id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-3pww-g69g-29xx | Internet Explorer 5.0 through 5.5 allows remote attackers to read arbitrary files from the client via the INPUT TYPE element in an HTML form, aka the "File Upload via Form" vulnerability. | [] | null | null | null | null |
|
CVE-2023-37517 | HCL Domino Volt and Domino Leap are affected by missing "no cache" headers | Missing "no cache" headers in HCL Leap permits sensitive data to be cached. | [] | null | 3.2 | null | null |
GHSA-fx53-xcf2-fx6g | Cross-site scripting (XSS) vulnerability in CGI RESCUE Trees before 2.11 allows remote attackers to inject arbitrary web script or HTML via unspecified parameters. | [] | null | null | null | null |
|
CVE-2022-0920 | Salon booking system < 7.6.3 - Customer+ Bookings/Customers Data Disclosure | The Salon booking system Free and Pro WordPress plugins before 7.6.3 do not have proper authorisation in some of its endpoints, which could allow customers to access all bookings and other customer's data | [
"cpe:2.3:a:salonbookingsystem:salon_booking_system:*:*:*:*:*:wordpress:*:*"
] | null | 7.5 | null | 5 |
GHSA-7h6m-c395-86jj | An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory, aka 'Windows GDI Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2019-0968, CVE-2019-0977, CVE-2019-1009, CVE-2019-1011, CVE-2019-1012, CVE-2019-1013, CVE-2019-1015, CVE-2019-1016, CVE-2019-1046, CVE-2019-1047, CVE-2019-1048, CVE-2019-1049, CVE-2019-1050. | [] | null | null | 6.5 | null |
|
GHSA-8wp2-w85w-9q24 | Adobe Campaign Classic version 18.10.5-8984 and earlier versions have an Information Exposure Through an Error Message vulnerability. Successful exploitation could lead to Information Disclosure in the context of the current user. | [] | null | null | null | null |
|
GHSA-7wpv-4qh2-r4fv | An infinite loop in Ivanti Avalanche before 6.4.6 allows a remote unauthenticated attacker to cause a denial of service. | [] | null | 7.5 | null | null |
|
GHSA-6653-c3g4-g7jm | Heap buffer overflow in sqlite in Google Chrome prior to 112.0.5615.137 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium) | [] | null | 8.8 | null | null |
|
CVE-2016-10216 | An issue was discovered in IT ITems DataBase (ITDB) through 1.23. The vulnerability exists due to insufficient filtration of user-supplied data in the "value" HTTP POST parameter passed to the "itdb-1.23/js/DataTables-1.8.2/examples/examples_support/editable_ajax.php" URL. An attacker could execute arbitrary HTML and script code in a browser in the context of the vulnerable website. | [
"cpe:2.3:a:sivann:it_items_database:*:*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 |
|
GHSA-9vxq-mxw5-mcgp | Typo3 Arbitrary File Delete | TYPO3 before 4.3.12, 4.4.x before 4.4.9, and 4.5.x before 4.5.4 allows remote attackers to delete arbitrary files on the webserver. | [] | null | 6.5 | null | null |
GHSA-pp7w-52gw-4c68 | An information disclosure vulnerability exists in the way Windows Error Reporting (WER) handles objects in memory, aka 'Windows Error Reporting Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2020-1261. | [] | null | null | null | null |
|
CVE-2014-6648 | The iPhone4.TW (aka com.tapatalk.iPhone4TWforums) application 3.3.20 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [
"cpe:2.3:a:iphone4:iphone4.tw:3.3.20:*:*:*:*:android:*:*"
] | null | null | null | 5.4 |
|
GHSA-qmg8-gpch-856q | The DoResolveRelativeHost function in url/url_canon_relative.cc in Google Chrome before 30.0.1599.66 allows remote attackers to cause a denial of service (out-of-bounds read) via a relative URL containing a hostname, as demonstrated by a protocol-relative URL beginning with a //www.google.com/ substring. | [] | null | null | null | null |
|
CVE-2016-1680 | Use-after-free vulnerability in ports/SkFontHost_FreeType.cpp in Skia, as used in Google Chrome before 51.0.2704.63, allows remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via unknown vectors. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.8 |
|
GHSA-9pqp-62pc-c8g4 | A vulnerability in the Aruba InstantOS and ArubaOS 10 web management interface could allow a remote attacker to conduct a reflected cross-site scripting (XSS) attack against a user of the interface. A successful exploit could allow an attacker to execute arbitrary script code in a victim’s browser in the context of the affected interface of Aruba InstantOS 6.4.x: 6.4.4.8-4.2.4.20 and below; Aruba InstantOS 6.5.x: 6.5.4.23 and below; Aruba InstantOS 8.6.x: 8.6.0.18 and below; Aruba InstantOS 8.7.x: 8.7.1.9 and below; Aruba InstantOS 8.10.x: 8.10.0.1 and below; ArubaOS 10.3.x: 10.3.1.0 and below; Aruba has released upgrades for Aruba InstantOS that address this security vulnerability. | [] | null | 6.1 | null | null |
