_mvc:11.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:devexpress:aspxfilemanager_control_for_webforms_and_mvc:11.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:devexpress:aspxfilemanager_control_for_webforms_and_mvc:11.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:devexpress:aspxfilemanager_control_for_webforms_and_mvc:11.2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:devexpress:aspxfilemanager_control_for_webforms_and_mvc:11.2.11:*:*:*:*:*:*:*",
"cpe:2.3:a:devexpress:aspxfilemanager_control_for_webforms_and_mvc:11.2.12:*:*:*:*:*:*:*",
"cpe:2.3:a:devexpress:aspxfilemanager_control_for_webforms_and_mvc:11.2.13:*:*:*:*:*:*:*",
"cpe:2.3:a:devexpress:aspxfilemanager_control_for_webforms_and_mvc:11.2.14:*:*:*:*:*:*:*",
"cpe:2.3:a:devexpress:aspxfilemanager_control_for_webforms_and_mvc:12.1:*:*:*:*:*:*:*",
"cpe:2.3:a:devexpress:aspxfilemanager_control_for_webforms_and_mvc:12.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:devexpress:aspxfilemanager_control_for_webforms_and_mvc:12.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:devexpress:aspxfilemanager_control_for_webforms_and_mvc:12.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:devexpress:aspxfilemanager_control_for_webforms_and_mvc:12.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:devexpress:aspxfilemanager_control_for_webforms_and_mvc:12.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:devexpress:aspxfilemanager_control_for_webforms_and_mvc:12.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:devexpress:aspxfilemanager_control_for_webforms_and_mvc:12.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:devexpress:aspxfilemanager_control_for_webforms_and_mvc:12.1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:devexpress:aspxfilemanager_control_for_webforms_and_mvc:12.1.12:*:*:*:*:*:*:*",
"cpe:2.3:a:devexpress:aspxfilemanager_control_for_webforms_and_mvc:12.2:*:*:*:*:*:*:*",
"cpe:2.3:a:devexpress:aspxfilemanager_control_for_webforms_and_mvc:12.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:devexpress:aspxfilemanager_control_for_webforms_and_mvc:12.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:devexpress:aspxfilemanager_control_for_webforms_and_mvc:12.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:devexpress:aspxfilemanager_control_for_webforms_and_mvc:12.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:devexpress:aspxfilemanager_control_for_webforms_and_mvc:12.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:devexpress:aspxfilemanager_control_for_webforms_and_mvc:12.2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:devexpress:aspxfilemanager_control_for_webforms_and_mvc:12.2.11:*:*:*:*:*:*:*",
"cpe:2.3:a:devexpress:aspxfilemanager_control_for_webforms_and_mvc:12.2.12:*:*:*:*:*:*:*",
"cpe:2.3:a:devexpress:aspxfilemanager_control_for_webforms_and_mvc:12.2.13:*:*:*:*:*:*:*",
"cpe:2.3:a:devexpress:aspxfilemanager_control_for_webforms_and_mvc:12.2.15:*:*:*:*:*:*:*",
"cpe:2.3:a:devexpress:aspxfilemanager_control_for_webforms_and_mvc:12.2.16:*:*:*:*:*:*:*",
"cpe:2.3:a:devexpress:aspxfilemanager_control_for_webforms_and_mvc:13.1:*:*:*:*:*:*:*",
"cpe:2.3:a:devexpress:aspxfilemanager_control_for_webforms_and_mvc:13.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:devexpress:aspxfilemanager_control_for_webforms_and_mvc:13.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:devexpress:aspxfilemanager_control_for_webforms_and_mvc:13.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:devexpress:aspxfilemanager_control_for_webforms_and_mvc:13.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:devexpress:aspxfilemanager_control_for_webforms_and_mvc:13.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:devexpress:aspxfilemanager_control_for_webforms_and_mvc:13.2:*:*:*:*:*:*:*",
"cpe:2.3:a:devexpress:aspxfilemanager_control_for_webforms_and_mvc:13.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:devexpress:aspxfilemanager_control_for_webforms_and_mvc:13.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:devexpress:aspxfilemanager_control_for_webforms_and_mvc:13.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:devexpress:aspxfilemanager_control_for_webforms_and_mvc:13.2.8:*:*:*:*:*:*:*"
] | null | null | null | 6.5
| null |
|
GHSA-9mxj-5p25-8xf4
|
The installPackage function in the installerHelper subcomponent in Libmacgpg in GPG Suite before 2015.06 allows local users to execute arbitrary commands with root privileges via shell metacharacters in the xmlPath argument.
