id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 36
232
⌀ |
---|---|---|---|---|---|---|---|---|
GHSA-2f28-f6j6-pc52
|
Use-after-free vulnerability in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application, aka "Win32k Use After Free Vulnerability."
|
[] | null | null | null | null | null |
|
CVE-2025-52915
|
K7RKScan.sys 23.0.0.10, part of the K7 Security Anti-Malware suite, allows an admin-privileged user to send crafted IOCTL requests to terminate processes that are protected through a third-party implementation. This is caused by insufficient caller validation in the driver's IOCTL handler, enabling unauthorized processes to perform those actions in kernel space. Successful exploitation can lead to denial of service by disrupting critical third-party services or applications.
|
[] | null | 7.2 | null | null | null |
|
CVE-2022-43622
|
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DIR-1935 1.03 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of Login requests to the web management portal. When parsing the HNAP_AUTH header, the process does not properly validate the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-16139.
|
[
"cpe:2.3:o:dlink:dir-1935_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dir-1935_firmware:1.03:b1:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dir-1935_firmware:1.03:b2:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dir-1935:-:*:*:*:*:*:*:*"
] | null | null | 8.8 | null | null |
|
GHSA-m3mf-v96r-7q6w
|
Vulnerability in the Solaris Cluster component of Oracle Sun Systems Products Suite (subcomponent: HA for MySQL). Supported versions that are affected are 3.3 and 4.3. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Solaris Cluster executes to compromise Solaris Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Solaris Cluster accessible data as well as unauthorized access to critical data or complete access to all Solaris Cluster accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Solaris Cluster. CVSS 3.0 Base Score 7.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L).
|
[] | null | null | 7.3 | null | null |
|
RHSA-2015:2559
|
Red Hat Security Advisory: Red Hat JBoss BRMS 6.2.0 update
|
batik: XML External Entity (XXE) injection in SVG parsing jsoup: XSS vulnerability related to incomplete tags at EOF apache-commons-collections: InvokerTransformer code execution during deserialisation
|
[
"cpe:/a:redhat:jboss_brms:6.2"
] | null | null | null | null | null |
GHSA-v9xf-2767-3v8v
|
Adobe Reader and Acrobat 10.x before 10.1.16 and 11.x before 11.0.13, Acrobat and Acrobat Reader DC Classic before 2015.006.30094, and Acrobat and Acrobat Reader DC Continuous before 2015.009.20069 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted use of the value attribute, a different vulnerability than CVE-2015-6685, CVE-2015-6686, CVE-2015-6693, CVE-2015-6694, and CVE-2015-7622.
|
[] | null | null | null | null | null |
|
GHSA-fvf5-xp83-vrqp
|
ICEcoder vulnerable to Path Traversal
|
ICEcoder v8.1 allows attackers to execute a directory traversal.
|
[] | null | 7.5 | null | null | null |
GHSA-8p2x-j374-7m2g
|
The web management service on Cisco Content Service series 11000 switches (CSS) before WebNS 4.01B29s or WebNS 4.10B17s allows a remote attacker to gain additional privileges by directly requesting the web management URL instead of navigating through the interface.
|
[] | null | null | null | null | null |
|
CVE-2007-1331
|
Multiple cross-site scripting (XSS) vulnerabilities in TKS Banking Solutions ePortfolio 1.0 Java allow remote attackers to inject arbitrary web script or HTML via unspecified vectors that bypass the client-side protection scheme, one of which may be the q parameter to the search program. NOTE: some of these details are obtained from third party information.
|
[
"cpe:2.3:a:tks_banking_solutions:eportfolio:1.0:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
CVE-2017-6777
|
A vulnerability in the ConfD server of the Cisco Elastic Services Controller (ESC) could allow an authenticated, remote attacker to acquire sensitive system information. The vulnerability is due to insufficient protection of sensitive files on the system. An attacker could exploit this vulnerability by logging into the ConfD server and executing certain commands. An exploit could allow an unprivileged user to view configuration parameters that can be maliciously used. Cisco Bug IDs: CSCvd76409. Known Affected Releases: 2.3, 2.3(2).
|
[
"cpe:2.3:a:cisco:elastic_services_controller:2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:elastic_services_controller:2.3\\(2\\):*:*:*:*:*:*:*"
] | null | null | 4.9 | 4 | null |
|
GHSA-pjj6-9mq4-p5qc
|
Incorrect default permissions in some Intel Arc RGB Controller software before version 1.06 may allow an authenticated user to potentially enable escalation of privilege via local access.
|
[] | null | 6.7 | null | null | null |
|
CVE-2022-44235
|
Beijing Zed-3 Technologies Co.,Ltd VoIP simpliclty ASG 8.5.0.17807 (20181130-16:12) is vulnerable to Cross Site Scripting (XSS).
|
[
"cpe:2.3:a:zed-3:voip_simplicity_asg:8.5.0.17807:*:*:*:*:*:*:*"
] | null | 6.1 | null | null | null |
|
GHSA-pr9v-gfw5-55x8
|
An issue was discovered in sela through 20200412. A NULL pointer dereference exists in the function rice::RiceDecoder::process() located in rice_decoder.c. It allows an attacker to cause Denial of Service.
