id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2021-21409 | Possible request smuggling in HTTP/2 due missing validation of content-length | Netty is an open-source, asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. In Netty (io.netty:netty-codec-http2) before version 4.1.61.Final there is a vulnerability that enables request smuggling. The content-length header is not correctly validated if the request only uses a single Http2HeaderFrame with the endStream set to to true. This could lead to request smuggling if the request is proxied to a remote peer and translated to HTTP/1.1. This is a followup of GHSA-wm47-8v5p-wjpj/CVE-2021-21295 which did miss to fix this one case. This was fixed as part of 4.1.61.Final. | [
"cpe:2.3:a:netty:netty:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_api_services:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:banking_corporate_lending_process_management:14.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:banking_corporate_lending_process_management:14.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:banking_corporate_lending_process_management:14.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:banking_credit_facilities_process_management:14.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:banking_credit_facilities_process_management:14.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:banking_credit_facilities_process_management:14.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:banking_trade_finance_process_management:14.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:banking_trade_finance_process_management:14.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:banking_trade_finance_process_management:14.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:coherence:12.2.1.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:coherence:14.1.1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:12.0.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_cloud_native_core_console:1.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_cloud_native_core_policy:1.14.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_design_studio:7.4.2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_messaging_server:8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:helidon:1.4.10:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:helidon:2.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:nosql_database:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:primavera_gateway:*:*:*:*:*:*:*:*",
"cpe:2.3:a:quarkus:quarkus:*:*:*:*:*:*:*:*"
] | null | 5.9 | null | null |
CVE-2015-5791 | WebKit, as used in JavaScriptCore in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3. | [
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
CVE-2007-5144 | Buffer overflow in the GDI engine in Windows Live Messenger, as used for Windows MSN Live 8.1, allows user-assisted remote attackers to cause a denial of service (application crash or system crash) and possibly execute arbitrary code by placing a malformed file in a new folder under the Sharing Folders path, and triggering a synchronize operation through the Windows MSN Live online service, possibly related to extended file attributes and possibly related to an incomplete fix for MS07-046, as demonstrated by a (1) .jpg, (2) .gif, (3) .wmf, (4) .doc, or (5) .ico file. | [
"cpe:2.3:a:microsoft:windows_live_messenger:8.1:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2023-41969 | ZSATrayManager Arbitrary File Deletion | An arbitrary file deletion in ZSATrayManager where it protects the temporary encrypted ZApp issue reporting file from the unprivileged end user access and modification. Fixed version: Win ZApp 4.3.0 and later. | [
"cpe:2.3:a:zscaler:client_connector:*:*:*:*:*:*:*:*"
] | null | 7.3 | null | null |
GHSA-gp7f-2x97-vf49 | Cross-site scripting (XSS) vulnerability in info2www before 1.2.2.9 allows remote attackers to inject arbitrary web script or HTML via the arguments to info2www. | [] | null | null | null | null |
|
GHSA-33jq-g649-fc48 | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Andy Moyle Church Admin allows Reflected XSS.This issue affects Church Admin: from n/a before 5.0.0. | [] | null | 7.1 | null | null |
|
GHSA-p8xr-4v2c-rvgp | High severity vulnerability that affects org.apache.hbase:hbase | Apache HBase 0.98 before 0.98.12.1, 1.0 before 1.0.1.1, and 1.1 before 1.1.0.1, as used in IBM InfoSphere BigInsights 3.0, 3.0.0.1, and 3.0.0.2 and other products, uses incorrect ACLs for ZooKeeper coordination state, which allows remote attackers to cause a denial of service (daemon outage), obtain sensitive information, or modify data via unspecified client traffic. | [] | null | null | 7.3 | null |
CVE-2018-15974 | Adobe Framemaker versions 1.0.5.1 and below have an insecure library loading (dll hijacking) vulnerability. Successful exploitation could lead to privilege escalation. | [
"cpe:2.3:a:adobe:framemaker:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | 6.8 |
|
GHSA-5c4g-wxx8-6c9r | A memory corruption issue was addressed with improved validation. This issue is fixed in tvOS 15.4, iOS 15.4 and iPadOS 15.4, watchOS 8.5. Processing a maliciously crafted image may lead to heap corruption. | [] | null | 7.8 | null | null |
|
CVE-2021-44430 | A vulnerability has been identified in JT Utilities (All versions < V13.1.1.0), JTTK (All versions < V11.1.1.0). JTTK library in affected products is vulnerable to an out of bounds write past the end of an allocated structure while parsing specially crafted JT files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-14829) | [
"cpe:2.3:a:siemens:jt_open_toolkit:*:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:jt_utilities:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | 6.8 |
|
CVE-2021-0284 | Junos OS: Upon receipt of specific sequences of genuine packets destined to the device the kernel will crash and restart (vmcore) | A buffer overflow vulnerability in the TCP/IP stack of Juniper Networks Junos OS allows an attacker to send specific sequences of packets to the device thereby causing a Denial of Service (DoS). By repeatedly sending these sequences of packets to the device, an attacker can sustain the Denial of Service (DoS) condition. The device will abnormally shut down as a result of these sent packets. A potential indicator of compromise will be the following message in the log files: "eventd[13955]: SYSTEM_ABNORMAL_SHUTDOWN: System abnormally shut down" This issue is only triggered by traffic destined to the device. Transit traffic will not trigger this issue. This issue affects: Juniper Networks Junos OS 12.3 versions prior to 12.3R12-S19; 15.1 versions prior to 15.1R7-S10; 17.3 versions prior to 17.3R3-S12; 18.4 versions prior to 18.4R2-S9, 18.4R3-S9; 19.1 versions prior to 19.1R3-S7; 19.2 versions prior to 19.2R1-S7, 19.2R3-S3; 19.3 versions prior to 19.3R2-S7, 19.3R3-S3; 19.4 versions prior to 19.4R3-S5; 20.1 versions prior to 20.1R3-S1; 20.2 versions prior to 20.2R3-S2; 20.3 versions prior to 20.3R3-S1; 20.4 versions prior to 20.4R2-S2, 20.4R3; 21.1 versions prior to 21.1R2; 21.2 versions prior to 21.2R1-S1, 21.2R2. | [