|
[] | null | null | 7.8
| null | null |
|
CVE-2024-41861
|
Adobe Substance 3D Sampler Memory Corruption Out-of-Bounds-READ Vulnerability I, when parsing PSD file
|
Substance3D - Sampler versions 4.5 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[
"cpe:2.3:a:adobe:substance_3d_sampler:*:*:*:*:*:*:*:*"
] | null | 5.5
| null | null | null |
CVE-2018-11556
|
tificc in Little CMS 2.9 has an out-of-bounds write in the cmsPipelineCheckAndRetreiveStages function in cmslut.c in liblcms2.a via a crafted TIFF file. NOTE: Little CMS developers do consider this a vulnerability because the issue is based on an sample program using LIBTIFF and do not apply to the lcms2 library, lcms2 does not depends on LIBTIFF other than to build sample programs, and the issue cannot be reproduced on the lcms2 library.”
|
[
"cpe:2.3:a:littlecms:little_cms:2.9:*:*:*:*:*:*:*"
] | null | null | 7.8
| 6.8
| null |
|
GHSA-49xr-3mhp-pp54
|
The attachment download resource in Atlassian Jira Server and Data Center before 8.5.5, and from 8.6.0 before 8.8.2, and from 8.9.0 before 8.9.1 allows remote attackers to inject arbitrary HTML or JavaScript via a Cross-Site Scripting (XSS) vulnerability issue attachments with a mixed multipart content type.
|
[] | null | 6.1
| null | null | null |
|
GHSA-4rmv-m7cx-wvg4
|
Memory corruption occurs while connecting a STA to an AP and initiating an ADD TS request from the AP to establish a TSpec session.
|
[] | null | 7.5
| null | null | null |
|
GHSA-4grp-h3mq-wpwx
|
The OTV parser in tcpdump before 4.9.0 has a buffer overflow in print-otv.c:otv_print().
|
[] | null | null | 9.8
| null | null |
|
CVE-2025-27393
|
A vulnerability has been identified in SCALANCE LPE9403 (6GK5998-3GS00-2AC2) (All versions < V4.0). Affected devices do not properly sanitize user input when creating new users.
This could allow an authenticated highly-privileged remote attacker to execute arbitrary code on the device.
|
[] | 8.6
| 7.2
| null | null | null |
|
GHSA-8v5v-6vq3-j2gq
|
TOTOLINK A3700R V9.1.2u.6134_B20201202 was discovered to contain a stack overflow via the command parameter in the function setTracerouteCfg.
|
[] | null | 7.8
| null | null | null |
|
GHSA-5mhv-hhcq-f895
|
FileSeek.cgi allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) head or (2) foot parameters.
|
[] | null | null | null | null | null |
|
RHSA-2018:1254
|
Red Hat Security Advisory: rh-mysql56-mysql security update
|
mysql: Server: Replication unspecified vulnerability (CPU Apr 2018) mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2018) mysql: Client programs unspecified vulnerability (CPU Apr 2018) mysql: InnoDB unspecified vulnerability (CPU Apr 2018) mysql: Server: Locking unspecified vulnerability (CPU Apr 2018) mysql: pid file can be created in a world-writeable directory (CPU Apr 2018) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2018) mysql: InnoDB unspecified vulnerability (CPU Apr 2018) mysql: InnoDB unspecified vulnerability (CPU Apr 2018) mysql: InnoDB unspecified vulnerability (CPU Apr 2018) mysql: GIS Extension unspecified vulnerability (CPU Apr 2018) mysql: Server: DDL unspecified vulnerability (CPU Apr 2018) mysql: Server: DDL unspecified vulnerability (CPU Apr 2018) mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2018) mysql: InnoDB unspecified vulnerability (CPU Apr 2018)
|
[
"cpe:/a:redhat:rhel_software_collections:3::el6",
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | null | 6.5
| null | null |
GHSA-v3cx-744x-wrj6
|
Cross-application scripting vulnerability in Google Chrome before 18.0.1025308 on Android allows remote attackers to inject arbitrary web script via unspecified vectors, as demonstrated by "Universal XSS (UXSS)" attacks against the current tab.
|
[] | null | null | null | null | null |
|
GHSA-675m-x238-3mpf
|
Cross-site scripting (XSS) vulnerability in index.php in PlaySMS 0.8 allows remote attackers to inject arbitrary web script or HTML via the err parameter.
|
[] | null | null | null | null | null |
|
CVE-2025-5939
|
Telegram for WP <= 1.6.1 - Authenticated (Admin+) Stored Cross-Site Scripting
|
The Telegram for WP plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 1.6.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
|
[] | null | 4.4
| null | null | null |
GHSA-fw7q-prfm-977f
|
A heap-based buffer overflow issue was found in ImageMagick's PushCharPixel() function in quantum-private.h. This issue may allow a local attacker to trick the user into opening a specially crafted file, triggering an out-of-bounds read error and allowing an application to crash, resulting in a denial of service.
