id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2016-3032 | IBM Cognos Analytics 11.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 114516. | [
"cpe:2.3:a:ibm:cognos_analytics:11.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:cognos_analytics:11.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:cognos_analytics:11.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:cognos_analytics:11.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:cognos_analytics:11.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:cognos_analytics:11.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:cognos_analytics:11.0.6:*:*:*:*:*:*:*"
] | null | null | 5.4 | 3.5 |
|
CVE-2023-3149 | SourceCodester Online Discussion Forum Site manage_user.php sql injection | A vulnerability was found in SourceCodester Online Discussion Forum Site 1.0. It has been classified as critical. Affected is an unknown function of the file admin\user\manage_user.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-231018 is the identifier assigned to this vulnerability. | [
"cpe:2.3:a:online_discussion_forum_site_project:online_discussion_forum_site:1.0:*:*:*:*:*:*:*"
] | null | 6.3 | 6.3 | 6.5 |
CVE-2022-0487 | A use-after-free vulnerability was found in rtsx_usb_ms_drv_remove in drivers/memstick/host/rtsx_usb_ms.c in memstick in the Linux kernel. In this flaw, a local attacker with a user privilege may impact system Confidentiality. This flaw affects kernel versions prior to 5.14 rc1. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:-:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*"
] | null | 5.5 | null | 2.1 |
|
GHSA-6c88-fwg8-4qhh | Vulnerability in the Oracle Solaris product of Oracle Systems (component: Common Desktop Environment). Supported versions that are affected are 10 and 11. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Solaris executes to compromise Oracle Solaris. While the vulnerability is in Oracle Solaris, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle Solaris. CVSS 3.0 Base Score 7.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H). | [] | null | 7.8 | null | null |
|
ICSA-23-192-01 | Rockwell Automation Enhanced HIM | The API the application uses is not protected sufficiently and uses incorrect Cross-Origin Resource Sharing (CORS) settings and, as a result, is vulnerable to a Cross Site Request Forgery (CSRF) attack. To exploit this vulnerability, a malicious user would have to convince a user to click on an untrusted link through a social engineering attack or successfully perform a Cross Site Scripting Attack (XSS). Exploitation of a CSRF could potentially lead to sensitive information disclosure and full remote access to the affected products. | [] | null | 9.6 | null | null |
RHSA-2021:1299 | Red Hat Security Advisory: java-1.8.0-openjdk security update | OpenJDK: Incomplete enforcement of JAR signing disabled algorithms (Libraries, 8249906) | [
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 5.3 | null | null |
GHSA-889m-9374-3cr2 | The package manager in Sitecore CRM 8.1 Rev 151207 allows remote authenticated administrators to execute arbitrary ASP code by creating a ZIP archive in which a .asp file has a ..\ in its pathname, visiting sitecore/shell/applications/install/dialogs/Upload%20Package/UploadPackage2.aspx to upload this archive and extract its contents, and visiting a URI under sitecore/ to execute the .asp file. | [] | null | null | 6.7 | null |
|
PYSEC-2023-291 | null | PyDrive2 is a wrapper library of google-api-python-client that simplifies many common Google Drive API V2 tasks. Unsafe YAML deserilization will result in arbitrary code execution. A maliciously crafted YAML file can cause arbitrary code execution if PyDrive2 is run in the same directory as it, or if it is loaded in via `LoadSettingsFile`. This is a deserilization attack that will affect any user who initializes GoogleAuth from this package while a malicious yaml file is present in the same directory. This vulnerability does not require the file to be directly loaded through the code, only present. This issue has been addressed in commit `c57355dc` which is included in release version `1.16.2`. Users are advised to upgrade. There are no known workarounds for this vulnerability. | [] | null | 7.8 | null | null |
GHSA-g2mc-fqqc-hxg3 | Pimcore Path Traversal Vulnerability in AdminBundle/Controller/Reports/CustomReportController.php | ImpactThe impact of this path traversal and arbitrary extension is limited (creation of arbitrary files and appending data to existing files) but when combined with the SQL Injection, the exported data `RESTRICTED DIFFUSION 9 / 9` can be controlled and a webshell can be uploaded. Attackers can use that to execute arbitrary PHP code on the server with the permissions of the webserver.PatchesUpdate to version 10.5.18 or apply this patch manually https://github.com/pimcore/pimcore/commit/7f788fa44bc18bc1c9182c25e26b770a1d30b62f.patchWorkaroundsApply patch https://github.com/pimcore/pimcore/commit/7f788fa44bc18bc1c9182c25e26b770a1d30b62f.patch manually.Referenceshttps://github.com/pimcore/pimcore/pull/14498 | [] | null | 6.5 | null | null |
RHSA-2021:4531 | Red Hat Security Advisory: OpenJDK 17.0.1 security update for Windows Builds | OpenJDK: Excessive memory allocation in RTFParser (Swing, 8265167) OpenJDK: Excessive memory allocation in RTFReader (Swing, 8265580) OpenJDK: Excessive memory allocation in HashMap and HashSet (Utility, 8266097) OpenJDK: Certificates with end dates too far in the future can corrupt keystore (Keytool, 8266137) OpenJDK: Incorrect principal selection when using Kerberos Constrained Delegation (Libraries, 8266689) OpenJDK: Unexpected exception raised during TLS handshake (JSSE, 8267729) OpenJDK: Excessive memory allocation in BMPImageReader (ImageIO, 8267735) OpenJDK: Non-constant comparison during TLS handshakes (JSSE, 8269618) | [
"cpe:/a:redhat:openjdk:17::windows"
] | null | 3.7 | null | null |
GHSA-vpjc-3v2r-p99w | A Cross-Site Request Forgery (CSRF) in Academy LMS before v5.10 allows an attacker to arbitrarily create a page. | [] | null | 4.8 | null | null |
|