|
GHSA-h2hv-gpr9-gq4m | classes/Url.php in Justin Hagstrom AutoIndex PHP Script before 2.2.4 allows remote attackers to cause a denial of service (CPU and memory consumption) via a %00 sequence in the dir parameter to index.php, which triggers an erroneous "recursive calculation." | [] | null | null | null | null |
|
GHSA-v3jg-qf5j-54wh | Unrestricted Upload of File with Dangerous Type vulnerability in SuitePlugins Video & Photo Gallery for Ultimate Member allows Upload a Web Shell to a Web Server.This issue affects Video & Photo Gallery for Ultimate Member: from n/a through 1.1.0. | [] | null | 9.9 | null | null |
|
GHSA-xh62-mxvq-v84j | The QCMAP_Web_CLIENT binary in the Qualcomm QCMAP software suite prior to versions released in October 2020 does not validate the return value of a strstr() or strchr() call in the Tokenizer() function. An attacker who invokes the web interface with a crafted URL can crash the process, causing denial of service. This version of QCMAP is used in many kinds of networking devices, primarily mobile hotspots and LTE routers. | [] | null | null | null | null |
|
CVE-2021-3819 | Cross-Site Request Forgery (CSRF) in firefly-iii/firefly-iii | firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF) | [
"cpe:2.3:a:firefly-iii:firefly_iii:*:*:*:*:*:*:*:*"
] | null | null | 4.3 | null |
CVE-2015-5063 | Multiple cross-site scripting (XSS) vulnerabilities in SilverStripe CMS & Framework 3.1.13 allow remote attackers to inject arbitrary web script or HTML via the (1) admin_username or (2) admin_password parameter to install.php. | [
"cpe:2.3:a:silverstripe:silverstripe:3.1.13:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2019-7797 | Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier version, 2017.011.30138 and earlier version, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have a use after free vulnerability. Successful exploitation could lead to arbitrary code execution. | [
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | null | 8.8 | 9.3 |
|
GHSA-fq6m-725p-m7wr | Jspxcms v10.2.0 allows attackers to execute a Server-Side Request Forgery (SSRF) via /cmscp/ext/collect/fetch_url.do?url=. | [] | null | 6.5 | null | null |
|
CVE-2017-2957 | Adobe Acrobat Reader versions 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier have an exploitable use after free vulnerability in the JavaScript engine, related to collaboration functionality. Successful exploitation could lead to arbitrary code execution. | [
"cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:reader:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | 9.3 |
|
CVE-2011-1825 | Multiple cross-site scripting (XSS) vulnerabilities in the Administrative Console in CA Arcot WebFort Versatile Authentication Server (VAS) before 6.2.5 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors. | [
"cpe:2.3:a:ca:arcot_webfort_versatile_authentication_server:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-v76p-5x3q-xh47 | Setup Wizard in Android 5.x before 5.1.1 LMY49F and 6.0 before 2016-01-01 allows physically proximate attackers to modify settings or bypass a reset protection mechanism via unspecified vectors, aka internal bug 25290269. | [] | null | null | 6.6 | null |
|
CVE-2016-8356 | An issue was discovered in Kabona AB WebDatorCentral (WDC) application prior to Version 3.4.0. The web server URL inputs are not sanitized correctly, which may allow cross-site scripting vulnerabilities. | [
"cpe:2.3:a:kabona_ab:webdatorcentral:-:*:*:*:*:*:*:*"
] | null | null | 8.2 | 4.3 |
|
cisco-sa-ios-iot-udp-vds-inj-f2D5Jzrt | Cisco IOS Software for Cisco Industrial Routers Virtual Device Server Inter-VM Channel Command Injection Vulnerability | A vulnerability in the implementation of the inter-VM channel of Cisco IOS Software for Cisco 809 and 829 Industrial Integrated Services Routers (Industrial ISRs) and Cisco 1000 Series Connected Grid Routers (CGR1000) could allow an unauthenticated, adjacent attacker to execute arbitrary shell commands on the Virtual Device Server (VDS) of an affected device.
The vulnerability is due to insufficient validation of signaling packets that are destined to VDS. An attacker could exploit this vulnerability by sending malicious packets to an affected device. A successful exploit could allow the attacker to execute arbitrary commands in the context of the Linux shell of VDS with the privileges of the root user. Because the device is designed on a hypervisor architecture, exploitation of a vulnerability that affects the inter-VM channel may lead to a complete system compromise.