|
[] | null | null | null | null | null |
|
RHSA-2019:3735
|
Red Hat Security Advisory: php:7.2 security update
|
php: underflow in env_path_info in fpm_main.c
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | null | 8.1 | null | null |
CVE-2025-31731
|
WordPress Author Bio Shortcode Plugin <= 2.5.3 - Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Philip John Author Bio Shortcode allows Stored XSS. This issue affects Author Bio Shortcode: from n/a through 2.5.3.
|
[] | null | 6.5 | null | null | null |
GHSA-86hf-jfr6-r7p7
|
The affected On-Premise cnMaestro allows an unauthenticated attacker to access the cnMaestro server and execute arbitrary code in the privileges of the web server. This lack of validation could allow an attacker to append arbitrary data to the logger command.
|
[] | null | 9.8 | null | null | null |
|
RHSA-2014:1905
|
Red Hat Security Advisory: Red Hat OpenShift Enterprise 1.2 - Final Retirement Notice
|
This is the final notification for the retirement of Red Hat OpenShift
Enterprise 1.2.
|
[] | null | null | null | null | null |
GHSA-6888-x99r-6c49
|
Microsoft Internet Explorer 6 through 11 allows remote attackers to gain privileges via a crafted web site, aka "Internet Explorer Elevation of Privilege Vulnerability," a different vulnerability than CVE-2015-1704.
|
[] | null | null | null | null | null |
|
CVE-2015-2106
|
Unspecified vulnerability in HP Integrated Lights-Out (iLO) firmware 2 before 2.27, 3 before 1.82, and 4 before 2.10 allows remote attackers to bypass intended access restrictions or cause a denial of service via unknown vectors.
|
[
"cpe:2.3:o:hp:integrated_lights-out_2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:integrated_lights-out_3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:integrated_lights-out_4_firmware:*:*:*:*:*:*:*:*"
] | null | null | null | 6.4 | null |
|
RHSA-2020:3842
|
Red Hat Security Advisory: OpenShift Container Platform 4.5.13 openshift-enterprise-console-container security update
|
SSL/TLS: Birthday attack against 64-bit block ciphers (SWEET32)
|
[
"cpe:/a:redhat:openshift:4.5::el7"
] | null | null | 7.5 | null | null |
GHSA-qm6g-qrgf-9jh7
|
Cross-Site Request Forgery (CSRF) vulnerability leading to Stored Cross-Site Scripting (XSS) in CallRail, Inc. CallRail Phone Call Tracking plugin <= 0.4.9 at WordPress.
|
[] | null | 6.1 | null | null | null |
|
RHSA-2022:0237
|
Red Hat Security Advisory: Red Hat OpenStack Platform 16.2 (etcd) security update
|
golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet golang: crypto/tls: certificate of wrong type is causing TLS client to panic golang: net/http: limit growth of header canonicalization cache
|
[
"cpe:/a:redhat:openstack:16.2::el8"
] | null | 7.5 | null | null | null |
CVE-2024-27067
|
xen/evtchn: avoid WARN() when unbinding an event channel
|
In the Linux kernel, the following vulnerability has been resolved:
xen/evtchn: avoid WARN() when unbinding an event channel
When unbinding a user event channel, the related handler might be
called a last time in case the kernel was built with
CONFIG_DEBUG_SHIRQ. This might cause a WARN() in the handler.
Avoid that by adding an "unbinding" flag to struct user_event which
will short circuit the handler.
|
[] | null | null | null | null | null |
CVE-2023-22409
|
Junos OS: SRX Series, MX Series with SPC3: When an inconsistent NAT configuration exists and a specific CLI command is issued the SPC will reboot
|
An Unchecked Input for Loop Condition vulnerability in a NAT library of Juniper Networks Junos OS allows a local authenticated attacker with low privileges to cause a Denial of Service (DoS). When an inconsistent "deterministic NAT" configuration is present on an SRX, or MX with SPC3 and then a specific CLI command is issued the SPC will crash and restart. Repeated execution of this command will lead to a sustained DoS. Such a configuration is characterized by the total number of port blocks being greater than the total number of hosts. An example for such configuration is: [ services nat source pool TEST-POOL address x.x.x.0/32 to x.x.x.15/32 ] [ services nat source pool TEST-POOL port deterministic block-size 1008 ] [ services nat source pool TEST-POOL port deterministic host address y.y.y.0/24] [ services nat source pool TEST-POOL port deterministic include-boundary-addresses] where according to the following calculation: 65536-1024=64512 (number of usable ports per IP address, implicit) 64512/1008=64 (number of port blocks per Nat IP) x.x.x.0/32 to x.x.x.15/32 = 16 (NAT IP addresses available in NAT pool) total port blocks in NAT Pool = 64 blocks per IP * 16 IPs = 1024 Port blocks host address y.y.y.0/24 = 256 hosts (with include-boundary-addresses) If the port block size is configured to be 4032, then the total port blocks are (64512/4032) * 16 = 256 which is equivalent to the total host addresses of 256, and the issue will not be seen. This issue affects Juniper Networks Junos OS on SRX Series, and MX Series with SPC3: All versions prior to 19.4R3-S10; 20.1 version 20.1R1 and later versions; 20.2 versions prior to 20.2R3-S6; 20.3 versions prior to 20.3R3-S6; 20.4 versions prior to 20.4R3-S5; 21.1 versions prior to 21.1R3-S4; 21.2 versions prior to 21.2R3-S3; 21.3 versions prior to 21.3R3-S3; 21.4 versions prior to 21.4R3-S1; 22.1 versions prior to 22.1R2-S2, 22.1R3; 22.2 versions prior to 22.2R2.