GHSA-2736-7x8v-6v3p | Mail in Apple Mac OS X before 10.6.3 does not properly enforce the key usage extension during processing of a keychain that specifies multiple certificates for an e-mail recipient, which might make it easier for remote attackers to obtain sensitive information via a brute-force attack on a weakly encrypted e-mail message. | [] | null | null | null | null |
|
CVE-2016-7663 | An issue was discovered in certain Apple products. iOS before 10.2 is affected. macOS before 10.12.2 is affected. watchOS before 3.1.3 is affected. The issue involves the "CoreFoundation" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted string. | [
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 |
|
GHSA-pwvf-mh7j-22qr | PHP remote file inclusion vulnerability in templates/header.php in ME Download System 1.3 allows remote attackers to execute arbitrary PHP code via a URL in the Vb8878b936c2bd8ae0cab parameter. | [] | null | null | null | null |
|
GHSA-92h8-xrqx-3w9v | GlowWorm FW before 1.5.3b4 allows remote attackers to cause a denial of service (kernel panic) via certain DNS responses that trigger infinite recursion in TrueDNS packet parsing, as originally observed with certain login.yahoo.com responses. | [] | null | null | null | null |
|
GHSA-j74g-h82x-vgj7 | FrontAccounting 2.4.3 suffers from a CSRF flaw, which leads to adding a user account via admin/users.php (aka the "add user" feature of the User Permissions page). | [] | null | null | 8.8 | null |
|
GHSA-47q6-hqqr-mcr3 | A vulnerability was found in ImageMagick. This security flaw cause a remote code execution vulnerability in OpenBlob with --enable-pipes configured. | [] | null | null | null | null |
|
CVE-2024-0929 | Tenda AC10U fromNatStaticSetting stack-based overflow | A vulnerability was found in Tenda AC10U 15.03.06.49_multi_TDE01. It has been rated as critical. Affected by this issue is the function fromNatStaticSetting. The manipulation of the argument page leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-252134 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | [
"cpe:2.3:o:tendacn:ac10u_firmware:15.03.06.49_multi_tde01:*:*:*:*:*:*:*",
"cpe:2.3:h:tendacn:ac10u:1.0:*:*:*:*:*:*:*"
] | null | 4.7 | 4.7 | 5.8 |
CVE-2018-5080 | In K7 AntiVirus 15.1.0306, the driver file (K7FWHlpr.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x830020FC. | [
"cpe:2.3:a:k7computing:antivirus:15.1.0306:*:*:*:*:*:*:*"
] | null | null | 7.8 | 6.1 |
|
CVE-2015-5011 | IBM WebSphere Message Broker 8 before 8.0.0.6 and Integration Bus 9 before 9.0.0.4 do not check authorization for MQSISTARTMSGFLOW and MQSISTOPMSGFLOW commands, which allows local users to bypass intended access restrictions, and start or stop a service, by issuing a command. | [
"cpe:2.3:a:ibm:websphere_message_broker:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_message_broker:8.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_message_broker:8.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_message_broker:8.0.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_message_broker:8.0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_message_broker:8.0.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:integration_bus:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:integration_bus:9.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:integration_bus:9.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:integration_bus:9.0.0.3:*:*:*:*:*:*:*"
] | null | null | null | 3.2 |
|
CVE-2019-11080 | Sitecore Experience Platform (XP) prior to 9.1.1 is vulnerable to remote code execution via deserialization, aka TFS # 293863. An authenticated user with necessary permissions is able to remotely execute OS commands by sending a crafted serialized object. | [
"cpe:2.3:a:sitecore:experience_platform:*:*:*:*:*:*:*:*"
] | null | null | 8.8 | 9 |
|
CVE-2023-6799 | WP Reset <= 2.0 - Sensitive Information Exposure due to Insufficient Randomness | The WP Reset – Most Advanced WordPress Reset Tool plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.0 via the use of insufficiently random snapshot names. This makes it possible for unauthenticated attackers to extract sensitive data including site backups by brute-forcing the snapshot filenames. Please note that the vendor does not plan to do any further hardening on this functionality. | [] | null | 5.9 | null | null |
CVE-2007-0837 | PHP remote file inclusion vulnerability in examples/inc/top.inc.php in AgerMenu 0.03 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the rootdir parameter. | [
"cpe:2.3:a:agermenu:agermenu:0.03:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-q2fp-fcx5-hff3 | The rad_decode function in FreeRADIUS before 1.1.8 allows remote attackers to cause a denial of service (radiusd crash) via zero-length Tunnel-Password attributes, as demonstrated by a certain module in VulnDisco Pack Professional 7.6 through 8.11. NOTE: this is a regression error related to CVE-2003-0967. | [] | null | null | null | null |
|
GHSA-cpxq-5q25-5cpx | in.uucpd UUCP server in Debian GNU/Linux 2.2, and possibly other operating systems, does not properly terminate long strings, which allows remote attackers to cause a denial of service, possibly due to a buffer overflow. | [] | null | null | null | null |
|
CVE-2019-15151 | AdPlug 2.3.1 has a double free in the Cu6mPlayer class in u6m.h. | [
"cpe:2.3:a:adplug_project:adplug:2.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
|
CVE-2021-23923 | An issue was discovered in Devolutions Server before 2020.3. There is Broken Authentication with Windows domain users. | [
"cpe:2.3:a:devolutions:devolutions_server:*:*:*:*:*:*:*:*"
] | null | 8.1 | null | 4.9 |
|
CVE-2009-2790 | SQL injection vulnerability in cat_products.php in SoftBiz Dating Script allows remote attackers to execute arbitrary SQL commands via the cid parameter. NOTE: this might overlap CVE-2006-3271.4. | [
"cpe:2.3:a:softbiz:dating_script:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-2g4v-qc3v-672p | Buffer overflow in ByteCatcher FTP client 1.04b allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long FTP server banner. | [] | null | null | null | null |
|