|
[] | null | 5.5
| null | null | null |
|
CVE-2006-2246
|
Cross-site scripting (XSS) vulnerability in UBlog 1.6 Access Edition allows remote attackers to inject arbitrary web script or HTML via text fields when adding a blog entry.
|
[
"cpe:2.3:a:uapplication:ublog:1.6_access_edition:*:*:*:*:*:*:*"
] | null | null | null | 5.8
| null |
|
GHSA-pqrw-6jhr-7hm6
|
Improper input validation vulnerability in Tizen FOTA service prior to Firmware update JUL-2021 Release allows arbitrary code execution via Samsung Accessory Protocol.
|
[] | null | null | null | null | null |
|
CVE-2008-2147
|
Untrusted search path vulnerability in VideoLAN VLC before 0.9.0 allows local users to execute arbitrary code via a malicious library under the modules/ or plugins/ subdirectories of the current working directory.
|
[
"cpe:2.3:a:videolan:vlc:*:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc:0.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc:0.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc:0.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc:0.5.1a:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc:0.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc:0.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc:0.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc:0.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc:0.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc:0.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc:0.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc:0.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc:0.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc:0.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc:0.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc:0.8.4:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc:0.8.4a:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc:0.8.5:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc:0.8.6a:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc:0.8.6b:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc:0.8.6c:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc:0.8.6d:*:*:*:*:*:*:*",
"cpe:2.3:a:videolan:vlc:0.8.6e:*:*:*:*:*:*:*"
] | null | null | null | 4.6
| null |
|
CVE-2004-1876
|
The "%f" feature in the VirusEvent directive in Clam AntiVirus daemon (clamd) before 0.70 allows local users to execute arbitrary commands via shell metacharacters in a file name.
|
[
"cpe:2.3:a:clam_anti-virus:clamav:0.51:*:*:*:*:*:*:*",
"cpe:2.3:a:clam_anti-virus:clamav:0.52:*:*:*:*:*:*:*",
"cpe:2.3:a:clam_anti-virus:clamav:0.53:*:*:*:*:*:*:*",
"cpe:2.3:a:clam_anti-virus:clamav:0.54:*:*:*:*:*:*:*",
"cpe:2.3:a:clam_anti-virus:clamav:0.60:*:*:*:*:*:*:*",
"cpe:2.3:a:clam_anti-virus:clamav:0.65:*:*:*:*:*:*:*",
"cpe:2.3:a:clam_anti-virus:clamav:0.67:*:*:*:*:*:*:*",
"cpe:2.3:a:clam_anti-virus:clamav:0.68:*:*:*:*:*:*:*",
"cpe:2.3:a:clam_anti-virus:clamav:0.68.1:*:*:*:*:*:*:*"
] | null | null | null | 4.6
| null |
|
GHSA-6j63-35hj-vmcg
|
mysql-bunuuid-rails vulnerable to SQL injection
|
mysql-binuuid-rails 1.1.0 and earlier allows SQL Injection because it removes default string escaping for affected database columns.
|
[] | null | null | 9.8
| null | null |
RHSA-2020:0550
|
Red Hat Security Advisory: openjpeg2 security update
|
openjpeg: heap-based buffer overflow in pj_t1_clbl_decode_processor in openjp2/t1.c
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.8
| null | null | null |
GHSA-c2xg-f2c9-gvpr
|
Missing Authorization vulnerability in WPTaskForce WPCargo Track & Trace allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WPCargo Track & Trace: from n/a through 7.0.6.
|
[] | null | 5.4
| null | null | null |
|
GHSA-wv3r-84v4-pcm2
|
A Reflected Cross-Site Scripting web vulnerability has been discovered in the OEcms v3.1 web-application. The vulnerability is located in the mod parameter of info.php.
|
[] | null | null | 5.4
| null | null |
|
CVE-2007-5071
|
Incomplete blacklist vulnerability in upload_img_cgi.php in Simple PHP Blog before 0.5.1 allows remote attackers to upload dangerous files and execute arbitrary code, as demonstrated by a filename ending in .php. or a .htaccess file, a different vector than CVE-2005-2733. NOTE: the vulnerability was also present in a 0.5.1 download available in the early morning of 20070923. NOTE: the original 20070920 disclosure provided an incorrect filename, img_upload_cgi.php.
|
[
"cpe:2.3:a:alexander_palmo:simple_php_blog:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5
| null |
|
GHSA-cjp9-x9jx-mcw7
|
Citrix MetaFrame 1.8 Server with Service Pack 3, and XP Server Service Pack 1 and earlier, allows remote attackers to cause a denial of service (crash) via a large number of incomplete connections to the server.
|
[] | null | null | null | null | null |
|
GHSA-v4qr-8h2v-qpjx
|
Cross-Site Scripting in TYPO3 CMS Backend
|
Failing to properly encode user input, backend forms are vulnerable to Cross-Site Scripting. A valid backend user account is needed to exploit this vulnerability.