|
[
"cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r1-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r1-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r2-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r2-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r2-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r2-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r2-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r3-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r3-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r3-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r3-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r3-s8:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r3-s9:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r1-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r1-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r3-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r1-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r2-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r3-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r3-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.3:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.3:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.3:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.3:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.3:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.3:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.3:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.3:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.3:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.3:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.3:r3-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.3:r3-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r3-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.1:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.1:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.1:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.1:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.1:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.1:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.1:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.1:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.1:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.1:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.3:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.3:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.3:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.3:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.3:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.3:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.3:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.3:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.3:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.3:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.4:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.4:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.4:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.4:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.4:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.4:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.1:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.1:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.1:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.1:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.1:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.2:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.2:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.2:r1-s2:*:*:*:*:*:*",
"cpe:2.3:h:juniper:mx10:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:mx10000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:mx10003:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:mx10008:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:mx10016:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:mx104:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:mx150:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:mx2008:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:mx2010:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:mx2020:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:mx204:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:mx240:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:mx40:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:mx480:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:mx5:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:mx80:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:mx960:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx100:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx110:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx1400:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx1500:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx210:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx220:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx240:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx240h2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx240m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx300:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx320:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx340:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx3400:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx345:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx3600:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx380:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx4000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx4100:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx4200:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx4600:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx5000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx5400:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx550:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx550_hm:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx550m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx5600:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx5800:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx650:-:*:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
RHSA-2022:7469
|
Red Hat Security Advisory: container-tools:4.0 security and bug fix update
|
cri-o: memory exhaustion on the node when access to the kube api golang: crash in a golang.org/x/crypto/ssh server runc: incorrect handling of inheritable capabilities
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 5.6 | null | null | null |
GHSA-4x92-r8v7-j2m9
|
A vulnerability classified as problematic was found in Watchdog Anti-Virus 1.4.214.0. Affected by this vulnerability is an unknown functionality in the library wsdk-driver.sys of the component IoControlCode Handler. The manipulation leads to denial of service. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-223291.
|
[] | null | 5.5 | null | null | null |
|
CVE-2024-2840
|
The Enhanced Media Library plugin for WordPress is vulnerable to Stored Cross-Site Scripting via media upload functionality in all versions up to, and including, 2.8.9 due to the plugin allowing 'dfxp' files to be uploaded. This makes it possible for authenticated attackers, with author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] | null | 5.4 | null | null | null |
|
GHSA-qwxp-946x-p86v
|
An issue was discovered in Xen through 4.11.x on AMD x86 platforms, possibly allowing guest OS users to gain host OS privileges because TLB flushes do not always occur after IOMMU mapping changes.
|
[] | null | null | 7.8 | null | null |
|
GHSA-2ggh-34r5-2jc7
|
The opj_dwt_decode_1* functions in dwt.c in OpenJPEG, as used in PDFium in Google Chrome before 47.0.2526.73, allow remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via crafted JPEG 2000 data that is mishandled during a discrete wavelet transform.
|
[] | null | null | null | null | null |
|
CVE-2022-21272
|
Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: Portal). Supported versions that are affected are 8.57, 8.58 and 8.59. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in PeopleSoft Enterprise PeopleTools, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise PeopleTools accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).
|
[
"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.57:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.58:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.59:*:*:*:*:*:*:*"
] | null | 6.1 | null | null | null |
|
CVE-2024-54024
|
An improper neutralization of special elements used in an OS command ('OS Command Injection') vulnerability [CWE-78] in Fortinet FortiIsolator before version 2.4.6 allows a privileged attacker with super-admin profile and CLI access to execute unauthorized code via specifically crafted HTTP requests.
|
[] | null | 7 | null | null | null |
|
CVE-2019-17660
|
A cross-site scripting (XSS) vulnerability in admin/translate/translateheader_view.php in LimeSurvey 3.19.1 and earlier allows remote attackers to inject arbitrary web script or HTML via the tolang parameter, as demonstrated by the index.php/admin/translate/sa/index/surveyid/336819/lang/ PATH_INFO.
|
[
"cpe:2.3:a:limesurvey:limesurvey:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 | null |
|
GHSA-m74c-c3qx-pxjq
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Joni Halabi Block Controller allows Reflected XSS.This issue affects Block Controller: from n/a through 1.4.2.
|
[] | null | 7.1 | null | null | null |
|
CVE-2023-46151
|
WordPress Product Category Tree Plugin <= 2.5 is vulnerable to Cross Site Request Forgery (CSRF)
|
Cross-Site Request Forgery (CSRF) vulnerability in AWESOME TOGI Product Category Tree plugin <= 2.5 versions.
|
[
"cpe:2.3:a:awesometogi:product_category_tree:*:*:*:*:*:wordpress:*:*"
] | null | 4.3 | null | null | null |
GHSA-f7vv-q49x-rvww
|
The E2EE password entropy generated by Rocket.Chat Mobile prior to version 4.5.1 is insufficient, allowing attackers to crack it if they have the appropriate time and resources.
|
[] | null | null | 6.7 | null | null |
|
CVE-2018-3566
|
In Qualcomm Android for MSM, Firefox OS for MSM, and QRD Android with all Android releases from CAF using the Linux kernel before security patch level 2018-04-05, a buffer overwrite may occur in ProcSetReqInternal() due to missing length check.