ICSA-18-046-03 | Schneider Electric IGSS Mobile | IGSS Mobile app lacks certificate pinning during the TLS/SSL connection establishing process. This issue could allow an attacker to execute a man-in-the-middle attack. CVE-2017-9968 has been assigned to this vulnerability. A CVSS v3 base score of 6.4 has been calculated; the CVSS vector string is (AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N). IGSS Mobile app passwords are stored in clear-text in the configuration file. CVE-2017-9969 has been assigned to this vulnerability. A CVSS v3 base score of 6.0 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N). | [] | null | null | 6 | null |
CVE-2022-36572 | Sinsiu Sinsiu Enterprise Website System v1.1.1.0 was discovered to contain a remote code execution (RCE) vulnerability via the component /upload/admin.php?/deal/. | [
"cpe:2.3:a:sinsiu:enterprise_website_system:1.1.1.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
CVE-2024-2113 | The Ninja Forms Contact Form – The Drag and Drop Form Builder for WordPress plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.8.0. This is due to missing or incorrect nonce validation on the nf_download_all_subs AJAX action. This makes it possible for unauthenticated attackers to trigger an export of a form's submission to a publicly accessible location via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | [] | null | 4.3 | null | null |
|
GHSA-r5h8-fch6-xr5v | The YaDisk Files WordPress plugin through 1.2.5 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks. | [] | null | 6.8 | null | null |
|
CVE-2015-10097 | grinnellplans-php read.php interface_disp_page sql injection | A vulnerability was found in grinnellplans-php up to 3.0. It has been declared as critical. Affected by this vulnerability is the function interface_disp_page/interface_disp_page of the file read.php. The manipulation leads to sql injection. The attack can be launched remotely. The identifier of the patch is 57e4409e19203a94495140ff1b5a697734d17cfb. It is recommended to apply a patch to fix this issue. The identifier VDB-223801 was assigned to this vulnerability. | [
"cpe:2.3:a:grinnellplans:grinnellplans:*:*:*:*:*:*:*:*"
] | null | 6.3 | 6.3 | 6.5 |
CVE-2019-25067 | Podman/Varlink API Privilege Escalation | A vulnerability, which was classified as critical, was found in Podman and Varlink 1.5.1. This affects an unknown part of the component API. The manipulation leads to Remote Privilege Escalation. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-143949 was assigned to this vulnerability. | [
"cpe:2.3:a:podman_project:podman:1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:varlink:varlink:1.5.1:*:*:*:*:*:*:*"
] | null | 6.3 | 6.3 | 6 |
GHSA-96jv-c7m6-q43g | Cross-site request forgery vulnerability in Jenkins OpenID Plugin | A cross-site request forgery (CSRF) vulnerability in Jenkins OpenID Plugin 2.4 and earlier allows attackers to trick users into logging in to the attacker's account. | [] | null | 8.8 | null | null |
GHSA-j77g-rccp-fpvv | A vulnerability in the web-based management interface of Cisco Small Business RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers could allow an authenticated, remote attacker to execute arbitrary code or cause the web-based management process on the device to restart unexpectedly, resulting in a denial of service (DoS) condition. The attacker must have valid administrator credentials. This vulnerability is due to insufficient validation of user-supplied input to the web-based management interface. An attacker could exploit this vulnerability by sending crafted HTTP input to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system or cause the web-based management process to restart, resulting in a DoS condition. | [] | null | 7.2 | null | null |
|
GHSA-xqvf-v5jg-pxc2 | MongoDB Ops Manager Diagnostics Archive may not redact sensitive PEM key file password app settings. Archives do not include the PEM files themselves. This issue affects MongoDB Ops Manager v5.0 prior to 5.0.21 and MongoDB Ops Manager v6.0 prior to 6.0.12 | [] | null | 3.1 | null | null |
|
CVE-2024-22019 | A vulnerability in Node.js HTTP servers allows an attacker to send a specially crafted HTTP request with chunked encoding, leading to resource exhaustion and denial of service (DoS). The server reads an unbounded number of bytes from a single connection, exploiting the lack of limitations on chunk extension bytes. The issue can cause CPU and network bandwidth exhaustion, bypassing standard safeguards like timeouts and body size limits. | [
"cpe:2.3:a:node.js:node.js:*:*:*:*:*:*:*:*"
] | null | null | 7.5 | null |
|
CVE-2025-0720 | Microword eScan Antivirus Folder Watch List rtscanner removeExtraSlashes stack-based overflow | A vulnerability was found in Microword eScan Antivirus 7.0.32 on Linux. It has been rated as problematic. Affected by this issue is the function removeExtraSlashes of the file /opt/MicroWorld/sbin/rtscanner of the component Folder Watch List Handler. The manipulation leads to stack-based buffer overflow. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | [] | 4.8 | 3.3 | 3.3 | 1.7 |
GHSA-26rg-mq58-rxvm | An issue was discovered in Xen through 4.14.x. A bounds check common to most operation time functions specific to FIFO event channels depends on the CPU observing consistent state. While the producer side uses appropriately ordered writes, the consumer side isn't protected against re-ordered reads, and may hence end up de-referencing a NULL pointer. Malicious or buggy guest kernels can mount a Denial of Service (DoS) attack affecting the entire system. Only Arm systems may be vulnerable. Whether a system is vulnerable depends on the specific CPU. x86 systems are not vulnerable. | [] | null | null | null | null |
|
CVE-2020-10021 | Out-of-bounds write in USB Mass Storage with unaligned sizes | Out-of-bounds Write in the USB Mass Storage memoryWrite handler with unaligned Sizes See NCC-ZEP-024, NCC-ZEP-025, NCC-ZEP-026 This issue affects: zephyrproject-rtos zephyr version 1.14.1 and later versions. version 2.1.0 and later versions. | [
"cpe:2.3:o:zephyrproject:zephyr:*:*:*:*:*:*:*:*"
] | null | 8.1 | null | null |