For more information about this vulnerability, see the Details ["#details"] section of this advisory.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-iot-udp-vds-inj-f2D5Jzrt ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-iot-udp-vds-inj-f2D5Jzrt"]
This advisory is part of the June 3, 2020, release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication, which includes 23 Cisco Security Advisories that describe 25 vulnerabilities. For a complete list of the advisories and links to them, see Cisco Event Response: June 2020 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication [" https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-73388"]. | [] | null | null | 8.8 | null |
GHSA-x9p6-jp98-g5fm | The tcp_fuse_rcv_drain function in the Sun Solaris 10 kernel before 20061017, when TCP Fusion is enabled, allows local users to cause a denial of service (system crash) via a TCP loopback connection with both endpoints on the same system. | [] | null | null | null | null |
|
CVE-2017-8150 | The boot loaders of P10 and P10 Plus Huawei mobile phones with software the versions before Victoria-L09AC605B162, the versions before Victoria-L29AC605B162, the versions before Vicky-L29AC605B162 have an arbitrary memory write vulnerability due to the lack of parameter validation. An attacker with the root privilege of an Android system may trick a user into installing a malicious APP. The APP can modify specific data to cause arbitrary memory writing in the next system reboot, causing continuous system reboot or arbitrary code execution. | [
"cpe:2.3:o:huawei:p10_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:p10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:p10_plus_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:p10_plus:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:p8_lite_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:p8_lite:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:p9_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:p9:-:*:*:*:*:*:*:*"
] | null | null | 7.8 | 9.3 |
|
CVE-2006-6959 | WebRoot Spy Sweeper 4.5.9 and earlier allows local users to bypass the "Startup-Shield" security restrictions by modifying certain registry keys. | [
"cpe:2.3:a:webroot_software:spy_sweeper:4.5.9:*:*:*:*:*:*:*"
] | null | null | null | 4.6 |
|
GHSA-fwjm-rf5j-rgrf | Untrusted search path vulnerability in the installer of UNARJ32.DLL (UNARJ32.DLL for Win32 Ver 1.10.1.25 and earlier) allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory. | [] | null | null | 7.8 | null |
|
CVE-2004-1963 | nqt.php in Network Query Tool (NQT) 1.6 allows remote attackers to obtain sensitive information via a string in the portNum parameter, which reveals the full path in an error message. | [
"cpe:2.3:a:freshmeat:network_query_tool:1.6:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2020-23349 | An intent redirection issue was doscovered in Sina Weibo Android SDK 4.2.7 (com.sina.weibo.sdk.share.WbShareTransActivity), any unexported Activities could be started by the com.sina.weibo.sdk.share.WbShareTransActivity. | [
"cpe:2.3:a:weibo:android_software_development_kit:4.2.7:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
CVE-2014-6253 | Multiple cross-site request forgery (CSRF) vulnerabilities in Zenoss Core through 5 Beta 3 allow remote attackers to hijack the authentication of arbitrary users, aka ZEN-12653. | [
"cpe:2.3:a:zenoss:zenoss_core:*:beta_3:*:*:*:*:*:*",
"cpe:2.3:a:zenoss:zenoss_core:2.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:zenoss:zenoss_core:2.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:zenoss:zenoss_core:2.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:zenoss:zenoss_core:2.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:zenoss:zenoss_core:2.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:zenoss:zenoss_core:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:zenoss:zenoss_core:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:zenoss:zenoss_core:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:zenoss:zenoss_core:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:zenoss:zenoss_core:3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:zenoss:zenoss_core:3.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:zenoss:zenoss_core:3.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:zenoss:zenoss_core:4.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:zenoss:zenoss_core:4.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:zenoss:zenoss_core:4.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:zenoss:zenoss_core:4.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:zenoss:zenoss_core:5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:zenoss:zenoss_core:5.0.0:beta_1:*:*:*:*:*:*",
"cpe:2.3:a:zenoss:zenoss_core:5.0.0:beta_2:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
GHSA-4828-w5pr-7qgw | In CompilationJob::FinalizeJob of compiler.cc, there is a possible remote code execution due to type confusion. This could lead to escalation of privilege from a malicious proxy configuration with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android-7.0 Android-7.1.1 Android-7.1.2 Android-8.0 Android-8.1 Android-9. Android ID: A-132073833. | [] | null | null | null | null |
|
CVE-2022-24386 | Stored XSS in SmarterTrack v100.0.8019.14010 | Stored XSS in SmarterTools SmarterTrack This issue affects: SmarterTools SmarterTrack 100.0.8019.14010. | [
"cpe:2.3:a:smartertools:smartertrack:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
GHSA-h86x-mv66-gr5q | OS Command Injection in Locutus | php/exec/escapeshellarg in Locutus PHP through 2.0.11 allows an attacker to achieve code execution. | [] | null | 9.8 | null | null |
GHSA-7pp2-qg9p-j76h | Adobe Acrobat Reader versions 23.006.20360 (and earlier) and 20.005.30524 (and earlier) are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [] | null | 7.8 | null | null |
|
CVE-2017-2642 | Moodle 3.x has user fullname disclosure on the user preferences page. | [
"cpe:2.3:a:moodle:moodle:3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:3.1.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:3.1.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:3.1.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:3.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:3.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:3.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:3.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:3.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:3.2.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:3.2.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:3.2.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:3.2.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:3.2.0:rc4:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:3.2.0:rc5:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:3.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:3.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:3.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:3.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:3.3.1:*:*:*:*:*:*:*"
] | null | null | 6.5 | 4 |
|
CVE-2022-43644 | This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DIR-825 1.0.9/EE routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the Dreambox plugin for the xupnpd service, which listens on TCP port 4044. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of the admin user. Was ZDI-CAN-19461. | [