|
[
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] | null | null | 7.8 | 6.8 | null |
|
CVE-2020-27769
|
In ImageMagick versions before 7.0.9-0, there are outside the range of representable values of type 'float' at MagickCore/quantize.c.
|
[
"cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*"
] | null | 3.3 | null | 4.3 | null |
|
CVE-2023-1687
|
SourceCodester Simple Task Allocation System cross site scripting
|
A vulnerability classified as problematic has been found in SourceCodester Simple Task Allocation System 1.0. Affected is an unknown function of the file LoginRegistration.php?a=register_user. The manipulation of the argument Fullname leads to cross site scripting. It is possible to launch the attack remotely. The identifier of this vulnerability is VDB-224244.
|
[
"cpe:2.3:a:task_allocation_system_project:task_allocation_system:1.0:*:*:*:*:*:*:*"
] | null | 3.5 | 3.5 | 4 | null |
CVE-2006-4161
|
Directory traversal vulnerability in the avatar_gallery action in profile.php in XennoBB 2.1.0 and earlier allows remote attackers to read arbitrary files via a .. (dot dot) in the category parameter.
|
[
"cpe:2.3:a:xennobb:xennobb:*:*:*:*:*:*:*:*",
"cpe:2.3:a:xennobb:xennobb:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:xennobb:xennobb:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:xennobb:xennobb:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:xennobb:xennobb:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:xennobb:xennobb:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:xennobb:xennobb:1.0.5:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
CVE-2022-28317
|
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley MicroStation CONNECT 10.16.02.34. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of IFC files. The issue results from the lack of proper initialization of memory prior to accessing it. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-16369.
|
[
"cpe:2.3:a:bentley:microstation:*:*:*:*:*:*:*:*",
"cpe:2.3:a:bentley:view:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | null | null |
|
GHSA-3v4v-w999-cvf5
|
SquirrelMail 1.2.5 and earlier allows authenticated SquirrelMail users to execute arbitrary commands by modifying the THEME variable in a cookie.
|
[] | null | null | null | null | null |
|
GHSA-7g9x-xhfc-88x2
|
Cross-site scripting (XSS) vulnerability in include/ajax/blogInfo.php in LiveStreet 0.2 allows remote attackers to inject arbitrary web script or HTML via the URI, as demonstrated by a SCRIPT element in an arbitrary parameter such as the asd parameter.
|
[] | null | null | null | null | null |
|
CVE-2017-9716
|
In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, the qbt1000 driver implements an alternative channel for usermode applications to talk to QSEE applications.
|
[
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] | null | null | 7.8 | 7.2 | null |
|
RHSA-2018:1647
|
Red Hat Security Advisory: java-1.7.0-openjdk security update
|
hw: cpu: speculative store bypass
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 5.6 | null | null |
GHSA-gwq4-xh4c-9x95
|
E-WEBInformationCo. FS-EZViewer(Web) exposes sensitive information in the service. A remote attacker can obtain the database configuration file path through the webpage source code without login. Accessing this path allows attacker to obtain the database credential with the highest privilege and database host IP address. With this information, attackers can connect to the database and perform actions such as adding, modifying, or deleting database contents.
|
[] | null | 9.8 | null | null | null |
|
GHSA-2v86-4x6m-fpw5
|
Unspecified vulnerability in Oracle Solaris 11 allows local users to affect availability via unknown vectors related to Kernel/VM.
|
[] | null | null | null | null | null |
|
CVE-2021-26628
|
MaxBoard XSS and File Upload Vulnerability
|
Insufficient script validation of the admin page enables XSS, which causes unauthorized users to steal admin privileges. When uploading file in a specific menu, the verification of the files is insufficient. It allows remote attackers to upload arbitrary files disguising them as image files.
|
[
"cpe:2.3:a:maxb:maxboard:*:*:*:*:*:*:*:*",
"cpe:2.3:a:linux:linux_kernel:-:*:*:*:*:*:*:*"
] | null | 8.1 | null | null | null |
CVE-2025-5220
|
FreeFloat FTP Server GET Command buffer overflow
|
A vulnerability was found in FreeFloat FTP Server 1.0.0 and classified as critical. Affected by this issue is some unknown functionality of the component GET Command Handler. The manipulation leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
|
[] | 6.9 | 7.3 | 7.3 | 7.5 | null |
CVE-2025-6841
|
code-projects Product Inventory System edit_product.php sql injection
|
A vulnerability has been found in code-projects Product Inventory System 1.0 and classified as critical. This vulnerability affects unknown code of the file /admin/edit_product.php. The manipulation of the argument ID leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
|
[] | 5.1 | 4.7 | 4.7 | 5.8 | null |
CVE-2021-47649
|
udmabuf: validate ubuf->pagecount
|
In the Linux kernel, the following vulnerability has been resolved:
udmabuf: validate ubuf->pagecount
Syzbot has reported GPF in sg_alloc_append_table_from_pages(). The
problem was in ubuf->pages == ZERO_PTR.
ubuf->pagecount is calculated from arguments passed from user-space. If
user creates udmabuf with list.size == 0 then ubuf->pagecount will be
also equal to zero; it causes kmalloc_array() to return ZERO_PTR.