CVE-2024-1935 | The Giveaways and Contests by RafflePress – Get More Website Traffic, Email Subscribers, and Social Followers plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘parent_url’ parameter in all versions up to, and including, 1.12.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] | null | 7.2 | null | null |
|
CVE-2019-16548 | A cross-site request forgery vulnerability in Jenkins Google Compute Engine Plugin 4.1.1 and earlier in ComputeEngineCloud#doProvision could be used to provision new agents. | [
"cpe:2.3:a:jenkins:google_compute_engine:*:*:*:*:*:jenkins:*:*"
] | null | 8.8 | null | 6.8 |
|
CVE-2019-18796 | The BASS Audio Library 2.4.14 under Windows is prone to a BASS_StreamCreateFile Denial of Service vulnerability (infinite loop) via a crafted .mp3 file. This weakness could allow attackers to consume excessive CPU and the application becomes unresponsive. | [
"cpe:2.3:a:un4seen:bass:*:*:*:*:*:windows:*:*"
] | null | 6.5 | null | 7.1 |
|
GHSA-qvxh-3pw2-32v5 | An improper control of interaction frequency vulnerability in Zyxel GS1200 series switches could allow a local attacker to guess the password by using a timing side-channel attack. | [] | null | 6.2 | null | null |
|
GHSA-4vgw-chff-95wv | Unspecified vulnerability in Oracle MySQL 5.6.26 and earlier allows remote authenticated users to affect availability via unknown vectors. | [] | null | null | null | null |
|
CVE-2024-0652 | PHPGurukul Company Visitor Management System search-visitor.php cross site scripting | A vulnerability was found in PHPGurukul Company Visitor Management System 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file search-visitor.php. The manipulation leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-251378 is the identifier assigned to this vulnerability. | [
"cpe:2.3:a:phpgurukul:company_visitor_management_system:1.0:*:*:*:*:*:*:*"
] | null | 3.5 | 3.5 | 4 |
CVE-2017-3379 | Vulnerability in the Oracle Advanced Outbound Telephony component of Oracle E-Business Suite (subcomponent: User Interface). Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5 and 12.2.6. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Advanced Outbound Telephony. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Advanced Outbound Telephony, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Advanced Outbound Telephony accessible data as well as unauthorized update, insert or delete access to some of Oracle Advanced Outbound Telephony accessible data. CVSS v3.0 Base Score 8.2 (Confidentiality and Integrity impacts). | [
"cpe:2.3:a:oracle:advanced_outbound_telephony:12.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:advanced_outbound_telephony:12.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:advanced_outbound_telephony:12.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:advanced_outbound_telephony:12.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:advanced_outbound_telephony:12.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:advanced_outbound_telephony:12.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:advanced_outbound_telephony:12.2.6:*:*:*:*:*:*:*"
] | null | null | 8.2 | 5.8 |
|
RHSA-2021:0094 | Red Hat Security Advisory: dotnet5.0 security and bugfix update | dotnet: ASP.NET Core Callbacks outside of locks cause Krestel deadlock when using HTTP2 | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
GHSA-6x4q-jqqf-cmgc | Intesync Solismed 3.3sp has XSS. | [] | null | 6.1 | null | null |
|
GHSA-rx9m-2wvh-rvjf | Format string vulnerability in Logger.cc for Spey 0.3.3 allows attackers to cause a denial of service (crash) and possibly execute arbitrary code via format string specifiers in a syslog call. | [] | null | null | null | null |
|
CVE-2018-15886 | Monstra CMS 3.0.4 does not properly restrict modified Snippet content, as demonstrated by the admin/index.php?id=snippets&action=edit_snippet&filename=google-analytics URI, which allows attackers to execute arbitrary PHP code by placing this code after a <?php substring. | [
"cpe:2.3:a:monstra:monstra:3.0.4:*:*:*:*:*:*:*"
] | null | null | 7.2 | 6.5 |
|
GHSA-fmc6-pg58-457g | The load_pnm function in frompnm.c in libsixel.a in libsixel 1.8.2 has infinite recursion. | [] | null | null | 5.5 | null |
|
CVE-2014-5175 | The License Measurement servlet in SAP Solution Manager 7.1 allows remote attackers to bypass authentication via unspecified vectors, related to a verb tampering attack and SAP_JTECHS. | [
"cpe:2.3:a:sap:solution_manager:7.1:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2011-4624 | Cross-site scripting (XSS) vulnerability in facebook.php in the GRAND FlAGallery plugin (flash-album-gallery) before 1.57 for WordPress allows remote attackers to inject arbitrary web script or HTML via the i parameter. | [
"cpe:2.3:a:codeasily:grand_flagallery:*:*:*:*:*:wordpress:*:*"
] | null | null | null | 4.3 |
|
GHSA-q433-xg7f-phjh | Unspecified vulnerability in the Enterprise Manager Base Platform component in Oracle Enterprise Manager Grid Control EM Base Platform 10.2.0.5 and 11.1.0.1; EM DB Control 11.1.0.7, 11.2.0.2, and 11.2.0.3; and EM Plugin for DB 12.1.0.2 and 12.1.0.3 allows remote attackers to affect integrity via unknown vectors related to DB Performance Advisories/UIs. | [] | null | null | null | null |
|
GHSA-xcv5-2xw2-v43x | Panda Antivirus Platinum before 6.23.00 allows a remore attacker to cause a denial of service (crash) when a user selects an action for a malformed UPX packed executable file. | [] | null | null | null | null |
|
RHSA-2011:0950 | Red Hat Security Advisory: jboss-seam2 security update | JBoss Seam EL interpolation in exception handling | [
"cpe:/a:redhat:jboss_enterprise_application_platform:4.3.0::el4",
"cpe:/a:redhat:jboss_enterprise_application_platform:4.3.0::el5"
] | null | null | null | null |
CVE-2005-0686 | Integer overflow in mlterm 2.5.0 through 2.9.1, with gdk-pixbuf support enabled, allows remote attackers to execute arbitrary code via a large image file that is used as a background. | [