"cpe:2.3:o:juniper:junos:12.3:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3:r10:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3:r10-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3:r10-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3:r11:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3:r12:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3:r12-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3:r12-s10:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3:r12-s11:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3:r12-s12:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3:r12-s13:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3:r12-s14:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3:r12-s15:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3:r12-s16:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3:r12-s17:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3:r12-s18:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3:r12-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3:r12-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3:r12-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3:r12-s8:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:a1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f2-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f2-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f5-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f6-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f6-s10:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f6-s12:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f6-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f6-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f6-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f6-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f6-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f6-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f6-s8:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f6-s9:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r4-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r4-s8:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r4-s9:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r5-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r5-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r5-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r5-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r6-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r6-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r6-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r6-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r6-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r7-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r7-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r7-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r7-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r7-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r7-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r7-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r7-s8:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r7-s9:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r1-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r2-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r2-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r2-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r3:-:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r3-s10:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r3-s11:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r3-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r3-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r3-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r3-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r3-s8:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r3-s9:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r1-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r1-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r1-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r1-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r1-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r2-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r2-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r2-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r2-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r2-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r2-s8:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r3-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r3-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r3-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r3-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r3-s8:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r1-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r1-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r1-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r1-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r2-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r2-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r2-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r1-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r2-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r3-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r1-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r1-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r1-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r2-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.3:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.3:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.3:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.3:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.3:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.1:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.1:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*"
] | null | 7.5 | null | null |
CVE-2021-42784 | OS Command Injection in debug_fcgi in D-Link DWR-932C E1 Firmware 1.0.0.4 | OS Command Injection vulnerability in debug_fcgi of D-Link DWR-932C E1 firmware allows a remote attacker to perform command injection via a crafted HTTP request. | [
"cpe:2.3:o:dlink:dwr-932c_e1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dwr-932c:revision_e:*:*:*:*:*:*:*"