Fix it by validating ubuf->pagecount before passing it to
kmalloc_array().
|
[] | null | null | null | null | null |
GHSA-h355-hm5h-cm8h
|
Agnai File Disclosure Vulnerability: JSON via Path Traversal
|
CWE-35: Path Traversalhttps://cwe.mitre.org/data/definitions/35.htmlCVSSv3.1 4.3 - MediumCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:NSummaryA vulnerability has been discovered in **Agnai** that permits attackers to read arbitrary JSON files at attacker-chosen locations on the server. This issue can lead to unauthorized access to sensitive information and exposure of confidential configuration files.
**This only affects installations with `JSON_STORAGE` enabled which is intended to local/self-hosting only.**Details & PoCThis is a path traversal vulnerability. An attacker can exploit this vulnerability by sending a specially crafted request:In this example, the attacker retrieves the `package.json` file content from the server by manipulating the file path.The request is processed by the `loadMessages` handler in `agnai/srv/api/json/index.ts` and a file is read and returned to the client. The read filename is constructed using string interpolation, with no guard or check for path traversal: https://github.com/agnaistic/agnai/blob/2b878b7ca66471c5dd080197ad9ca2f7f0022655/srv/api/json/index.ts#L77ConstraintsEnvironment constraints: JSON Storage enabled (non standard)ImpactThis vulnerability is classified as a path traversal vulnerability. Specifically, any JSON file on the server which the webserver process has read privileges for, can be disclosed to the attacker.Credit@ropwareJB@noe233
|
[] | 2.3 | 4.3 | null | null | null |
CVE-2021-40042
|
There is a release of invalid pointer vulnerability in some Huawei products, successful exploit may cause the process and service abnormal. Affected product versions include: CloudEngine 12800 V200R019C10SPC800, V200R019C10SPC900; CloudEngine 5800 V200R019C10SPC800, V200R020C00SPC600; CloudEngine 6800 versions V200R019C10SPC800, V200R019C10SPC900, V200R020C00SPC600, V300R020C00SPC200; CloudEngine 7800 V200R019C10SPC800.
|
[
"cpe:2.3:o:huawei:cloudengine_12800_firmware:v200r019c10spc800:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:cloudengine_12800_firmware:v200r019c10spc900:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:cloudengine_12800:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:cloudengine_5800_firmware:v200r019c10spc800:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:cloudengine_5800_firmware:v200r020c00spc600:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:cloudengine_5800:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:cloudengine_6800_firmware:v200r019c10spc800:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:cloudengine_6800_firmware:v200r019c10spc900:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:cloudengine_6800_firmware:v200r020c00spc600:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:cloudengine_6800_firmware:v300r020c00spc200:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:cloudengine_6800:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:cloudengine_7800_firmware:v200r019c10spc800:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:cloudengine_7800:-:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4 | null |
|
CVE-2020-7654
|
All versions of snyk-broker before 4.73.1 are vulnerable to Information Exposure. It logs private keys if logging level is set to DEBUG.
|
[
"cpe:2.3:a:synk:broker:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | 4.3 | null |
|
GHSA-8xqw-f37j-96v8
|
Protection mechanism failure in the Intel(R) Ethernet 500 Series Controller drivers for VMware before version 1.10.0.13 may allow an authenticated user to potentially enable escalation of privilege via local access.
|
[] | null | 7.8 | null | null | null |
|
GHSA-rcm5-8ghg-jhvv
|
Cross-site request forgery (CSRF) vulnerability in LOGITEC LAN-W300N/PR5B allows remote attackers to hijack the authentication of administrators via a specially crafted URL. As a result, unintended operations to the device such as changes of the device settings may be conducted.
|
[] | null | null | null | null | null |
|
GHSA-6mhg-8xpv-r877
|
The ZwOpenSection function in Integrity Protection Driver (IPD) 1.4 and earlier allows local users to cause a denial of service (crash) via an invalid pointer in the "oa" argument.
|
[] | null | null | null | null | null |
|
GHSA-hmcj-3g4j-7m53
|
XSS exists in SAMSUNG X7400GX SyncThru Web Service V6.A6.25 V11.01.05.25_08-21-2015 in "/sws/leftmenu.sws" in multiple parameters: ruiFw_id, ruiFw_pid, ruiFw_title.
|
[] | null | null | 6.1 | null | null |
|
CVE-2006-3373
|
Unspecified vulnerability in the client/bin/logfetch script in Hobbit 4.2-beta allows local users to read arbitrary files, related to logfetch running as setuid root.
|
[
"cpe:2.3:a:hobbit_monitor:hobbit_monitor:4.2_beta:*:*:*:*:*:*:*"
] | null | null | null | 2.1 | null |
|
GHSA-58pq-phhq-59vj
|
Trend Micro VPN Proxy One Pro, version 5.8.1012 and below is vulnerable to an arbitrary file overwrite or create attack but is limited to local Denial of Service (DoS) and under specific conditions can lead to elevation of privileges.
|
[] | null | 5.3 | null | null | null |
|
GHSA-m32w-3ggq-xj4p
|
Buffer overflow in the drmgr command in IBM AIX 5.2 and 5.3 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a long path name.
|
[] | null | null | null | null | null |
|
CVE-2022-20181
|
Product: AndroidVersions: Android kernelAndroid ID: A-210936609References: N/A
|
[
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | 7.8 | null |
|
CVE-2017-7218
|
The Management Web Interface in Palo Alto Networks PAN-OS before 7.1.9 allows remote authenticated users to gain privileges via unspecified request parameters.