"cpe:2.3:o:dlink:dir-825\\/ee_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dir-825\\/ee:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dir-825\\/ac_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dir-825\\/ac:g1a:*:*:*:*:*:*:*"
] | null | null | 8.8 | null |
|
GHSA-crw7-qg66-gv9w | Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: ImageIO). Supported versions that are affected are Oracle Java SE: 7u321, 8u311, 11.0.13, 17.01; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L). | [] | null | 5.3 | null | null |
|
CVE-2024-21284 | Vulnerability in the Oracle Banking Liquidity Management product of Oracle Financial Services Applications (component: Reports). The supported version that is affected is 14.5.0.12.0. Difficult to exploit vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Banking Liquidity Management. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Oracle Banking Liquidity Management. CVSS 3.1 Base Score 7.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H). | [
"cpe:2.3:a:oracle:banking_liquidity_management:14.5.0.12.0:*:*:*:*:*:*:*"
] | null | 7.1 | null | null |
|
CVE-2007-4152 | The Visionsoft Audit on Demand Service (VSAOD) in Visionsoft Audit 12.4.0.0 allows remote attackers to conduct replay attacks by capturing and resending data from the DETAILS and PROCESS sections of a session that schedules an audit. | [
"cpe:2.3:a:visionsoft:audit:12.4.0.0:*:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
CVE-2015-7999 | Multiple SQL injection vulnerabilities in the Administration Web UI servlets in Citrix Command Center before 5.1 Build 36.7 and 5.2 before Build 44.11 allow remote authenticated users to execute arbitrary SQL commands via unspecified vectors. | [
"cpe:2.3:a:citrix:command_center:5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:citrix:command_center:5.2:*:*:*:*:*:*:*"
] | null | null | 8.1 | 6.5 |
|
GHSA-xm5h-r3m3-mqj4 | Stack-based buffer overflow in Microsoft Office Access allows remote, user-assisted attackers to execute arbitrary code via a crafted Microsoft Access Database (.mdb) file. NOTE: due to the lack of details as of 20071210, it is not clear whether this issue is the same as CVE-2007-6026 or CVE-2005-0944. | [] | null | null | null | null |
|
CVE-2025-24787 | Parameter injection in DB connection URIs leading to local file inclusion in WhoDB | WhoDB is an open source database management tool. In affected versions the application is vulnerable to parameter injection in database connection strings, which allows an attacker to read local files on the machine the application is running on. The application uses string concatenation to build database connection URIs which are then passed to corresponding libraries responsible for setting up the database connections. This string concatenation is done unsafely and without escaping or encoding the user input. This allows an user, in many cases, to inject arbitrary parameters into the URI string. These parameters can be potentially dangerous depending on the libraries used. One of these dangerous parameters is `allowAllFiles` in the library `github.com/go-sql-driver/mysql`. Should this be set to `true`, the library enables running the `LOAD DATA LOCAL INFILE` query on any file on the host machine (in this case, the machine that WhoDB is running on). By injecting `&allowAllFiles=true` into the connection URI and connecting to any MySQL server (such as an attacker-controlled one), the attacker is able to read local files. This issue has been addressed in version 0.45.0 and all users are advised to upgrade. There are no known workarounds for this vulnerability. | [] | null | 8.6 | null | null |
CVE-2023-47471 | Buffer Overflow vulnerability in strukturag libde265 v1.10.12 allows a local attacker to cause a denial of service via the slice_segment_header function in the slice.cc component. | [
"cpe:2.3:a:struktur:libde265:1.0.12:*:*:*:*:*:*:*"
] | null | 6.5 | null | null |
|
CVE-2024-4162 | KW Watcher Vulnerability ALlows Malicious Read Access to Memory | A buffer error in Panasonic KW Watcher versions 1.00 through 2.83 may allow attackers malicious read access to memory. | [] | null | 4.4 | null | null |
CVE-2017-9162 | libautotrace.a in AutoTrace 0.31.1 has a "cannot be represented in type int" issue in autotrace.c:191:2. | [
"cpe:2.3:a:autotrace_project:autotrace:0.31.1:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 |
|
CVE-2013-7182 | Cross-site scripting (XSS) vulnerability in firewall/schedule/recurrdlg in Fortinet FortiOS 5.0.5 allows remote attackers to inject arbitrary web script or HTML via the mkey parameter. | [
"cpe:2.3:o:fortinet:fortios:5.0.5:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2020-3223 | Cisco IOS XE Software Web UI Arbitrary File Read Vulnerability | A vulnerability in the web-based user interface (web UI) of Cisco IOS XE Software could allow an authenticated, remote attacker with administrative privileges to read arbitrary files on the underlying filesystem of the device. The vulnerability is due to insufficient file scope limiting. An attacker could exploit this vulnerability by creating a specific file reference on the filesystem and then accessing it through the web UI. An exploit could allow the attacker to read arbitrary files from the underlying operating system's filesystem. | [
"cpe:2.3:o:cisco:ios_xe:16.9.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.9.4c:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.11.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.11.1a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.11.1b:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.11.1c:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.11.1s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.11.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.1a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.1c:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.1s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.1t:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.1w:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.1y:*:*:*:*:*:*:*"
] | null | null | 4.5 | null |
GHSA-fxc4-ggqh-5wg4 | It has been discovered that redhat-certification does not restrict file access in the /update/results page. A remote attacker could use this vulnerability to remove any file accessible by the user which is running httpd. This flaw affects redhat-certification version 7. | [] | null | 9.1 | null | null |
|
CVE-2021-36204 | Insufficiently Protected Credentials in Metasys | Under some circumstances an Insufficiently Protected Credentials vulnerability in Johnson Controls Metasys ADS/ADX/OAS 10 versions prior to 10.1.6 and 11 versions prior to 11.0.3 allows API calls to expose credentials in plain text. | [
"cpe:2.3:a:johnsoncontrols:metasys_application_and_data_server:*:*:*:*:*:*:*:*",
"cpe:2.3:a:johnsoncontrols:metasys_extended_application_and_data_server:*:*:*:*:*:*:*:*",
"cpe:2.3:a:johnsoncontrols:metasys_open_application_server:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
CVE-2024-42274 | Revert "ALSA: firewire-lib: operate for period elapse event in process context" | In the Linux kernel, the following vulnerability has been resolved:
Revert "ALSA: firewire-lib: operate for period elapse event in process context"
Commit 7ba5ca32fe6e ("ALSA: firewire-lib: operate for period elapse event
in process context") removed the process context workqueue from
amdtp_domain_stream_pcm_pointer() and update_pcm_pointers() to remove
its overhead.