"cpe:2.3:a:mlterm:mlterm:2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mlterm:mlterm:2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mlterm:mlterm:2.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mlterm:mlterm:2.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mlterm:mlterm:2.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mlterm:mlterm:2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mlterm:mlterm:2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mlterm:mlterm:2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mlterm:mlterm:2.9.1:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2019-12815 | An arbitrary file copy vulnerability in mod_copy in ProFTPD up to 1.3.5b allows for remote code execution and information disclosure without authentication, a related issue to CVE-2015-3306. | [
"cpe:2.3:a:proftpd:proftpd:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_cp_1543-1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_cp_1543-1:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
|
GHSA-879j-7rrf-6xvm | This vulnerability is caused when SharePoint Server does not properly sanitize a specially crafted request to an affected SharePoint server.An authenticated attacker could exploit this vulnerability by sending a specially crafted request to an affected SharePoint server, aka 'Microsoft SharePoint Reflective XSS Vulnerability'. | [] | null | 8.7 | null | null |
|
CVE-2022-45836 | WordPress Download Manager Plugin <= 3.2.59 is vulnerable to Cross Site Scripting (XSS) | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in W3 Eden, Inc. Download Manager plugin <= 3.2.59 versions. | [
"cpe:2.3:a:wpdownloadmanager:download_manager:*:*:*:*:*:wordpress:*:*"
] | null | 7.1 | null | null |
CVE-2016-6403 | The Data in Motion (DMo) application in Cisco IOS 15.6(1)T and IOS XE, when the IOx feature set is enabled, allows remote attackers to cause a denial of service via a crafted packet, aka Bug IDs CSCuy82904, CSCuy82909, and CSCuy82912. | [
"cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*"
] | null | null | 5.9 | 4.3 |
|
GHSA-cwg6-2p35-rmg5 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Pdfcrowd Save as PDF plugin by Pdfcrowd allows Stored XSS.This issue affects Save as PDF plugin by Pdfcrowd: from n/a through 3.2.1 . | [] | null | 5.9 | null | null |
|
GHSA-8m29-g8hw-c32w | HCL BigFix Compliance is affected by a missing secure flag on a cookie. If a secure flag is not set, cookies may be stolen by an attacker using XSS, resulting in unauthorized access or session cookies could be transferred over an unencrypted channel. | [] | null | 3.8 | null | null |
|
CVE-2020-29304 | A cross-site scripting (XSS) vulnerability exists in the SabaiApps WordPress Directories Pro plugin version 1.3.45 and previous, allows attackers who have convinced a site administrator to import a specially crafted CSV file to inject arbitrary web script or HTML as the victim is proceeding through the file import workflow. | [
"cpe:2.3:a:directoriespro:directories_pro:*:*:*:*:*:wordpress:*:*"
] | null | 6.1 | null | 4.3 |
|
CVE-2006-1808 | Cross-site scripting (XSS) vulnerability in index.php in Lifetype 1.0.3 allows remote attackers to inject arbitrary web script or HTML via the show parameter in a Template operation. | [
"cpe:2.3:a:lifetype:lifetype:1.0.3:*:*:*:*:*:*:*"
] | null | null | null | 2.6 |
|
GHSA-mpj5-8r3q-68mq | lv reads a .lv file from the current working directory, which allows local users to execute arbitrary commands as other lv users by placing malicious .lv files into other directories. | [] | null | null | null | null |
|
CVE-2023-2152 | SourceCodester Student Study Center Desk Management System index.php file inclusion | A vulnerability has been found in SourceCodester Student Study Center Desk Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file index.php. The manipulation of the argument page leads to file inclusion. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-226273 was assigned to this vulnerability. | [
"cpe:2.3:a:student_study_center_desk_management_system_project:student_study_center_desk_management_system:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oretnom23:student_study_center_desk_management_system:1.0:*:*:*:*:*:*:*"
] | null | 5.3 | 5.3 | 5 |
CVE-2024-48028 | WordPress IP Loc8 plugin <= 1.1 - PHP Object Injection vulnerability | Deserialization of Untrusted Data vulnerability in Boyan Raichev IP Loc8 allows Object Injection.This issue affects IP Loc8: from n/a through 1.1. | [
"cpe:2.3:a:boyan_raichev:ip_loc8:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
GHSA-2c4w-qc68-vvg4 | Unspecified vulnerability in HP Service Manager 7.11, 9.21, 9.30, and 9.31 and Service Center 6.2.8 allows remote attackers to obtain privileged access via unknown vectors. | [] | null | null | null | null |
|
RHSA-2016:1610 | Red Hat Security Advisory: php54-php security update | PHP: sets environmental variable based on user supplied Proxy request header | [
"cpe:/a:redhat:rhel_software_collections:2::el6",
"cpe:/a:redhat:rhel_software_collections:2::el7"
] | null | null | 5 | null |
CVE-2022-30161 | Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability | Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability | [
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:r2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:azure:*:*:*"
] | null | 8.8 | null | null |
CVE-2020-36535 | MINMAX newsDia.php sql injection | A vulnerability classified as critical has been found in MINMAX. This affects an unknown part of the file /newsDia.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. | [
"cpe:2.3:a:minmax:minmax:-:*:*:*:*:*:*:*"
] | null | 6.3 | null | null |
CVE-2017-3401 | Vulnerability in the Oracle Advanced Outbound Telephony component of Oracle E-Business Suite (subcomponent: User Interface). Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5 and 12.2.6. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Advanced Outbound Telephony. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Advanced Outbound Telephony, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Advanced Outbound Telephony accessible data as well as unauthorized update, insert or delete access to some of Oracle Advanced Outbound Telephony accessible data. CVSS v3.0 Base Score 8.2 (Confidentiality and Integrity impacts). | [