] | null | 9.8 | null | 10 |
GHSA-x3cf-w64x-4cp2 | Symfony Path Disclosure | An issue was discovered in Symfony 2.7.x before 2.7.50, 2.8.x before 2.8.49, 3.x before 3.4.20, 4.0.x before 4.0.15, 4.1.x before 4.1.9, and 4.2.x before 4.2.1. When using the scalar type hint `string` in a setter method (e.g. `setName(string $name)`) of a class that's the `data_class` of a form, and when a file upload is submitted to the corresponding field instead of a normal text input, then `UploadedFile::__toString()` is called which will then return and disclose the path of the uploaded file. If combined with a local file inclusion issue in certain circumstances this could escalate it to a Remote Code Execution. | [] | null | null | 5.3 | null |
CVE-2017-2851 | In the web management interface in Foscam C1 Indoor HD cameras with application firmware 2.52.2.37, a specially crafted HTTP request can cause a buffer overflow. | [
"cpe:2.3:o:foscam:c1_indoor_hd_camera_firmware:2.52.2.37:*:*:*:*:*:*:*",
"cpe:2.3:h:foscam:c1_indoor_hd_camera:-:*:*:*:*:*:*:*"
] | null | null | 7.5 | null |
|
CVE-2013-1508 | Unspecified vulnerability in the Oracle GlassFish Server component in Oracle Sun Middleware Products 3.0.1 and 3.1.2 allows remote attackers to affect integrity via vectors related to REST Interface. | [
"cpe:2.3:a:oracle:glassfish_server:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:glassfish_server:3.1.2:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2024-43318 | WordPress E2Pdf – Export To Pdf Tool for WordPress plugin <= 1.25.05 - Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in E2Pdf.Com allows Stored XSS.This issue affects e2pdf: from n/a through 1.25.05. | [
"cpe:2.3:a:e2pdf:e2pdf:*:*:*:*:*:wordpress:*:*"
] | null | 6.5 | null | null |
GHSA-79qh-6942-3q57 | A privacy issue was addressed with improved private data redaction for log entries. This issue is fixed in macOS Ventura 13.3, macOS Big Sur 11.7.5, watchOS 9.4, tvOS 16.4, iOS 15.7.4 and iPadOS 15.7.4, iOS 16.4 and iPadOS 16.4. An app may be able to access information about a user’s contacts | [] | null | 3.3 | null | null |
|
CVE-2017-9372 | PJSIP, as used in Asterisk Open Source 13.x before 13.15.1 and 14.x before 14.4.1, Certified Asterisk 13.13 before 13.13-cert4, and other products, allows remote attackers to cause a denial of service (buffer overflow and application crash) via a SIP packet with a crafted CSeq header in conjunction with a Via header that lacks a branch parameter. | [
"cpe:2.3:a:digium:open_source:13.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:open_source:13.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:open_source:13.1.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:open_source:13.1.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:open_source:13.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:open_source:13.2.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:open_source:13.3.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:open_source:13.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:open_source:13.4.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:open_source:13.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:open_source:13.5.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:open_source:13.6.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:open_source:13.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:open_source:13.7.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:open_source:13.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:open_source:13.8.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:open_source:13.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:open_source:13.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:open_source:13.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:open_source:13.9.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:open_source:13.10.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:open_source:13.11.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:open_source:13.12.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:open_source:13.12.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:open_source:13.12.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:open_source:13.12.2:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:open_source:13.13.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:open_source:13.14.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:open_source:13.15.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:open_source:14.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:open_source:14.0.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:digium:open_source:14.0.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:digium:open_source:14.0.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:open_source:14.1.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:open_source:14.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:open_source:14.2.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:open_source:14.2.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:open_source:14.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:open_source:14.3.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:open_source:14.4.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:13.13.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:13.13.0:cert1:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:13.13.0:cert1-rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:13.13.0:cert1-rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:13.13.0:cert1-rc3:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:13.13.0:cert1-rc4:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:13.13.0:cert2:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:13.13.0:cert3:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:13.13.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:13.13.0:rc2:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
GHSA-pqg9-w7ww-pq5c | SQL injection vulnerability in administration/index.php in chCounter 3.1.3 allows remote attackers to execute arbitrary SQL commands via the login_name parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | [] | null | null | null | null |
|
CVE-2007-3472 | Integer overflow in gdImageCreateTrueColor function in the GD Graphics Library (libgd) before 2.0.35 allows user-assisted remote attackers to have unspecified attack vectors and impact. | [
"cpe:2.3:a:libgd:gd_graphics_library:*:rc5:*:*:*:*:*:*",
"cpe:2.3:a:libgd:gd_graphics_library:2.0.33:*:*:*:*:*:*:*",
"cpe:2.3:a:libgd:gd_graphics_library:2.0.34:*:*:*:*:*:*:*",
"cpe:2.3:a:libgd:gd_graphics_library:2.0.34:rc1:*:*:*:*:*:*",
"cpe:2.3:a:libgd:gd_graphics_library:2.0.34:rc2:*:*:*:*:*:*",
"cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc1:*:*:*:*:*:*",
"cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc2:*:*:*:*:*:*",
"cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc3:*:*:*:*:*:*",
"cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc4:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-254w-gr7h-wvh4 | The Frontend File Manager plugin for WordPress is vulnerable to Authenticated Settings Change in versions up to, and including, 18.2. This is due to lacking capability checks and a security nonce, all on the wpfm_save_settings AJAX action. This makes it possible for subscriber-level attackers to edit the plugin settings, such as the allowed upload file types. This can lead to remote code execution through other vulnerabilities. | [] | null | 9.9 | null | null |
|
GHSA-jhvm-5xg8-647w | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Themis Solutions, Inc. Clio Grow allows Reflected XSS.This issue affects Clio Grow: from n/a through 1.0.2. | [] | null | 7.1 | null | null |
|
GHSA-6qfq-9m7h-9wwm | IBM Manage Application 8.8.0 and 8.9.0 in the IBM Maximo Application Suite is vulnerable to incorrect default permissions which could give access to a user to actions that they should not have access to. IBM X-Force ID: 242953. | [] | null | 6.5 | null | null |
|
GHSA-hvf9-qhxq-6pcq | In radare2 through 3.5.1, the rcc_context function of libr/egg/egg_lang.c mishandles changing context. This allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact (invalid memory access in r_egg_lang_parsechar; invalid free in rcc_pusharg). | [] | null | 7.8 | null | null |
|
GHSA-6wr7-fwxp-gg3v | A vulnerability, which was classified as problematic, was found in SourceCodester Online Graduate Tracer System 1.0. Affected is an unknown function of the file admin/. The manipulation leads to session expiration. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-224994 is the identifier assigned to this vulnerability. | [] | null | 9.8 | null | null |
|
GHSA-j6mh-5h78-837x | Cross-site scripting (XSS) vulnerability in myWebland MyBloggie 2.1.3 and earlier allows remote attackers to inject arbitrary web script or HTML via a JavaScript event in a BBCode img tag. | [] | null | null | null | null |
|
CVE-2024-38546 | drm: vc4: Fix possible null pointer dereference | In the Linux kernel, the following vulnerability has been resolved:
drm: vc4: Fix possible null pointer dereference
In vc4_hdmi_audio_init() of_get_address() may return
NULL which is later dereferenced. Fix this bug by adding NULL check.
Found by Linux Verification Center (linuxtesting.org) with SVACE. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
GHSA-mfjg-xr43-wxf9 | TYPO3 before 4.1.14, 4.2.x before 4.2.13, 4.3.x before 4.3.4 and 4.4.x before 4.4.1 allows Header Injection in the secure download feature jumpurl. | [] | null | null | null | null |
|
GHSA-ffw3-6mp6-jmvj | Improper Access Control in Apache Airflow | Improper Access Control on Configurations Endpoint for the Stable API of Apache Airflow allows users with Viewer or User role to get Airflow Configurations including sensitive information even when `[webserver] expose_config` is set to `False` in `airflow.cfg`. This allowed a privilege escalation attack. This issue affects Apache Airflow 2.0.0. | [] | 7.1 | 6.5 | null | null |
RHSA-2023:3380 | Red Hat Security Advisory: apr-util security update | apr-util: out-of-bounds writes in the apr_base64 | [
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
] | null | 6.5 | null | null |
GHSA-h6p5-h73r-mpjh | In the Linux kernel, the following vulnerability has been resolved:can: dev: can_set_termination(): allow sleeping GPIOsIn commit 6e86a1543c37 ("can: dev: provide optional GPIO based
termination support") GPIO based termination support was added.For no particular reason that patch uses gpiod_set_value() to set the
GPIO. This leads to the following warning, if the systems uses a
sleeping GPIO, i.e. behind an I2C port expander:| WARNING: CPU: 0 PID: 379 at /drivers/gpio/gpiolib.c:3496 gpiod_set_value+0x50/0x6c
| CPU: 0 UID: 0 PID: 379 Comm: ip Not tainted 6.11.0-20241016-1 #1 823affae360cc91126e4d316d7a614a8bf86236cReplace gpiod_set_value() by gpiod_set_value_cansleep() to allow the
use of sleeping GPIOs. | [] | null | null | null | null |
|
CVE-2004-0989 | Multiple buffer overflows in libXML 2.6.12 and 2.6.13 (libxml2), and possibly other versions, may allow remote attackers to execute arbitrary code via (1) a long FTP URL that is not properly handled by the xmlNanoFTPScanURL function, (2) a long proxy URL containing FTP data that is not properly handled by the xmlNanoFTPScanProxy function, and other overflows related to manipulation of DNS length values, including (3) xmlNanoFTPConnect, (4) xmlNanoHTTPConnectHost, and (5) xmlNanoHTTPConnectHost. | [
"cpe:2.3:a:xmlsoft:libxml:1.8.17:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.5.11:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.6.7:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.6.8:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.6.9:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.6.11:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.6.12:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.6.13:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:2.6.14:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlstarlet:command_line_xml_toolkit:0.9.1:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*",
"cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*"
] | null | null | null | 10 |
|
CVE-2022-36571 | Tenda AC9 V15.03.05.19 was discovered to contain a stack overflow via the mask parameter at /goform/WanParameterSetting. | [
"cpe:2.3:o:tenda:ac9_firmware:15.03.05.19:*:*:*:*:*:*:*",
"cpe:2.3:h:tenda:ac9:-:*:*:*:*:*:*:*"
] | null | 7.2 | null | null |
|
CVE-2024-49636 | WordPress Agile Video Player Lite plugin <= 1.0 - Reflected Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Prashant Mavinkurve Agile Video Player Lite allows Reflected XSS.This issue affects Agile Video Player Lite: from n/a through 1.0. | [
"cpe:2.3:a:prashantmavinkurve:agile_video_player_lite:*:*:*:*:*:wordpress:*:*"
] | null | 7.1 | null | null |
CVE-2023-5136 | Incorrect Permission Assignment in the TopoGrafix DataPlugin for GPX | An incorrect permission assignment in the TopoGrafix DataPlugin for GPX could result in information disclosure. An attacker could exploit this vulnerability by getting a user to open a specially crafted data file. | [
"cpe:2.3:a:ni:topografix_data_plugin:2023:-:*:*:*:gpx:*:*",
"cpe:2.3:a:ni:diadem:2014:*:*:*:*:*:*:*",
"cpe:2.3:a:ni:diadem:2015:-:*:*:*:*:*:*",
"cpe:2.3:a:ni:diadem:2015:sp2:*:*:*:*:*:*",
"cpe:2.3:a:ni:diadem:2017:-:*:*:*:*:*:*",
"cpe:2.3:a:ni:diadem:2017:sp1:*:*:*:*:*:*",
"cpe:2.3:a:ni:diadem:2018:-:*:*:*:*:*:*",
"cpe:2.3:a:ni:diadem:2018:sp1:*:*:*:*:*:*",