With RME Fireface 800, this lead to a regression since
Kernels 5.14.0, causing an AB/BA deadlock competition for the
substream lock with eventual system freeze under ALSA operation:
thread 0:
* (lock A) acquire substream lock by
snd_pcm_stream_lock_irq() in
snd_pcm_status64()
* (lock B) wait for tasklet to finish by calling
tasklet_unlock_spin_wait() in
tasklet_disable_in_atomic() in
ohci_flush_iso_completions() of ohci.c
thread 1:
* (lock B) enter tasklet
* (lock A) attempt to acquire substream lock,
waiting for it to be released:
snd_pcm_stream_lock_irqsave() in
snd_pcm_period_elapsed() in
update_pcm_pointers() in
process_ctx_payloads() in
process_rx_packets() of amdtp-stream.c
? tasklet_unlock_spin_wait
</NMI>
<TASK>
ohci_flush_iso_completions firewire_ohci
amdtp_domain_stream_pcm_pointer snd_firewire_lib
snd_pcm_update_hw_ptr0 snd_pcm
snd_pcm_status64 snd_pcm
? native_queued_spin_lock_slowpath
</NMI>
<IRQ>
_raw_spin_lock_irqsave
snd_pcm_period_elapsed snd_pcm
process_rx_packets snd_firewire_lib
irq_target_callback snd_firewire_lib
handle_it_packet firewire_ohci
context_tasklet firewire_ohci
Restore the process context work queue to prevent deadlock
AB/BA deadlock competition for ALSA substream lock of
snd_pcm_stream_lock_irq() in snd_pcm_status64()
and snd_pcm_stream_lock_irqsave() in snd_pcm_period_elapsed().
revert commit 7ba5ca32fe6e ("ALSA: firewire-lib: operate for period
elapse event in process context")
Replace inline description to prevent future deadlock. | [] | null | null | null | null |
GHSA-xf3g-mfwq-4jvm | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Iqonic Design WPBookit allows SQL Injection.This issue affects WPBookit: from n/a through 1.6.0. | [] | null | 9.3 | null | null |
|
GHSA-m75q-96qw-5cx5 | A vulnerability was found in SourceCodester Task Reminder System 1.0. It has been classified as critical. This affects an unknown part of the file /classes/Master.php?f=save_reminder. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The identifier VDB-243645 was assigned to this vulnerability. | [] | null | null | 6.3 | null |
|
GHSA-m662-6r33-w244 | Vulnerability in the OSS Support Tools component of Oracle Support Tools (subcomponent: Diagnostic Assistant). The supported version that is affected is Prior to 2.11.33. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise OSS Support Tools. Successful attacks of this vulnerability can result in takeover of OSS Support Tools. CVSS 3.0 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). | [] | null | null | 8.8 | null |
|
CVE-2020-7677 | Arbitrary Code Execution | This affects the package thenify before 3.3.1. The name argument provided to the package can be controlled by users without any sanitization, and this is provided to the eval function without any sanitization. | [
"cpe:2.3:a:thenify_project:thenify:*:*:*:*:*:node.js:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*"
] | null | 8.6 | null | null |
CVE-2020-8171 | We have recently released new version of AirMax AirOS firmware v6.3.0 for TI, XW and XM boards that fixes vulnerabilities found on AirMax AirOS v6.2.0 and prior TI, XW and XM boards, according to the description below:There are certain end-points containing functionalities that are vulnerable to command injection. It is possible to craft an input string that passes the filter check but still contains commands, resulting in remote code execution.Mitigation:Update to the latest AirMax AirOS firmware version available at the AirMax download page. | [
"cpe:2.3:o:ui:airos:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ui:ag-hp-2g16:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ui:ag-hp-2g20:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ui:ag-hp-5g23:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ui:ag-hp-5g27:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ui:airgrid_m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ui:airgrid_m2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ui:airgrid_m5:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ui:ar:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ui:ar-hp:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ui:bm2-ti:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ui:bm2hp:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ui:bm5-ti:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ui:bm5hp:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ui:is-m5:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ui:lbem5-23:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ui:litestation_m5:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ui:locom2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ui:locom5:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ui:locom9:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ui:m2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ui:m3:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ui:m365:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ui:m5:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ui:m900:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ui:nb-2g18:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ui:nb-5g22:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ui:nb-5g25:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ui:nbe-m2-13:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ui:nbe-m5-16:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ui:nbe-m5-19:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ui:nbm3:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ui:nbm365:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ui:nbm9:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ui:nsm2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ui:nsm3:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ui:nsm365:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ui:nsm5:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ui:pbe-m2-400:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ui:pbe-m5-300:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ui:pbe-m5-300-iso:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ui:pbe-m5-400:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ui:pbe-m5-400-iso:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ui:pbe-m5-620:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ui:pbm10:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ui:pbm365:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ui:pbm5:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ui:picom2hp:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ui:power_ap_n:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ui:rm2-ti:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ui:rm5-ti:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