"cpe:2.3:a:oracle:advanced_outbound_telephony:12.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:advanced_outbound_telephony:12.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:advanced_outbound_telephony:12.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:advanced_outbound_telephony:12.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:advanced_outbound_telephony:12.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:advanced_outbound_telephony:12.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:advanced_outbound_telephony:12.2.6:*:*:*:*:*:*:*"
] | null | null | 8.2 | 5.8 |
|
GHSA-xhh8-8jq9-8vf6 | In the Linux kernel, the following vulnerability has been resolved:fs/jfs: Add validity check for db_maxag and db_agprefBoth db_maxag and db_agpref are used as the index of the
db_agfree array, but there is currently no validity check for
db_maxag and db_agpref, which can lead to errors.The following is related bug reported by Syzbot:UBSAN: array-index-out-of-bounds in fs/jfs/jfs_dmap.c:639:20
index 7936 is out of range for type 'atomic_t[128]'Add checking that the values of db_maxag and db_agpref are valid
indexes for the db_agfree array. | [] | null | null | null | null |
|
GHSA-5p53-r9cc-7fmj | This vulnerability allows remote attackers to execute arbitrary code on affected installations of SolarWinds Orion Job Scheduler 2020.2.1 HF 2. Authentication is required to exploit this vulnerability. The specific flaw exists within the JobRouterService WCF service. The issue is due to the WCF service configuration, which allows a critical resource to be accessed by unprivileged users. An attacker can leverage this vulnerability to execute code in the context of an administrator. Was ZDI-CAN-12007. | [] | null | null | null | null |
|
CVE-2020-3407 | Cisco IOS XE Software RESTCONF and NETCONF-YANG Access Control List Denial of Service Vulnerability | A vulnerability in the RESTCONF and NETCONF-YANG access control list (ACL) function of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause the device to reload. The vulnerability is due to incorrect processing of the ACL that is tied to the RESTCONF or NETCONF-YANG feature. An attacker could exploit this vulnerability by accessing the device using RESTCONF or NETCONF-YANG. A successful exploit could allow an attacker to cause the device to reload, resulting in a denial of service (DoS) condition. | [
"cpe:2.3:o:cisco:ios_xe:15.8\\(3\\)m3:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1100-4g_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1100-4gltegb_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1100-4gltena_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1100-4p_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1100-6g_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1100-8p_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1100-lte_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1100_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1101-4p_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1101_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1109-2p_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1109-4p_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1109_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1111x-8p_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1111x_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:111x_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1120_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1160_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:4221_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:4331_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:4431_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:4451_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:4461_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_1000-x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_1001:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_1001-x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_1002:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_1002-x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_1004:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_1006:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_1013:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr1001-hx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr1001-hx-rf:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr1001-x-rf:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr1001-x-ws:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr1002-hx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr1002-hx-rf:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr1002-hx-ws:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr1002-x-rf:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr1002-x-ws:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9800-40:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9800-80:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9800-cl:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9800-l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9800-l-c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_9800-l-f:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9200-24p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9200-24t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9200-48p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9200-48t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9200l-24p-4g:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9200l-24p-4x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9200l-24pxg-2y:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9200l-24pxg-4x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9200l-24t-4g:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9200l-24t-4x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9200l-48p-4g:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9200l-48p-4x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9200l-48pxg-2y:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9200l-48pxg-4x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9200l-48t-4g:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9200l-48t-4x