"cpe:2.3:a:ni:diadem:2019:-:*:*:*:*:*:*",
"cpe:2.3:a:ni:diadem:2019:sp1:*:*:*:*:*:*",
"cpe:2.3:a:ni:diadem:2020:-:*:*:*:*:*:*",
"cpe:2.3:a:ni:diadem:2020:sp1:*:*:*:*:*:*",
"cpe:2.3:a:ni:diadem:2021:-:*:*:*:*:*:*",
"cpe:2.3:a:ni:diadem:2021:sp1:*:*:*:*:*:*",
"cpe:2.3:a:ni:diadem:2022:q2:*:*:*:*:*:*",
"cpe:2.3:a:ni:diadem:2022:q4:*:*:*:*:*:*",
"cpe:2.3:a:ni:diadem:2023:q2:*:*:*:*:*:*",
"cpe:2.3:a:ni:veristand:2013:sp1:*:*:*:*:*:*",
"cpe:2.3:a:ni:veristand:2014:*:*:*:*:*:*:*",
"cpe:2.3:a:ni:veristand:2015:-:*:*:*:*:*:*",
"cpe:2.3:a:ni:veristand:2015:sp1:*:*:*:*:*:*",
"cpe:2.3:a:ni:veristand:2016:*:*:*:*:*:*:*",
"cpe:2.3:a:ni:veristand:2017:*:*:*:*:*:*:*",
"cpe:2.3:a:ni:veristand:2018:-:*:*:*:*:*:*",
"cpe:2.3:a:ni:veristand:2018:sp1:*:*:*:*:*:*",
"cpe:2.3:a:ni:veristand:2019:-:*:*:*:*:*:*",
"cpe:2.3:a:ni:veristand:2019:r2:*:*:*:*:*:*",
"cpe:2.3:a:ni:veristand:2019:r3:*:*:*:*:*:*",
"cpe:2.3:a:ni:veristand:2019:r3f1:*:*:*:*:*:*",
"cpe:2.3:a:ni:veristand:2020:-:*:*:*:*:*:*",
"cpe:2.3:a:ni:veristand:2020:r2:*:*:*:*:*:*",
"cpe:2.3:a:ni:veristand:2020:r3:*:*:*:*:*:*",
"cpe:2.3:a:ni:veristand:2020:r4:*:*:*:*:*:*",
"cpe:2.3:a:ni:veristand:2020:r5:*:*:*:*:*:*",
"cpe:2.3:a:ni:veristand:2020:r6:*:*:*:*:*:*",
"cpe:2.3:a:ni:veristand:2021:-:*:*:*:*:*:*",
"cpe:2.3:a:ni:veristand:2021:r2:*:*:*:*:*:*",
"cpe:2.3:a:ni:veristand:2021:r3:*:*:*:*:*:*",
"cpe:2.3:a:ni:veristand:2023:q1:*:*:*:*:*:*",
"cpe:2.3:a:ni:veristand:2023:q2:*:*:*:*:*:*",
"cpe:2.3:a:ni:veristand:2023:q3:*:*:*:*:*:*",
"cpe:2.3:a:ni:veristand:2023:q4:*:*:*:*:*:*",
"cpe:2.3:a:ni:flexlogger:2018:r1:*:*:*:*:*:*",
"cpe:2.3:a:ni:flexlogger:2018:r2:*:*:*:*:*:*",
"cpe:2.3:a:ni:flexlogger:2018:r3:*:*:*:*:*:*",
"cpe:2.3:a:ni:flexlogger:2018:r4:*:*:*:*:*:*",
"cpe:2.3:a:ni:flexlogger:2019:r1:*:*:*:*:*:*",
"cpe:2.3:a:ni:flexlogger:2019:r2:*:*:*:*:*:*",
"cpe:2.3:a:ni:flexlogger:2019:r3:*:*:*:*:*:*",
"cpe:2.3:a:ni:flexlogger:2019:r4:*:*:*:*:*:*",
"cpe:2.3:a:ni:flexlogger:2020:r1:*:*:*:*:*:*",
"cpe:2.3:a:ni:flexlogger:2020:r2:*:*:*:*:*:*",
"cpe:2.3:a:ni:flexlogger:2020:r3:*:*:*:*:*:*",
"cpe:2.3:a:ni:flexlogger:2020:r4:*:*:*:*:*:*",
"cpe:2.3:a:ni:flexlogger:2021:r1:*:*:*:*:*:*",
"cpe:2.3:a:ni:flexlogger:2021:r2:*:*:*:*:*:*",
"cpe:2.3:a:ni:flexlogger:2021:r3:*:*:*:*:*:*",
"cpe:2.3:a:ni:flexlogger:2021:r4:*:*:*:*:*:*",
"cpe:2.3:a:ni:flexlogger:2022:q2:*:*:*:*:*:*",
"cpe:2.3:a:ni:flexlogger:2022:q4:*:*:*:*:*:*",
"cpe:2.3:a:ni:flexlogger:2023:q1:*:*:*:*:*:*",
"cpe:2.3:a:ni:flexlogger:2023:q2:*:*:*:*:*:*",
"cpe:2.3:a:ni:flexlogger:2023:q3:*:*:*:*:*:*",
"cpe:2.3:a:ni:flexlogger:2023:q4:*:*:*:*:*:*"
] | null | 5.5 | null | null |
GHSA-8hw7-7h75-8xrp | IBM WebSphere Commerce 6.x through 6.0.0.11 and 7.x through 7.0.0.8 allows remote authenticated users to read arbitrary files or send TCP requests to intranet servers via XML data containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue. | [] | null | null | null | null |
|
GHSA-84mh-26r2-jcpf | Unspecified vulnerability in Oracle MySQL Server 5.6.19 and earlier allows remote authenticated users to affect availability via vectors related to SERVER:INNODB FULLTEXT SEARCH DML. | [] | null | null | null | null |
|
CVE-2017-18510 | The custom-sidebars plugin before 3.1.0 for WordPress has CSRF related to set location, import actions, and export actions. | [
"cpe:2.3:a:wpmudev:custom_sidebars:*:*:*:*:*:wordpress:*:*"
] | null | null | 8.8 | 6.8 |
|
CVE-2023-38871 | The commit 3730880 (April 2023) and v.0.9-beta1 of gugoan Economizzer has a user enumeration vulnerability in the login and forgot password functionalities. The app reacts differently when a user or email address is valid, and when it's not. This may allow an attacker to determine whether a user or email address is valid, or brute force valid usernames and email addresses. | [
"cpe:2.3:a:economizzer:economizzer:0.9:beta1:*:*:*:wordpress:*:*",
"cpe:2.3:a:economizzer:economizzer:april_2023:*:*:*:*:wordpress:*:*"
] | null | 5.3 | null | null |
|
RHSA-2018:0480 | Red Hat Security Advisory: JBoss Enterprise Application Platform 7.1.1 for RHEL 7 | resteasy: Vary header not added by CORS filter leading to cache poisoning artemis/hornetq: memory exhaustion via UDP and JGroups discovery undertow: Client can use bogus uri in Digest authentication infinispan: Unsafe deserialization of malicious object injected into data cache jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-7525) jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-15095) undertow: ALLOW_ENCODED_SLASH option not taken into account in the AjpRequestParser jackson-databind: unsafe deserialization due to incomplete blacklist (incomplete fix for CVE-2017-7525 and CVE-2017-17485) | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.1::el7"
] | null | null | 8.1 | null |
GHSA-rhqq-6hxm-qhgr | SQL injection vulnerability in index.php in ScriptMagix Recipes 2.0 and earlier allows remote attackers to execute arbitrary SQL commands via the catid parameter. | [] | null | null | null | null |
|
CVE-2013-6394 | Percona XtraBackup before 2.1.6 uses a constant string for the initialization vector (IV), which makes it easier for local users to defeat cryptographic protection mechanisms and conduct plaintext attacks. | [
"cpe:2.3:a:percona:xtrabackup:*:*:*:*:*:*:*:*",
"cpe:2.3:a:percona:xtrabackup:2.1.0:alpha1:*:*:*:*:*:*",
"cpe:2.3:a:percona:xtrabackup:2.1.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:percona:xtrabackup:2.1.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:percona:xtrabackup:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:percona:xtrabackup:2.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:percona:xtrabackup:2.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:percona:xtrabackup:2.1.4:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*"
] | null | null | null | 2.1 |
|
CVE-2016-1935 | Buffer overflow in the BufferSubData function in Mozilla Firefox before 44.0 and Firefox ESR 38.x before 38.6 allows remote attackers to execute arbitrary code via crafted WebGL content. | [
"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:*"
] | null | null | 8.8 | 9.3 |
|
GHSA-mpwr-fprg-72gv | A vulnerability in the SSL session cache management of Cisco Wide Area Application Services (WAAS) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition due to high consumption of disk space. The user would see a performance degradation. More Information: CSCva03095. Known Affected Releases: 5.3(5), 6.1(1), 6.2(1). Known Fixed Releases: 5.3(5g)1, 6.2(2.32). | [] | null | null | 5.9 | null |
|
CVE-2021-22655 | Multiple out-of-bounds read issues have been identified in the way the application processes project files, allowing an attacker to craft a special project file that may allow arbitrary code execution on the Tellus Lite V-Simulator and V-Server Lite (versions prior to 4.0.10.0). | [
"cpe:2.3:a:fujielectric:v-server:*:*:*:*:lite:*:*:*",