|
CVE-2022-33228 | Buffer over-read in Modem | Information disclosure sue to buffer over-read in modem while processing ipv6 packet with hop-by-hop or destination option in header. | [
"cpe:2.3:o:qualcomm:mdm8207_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm8207:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9205_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9205:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9206_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9206:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9207_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9207:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca4004_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca4004:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qts110_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qts110:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_wear_1100_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_wear_1100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_wear_1200_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_wear_1200:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_wear_1300_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_wear_1300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_x5_lte_modem_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_x5_lte_modem:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9306_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9306:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9330_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9330:-:*:*:*:*:*:*:*"
] | null | 8.2 | null | null |
GHSA-5w78-c2f4-q879 | Buffer overflow in Info-Zip 2.3 and possibly earlier versions, when using recursive folder compression, allows remote attackers to execute arbitrary code via a ZIP file containing a long pathname. | [] | null | null | null | null |
|
RHSA-2022:1801 | Red Hat Security Advisory: gfbgraph security update | gfbgraph: missing TLS certificate verification | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
CVE-2023-42232 | Pat Infinite Solutions HelpdeskAdvanced <= 11.0.33 is vulnerable to Directory Traversal via the Navigator/Index function. | [] | null | 7.5 | null | null |
|
CVE-2006-4097 | Multiple unspecified vulnerabilities in the CSRadius service in Cisco Secure Access Control Server (ACS) for Windows before 4.1 and ACS Solution Engine before 4.1 allow remote attackers to cause a denial of service (crash) via a crafted RADIUS Access-Request packet. NOTE: it has been reported that at least one issue is a heap-based buffer overflow involving the Tunnel-Password attribute. | [
"cpe:2.3:a:cisco:secure_access_control_server:*:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_access_control_server:4.1:*:windows:*:*:*:*:*"
] | null | null | null | 7.8 |
|
GHSA-6g2j-9xh2-rw37 | The change_process_uid function in os-posix.c in Qemu 0.14.0 and earlier does not properly drop group privileges when the -runas option is used, which allows local guest users to access restricted files on the host. | [] | null | null | null | null |
|
GHSA-gpc4-hgmf-4jfc | A buffer overflow vulnerability exists in Delta Electronics Delta Industrial Automation DOPSoft version 2 when parsing the wScreenDESCTextLen field of a DPS file. An anonymous attacker can exploit this vulnerability by enticing a user to open a specially crafted DPS file to achieve code execution. | [] | null | 7.1 | null | null |
|
CVE-2024-25170 | An issue in Mezzanine v6.0.0 allows attackers to bypass access controls via manipulating the Host header. | [
"cpe:2.3:a:jupo:mezzanine:6.0.0:*:*:*:*:*:*:*"
] | null | 9.1 | null | null |
|
CVE-2022-46413 | An issue was discovered in Veritas NetBackup Flex Scale through 3.0 and Access Appliance through 8.0.100. Authenticated remote command execution can occur via the management portal. | [
"cpe:2.3:a:veritas:access_appliance:*:*:*:*:*:*:*:*",
"cpe:2.3:a:veritas:netbackup_flex_scale_appliance:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
|
CVE-2024-43456 | Windows Remote Desktop Services Tampering Vulnerability | Windows Remote Desktop Services Tampering Vulnerability | [
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*"
] | null | 4.8 | null | null |
CVE-2021-34654 | Custom Post Type Relations <= 1.0 Reflected Cross-Site Scripting | The Custom Post Type Relations WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the cptr[name] parameter found in the ~/pages/admin-page.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 1.0. | [
"cpe:2.3:a:custom_post_type_relations_project:custom_post_type_relations:*:*:*:*:*:wordpress:*:*"
] | null | 6.1 | null | null |
GHSA-xf6g-wjr6-2444 | Tenda AC9 v15.03.2.21 was discovered to contain a stack overflow via the deviceId parameter in the saveparentcontrolinfo function. | [] | null | 9.8 | null | null |
|
GHSA-4vhf-2hv7-8mrx | Improper Restriction of XML External Entity Reference in Apache ActiveMQ | XML external entity (XXE) vulnerability in Apache ActiveMQ 5.x before 5.10.1 allows remote consumers to have unspecified impact via vectors involving an XPath based selector when dequeuing XML messages. | [] | null | null | 9.8 | null |
GHSA-2hq6-33g7-497g | The SpeedyCache plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the speedycache_save_varniship, speedycache_img_update_settings, speedycache_preloading_add_settings, and speedycache_preloading_delete_resource functions in all versions up to, and including, 1.1.3. This makes it possible for authenticated attackers, with subscriber-level access and above, to update plugin options. | [] | null | 4.3 | null | null |
|
CVE-2023-4034 | SQLi in Smartrise Document Management System | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Digita Information Technology Smartrise Document Management System allows SQL Injection.This issue affects Smartrise Document Management System: before Hvl-2.0.