|
[] | null | 5.4
| null | null | null |
GHSA-w9gw-5cvf-6753
|
A CWE-862 "Missing Authorization" in maxprofile/users/routes.lua in Q-Free MaxTime less than or equal to version 2.11.0 allows an authenticated (low-privileged) attacker to remove users via crafted HTTP requests.
|
[] | null | 8.1
| null | null | null |
|
GHSA-9q9r-fmgh-vv5v
|
Heimdall Application Dashboard through 2.5.4 allows reflected XSS via "Application name" to the "Add application" page.
|
[] | null | 5.4
| null | null | null |
|
GHSA-632w-7gxq-vxq4
|
In the Linux kernel, the following vulnerability has been resolved:KVM: x86/xen: Fix cleanup logic in emulation of Xen schedop poll hypercallskvm_xen_schedop_poll does a kmalloc_array() when a VM polls the host
for more than one event channel potr (nr_ports > 1).After the kmalloc_array(), the error paths need to go through the
"out" label, but the call to kvm_read_guest_virt() does not.[Adjusted commit message. - Paolo]
|
[] | null | null | null | null | null |
|
GHSA-w5qv-457x-4w67
|
A flaw was found in the Xorg-x11-server. The specific flaw exists within the handling of ProcXkbSetDeviceInfo requests. The issue results from the lack of proper validation of user-supplied data, which can result in a memory access past the end of an allocated buffer. This flaw allows an attacker to escalate privileges and execute arbitrary code in the context of root.
|
[] | null | 7.8
| null | null | null |
|
CVE-2021-35059
|
OpenWay WAY4 ACS before 1.2.278-2693 allows XSS via the /way4acs/enroll action parameter.
|
[
"cpe:2.3:a:openwaygroup:way4:*:*:*:*:*:*:*:*"
] | null | 6.1
| null | 4.3
| null |
|
CVE-2024-48197
|
Cross Site Scripting vulnerability in Audiocodes MP-202b v.4.4.3 allows a remote attacker to escalate privileges via the login page of the web interface.
|
[] | null | 4.7
| null | null | null |
|
CVE-2021-38518
|
Certain NETGEAR devices are affected by command injection by an authenticated user. This affects RAX200 before 1.0.4.120, RAX75 before 1.0.4.120, RAX80 before 1.0.4.120, RBK852 before 3.2.17.12, RBR850 before 3.2.17.12, and RBS850 before 3.2.17.12.
|
[
"cpe:2.3:o:netgear:rax200_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rax200:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rax75_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rax75:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rax80_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rax80:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbk852_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbk852:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbr850_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbr850:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbs850_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbs850:-:*:*:*:*:*:*:*"
] | null | 8.4
| null | null | null |
|
GHSA-c37w-36r4-fj2g
|
host-deny.sh in OSSEC before 2.8.1 writes to temporary files with predictable filenames without verifying ownership, which allows local users to modify access restrictions in hosts.deny and gain root privileges by creating the temporary files before automatic IP blocking is performed.
|
[] | null | null | null | null | null |
|
CVE-2024-7734
|
Phoenix Contact: Multiple mGuard devices are vulnerable to a drain of open file descriptors.
|
An unauthenticated remote attacker can exploit the behavior of the pathfinder TCP encapsulation service by establishing a high number of TCP connections to the pathfinder TCP encapsulation service. The impact is limited to blocking of valid IPsec VPN peers.