|
[
"cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | 4.6 | null |
|
CVE-2009-2454
|
Cross-site scripting (XSS) vulnerability in Citrix Web Interface 4.6, 5.0, and 5.0.1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
|
[
"cpe:2.3:a:citrix:web_interface:4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:citrix:web_interface:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:citrix:web_interface:5.0.1:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
CVE-2021-1874
|
A logic issue was addressed with improved state management. This issue is fixed in iOS 14.5 and iPadOS 14.5. An application may be able to execute arbitrary code with kernel privileges.
|
[
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | 9.3 | null |
|
CVE-2018-6972
|
VMware ESXi (6.7 before ESXi670-201806401-BG, 6.5 before ESXi650-201806401-BG, 6.0 before ESXi600-201806401-BG and 5.5 before ESXi550-201806401-BG), Workstation (14.x before 14.1.2), and Fusion (10.x before 10.1.2) contain a denial-of-service vulnerability due to NULL pointer dereference issue in RPC handler. Successful exploitation of this issue may allow attackers with normal user privileges to crash their VMs.
|
[
"cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5:-:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5:1:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5:2:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5:3a:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5:3b:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5:550-20170901001s:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5:550-20170904001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:-:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:1:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:1a:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:1b:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:2:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:3:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:3a:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201504401:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201505401:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201507101:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201507102:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201507401:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201507402:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201507403:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201507404:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201507405:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201507406:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201507407:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201509101:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201509102:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201509201:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201509202:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201509203:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201509204:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201509205:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201509206:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201509207:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201509208:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201509209:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201509210:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201510401:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201511401:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201601101:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201601102:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201601401:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201601402:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201601403:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201601404:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201601405:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201602401:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201603101:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201603102:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201603201:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201603202:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201603203:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201603204:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201603205:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201603206:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201603207:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201603208:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201605401:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201608101:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201608401:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201608402:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201608403:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201608404:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201608405:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201610410:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201611401:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201611402:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201611403:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201702101:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201702102:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201702201:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201702202:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201702203:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201702204:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201702205:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201702206:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201702207:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201702208:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201702209:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201702210:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201702211:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201702212:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201703401:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201706101:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201706102:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201706103:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:-:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:2:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201701001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201703001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201703002:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201704001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707101:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707102:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707103:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707201:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707202:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707203:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707204:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707205:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707206:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707207:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707208:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707209:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707210:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707211:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707212:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707213:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707214:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707215:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707216:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707217:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707218:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707219:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707220:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707221:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201710001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201712001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201803001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201806001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:-:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201806001:*:*:*:*:*:*"
] | null | 6.5 | null | 4 | null |
|
GHSA-rm6v-g2jg-m432
|
Adobe Flash Player before 10.3.183.86 and 11.x before 11.7.700.202 on Windows and Mac OS X, before 10.3.183.86 and 11.x before 11.2.202.285 on Linux, before 11.1.111.54 on Android 2.x and 3.x, and before 11.1.115.58 on Android 4.x; Adobe AIR before 3.7.0.1860; and Adobe AIR SDK & Compiler before 3.7.0.1860 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-2728, CVE-2013-3324, CVE-2013-3325, CVE-2013-3326, CVE-2013-3327, CVE-2013-3328, CVE-2013-3329, CVE-2013-3330, CVE-2013-3331, CVE-2013-3333, CVE-2013-3334, and CVE-2013-3335.
|
[] | null | null | null | null | null |
|
GHSA-qc2r-75r5-j2hv
|
Chrome OS before 53.0.2785.144 allows remote attackers to execute arbitrary commands at boot.
|
[] | null | null | 9.8 | null | null |
|
CVE-2024-13552
|
SupportCandy – Helpdesk & Customer Support Ticket System <= 3.3.0 - Insecure Direct Object Reference
|
The SupportCandy – Helpdesk & Customer Support Ticket System plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 3.3.0 via file upload due to missing validation on a user controlled key. This makes it possible for authenticated attackers to download attachments for support tickets that don't belong to them. If an admin enables tickets for guests, this can be exploited by unauthenticated attackers.
|
[] | null | 4.3 | null | null | null |
CVE-2021-26881
|
Microsoft Windows Media Foundation Remote Code Execution Vulnerability
|
Microsoft Windows Media Foundation Remote Code Execution Vulnerability
|
[
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1803:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1803:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_1909:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2004:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_20h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008_r2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012_r2:*:*:*:*:*:*:x64:*"
] | null | 7.5 | null | null | null |
GHSA-qwxw-cr32-mppw
|
The generic_file_splice_write function in fs/splice.c in the Linux kernel before 2.6.19 does not properly strip setuid and setgid bits when there is a write to a file, which allows local users to gain the privileges of a different group, and obtain sensitive information or possibly have unspecified other impact, by splicing into an inode in order to create an executable file in a setgid directory, a different vulnerability than CVE-2008-4210.
|
[] | null | null | null | null | null |
|
CVE-2022-24957
|
DHC Vision eQMS through 5.4.8.322 has Persistent XSS due to insufficient encoding of untrusted input/output. To exploit the vulnerability, the attacker has to create or edit a new information object and use the XSS payload as the name. Any user that opens the object's version or history tab will be attacked.
|
[
"cpe:2.3:a:dhc-vision:eqms:*:*:*:*:*:*:*:*"
] | null | 5.4 | null | 3.5 | null |
|
CVE-2024-34381
|
WordPress PropertyHive plugin <= 2.0.10 - Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in PropertyHive allows Stored XSS.This issue affects PropertyHive: from n/a through 2.0.10.