| [
"cpe:2.3:a:digitatek:smartrise_document_management_system:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
CVE-2017-0060 | The Graphics Device Interface (GDI) in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607 allows remote attackers to obtain sensitive information from process memory via a crafted web site, aka "GDI+ Information Disclosure Vulnerability." This vulnerability is different from those described in CVE-2017-0060 and CVE-2017-0062. | [
"cpe:2.3:a:microsoft:live_meeting:2007:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:lync:2010:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:lync:2010:*:*:*:attendee:*:*:*",
"cpe:2.3:a:microsoft:lync:2013:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2007:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2010:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_word_viewer:-:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:skype_for_business:2016:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:skype_for_business_basic:2016:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:x64:*"
] | null | 5.5 | null | 2.1 |
|
RHSA-2008:0828 | Red Hat Security Advisory: JBoss Enterprise Application Platform 4.3.0CP01 security update | Cross-site scripting (XSS) vulnerability in Sun Java Server Faces JBossEAP status servlet info leak | [
"cpe:/a:redhat:jboss_enterprise_application_platform:4.3.0::el5"
] | null | null | null | null |
CVE-2014-5407 | Multiple stack-based buffer overflows in Schneider Electric VAMPSET 2.2.136 and earlier allow local users to cause a denial of service (application halt) via a malformed (1) setting file or (2) disturbance recording file. | [
"cpe:2.3:a:schneider-electric:vampset:*:*:*:*:*:*:*:*"
] | null | null | null | 4.4 |
|
GHSA-c8pj-5cqm-hgg7 | A vulnerability classified as critical has been found in DedeCMS 5.7.111. Affected is an unknown function of the file baidunews.php. The manipulation leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-240948. | [] | null | null | 6.3 | null |
|
CVE-2011-3650 | Mozilla Firefox before 3.6.24 and 4.x through 7.0 and Thunderbird before 3.1.6 and 5.0 through 7.0 do not properly handle JavaScript files that contain many functions, which allows user-assisted remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via a crafted file that is accessed by debugging APIs, as demonstrated by Firebug. | [
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.9:rc:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0:preview_release:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.18:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.19:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.20:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.21:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.22:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.5:beta:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.21:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.22:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.23:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0:beta10:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0:beta11:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0:beta12:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0:beta5:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0:beta6:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0:beta7:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0:beta8:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0:beta9:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:7.0:*:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
RHSA-2003:082 | Red Hat Security Advisory: apache, openssl, php, tomcat security update for Stronghold | security flaw security flaw security flaw security flaw | [
"cpe:/a:redhat:stronghold:4"
] | null | null | null | null |
CVE-2024-1319 | Event Tickets Plus < 5.9.1 - Contributor+ Attendees Lists Disclosure | The Events Tickets Plus WordPress plugin before 5.9.1 does not prevent users with at least the contributor role from leaking the attendees list on any post type regardless of status. (e.g. draft, private, pending review, password-protected, and trashed posts). | [] | null | 4.3 | null | null |
GHSA-7p3m-6wwx-vgfx | The Hubbub Lite – Fast, Reliable Social Sharing Buttons plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.33.1 via deserialization of untrusted input via the 'dpsp_maybe_unserialize' function. This makes it possible for authenticated attackers, with contributor access and above, to inject a PHP Object. No POP chain is present in the vulnerable plugin. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code. | [] | null | 7.5 | null | null |
|
CVE-2021-20017 | A post-authenticated command injection vulnerability in SonicWall SMA100 allows an authenticated attacker to execute OS commands as a 'nobody' user. This vulnerability impacts SMA100 version 10.2.0.5 and earlier. | [
"cpe:2.3:o:sonicwall:sma100_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sonicwall:sma100:-:*:*:*:*:*:*:*"
] | null | 8.8 | null | 9 |
|
CVE-2017-14991 | The sg_ioctl function in drivers/scsi/sg.c in the Linux kernel before 4.13.4 allows local users to obtain sensitive information from uninitialized kernel heap-memory locations via an SG_GET_REQUEST_TABLE ioctl call for /dev/sg0. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | null | 5.5 | 2.1 |
|
CVE-2022-49273 | rtc: pl031: fix rtc features null pointer dereference | In the Linux kernel, the following vulnerability has been resolved:
rtc: pl031: fix rtc features null pointer dereference
When there is no interrupt line, rtc alarm feature is disabled.
The clearing of the alarm feature bit was being done prior to allocations
of ldata->rtc device, resulting in a null pointer dereference.
