id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
197k
cpes
listlengths
0
4.89k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
GHSA-3rj2-wfgm-mm6x
A vulnerability was found in 274056675 springboot-openai-chatgpt e84f6f5. It has been declared as problematic. This vulnerability affects the function updateQuestionCou of the file /api/mjkj-chat/chat/mng/update/questionCou of the component Number of Question Handler. The manipulation leads to enforcement of behavioral workflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available. The vendor was contacted early about this disclosure but did not respond in any way.
[]
5.3
4.3
null
null
CVE-2006-4915
Cross-site scripting (XSS) vulnerability in index.php in Innovate Portal 2.0 allows remote attackers to inject arbitrary web script or HTML via the content parameter.
[ "cpe:2.3:a:innovate_portal:innovate_portal:2.0:*:*:*:*:*:*:*" ]
null
null
null
4.3
GHSA-35gp-6hvq-gx74
Unspecified vulnerability in Oracle Sun Solaris 11 allows remote attackers to affect integrity via unknown vectors related to pkg.depotd.
[]
null
null
null
null
CVE-2020-20595
A cross-site request forgery (CSRF) in OPMS v1.3 and below allows attackers to arbitrarily add a user account via /user/add.
[ "cpe:2.3:a:opms_project:opms:1.3:*:*:*:*:*:*:*" ]
null
6.5
null
4.3
GHSA-jpgp-p76h-hmp8
An issue has been discovered in GitLab affecting versions from 11.8 before 12.10.13. GitLab was vulnerable to a stored XSS by in the error tracking feature.
[]
null
null
null
null
CVE-2025-22304
WordPress WP Visitor Statistics plugin <= 7.3 - Broken Access Control vulnerability
Missing Authorization vulnerability in osamaesh WP Visitor Statistics (Real Time Traffic) allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP Visitor Statistics (Real Time Traffic): from n/a through 7.3.
[]
null
4.3
null
null
CVE-2023-46134
D-Tale vulnerable to Remote Code Execution through the Custom Filter Input
D-Tale is the combination of a Flask back-end and a React front-end to view & analyze Pandas data structures. Prior to version 3.7.0, users hosting D-Tale publicly can be vulnerable to remote code execution, allowing attackers to run malicious code on the server. This issue has been patched in version 3.7.0 by turning off "Custom Filter" input by default. The only workaround for versions earlier than 3.7.0 is to only host D-Tale to trusted users.
[ "cpe:2.3:a:man:d-tale:*:*:*:*:*:*:*:*" ]
null
6.1
null
null
CVE-2023-5308
The Podcast Subscribe Buttons plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'podcast_subscribe' shortcode in versions up to, and including, 1.4.8 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[ "cpe:2.3:a:secondlinethemes:podcast_subscribe_buttons:*:*:*:*:*:wordpress:*:*" ]
null
6.4
null
null
ICSA-24-030-07
Rockwell Automation LP30/40/50 and BM40 Operator Interface
After successful authentication, specifically crafted communication requests with inconsistent content can cause the CmpFiletransfer component to read internally from an invalid address, potentially leading to a denial-of-service condition. After successful authentication, specifically crafted communication requests can cause the CmpApp component to write threat actor-controlled data to memory, which can lead to a denial-of-service condition, memory overwriting, or remote code execution. After successful authentication, specifically crafted communication requests can cause the CmpApp component to write threat actor-controlled data to stack, which can lead to a denial-of-service condition, memory overwriting, or remote code execution. After successful authentication, specifically crafted communication requests can cause the CmpApp component to write threat actor-controlled data to stack, which can lead to a denial-of-service condition, memory overwriting, or remote code execution. After successful authentication, specifically crafted communication requests can cause the CmpTraceMgr component to write threat actor-controlled data to stack, which can lead to a denial-of-service condition, memory overwriting, or remote code execution. After successful authentication, specifically crafted communication requests can cause the CmpTraceMgr component to write threat actor-controlled data to stack, which can lead to a denial-of-service condition, memory overwriting, or remote code execution. After successful authentication, specifically crafted communication requests can cause the CmpTraceMgr component to write threat actor-controlled data to stack, which can lead to a denial-of-service condition, memory overwriting, or remote code execution. After successful authentication, specifically crafted communication requests can cause the CmpTraceMgr component to write threat actor-controlled data to stack, which can lead to a denial-of-service condition, memory overwriting, or remote code execution. After successful authentication, specifically crafted communication requests can cause the CmpTraceMgr component to write threat actor-controlled data to stack, which can lead to a denial-of-service condition, memory overwriting, or remote code execution. After successful authentication, specifically crafted communication requests can cause the CmpTraceMgr component to write threat actor-controlled data to stack, which can lead to a denial-of-service condition, memory overwriting, or remote code execution. After successful authentication, specifically crafted communication requests can cause the CmpTraceMgr component to write threat actor-controlled data to stack, which can lead to a denial-of-service condition, memory overwriting, or remote code execution. After successful authentication, specifically crafted communication requests can cause the CmpTraceMgr component to write threat actor-controlled data to stack, which can lead to a denial-of-service condition, memory overwriting, or remote code execution. After successful authentication, specifically crafted communication requests can cause the CmpAppForce component to write threat actor-controlled data to stack, which can lead to a denial-of-service condition, memory overwriting, or remote code execution. After successful authentication, specifically crafted communication requests with inconsistent content can cause the CmpApp/CmpAppBP/CmpAppForce components to read internally from an invalid address, potentially leading to a denial-of-service condition. After successful authentication, specifically crafted communication requests can cause the cmpFiletransfer component to dereference addresses provided by the request for internal read access, which can lead to a denial-of-service situation.