"cpe:2.3:a:fujielectric:v-simulator:*:*:*:*:lite:*:*:*"
] | null | 7.8 | null | 6.8 |
|
GHSA-qfq7-2r89-r328 | The WebDAV Message Handler for Internet Information Services (IIS) 5.0, 5.1, and 6.0 allows remote attackers to cause a denial of service (memory and CPU exhaustion, application crash) via a PROPFIND request with an XML message containing XML elements with a large number of attributes. | [] | null | null | null | null |
|
GHSA-7p6h-w6m6-5fm2 | In Go before 1.10.6 and 1.11.x before 1.11.3, the "go get" command is vulnerable to directory traversal when executed with the import path of a malicious Go package which contains curly braces (both '{' and '}' characters). Specifically, it is only vulnerable in GOPATH mode, but not in module mode (the distinction is documented at https://golang.org/cmd/go/#hdr-Module_aware_go_get). The attacker can cause an arbitrary filesystem write, which can lead to code execution. | [] | null | 8.1 | null | null |
|
RHSA-2023:6732 | Red Hat Security Advisory: ghostscript security update | Ghostscript: GhostPDL can lead to remote code execution via crafted PostScript documents | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 8.8 | null | null |
GHSA-qg5g-gv98-5ffh | rustls network-reachable panic in `Acceptor::accept` | A bug introduced in rustls 0.23.13 leads to a panic if the received TLS ClientHello is fragmented. Only servers that use `rustls::server::Acceptor::accept()` are affected.Servers that use `tokio-rustls`'s `LazyConfigAcceptor` API are affected.Servers that use `tokio-rustls`'s `TlsAcceptor` API are not affected.Servers that use `rustls-ffi`'s `rustls_acceptor_accept` API are affected. | [] | 6.9 | null | null | null |
CVE-2013-1217 | The generic input/output control implementation in Cisco IOS does not properly manage buffers, which allows remote authenticated users to cause a denial of service (device reload) by sending many SNMP requests at the same time, aka Bug ID CSCub41105. | [
"cpe:2.3:o:cisco:ios:-:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
RHSA-2023:7573 | Red Hat Security Advisory: firefox security update | Mozilla: Out-of-bound memory access in WebGL2 blitFramebuffer Mozilla: Use-after-free in MessagePort::Entangled Mozilla: Clickjacking permission prompts using the fullscreen transition Mozilla: Use-after-free in ReadableByteStreamQueueEntry::Buffer Mozilla: Using Selection API would copy contents into X11 primary selection. Mozilla: Incorrect parsing of relative URLs starting with "///" Mozilla: Memory safety bugs fixed in Firefox 120, Firefox ESR 115.5, and Thunderbird 115.5 | [
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
] | null | 8.8 | null | null |
CVE-2022-23112 | A missing permission check in Jenkins Publish Over SSH Plugin 1.22 and earlier allows attackers with Overall/Read access to connect to an attacker-specified SSH server using attacker-specified credentials. | [
"cpe:2.3:a:jenkins:publish_over_ssh:*:*:*:*:*:jenkins:*:*"
] | null | 6.5 | null | 4 |
|
GHSA-cj8v-r5w4-97v8 | Affected versions of Atlassian Crucible allow remote attackers to impact the application's availability via a Denial of Service (DoS) vulnerability in the file upload request feature of code reviews. The affected versions are before version 4.7.4, and from version 4.8.0 before 4.8.5. | [] | null | null | null | null |
|
GHSA-9qhv-gvfh-83hj | A vulnerability was found in dimtion Shaarlier up to 1.2.2. It has been declared as critical. Affected by this vulnerability is the function createTag of the file app/src/main/java/com/dimtion/shaarlier/TagsSource.java of the component Tag Handler. The manipulation leads to sql injection. Upgrading to version 1.2.3 is able to address this issue. The name of the patch is 3d1d9b239d9b3cd87e8bed45a0f02da583ad371e. It is recommended to upgrade the affected component. The identifier VDB-220453 was assigned to this vulnerability. | [] | null | 9.8 | null | null |
|
CVE-2023-35710 | Ashlar-Vellum Cobalt Stack-based Buffer Overflow Remote Code Execution Vulnerability | Ashlar-Vellum Cobalt Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ashlar-Vellum Cobalt. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of CO files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process.
. Was ZDI-CAN-19956. | [
"cpe:2.3:a:ashlar:cobalt:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | null |
GHSA-88h3-v66m-cv23 | In crasm 1.8-3, invalid input validation, specific files passed to the command line application, can lead to a divide by zero fault in the function opdiv. | [] | null | 7.5 | null | null |
|
CVE-2025-23827 | WordPress Strx Magic Floating Sidebar Maker plugin <= 1.4.1 - CSRF to Stored XSS vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Strx Strx Magic Floating Sidebar Maker allows Stored XSS.This issue affects Strx Magic Floating Sidebar Maker: from n/a through 1.4.1. | [] | null | 7.1 | null | null |
CVE-2025-44175 | Tenda AC10 v4 V16.03.10.13 is vulnerable to Buffer Overflow in the GetParentControlInfo function. | [] | null | 5.4 | null | null |
|
GHSA-chv9-fg26-xg8h | powertip.ts in Lila (for Lichess) before ab0beaf allows XSS in some applications because of an innerHTML usage pattern in which text is extracted from a DOM node and interpreted as HTML. | [] | null | 4.7 | null | null |
|
CVE-2025-46506 | WordPress WpZon – Amazon Affiliate Plugin plugin <= 1.3 - CSRF to XSS vulnerability | Cross-Site Request Forgery (CSRF) vulnerability in Lora77 WpZon – Amazon Affiliate Plugin allows Reflected XSS. This issue affects WpZon – Amazon Affiliate Plugin: from n/a through 1.3. | [] | null | 7.1 | null | null |
GHSA-h956-h9q8-3c53 | LINE for iOS version 7.1.3 to 7.1.5 does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [] | null | null | 5.9 | null |
|
GHSA-9rf3-x554-878q | A vulnerability was found in SourceCodester Gym Management System. It has been rated as critical. Affected by this issue is some unknown functionality of the file /mygym/admin/index.php. The manipulation of the argument edit_tran leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-205856. | [] | null | 9.8 | null | null |
|
GHSA-wcfh-34hc-3p4p | Einstein 1.0 stores credit card information in plaintext in the world-readable wallets.dat file, which allows local users to steal the information. | [] | null | null | null | null |
|
CVE-2018-0854 | A security feature bypass vulnerability exists in Windows Scripting Host which could allow an attacker to bypass Device Guard, aka "Windows Security Feature Bypass Vulnerability." This affects Windows Server 2016, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-0958, CVE-2018-8129, CVE-2018-8132. | [
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1709:*:*:*:*:*:*:*"
] | null | null | 5.3 | 4.6 |
|