|
[
"cpe:2.3:o:phoenixcontact:fl_mguard_centerport_vpn-1000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_core_tx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_core_tx_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_delta_tx\\/tx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_delta_tx\\/tx_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_gt\\/gt_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_gt\\/gt_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_pci4000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_pci4000_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_pcie4000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_pcie4000_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_rs2000_tx\\/tx-b_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_rs2000_tx\\/tx_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_rs2005_tx_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_rs4000_tx\\/tx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_rs4000_tx\\/tx-m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_rs4000_tx\\/tx-p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_rs4000_tx\\/tx_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_rs4004_tx\\/dtx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_rs4004_tx\\/dtx_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_smart2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_smart2_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_2102_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_2105_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_4102_pcie_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_4102_pci_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_4302_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_4305_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:tc_mguard_rs2000_3g_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:tc_mguard_rs2000_4g_att_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:tc_mguard_rs2000_4g_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:tc_mguard_rs2000_4g_vzw_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:tc_mguard_rs4000_3g_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:tc_mguard_rs4000_4g_att_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:tc_mguard_rs4000_4g_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:tc_mguard_rs4000_4g_vzw_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:tc_mguard_rs4000_4g_vzw_vpn:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:tc_mguard_rs4000_4g_vpn:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:tc_mguard_rs4000_4g_att_vpn:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:tc_mguard_rs4000_3g_vpn:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:tc_mguard_rs2000_4g_vzw_vpn:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:tc_mguard_rs2000_4g_vpn:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:tc_mguard_rs2000_4g_att_vpn:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:tc_mguard_rs2000_3g_vpn:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_mguard_smart2_vpn:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_mguard_smart2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_mguard_rs4004_tx\\/dtx_vpn:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_mguard_rs4004_tx\\/dtx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_mguard_rs4000_tx\\/tx_vpn:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_mguard_rs4000_tx\\/tx-p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_rs4000_tx\\/tx-m_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_mguard_rs4000_tx\\/tx-m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_mguard_rs4000_tx\\/tx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_mguard_rs2005_tx_vpn:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_mguard_rs2000_tx\\/tx_vpn:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_mguard_rs2000_tx\\/tx-b:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_mguard_pcie4000_vpn:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_mguard_pcie4000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_mguard_pci4000_vpn:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_mguard_pci4000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_mguard_gt\\/gt_vpn:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_mguard_gt\\/gt:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_mguard_delta_tx\\/tx_vpn:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_mguard_delta_tx\\/tx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_mguard_core_tx_vpn:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_mguard_core_tx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_mguard_centerport_vpn-1000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_mguard_4305:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_mguard_4302:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_mguard_4102_pcie:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_mguard_4102_pci:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_mguard_2105:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_mguard_2102:-:*:*:*:*:*:*:*"
] | null | 5.3
| null | null | null |
CVE-2018-17987
|
The determineWinner function of a smart contract implementation for HashHeroes Tiles, an Ethereum game, uses a certain blockhash value in an attempt to generate a random number for the case where NUM_TILES equals the number of people who purchased a tile, which allows an attacker to control the awarding of the prize by being the last person to purchase a tile.
|
[
"cpe:2.3:a:hashheroes:hashheroes:-:*:*:*:*:*:*:*"
] | null | null | 7.5
| 5
| null |
|
CVE-2007-2482
|
Directory traversal vulnerability in wordtube-button.php in the wordTube 1.43 and earlier plugin for WordPress, when register_globals is enabled, allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the wpPATH parameter.
|
[
"cpe:2.3:a:ruben_boelinger:wordtube:*:*:*:*:*:*:*:*"
] | null | null | null | 6.8
| null |
|
CVE-2016-6548
|
Zizai Tech Nut mobile application makes requests using HTTP, which includes the users session token
|
The Zizai Tech Nut mobile app makes requests via HTTP instead of HTTPS. These requests contain the user's authenticated session token with the URL. An attacker can capture these requests and reuse the session token to gain full access the user's account.
|
[
"cpe:2.3:a:nutspace:nut_mobile:-:*:*:*:*:*:*:*"
] | null | null | 9.8
| 5
| null |
GHSA-6p56-wp2h-9hxr
|
NumPy Buffer Overflow (Disputed)
|
A Buffer Overflow vulnerability exists in NumPy 1.9.x in the PyArray_NewFromDescr_int function of ctors.c when specifying arrays of large dimensions (over 32) from Python code, which could let a malicious user cause a Denial of Service.NOTE: The vendor does not agree this is a vulnerability; In (very limited) circumstances a user may be able provoke the buffer overflow, the user is most likely already privileged to at least provoke denial of service by exhausting memory. Triggering this further requires the use of uncommon API (complicated structured dtypes), which is very unlikely to be available to an unprivileged user.