|
[
"cpe:2.3:a:propertyhive:propertyhive:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | null | null |
CVE-2017-16574
|
This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader 8.3.1.21155. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of Image filters. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the current process. Was ZDI-CAN-5079.
|
[
"cpe:2.3:a:foxitsoftware:foxit_reader:8.3.1.21155:*:*:*:*:*:*:*"
] | null | null | 6.5 | 4.3 | null |
|
GHSA-rq7c-3qxq-cq5m
|
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.2.20. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).
|
[] | null | null | 8.6 | null | null |
|
RHSA-2017:2390
|
Red Hat Security Advisory: qemu-kvm-rhev security update
|
Qemu: qemu-nbd: server breaks with SIGPIPE upon client abort
|
[
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | null | 5.3 | null | null |
GHSA-q46h-crrj-ggjm
|
The WooCommerce Upload Files plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the upload_files() function in all versions up to, and including, 84.3. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
|
[] | null | 9.8 | null | null | null |
|
GHSA-9whw-7g7j-hr7q
|
In all Qualcomm products with Android releases from CAF using the Linux kernel, while processing a vendor sub-command, a buffer over-read can occur.
|
[] | null | null | 5.5 | null | null |
|
CVE-2021-27609
|
SAP Focused RUN versions 200, 300, does not perform necessary authorization checks for an authenticated user, which allows a user to call the oData service and manipulate the activation for the SAP EarlyWatch Alert service data collection and sending to SAP without the intended authorization.
|
[
"cpe:2.3:a:sap:focused_run:200:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:focused_run:300:*:*:*:*:*:*:*"
] | null | null | 4.6 | null | null |
|
CVE-2022-44256
|
TOTOLINK LR350 V9.3.5u.6369_B20220309 contains a post-authentication buffer overflow via parameter lang in the setLanguageCfg function.
|
[
"cpe:2.3:o:totolink:nr1800x_firmware:9.3.5u.6369_b20220309:*:*:*:*:*:*:*",
"cpe:2.3:h:totolink:nr1800x:-:*:*:*:*:*:*:*"
] | null | 8.8 | null | null | null |
|
GHSA-gxcv-w2wp-7xvm
|
The plural form formula in ngettext family of calls in php-gettext before 1.0.12 allows remote attackers to execute arbitrary code.
|
[] | null | 9.8 | null | null | null |
|
CVE-2021-22325
|
There is an Information Disclosure vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may result in video streams being intercepted during transmission.
|
[
"cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*"
] | null | 5.3 | null | 5 | null |
|
GHSA-wr9r-499g-57gv
|
TRENDnet TEW-651BR 2.04B1, TEW-652BRP 3.04b01, and TEW-652BRU 1.00b12 devices contain a Store Cross-site scripting (XSS) vulnerability via the firewallRule_Name_1.1.1.0.0 parameter on the /firewall_setting.htm page.
|
[] | null | 4.8 | null | null | null |
|
CVE-2025-4569
|
An insecure sensitive key storage issue was found in MyASUS. potentially allowing unauthorized actor to obtain a token that could be used to communicate with certain services.
Refer to the 'Security Update for for MyASUS' section on the ASUS Security Advisory for more information.
|
[] | 7.7 | null | null | null | null |
|
CVE-2024-7472
|
Email Injection Vulnerability in lunary-ai/lunary
|
lunary-ai/lunary v1.2.26 contains an email injection vulnerability in the Send email verification API (/v1/users/send-verification) and Sign up API (/auth/signup). An unauthenticated attacker can inject data into outgoing emails by bypassing the extractFirstName function using a different whitespace character (e.g., \xa0). This vulnerability can be exploited to conduct phishing attacks, damage the application's brand, cause legal and compliance issues, and result in financial impact due to unauthorized email usage.
|
[
"cpe:2.3:a:lunary-ai:lunary:*:*:*:*:*:*:*:*",
"cpe:2.3:a:lunary:lunary:1.2.26:*:*:*:*:*:*:*"
] | null | null | 5.3 | null | null |
GHSA-vjjr-whj3-xg6q
|
IBM WebSphere Application Server (WAS) 6.1 before 6.1.0.45, 7.0 before 7.0.0.25, 8.0 before 8.0.0.5, and 8.5 before 8.5.0.1, when multi-domain support is configured, does not purge password data from the authentication cache, which has unspecified impact and remote attack vectors.
|
[] | null | null | null | null | null |
|
GHSA-vjg6-2q25-fqrp
|
SQL Injection in 74cms 3.2.0 via the x parameter to ajax_officebuilding.php.
|
[] | null | null | null | null | null |
|
CVE-2007-4662
|
Buffer overflow in the php_openssl_make_REQ function in PHP before 5.2.4 has unknown impact and attack vectors.
|
[
"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2023-29200
|
contao/core-bundle has path traversal vulnerability in the file manager
|
Contao is an open source content management system. Prior to versions 4.9.40, 4.13.21, and 5.1.4, logged in users can list arbitrary system files in the file manager by manipulating the Ajax request. However, it is not possible to read the contents of these files. Users should update to Contao 4.9.40, 4.13.21 or 5.1.4 to receive a patch. There are no known workarounds.