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9300-24p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9300-24s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9300-24t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9300-24u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9300-24ux:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9300-48p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9300-48s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9300-48t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9300-48u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9300-48un:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9300-48uxm:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9300l-24p-4g:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9300l-24p-4x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9300l-24t-4g:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9300l-24t-4x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9300l-48p-4g:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9300l-48p-4x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9300l-48t-4g:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9300l-48t-4x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9404r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9407r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9410r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9500-12q:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9500-16x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9500-24q:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9500-24y4c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9500-32c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9500-32qc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9500-40x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9500-48y4c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:csr_1000v:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ws-c3650-12x48uq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ws-c3650-12x48ur:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ws-c3650-12x48uz:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ws-c3650-24pd:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ws-c3650-24pdm:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ws-c3650-24ps:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ws-c3650-24td:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ws-c3650-24ts:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ws-c3650-48fd:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ws-c3650-48fq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ws-c3650-48fqm:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ws-c3650-48fs:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ws-c3650-48pd:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ws-c3650-48pq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ws-c3650-48ps:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ws-c3650-48td:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ws-c3650-48tq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ws-c3650-48ts:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ws-c3650-8x24uq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ws-c3850:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ws-c3850-12s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ws-c3850-12x48u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ws-c3850-12xs:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ws-c3850-24p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ws-c3850-24s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ws-c3850-24t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ws-c3850-24u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ws-c3850-24xs:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ws-c3850-24xu:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ws-c3850-48f:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ws-c3850-48p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ws-c3850-48t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ws-c3850-48u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ws-c3850-48xs:-:*:*:*:*:*:*:*"
] | null | null | 8.6 | null |
CVE-2024-10194 | WAVLINK WN530H4/WN530HG4/WN572HG3 Front-End Authentication Page login.cgi Goto_chidx stack-based overflow | A vulnerability was found in WAVLINK WN530H4, WN530HG4 and WN572HG3 up to 20221028. It has been classified as critical. Affected is the function Goto_chidx of the file login.cgi of the component Front-End Authentication Page. The manipulation of the argument wlanUrl leads to stack-based buffer overflow. The attack can only be initiated within the local network. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | [
"cpe:2.3:h:wavlink:wn530h4:-:*:*:*:*:*:*:*",
"cpe:2.3:h:wavlink:wn530hg4:-:*:*:*:*:*:*:*",
"cpe:2.3:h:wavlink:wn572hg3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wavlink:wn530h4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:wavlink:wn530hg4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:wavlink:wn572hg3_firmware:*:*:*:*:*:*:*:*"
] | 8.7 | 8.8 | 8.8 | 8.3 |
GHSA-7m6w-6686-g729 | The SiteOrigin Widgets Bundle plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's SiteOrigin Blog Widget in all versions up to, and including, 1.61.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] | null | 6.4 | null | null |
|
CVE-2021-40422 | An authentication bypass vulnerability exists in the device password generation functionality of Swift Sensors Gateway SG3-1010. A specially-crafted network request can lead to remote code execution. An attacker can send a sequence of requests to trigger this vulnerability. | [
"cpe:2.3:o:swiftsensors:sg3-1010_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:swiftsensors:sg3-1010:-:*:*:*:*:*:*:*"
] | null | 10 | null | null |
|
GHSA-456w-h99j-m5vj | Uncontrolled search path for the Intel(R) XTU software for Windows before version 7.14.2.14 may allow an authenticated user to potentially enable escalation of privilege via local access. | [] | 5.4 | 6.7 | null | null |
|