|
[] | 6
| 5.3
| null | null | null |
RHSA-2012:0543
|
Red Hat Security Advisory: httpd security and bug fix update
|
httpd: mod_proxy_ajp remote temporary DoS httpd: reverse web proxy vulnerability httpd: ap_pregsub Integer overflow to buffer overflow httpd: NULL pointer dereference crash in mod_log_config httpd: possible crash on shutdown due to flaw in scoreboard handling httpd: cookie exposure due to error responses
|
[
"cpe:/a:redhat:jboss_enterprise_web_server:1.0"
] | null | null | null | null | null |
ICSMA-18-310-01
|
Roche Diagnostics Point of Care Handheld Medical Devices (Update A)
|
Weak access credentials may enable attackers in the adjacent network to gain unauthorized service access via a service interface. CVE-2018-18561 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).. Affected products:CVE-2018-18561 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N). Insecure permissions in a service interface may allow authenticated attackers in the adjacent network to execute arbitrary commands on the operating systems. CVE-2018-18562 has been assigned to this vulnerability. A CVSS v3 base score of 8.0 has been calculated; the CVSS vector string is (AV:A/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H).. Affected products:CVE-2018-18562 has been assigned to this vulnerability. A CVSS v3 base score of 8.0 has been calculated; the CVSS vector string is (AV:A/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H). A vulnerability in the software update mechanism allows an attacker in adjacent network to overwrite arbitrary files on the system through a crafted update package. CVE-2018-18563 has been assigned to this vulnerability. A CVSS v3 base score of 8.0 has been calculated; the CVSS vector string is (AV:A/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H).. Affected products: Affected products:. Accu-Chek Inform II Instrument - all versions before 03.06.00 (serial number below 14000) / 04.03.00 (serial Number above 14000)CVE-2018-18563 has been assigned to this vulnerability. A CVSS v3 base score of 8.0 has been calculated; the CVSS vector string is (AV:A/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H). Improper access control to a service command allows attackers in the adjacent network to execute arbitrary code on the system through a crafted message. CVE-2018-18564 has been assigned to this vulnerability. A CVSS v3 base score of 8.3 has been calculated; the CVSS vector string is (AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H).. Affected Products:CVE-2018-18564 has been assigned to this vulnerability. A CVSS v3 base score of 8.3 has been calculated; the CVSS vector string is (AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H). Improper access control allows attackers in the adjacent network to change the instrument configuration. CVE-2018-18565 has been assigned to this vulnerability. A CVSS v3 base score of 8.2 has been calculated; the CVSS vector string is (AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:H).. Affected products:CVE-2018-18565 has been assigned to this vulnerability. A CVSS v3 base score of 8.2 has been calculated; the CVSS vector string is (AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:H).
|
[] | null | null | 8.2
| null | null |
GHSA-fgqx-c62g-pm83
|
The The Authors List plugin for WordPress is vulnerable to arbitrary shortcode execution via update_authors_list_ajax AJAX action in all versions up to, and including, 2.0.4. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes.
|
[] | null | 7.3
| null | null | null |
|
GHSA-f8gw-fp67-9958
|
IBM Engineering Requirements Management DOORS Next 7.0.2, 7.0.3, and 7.1 could allow a remote attacker to download temporary files which could expose application logic or other sensitive information.
|
[] | null | 7.5
| null | null | null |
|
CVE-2025-52906
|
TOTOLINK X6000R Command Injection Vulnerability
|
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in TOTOLINK X6000R allows OS Command Injection.This issue affects X6000R: through V9.4.0cu.1360_B20241207.
|
[] | 9.3
| null | null | null | null |
RHSA-2023:2851
|
Red Hat Security Advisory: freerdp security update
|
freerdp: clients using `/parallel` command line switch might read uninitialized data freerdp: clients using the `/video` command line switch might read uninitialized data freerdp: out of bounds read in zgfx decoder freerdp: undefined behaviour in zgfx decoder freerdp: division by zero in urbdrc channel freerdp: missing length validation in urbdrc channel freerdp: heap buffer overflow in urbdrc channel freerdp: missing path sanitation with `drive` channel freerdp: missing input length validation in `drive` channel
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 3.7
| null | null | null |
CVE-2020-4196
|
IBM Tivoli Netcool/OMNIbus_GUI 8.1.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 174907.
|
[
"cpe:2.3:a:ibm:tivoli_netcool\\/omnibus:8.1.0:*:*:*:*:*:*:*"
] | null | null | 5.4
| null | null |
|
GHSA-2vxv-gxpx-wc5c
|
Use of a Broken or Risky Cryptographic Algorithm vulnerability exists in homeLYnk (Wiser For KNX) and spaceLYnk V2.60 and prior that could cause unauthorized access when credentials are discovered after a brute force attack.
|
[] | null | null | null | null | null |
|
CVE-2025-5159
|
H3C SecCenter SMP-E1114P02 download path traversal
|
A vulnerability was found in H3C SecCenter SMP-E1114P02 up to 20250513. It has been rated as problematic. This issue affects the function Download of the file /cfgFile/1/download. The manipulation of the argument Name leads to path traversal. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
|
[] | 5.3
| 4.3
| 4.3
| 4
| null |
CVE-2024-32824
|
WordPress Evergreen Content Poster plugin <= 1.4.2 - Broken Access Control vulnerability
|
Missing Authorization vulnerability in Evergreen Content Poster.This issue affects Evergreen Content Poster: from n/a through 1.4.2.
|
[] | null | 5.4
| null | null | null |
GHSA-f775-fgwg-5qvw
|
Memory safety bugs present in Firefox 60. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox < 61.