|
[
"cpe:2.3:a:contao:contao:*:*:*:*:*:*:*:*"
] | null | 4.3 | null | null | null |
RHSA-2024:3265
|
Red Hat Security Advisory: grafana security update
|
grafana: vulnerable to authorization bypass golang-fips/openssl: Memory leaks in code encrypting and decrypting RSA payloads
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null | null |
GHSA-4j7q-5rcw-6f5j
|
The vulnerability allows an unauthenticated remote attacker to upload arbitrary files under the context of the application OS user (“root”) via a crafted HTTP request.
|
[] | null | 6.5 | null | null | null |
|
GHSA-v2rh-5v88-rgvh
|
Moodle context freezing
|
A vulnerability was found in moodle before version 3.6.3. The get_with_capability_join and get_users_by_capability functions were not taking context freezing into account when checking user capabilities
|
[] | null | null | 4.3 | null | null |
GHSA-gj26-g5qf-jrh7
|
Cross-site Scripting in librenms
|
Cross-site Scripting (XSS) - Stored in Packagist librenms/librenms prior to 22.1.0.
|
[] | null | 5.4 | null | null | null |
GHSA-r8j8-g8mg-2j28
|
Multiple cross-site scripting (XSS) vulnerabilities in HP Network Node Manager i 9.10 allow remote attackers to inject arbitrary web script or HTML via the (1) node parameter to nnm/mibdiscover; (2) nodename parameter to nnm/protected/configurationpoll.jsp, (3) nnm/protected/ping.jsp, (4) nnm/protected/statuspoll.jsp, or (5) nnm/protected/traceroute.jsp; or (6) field parameter to nmm/validate. NOTE: this might be a duplicate of CVE-2011-4155 or CVE-2011-4156.
|
[] | null | null | null | null | null |
|
CVE-2019-9682
|
Dahua devices with Build time before December 2019 use strong security login mode by default, but in order to be compatible with the normal login of early devices, some devices retain the weak security login mode that users can control. If the user uses a weak security login method, an attacker can monitor the device network to intercept network packets to attack the device. So it is recommended that the user disable this login method.
|
[
"cpe:2.3:o:dahuasecurity:sd6al_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:sd6al:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dahuasecurity:sd5a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:sd5a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dahuasecurity:sd1a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:sd1a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dahuasecurity:ptz1a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:ptz1a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dahuasecurity:sd50_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:sd50:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dahuasecurity:sd52c_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:sd52c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dahuasecurity:ipc-hx5842h_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:ipc-hx5842h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dahuasecurity:ipc-hx7842h_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:ipc-hx7842h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dahuasecurity:ipc-hx2xxx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:ipc-hx2xxx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dahuasecurity:ipc-hxxx5x4x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:ipc-hxxx5x4x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dahuasecurity:n42b1p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:n42b1p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dahuasecurity:n42b2p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:n42b2p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dahuasecurity:n42b3p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:n42b3p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dahuasecurity:n52a4p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:n52a4p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dahuasecurity:n54a4p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:n54a4p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dahuasecurity:n52b2p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:n52b2p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dahuasecurity:n52b5p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:n52b5p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dahuasecurity:n52b3p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:n52b3p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dahuasecurity:n54b2p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:n54b2p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dahuasecurity:ipc-hdbw1320e-w_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:ipc-hdbw1320e-w:-:*:*:*:*:*:*:*"
] | null | 8.1 | null | 6.8 | null |
|
GHSA-pxwq-5hrx-rxf2
|
** DISPUTED ** Jelsoft vBulletin 3.5.4 allows remote attackers to register multiple arbitrary users and cause a denial of service (resource consumption) via a large number of requests to register.php. NOTE: the vendor has disputed this vulnerability, stating "If you have the CAPTCHA enabled then the registrations wont even go through. ... if you are talking about the flood being allowed in the first place then surely this is something that should be handled at the server level."
|
[] | null | null | null | null | null |
|
GHSA-cx83-c67h-h9gr
|
An issue was discovered in mspack/chmd.c in libmspack before 0.7alpha. There is an off-by-one error in the TOLOWER() macro for CHM decompression.
|
[] | null | null | 8.8 | null | null |
|
CVE-2018-18025
|
In ImageMagick 7.0.8-13 Q16, there is a heap-based buffer over-read in the EncodeImage function of coders/pict.c, which allows attackers to cause a denial of service via a crafted SVG image file.
|
[
"cpe:2.3:a:imagemagick:imagemagick:7.0.8-13:q16:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
] | null | null | 6.5 | 4.3 | null |
|
GHSA-75r9-8mmv-vmxm
|
Cross-site scripting (XSS) vulnerability in the Node basket module for Drupal allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors.
|
[] | null | null | null | null | null |
|
GHSA-869p-rj24-pjcc
|
IBM License Metric Tool 9 before 9.1.0.2 and Endpoint Manager for Software Use Analysis 9 before 9.1.0.2 do not send an X-Frame-Options HTTP header in response to requests for the login page, which allows remote attackers to conduct clickjacking attacks via vectors involving a FRAME element.
|
[] | null | null | null | null | null |
|
GHSA-2fvh-4fwg-94q3
|
Heap-based buffer overflow in SAP Crystal Reports Server 2008 has unknown impact and attack vectors, as demonstrated by a certain module in VulnDisco Pack Professional 8.3 through 8.11. NOTE: as of 20090917, this disclosure has no actionable information. However, because the VulnDisco Pack author is a reliable researcher, the issue is being assigned a CVE identifier for tracking purposes.
|
[] | null | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.