GHSA-mg45-3qpx-2hfr | Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.3.5 and 8.3.7 allows remote attackers to affect confidentiality, integrity, and availability, related to Outside In Image Export SDK, a different vulnerability than CVE-2012-0554, CVE-2012-0556, and CVE-2012-0557. | [] | null | null | null | null |
|
GHSA-r946-8c39-rrcc | Cross-site scripting (XSS) vulnerability in the UI in IBM Rational Build Forge 7.0.2 allows remote attackers to inject arbitrary web script or HTML via the mod parameter to the fullcontrol program. NOTE: some of these details are obtained from third party information. | [] | null | null | null | null |
|
GHSA-3522-f7v7-pv57 | The Uncanny Groups for LearnDash plugin for WordPress is vulnerable to user group add due to a missing capability check on the /wp-json/ulgm_management/v1/add_user/ REST API endpoint in all versions up to, and including, 6.1.0.1. This makes it possible for authenticated attackers, with group leader-level access and above, to add users to their group which ultimately allows them to leverage CVE-2024-8349 and gain admin access to the site. | [] | null | 2.7 | null | null |
|
GHSA-fpm8-vp26-crfh | An ActiveX control in prtstb06.dll in Microsoft Money 2006, when used with WScript in Windows Script Host (WSH) on Windows Vista, allows remote attackers to cause a denial of service (access violation and application crash) via a zero value for the Startup property. | [] | null | null | null | null |
|
CVE-2017-18834 | Certain NETGEAR devices are affected by reflected XSS. This affects M4300-28G before 12.0.2.15, M4300-52G before 12.0.2.15, M4300-28G-POE+ before 12.0.2.15, M4300-52G-POE+ before 12.0.2.15, M4300-8X8F before 12.0.2.15, M4300-12X12F before 12.0.2.15, M4300-24X24F before 12.0.2.15, M4300-24X before 12.0.2.15, M4300-48X before 12.0.2.15, and M4200 before 12.0.2.15. | [
"cpe:2.3:o:netgear:m4300-28g_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:m4300-28g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:m4300-52g_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:m4300-52g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:m4300-28g-poe\\+_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:m4300-28g-poe\\+:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:m4300-52g-poe\\+_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:m4300-52g-poe\\+:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:m4300-8x8f_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:m4300-8x8f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:m4300-12x12f_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:m4300-12x12f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:m4300-24x24f_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:m4300-24x24f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:m4300-24x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:m4300-24x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:m4300-48x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:m4300-48x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:m4200_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:m4200:-:*:*:*:*:*:*:*"
] | null | null | 6.1 | null |
|
GHSA-jqmg-5jqp-94q9 | Heap out-of-bounds write vulnerability in bootloader prior to SMR May-2023 Release 1 allows a physical attacker to execute arbitrary code. | [] | null | 7.1 | null | null |
|
CVE-2023-27704 | Void Tools Everything lower than v1.4.1.1022 was discovered to contain a Regular Expression Denial of Service (ReDoS). | [
"cpe:2.3:a:voidtools:everything:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
|
CVE-2008-5566 | Cross-site scripting (XSS) vulnerability in index.php in Triangle Solutions PHP Multiple Newsletters 2.7 allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO. | [
"cpe:2.3:a:phpmultiplenewsletters:phpmultiplenewsletters:2.7:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-7jc3-jgh2-x9w6 | Memory leak in the ccnl_app_RX function in ccnl-uapi.c in CCN-lite before 2.00 allows context-dependent attackers to cause a denial of service (memory consumption) via vectors involving an envelope_s structure pointer when the packet format is unknown. | [] | null | null | 7.5 | null |
|
GHSA-34gc-wf8f-4rcx | Directory traversal vulnerability in the Web TV (com_webtv) component 1.0 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php. | [] | null | null | null | null |
|
GHSA-wxg8-cr3q-q5c8 | Out of bound write can occur in playready while processing command due to lack of input validation in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music | [] | null | null | null | null |
|
GHSA-fh5v-r835-mw7v | The csnmp_read_table function in snmp.c in the SNMP plugin in collectd before 5.6.3 is susceptible to a double free in a certain error case, which could lead to a crash (or potentially have other impact). | [] | null | null | 9.8 | null |
|
CVE-2023-21432 | Improper access control vulnerabilities in Smart Things prior to 1.7.93 allows to attacker to invite others without authorization of the owner. | [
"cpe:2.3:a:samsung:smart_things:*:*:*:*:*:*:*:*"
] | null | 4.2 | null | null |
|
CVE-2002-0698 | Buffer overflow in Internet Mail Connector (IMC) for Microsoft Exchange Server 5.5 allows remote attackers to execute arbitrary code via an EHLO request from a system with a long name as obtained through a reverse DNS lookup, which triggers the overflow in IMC's hello response. | [
"cpe:2.3:a:microsoft:exchange_server:5.5:-:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:exchange_server:5.5:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:exchange_server:5.5:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:exchange_server:5.5:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:exchange_server:5.5:sp4:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2024-30157 | A vulnerability in the Suite Applications Services component of Mitel MiCollab through 9.7.1.110 could allow an authenticated attacker with administrative privileges to conduct a SQL Injection attack due to insufficient validation of user input. A successful exploit could allow an attacker to execute arbitrary database and management operations. | [
"cpe:2.3:a:mitel:micollab:*:*:*:*:*:*:*:*"
] | null | 7.2 | null | null |
|
GHSA-c6jf-m4vp-74vf | In Wireshark 2.4.0 to 2.4.3 and 2.2.0 to 2.2.11, the WCP dissector could crash. This was addressed in epan/dissectors/packet-wcp.c by validating the available buffer length. | [] | null | null | 6.5 | null |
|
CVE-2022-49893 | cxl/region: Fix cxl_region leak, cleanup targets at region delete | In the Linux kernel, the following vulnerability has been resolved:
cxl/region: Fix cxl_region leak, cleanup targets at region delete
When a region is deleted any targets that have been previously assigned
to that region hold references to it. Trigger those references to
drop by detaching all targets at unregister_region() time.