|
[] | null | null | 9.8
| null | null |
|
CVE-2024-1405
|
Linksys WRT54GL Web Management Interface wlaninfo.htm information disclosure
|
A vulnerability was found in Linksys WRT54GL 4.30.18. It has been classified as problematic. This affects an unknown part of the file /wlaninfo.htm of the component Web Management Interface. The manipulation leads to information disclosure. The exploit has been disclosed to the public and may be used. The identifier VDB-253329 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
|
[
"cpe:2.3:o:linksys:wrt54gl_firmware:4.30.18:*:*:*:*:*:*:*",
"cpe:2.3:h:linksys:wrt54gl:-:*:*:*:*:*:*:*"
] | null | 4.3
| 4.3
| 3.3
| null |
GHSA-5hcj-4wf5-fr4j
|
The Net Guys ASPired2poll stores sensitive information under the web root with insufficient access control, which allows remote attackers to download a database containing the username and password via a direct request to ASPired2poll.mdb.
|
[] | null | null | null | null | null |
|
GHSA-5793-wfxr-j725
|
In the Linux kernel, the following vulnerability has been resolved:dma-buf: heaps: Fix off-by-one in CMA heap fault handlerUntil VM_DONTEXPAND was added in commit 1c1914d6e8c6 ("dma-buf: heaps:
Don't track CMA dma-buf pages under RssFile") it was possible to obtain
a mapping larger than the buffer size via mremap and bypass the overflow
check in dma_buf_mmap_internal. When using such a mapping to attempt to
fault past the end of the buffer, the CMA heap fault handler also checks
the fault offset against the buffer size, but gets the boundary wrong byFix the boundary check so that we don't read off the end of the pages
array and insert an arbitrary page in the mapping.
|
[] | null | 7.8
| null | null | null |
|
GHSA-fmp6-4cgh-vf6r
|
This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of PDF files. Crafted data in a PDF file can trigger a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-18324.
|
[] | null | 5.5
| null | null | null |
|
CVE-2023-26393
|
ZDI-CAN-20234: Adobe Substance 3D Stager USD File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability
|
Adobe Substance 3D Stager version 2.0.1 (and earlier) is affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[
"cpe:2.3:a:adobe:substance_3d_stager:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 7.8
| null | null | null |
CVE-2019-7898
|
Samples of disabled downloadable products are accessible in Magento Open Source prior to 1.9.4.2, and Magento Commerce prior to 1.14.4.2, Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2 due to inadequate validation of user input.
|
[
"cpe:2.3:a:magento:magento:*:*:*:*:open_source:*:*:*",
"cpe:2.3:a:magento:magento:*:*:*:*:commerce:*:*:*"
] | null | null | 5.3
| 5
| null |
|
GHSA-32gf-jv83-x2cj
|
Servision - CWE-287: Improper Authentication
|
[] | null | 8.2
| null | null | null |
|
GHSA-8mqx-rxrp-v4x5
|
ABB PCM600 before 2.7 improperly stores OPC Server IEC61850 passwords in unspecified temporary circumstances, which allows local users to obtain sensitive information via unknown vectors.
|
[] | null | null | 6.5
| null | null |
|
GHSA-x7g8-97jm-3vpj
|
A use after free vulnerability in iva_ctl driver prior to SMR Sep-2022 Release 1 allows attacker to cause memory access fault.
|
[] | null | 7.8
| null | null | null |
|
GHSA-p3xq-894m-329r
|
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in nuajik plugin <= 0.1.0 versions.
|
[] | null | 5.9
| null | null | null |
|
GHSA-84rf-vwrp-f9rj
|
Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability.
|
[] | null | 7.8
| null | null | null |
|
CVE-1999-0724
|
Buffer overflow in OpenBSD procfs and fdescfs file systems via uio_offset in the readdir() function.
|
[
"cpe:2.3:o:openbsd:openbsd:2.5:*:*:*:*:*:*:*"
] | null | null | null | 4.6
| null |
|
RHSA-2017:0988
|
Red Hat Security Advisory: qemu-kvm-rhev security update
|
Qemu: cirrus: heap buffer overflow via vnc connection Qemu: display: cirrus: OOB read access issue Qemu: display: cirrus: OOB r/w access issues in bitblt routines
|
[
"cpe:/a:redhat:openstack:10::el7"
] | null | null | 5.5
| null | null |
RHSA-2019:2782
|
Red Hat Security Advisory: qpid-proton security update
|
qpid-proton: TLS Man in the Middle Vulnerability
|
[
"cpe:/a:redhat:rhel_satellite_tools:6.4::el5",
"cpe:/a:redhat:rhel_satellite_tools:6.4::el6",
"cpe:/a:redhat:rhel_satellite_tools:6.4::el7",
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | null | 7.4
| null | null |
CVE-2008-1123
|
Multiple PHP remote file inclusion vulnerabilities in SiteBuilder Elite 1.2 allow remote attackers to execute arbitrary PHP code via a URL in the CarpPath parameter to (1) files/carprss.php and (2) files/amazon-bestsellers.php.