GHSA-v5rr-334g-rqm6 | Endian Firewall Community (aka EFW) 3.3.2 allows remote authenticated users to execute arbitrary OS commands via shell metacharacters in a backup comment. | [] | null | 8.8 | null | null |
|
CVE-2005-2030 | Ultimate PHP Board (UPB) 1.9.6 GOLD uses weak encryption for passwords in the users.dat file, which allows attackers to easily decrypt the passwords and gain privileges, possibly after exploiting CVE-2005-2005 to obtain users.dat. | [
"cpe:2.3:a:ultimate_php_board:ultimate_php_board:1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ultimate_php_board:ultimate_php_board:1.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ultimate_php_board:ultimate_php_board:1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:ultimate_php_board:ultimate_php_board:1.9.6:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
RHSA-2021:4000 | Red Hat Security Advisory: kpatch-patch security update | kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks kernel: powerpc: KVM guest OS users can cause host OS memory corruption | [
"cpe:/o:redhat:rhel_e4s:7.7::server"
] | null | 7.8 | null | null |
GHSA-vw4g-j3vp-w855 | Vulnerability in the Oracle Outside In Technology component of Oracle Fusion Middleware (subcomponent: Outside In Filters). Supported versions that are affected are 8.5.2 and 8.5.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Outside In Technology. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Outside In Technology. Note: Outside In Technology is a suite of software development kits (SDKs). The protocol and CVSS score depend on the software that uses the Outside In Technology code. The CVSS score assumes that the software passes data received over a network directly to Outside In Technology code, but if data is not received over a network the CVSS score may be lower. CVSS v3.0 Base Score 7.5 (Availability impacts). | [] | null | null | 7.5 | null |
|
CVE-2019-0099 | Insufficient access control vulnerability in subsystem in Intel(R) SPS before version SPS_E3_05.00.04.027.0 may allow an unauthenticated user to potentially enable escalation of privilege via physical access. | [
"cpe:2.3:o:intel:server_platform_services_firmware:*:*:*:*:*:*:*:*"
] | null | null | 6.8 | 4.6 |
|
CVE-2000-0427 | The Aladdin Knowledge Systems eToken device allows attackers with physical access to the device to obtain sensitive information without knowing the PIN of the owner by resetting the PIN in the EEPROM. | [
"cpe:2.3:a:aladdin_knowledge_systems:etoken:3.3.3:*:*:*:*:*:*:*"
] | null | null | null | 4.6 |
|
GHSA-fwr7-9543-4584 | Gitlab Enterprise Edition version 10.1.0 is vulnerable to an insufficiently protected credential issue in the project service integration API endpoint resulting in an information disclosure of plaintext password. | [] | null | null | 7.2 | null |
|
CVE-2008-1058 | The tcp_respond function in netinet/tcp_subr.c in OpenBSD 4.1 and 4.2 allows attackers to cause a denial of service (panic) via crafted TCP packets. NOTE: some of these details are obtained from third party information. | [
"cpe:2.3:o:openbsd:openbsd:4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:openbsd:openbsd:4.2:*:*:*:*:*:*:*"
] | null | null | null | 7.8 |
|
GHSA-65hv-4q6g-x7mh | PHP remote file inclusion vulnerability in language/lang_german/lang_main_album.php in phpBB Plus 1.53, and 1.53a before 20070922, allows remote attackers to execute arbitrary PHP code via a URL in the phpbb_root_path parameter. | [] | null | null | null | null |
|
CVE-2017-13307 | A elevation of privilege vulnerability in the Upstream kernel pci sysfs. Product: Android. Versions: Android kernel. Android ID: A-69128924. | [
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] | null | null | 7.3 | 7.5 |
|
GHSA-2m9c-c5w9-q97c | Cross-site scripting (XSS) vulnerability in posts.asp for ASP-DEv XM Forum RC3 allows remote attackers to inject arbitrary web script or HTML via a "javascript:" URL in an IMG tag. | [] | null | null | null | null |
|
CVE-2020-1257 | An elevation of privilege vulnerability exists when the Diagnostics Hub Standard Collector Service improperly handles file operations, aka 'Diagnostics Hub Standard Collector Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1278, CVE-2020-1293. | [
"cpe:2.3:a:microsoft:visual_studio:2015:update3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:visual_studio_2017:*:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | 4.6 |
|
GHSA-w73w-5m7g-f7qc | Authorization bypass in github.com/dgrijalva/jwt-go | jwt-go allows attackers to bypass intended access restrictions in situations with `[]string{}` for `m["aud"]` (which is allowed by the specification). Because the type assertion fails, "" is the value of aud. This is a security problem if the JWT token is presented to a service that lacks its own audience check. There is no patch available and users of jwt-go are advised to migrate to [golang-jwt](https://github.com/golang-jwt/jwt) at version 3.2.1 | [] | null | 7.5 | null | null |
GHSA-m7m7-9gfg-6cxv | SiberianCMS - CWE-434: Unrestricted Upload of File with Dangerous Type - A malicious user with administrative privileges may be able to upload a dangerous filetype via an unspecified method | [] | null | 7.2 | null | null |
|
CVE-2025-22624 | FooGallery – Responsive Photo Gallery, Image Viewer, Justified, Masonry and Carousel 2.4.29 - Reflected cross-site scripting (XSS) | FooGallery – Responsive Photo Gallery, Image Viewer, Justified, Masonry and Carousel 2.4.29 was found to be vulnerable. The web application dynamically generates web content without validating the source of the potentially untrusted data in myapp/extensions/albums/admin/class-meta boxes.php. | [] | 6.4 | null | null | null |
GHSA-9vpp-hrxf-x9vx | FAC Guestbook 3.01 stores sensitive information under the web root with insufficient access control, which allows remote attackers to download a database via a direct request for db/gbdb.mdb. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | [] | null | null | null | null |
|
GHSA-rpmv-jvfw-f6xg | An SSRF issue in the PDFMyURL service allows a remote attacker to obtain sensitive information and execute arbitrary code via a POST request in the url parameter | [] | null | 9.8 | null | null |
Subsets and Splits