Otherwise that region object will leak as userspace has lost the ability
to detach targets once region sysfs is torn down. | [] | null | null | null | null |
CVE-2018-1000834 | runelite version <= runelite-parent-1.4.23 contains a XML External Entity (XXE) vulnerability in Man in the middle runscape services call that can result in Disclosure of confidential data, denial of service, SSRF, port scanning. | [
"cpe:2.3:a:runelite:runelite:*:*:*:*:*:*:*:*"
] | null | null | 9 | 6.8 |
|
GHSA-qjv2-p92g-q4wq | scan.c in x11vnc 0.9.16 uses IPC_CREAT|0777 in shmget calls, which allows access by actors other than the current user. | [] | null | null | null | null |
|
CVE-2024-56274 | WordPress Astra Widgets plugin <= 1.2.15 - Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Brainstorm Force Astra Widgets allows Stored XSS.This issue affects Astra Widgets: from n/a through 1.2.15. | [] | null | 6.5 | null | null |
CVE-2021-1409 | Cisco Unified Communications Products Cross-Site Scripting Vulnerabilities | Multiple vulnerabilities in the web-based management interface of Cisco Unified Communications Manager (Unified CM), Cisco Unified Communications Manager IM & Presence Service (Unified CM IM&P), Cisco Unified Communications Manager Session Management Edition (Unified CM SME), and Cisco Unity Connection could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against an interface user. These vulnerabilities exist because the web-based management interface does not properly validate user-supplied input. An attacker could exploit these vulnerabilities by persuading an interface user to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive browser-based information. | [
"cpe:2.3:a:cisco:unified_communications_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:*:*:*:*:session_management:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager_im_\\&_presence_service:*:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unity_connection:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | null |
CVE-2024-53845 | AES/CBC Constant IV Vulnerability in ESPTouch v2 | ESPTouch is a connection protocol for internet of things devices. In the ESPTouchV2 protocol, while there is an option to use a custom AES key, there is no option to set the IV (Initialization Vector) prior to versions 5.3.2, 5.2.4, 5.1.6, and 5.0.8. The IV is set to zero and remains constant throughout the product's lifetime. In AES/CBC mode, if the IV is not properly initialized, the encrypted output becomes deterministic, leading to potential data leakage. To address the aforementioned issues, the application generates a random IV when activating the AES key starting in versions 5.3.2, 5.2.4, 5.1.6, and 5.0.8. This IV is then transmitted along with the provision data to the provision device. The provision device has also been equipped with a parser for the AES IV. The upgrade is applicable for all applications and users of ESPTouch v2 component from ESP-IDF. As it is implemented in the ESP Wi-Fi stack, there is no workaround for the user to fix the application layer without upgrading the underlying firmware. | [] | 6.6 | null | null | null |
GHSA-crv8-9h6w-q3j9 | Cross-site scripting (XSS) vulnerability in search.php in Gallarific allows remote attackers to inject arbitrary web script or HTML via the query parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | [] | null | null | null | null |
|
GHSA-xjjp-35cq-88wh | A heap corruption vulnerability has been identified in PostScript interpreter in various Lexmark devices. The vulnerability can be leveraged by an attacker to execute arbitrary code. | [] | null | 9 | null | null |
|
GHSA-46f9-f8jm-mw2x | Plone Cross-site Scripting vulnerability in the LiveSearch module | Cross-site scripting (XSS) vulnerability in the LiveSearch module in Plone before 3.0.4 allows remote attackers to inject arbitrary web script or HTML via the Description field for search results, as demonstrated using the onerror Javascript even in an IMG tag. | [] | null | null | null | null |
CVE-2023-32787 | The OPC UA Legacy Java Stack before 6f176f2 enables an attacker to block OPC UA server applications via uncontrolled resource consumption so that they can no longer serve client applications. | [
"cpe:2.3:a:opcfoundation:ua_java_legacy:*:*:*:*:*:*:*:*",
"cpe:2.3:a:prosysopc:ua_historian:*:*:*:*:*:*:*:*",
"cpe:2.3:a:prosysopc:ua_modbus_server:*:*:*:*:*:*:*:*",
"cpe:2.3:a:prosysopc:ua_simulation_server:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
|
GHSA-r3cw-4h6g-qxmh | A vulnerability in the web-based guest portal of Cisco Identity Services Engine (ISE) could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface. The vulnerability is due to insufficient validation of user-supplied input that is processed by the web-based management interface. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive browser-based information. | [] | null | 6.1 | null | null |
|
CVE-2020-25170 | B. Braun OnlineSuite | An Excel Macro Injection vulnerability exists in the export feature in the B. Braun OnlineSuite Version AP 3.0 and earlier via multiple input fields that are mishandled in an Excel export. | [
"cpe:2.3:a:bbraun:onlinesuite_application_package:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | 6.8 |
CVE-2001-0379 | Vulnerability in the newgrp program included with HP9000 servers running HP-UX 11.11 allows a local attacker to obtain higher access rights. | [
"cpe:2.3:o:hp:hp-ux:11.11:*:*:*:*:*:*:*"
] | null | null | null | 4.6 |
|
CVE-2000-0684 | BEA WebLogic 5.1.x does not properly restrict access to the JSPServlet, which could allow remote attackers to compile and execute Java JSP code by directly invoking the servlet on any source file. | [
"cpe:2.3:a:bea:weblogic_server:3.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:4.5.1:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
CVE-2024-0367 | The Unlimited Elements For Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the link field of an installed widget (e.g., 'Button Link') in all versions up to, and including, 1.5.96 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] | null | 6.4 | null | null |
|
CVE-2024-46698 | video/aperture: optionally match the device in sysfb_disable() | In the Linux kernel, the following vulnerability has been resolved:
video/aperture: optionally match the device in sysfb_disable()
In aperture_remove_conflicting_pci_devices(), we currently only
call sysfb_disable() on vga class devices. This leads to the
following problem when the pimary device is not VGA compatible:
1. A PCI device with a non-VGA class is the boot display
2. That device is probed first and it is not a VGA device so
sysfb_disable() is not called, but the device resources
are freed by aperture_detach_platform_device()
3. Non-primary GPU has a VGA class and it ends up calling sysfb_disable()
4. NULL pointer dereference via sysfb_disable() since the resources
have already been freed by aperture_detach_platform_device() when
it was called by the other device.
Fix this by passing a device pointer to sysfb_disable() and checking
the device to determine if we should execute it or not.
v2: Fix build when CONFIG_SCREEN_INFO is not set
v3: Move device check into the mutex
Drop primary variable in aperture_remove_conflicting_pci_devices()
Drop __init on pci sysfb_pci_dev_is_enabled() | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.11:rc5:*:*:*:*:*:*"
] | null | 5.5 | null | null |
GHSA-x4rh-jv54-gh7g | Heap buffer overflow in extensions in Google Chrome prior to 96.0.4664.93 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension. | [] | null | 8.8 | null | null |
|
CVE-2022-45613 | Book Store Management System v1.0 was discovered to contain a cross-site scripting (XSS) vulnerability in /bsms_ci/index.php/book. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the publisher parameter. | [
"cpe:2.3:a:book_store_management_system_project:book_store_management_system:1.0:*:*:*:*:*:*:*"
] | null | 5.4 | null | null |
|
RHSA-2006:0206 | Red Hat Security Advisory: kdegraphics security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
GHSA-jgxj-6h4c-hpvg | SQL Injection in PHPSHE Mall System v1.7 allows remote attackers to execute arbitrary code by injecting SQL commands into the "user_phone" parameter of a crafted HTTP request to the "admin.php" component. | [] | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.