|
[
"cpe:2.3:a:sitebuilder:sitebuilder_elite:1.2:*:*:*:*:*:*:*"
] | null | null | null | 6.8
| null |
|
GHSA-544h-6wr4-cv4m
|
Buffer overflow can occur in WLAN firmware while parsing beacon/probe_response frames during roaming in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wired Infrastructure and Networking in APQ8096, APQ8096AU, IPQ6018, IPQ8074, MDM9607, MDM9640, MDM9650, MSM8996AU, Nicobar, QCA6174A, QCA6574, QCA6574AU, QCA6584, QCA6584AU, QCA8081, QCA9377, QCA9379, QCS404, QCS605, Rennell, SA6155P, SC8180X, SDA660, SDA845, SDM630, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, SM6150, SM7150, SM8150, SM8250, SXR1130, SXR2130
|
[] | null | null | null | null | null |
|
CVE-2019-13675
|
Insufficient data validation in extensions in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to disable extensions via a crafted HTML page.
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] | null | 4.3
| null | 4.3
| null |
|
GHSA-rx8q-95g3-hphm
|
Adobe Experience Manager versions 6.5.18 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
|
[] | null | 5.4
| null | null | null |
|
CVE-2023-48432
|
An issue was discovered in Zimbra Collaboration (ZCS) 8.8.15, 9.0, and 10.0. XSS, with resultant session stealing, can occur via JavaScript code in a link (for a webmail redirection endpoint) within en email message, e.g., if a victim clicks on that link within Zimbra webmail.
|
[
"cpe:2.3:a:zimbra:collaboration:*:*:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:-:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p1:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p10:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p11:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p12:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p13:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p14:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p15:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p16:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p17:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p18:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p19:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p2:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p20:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p21:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p22:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p23:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p24:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p25:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p26:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p27:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p28:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p29:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p3:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p30:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p31:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p32:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p33:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p34:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p35:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p37:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p4:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p40:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p41:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p42:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p43:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p44:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p5:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p6:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p7:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p8:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p9:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:-:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p0:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p1:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p10:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p11:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p12:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p13:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p14:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p15:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p16:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p19:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p2:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p20:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p21:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p23:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p24:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p24.1:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p25:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p26:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p27:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p3:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p33:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p34:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p35:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p36:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p37:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p4:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p5:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p6:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p7:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p7.1:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p8:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p9:*:*:*:*:*:*"
] | null | 6.1
| null | null | null |
|
GHSA-mmjm-8qjp-f6jv
|
A vulnerability has been found in SourceCodester Home Clean Services Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /public_html/admin/process.php. The manipulation of the argument type/length/business leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.
|
[] | 5.1
| 4.7
| null | null | null |
|
CVE-2017-3224
|
Open Shortest Path First (OSPF) protocol implementations may improperly determine LSA recency in affected Quagga and downstream implementations (SUSE, openSUSE, and Red Hat packages)
|
Open Shortest Path First (OSPF) protocol implementations may improperly determine Link State Advertisement (LSA) recency for LSAs with MaxSequenceNumber. According to RFC 2328 section 13.1, for two instances of the same LSA, recency is determined by first comparing sequence numbers, then checksums, and finally MaxAge. In a case where the sequence numbers are the same, the LSA with the larger checksum is considered more recent, and will not be flushed from the Link State Database (LSDB). Since the RFC does not explicitly state that the values of links carried by a LSA must be the same when prematurely aging a self-originating LSA with MaxSequenceNumber, it is possible in vulnerable OSPF implementations for an attacker to craft a LSA with MaxSequenceNumber and invalid links that will result in a larger checksum and thus a 'newer' LSA that will not be flushed from the LSDB. Propagation of the crafted LSA can result in the erasure or alteration of the routing tables of routers within the routing domain, creating a denial of service condition or the re-routing of traffic on the network. CVE-2017-3224 has been reserved for Quagga and downstream implementations (SUSE, openSUSE, and Red Hat packages).
|
[
"cpe:2.3:a:quagga:quagga:-:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:opensuse:-:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:-:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:package_manager:-:*:*:*:*:*:*:*"
] | null | null | 8.2
| 4.3
| null |
CVE-2018-20340
|
Yubico libu2f-host 1.1.6 contains unchecked buffers in devs.c, which could enable a malicious token to exploit a buffer overflow. An attacker could use this to attempt to execute malicious code using a crafted USB device masquerading as a security token on a computer where the affected library is currently in use. It is not possible to perform this attack with a genuine YubiKey.
|
[
"cpe:2.3:a:yubico:libu2f-host:1.1.6:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] | null | null | 6.8
| 4.6
| null |
|
GHSA-mx8j-4265-g43j
|
A Stored Cross-Site Scripting (XSS) vulnerability in the SSH configuration tab in Usermin 2.001 allows remote attackers to inject arbitrary web script or HTML via options for the host value while editing the host options.
|
[] | null | 5.4
| null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.