Clear RTC_FEATURE_ALARM after the rtc device is allocated. | [] | null | 5.5 | null | null |
GHSA-r2jf-vq9h-96p6 | XMLParser.pm in DJabberd before 0.85 allows remote authenticated users to read arbitrary files, and possibly send HTTP requests to intranet servers or cause a denial of service (CPU and memory consumption), via an XML external entity declaration in conjunction with an entity reference, a different vulnerability than CVE-2011-1757. | [] | null | null | null | null |
|
CVE-2023-51425 | WordPress Rencontre plugin <= 3.10.1 - Unauthenticated Account Takeover vulnerability | Improper Privilege Management vulnerability in Jacques Malgrange Rencontre – Dating Site allows Privilege Escalation.This issue affects Rencontre – Dating Site: from n/a through 3.10.1.
| [
"cpe:2.3:a:jacques_malgrange:rencontre:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
GHSA-8jq4-569v-m5w2 | The "First Citizens Bank-Mobile Banking" by First Citizens Bank (AL) app 3.0.0 -- aka first-citizens-bank-mobile-banking/id566037101 for iOS does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [] | null | null | 5.9 | null |
|
RHSA-2019:1268 | Red Hat Security Advisory: virt:rhel security update | libvirt: wrong permissions in systemd admin-sock due to missing SocketMode parameter | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | null | 8.8 | null |
GHSA-2c82-gggj-55f4 | Buffer overflow in the CGM image converter in the graphics filters in Microsoft Office XP SP3, Office 2003 SP3, and Office Converter Pack allows remote attackers to execute arbitrary code via a crafted CGM image in an Office document, aka "CGM Image Converter Buffer Overrun Vulnerability." | [] | null | null | null | null |
|
CVE-2015-3921 | Cross-site scripting (XSS) vulnerability in contact.php in Coppermine Photo Gallery before 1.5.36 allows remote authenticated users to inject arbitrary web script or HTML via the referer parameter. | [
"cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:*:*:*:*:*:*:*:*"
] | null | null | null | 3.5 |
|
GHSA-cgh5-9m3c-c3qx | The Syncfusion EJ2 ASPCore File Provider 3ac357f is vulnerable to Models/PhysicalFileProvider.cs directory traversal. As a result, an unauthenticated attacker can list files within a directory, download any file, or upload any file to any directory accessible by the web server. | [] | null | 9.8 | null | null |
|
GHSA-9gf3-6wpf-hgpx | Microsoft Publisher Security Features Bypass Vulnerability | [] | null | 7.3 | null | null |
|
GHSA-qcg4-w26w-fjv8 | A remote code execution vulnerability exists in Remote Desktop Services – formerly known as Terminal Services – when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests, aka 'Remote Desktop Services? Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-1181, CVE-2019-1182, CVE-2019-1222. | [] | null | null | null | null |
|
GHSA-r8fv-qm2f-vc68 | OSRAM SYLVANIA Osram Lightify Pro before 2016-07-26 has XSS in the username field and Wireless Client Mode configuration page. | [] | null | null | 6.1 | null |
|
CVE-2018-25032 | zlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches. | [
"cpe:2.3:a:zlib:zlib:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-005:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-007:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-002:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-003:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-006:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-007:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-008:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2022-001:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2022-002:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2022-003:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"cpe:2.3:a:python:python:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*",
"cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:management_services_for_element_software:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_sc622-2c_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_sc622-2c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_sc626-2c_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_sc626-2c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_sc632-2c_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_sc632-2c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_sc636-2c_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_sc636-2c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_sc642-2c_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_sc642-2c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_sc646-2c_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_sc646-2c:-:*:*:*:*:*:*:*",
"cpe:2.3:a:azul:zulu:6.45:*:*:*:*:*:*:*",
"cpe:2.3:a:azul:zulu:7.52:*:*:*:*:*:*:*",
"cpe:2.3:a:azul:zulu:8.60:*:*:*:*:*:*:*",
"cpe:2.3:a:azul:zulu:11.54:*:*:*:*:*:*:*",
"cpe:2.3:a:azul:zulu:13.46:*:*:*:*:*:*:*",
"cpe:2.3:a:azul:zulu:15.38:*:*:*:*:*:*:*",
"cpe:2.3:a:azul:zulu:17.32:*:*:*:*:*:*:*",
"cpe:2.3:a:goto:gotoassist:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
GHSA-qwpm-ppc7-2rrr | In BIG-IP versions 15.1.0-15.1.0.4, 15.0.0-15.0.1.3, 14.1.0-14.1.2.3, 13.1.0-13.1.3.3, 12.1.0-12.1.5.1, and 11.6.1-11.6.5.1, the Traffic Management Microkernel (TMM) may stop responding when processing Stream Control Transmission Protocol (SCTP) traffic when traffic volume is high. This vulnerability affects TMM by way of a virtual server configured with an SCTP profile. | [] | null | null | null | null |
|
GHSA-453j-2h25-w552 | There is an Improper verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause out-of-bounds read. | [] | null | 9.1 | null | null |
|
GHSA-53r6-9q9v-359p | Insufficient bounds checking in SEV-ES may allow an attacker to corrupt Reverse Map table (RMP) memory, potentially resulting in a loss of SNP (Secure Nested Paging) memory integrity. | [] | null | 7.8 | null | null |
|
RHSA-2019:4341 | Red Hat Security Advisory: Red Hat Quay v3.2.0 security and bug fix update | quay: Red Hat Quay stores robot account tokens in plain text | [
"cpe:/a:redhat:quay:3::el7"
] | null | null | 6 | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.