[]
null
6.5
null
null
CVE-2011-4919
mpack 1.6 has information disclosure via eavesdropping on mails sent by other users
[ "cpe:2.3:a:mpack_project:mpack:1.6:*:*:*:*:*:*:*" ]
null
7.5
null
5
CVE-2020-25599
An issue was discovered in Xen through 4.14.x. There are evtchn_reset() race conditions. Uses of EVTCHNOP_reset (potentially by a guest on itself) or XEN_DOMCTL_soft_reset (by itself covered by XSA-77) can lead to the violation of various internal assumptions. This may lead to out of bounds memory accesses or triggering of bug checks. In particular, x86 PV guests may be able to elevate their privilege to that of the host. Host and guest crashes are also possible, leading to a Denial of Service (DoS). Information leaks cannot be ruled out. All Xen versions from 4.5 onwards are vulnerable. Xen versions 4.4 and earlier are not vulnerable.
[ "cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*" ]
null
7
null
4.4
GHSA-vp73-qc6h-83r4
Unknown vulnerability in IPV6 functionality for DCE daemons (1) dced or (2) rpcd on HP-UX 11.11 allows attackers to cause a denial of service (crash) via an attack that modifies internal data.
[]
null
null
null
null
GHSA-c9m9-x3p2-fwvw
The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c at the Linux kernel version 3.4 and up to and including 4.15 has an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space.
[]
null
null
7.8
null
GHSA-xqv4-m752-6vpr
Memory leak in Cisco IOS XR 5.1.x through 5.1.3, 5.2.x through 5.2.5, and 5.3.x through 5.3.2 on ASR 9001 devices allows remote attackers to cause a denial of service (control-plane protocol outage) via crafted fragmented packets, aka Bug ID CSCux26791.
[]
null
null
7.5
null
CVE-2020-15217
User data exposure in GLPI
In GLPI before version 9.5.2, there is a leakage of user information through the public FAQ. The issue was introduced in version 9.5.0 and patched in 9.5.2. As a workaround, disable public access to the FAQ.
[ "cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*" ]
null
5.3
null
null
CVE-2008-4179
Multiple cross-site scripting (XSS) vulnerabilities in NooMS 1.1 allow remote attackers to inject arbitrary web script or HTML via the (1) page_id parameter to smileys.php and the (2) q parameter to search.php.
[ "cpe:2.3:a:nooms:nooms:1.1:*:*:*:*:*:*:*" ]
null
null
null
4.3
GHSA-5g9m-x68j-5mr2
Citrix Provisioning Services before 7.12 allows attackers to obtain sensitive kernel address information via unspecified vectors.
[]
null
null
5.3
null
GHSA-vjmg-qh6v-526r
In Ericsson BSCS iX R18 Billing & Rating iX R18, MX is a web base module in BSCS iX that is vulnerable to stored XSS via an Alert Dashboard comment. In most test cases, session hijacking was also possible by utilizing the XSS vulnerability. This potentially allows for full account takeover, or exploiting admins' browsers by using the beef framework.
[]
null
null
null
null
CVE-2021-45674
Certain NETGEAR devices are affected by stored XSS. This affects R7000 before 1.0.11.110, R7900 before 1.0.4.30, R8000 before 1.0.4.62, RAX15 before 1.0.2.82, RAX20 before 1.0.2.82, RAX200 before 1.0.3.106, RAX75 before 1.0.3.106, and RAX80 before 1.0.3.106.
[ "cpe:2.3:o:netgear:r7000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r7000:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r7900_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r7900:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r8000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r8000:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:rax15_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:rax15:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:rax20_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:rax20:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:rax200_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:rax200:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:rax75_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:rax75:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:rax80_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:rax80:-:*:*:*:*:*:*:*" ]
null
3.2
null
null
GHSA-w3cg-6577-wx9f
Directory Traversal in cuciuci
Affected versions of `cuciuci` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.**Example request:**RecommendationNo patch is available for this vulnerability.It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
[]
null
null
7.5
null
RHSA-2009:0053
Red Hat Security Advisory: kernel-rt security and bug fix update
Linux Kernel 'atm module' Local Denial of Service kernel: libertas: fix buffer overrun kernel: fix inotify watch removal/umount races kernel: fix soft lockups/OOM issues with unix socket garbage collector kernel: enforce a minimum SG_IO timeout kernel: sctp: memory overflow when FWD-TSN chunk is received with bad stream ID
[ "cpe:/a:redhat:enterprise_mrg:1::el5" ]
null
null
null
null
CVE-2010-5286
Directory traversal vulnerability in Jstore (com_jstore) component for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php.
[ "cpe:2.3:a:joobi:com_jstore:-:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:*:*:*:*:*:*:*:*" ]
null
null
null
10
CVE-2025-38038
cpufreq: amd-pstate: Remove unnecessary driver_lock in set_boost
In the Linux kernel, the following vulnerability has been resolved: cpufreq: amd-pstate: Remove unnecessary driver_lock in set_boost set_boost is a per-policy function call, hence a driver wide lock is unnecessary. Also this mutex_acquire can collide with the mutex_acquire from the mode-switch path in status_store(), which can lead to a deadlock. So, remove it.
[]
null
null
null
null
RHSA-2011:0306
Red Hat Security Advisory: samba3x security update
Samba unsafe fd_set usage
[ "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
GHSA-jf69-6wxx-cpxg
The filesystem authentication (condor_io/condor_auth_fs.cpp) in Condor 7.6.x before 7.6.10 and 7.8.x before 7.8.4 uses authentication directories even when they have weak permissions, which allows remote attackers to impersonate users by renaming a user's authentication directory.
[]
null
null
null
null
GHSA-rvjh-ch4h-2q94
Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via getprop_builtin_foreign at src/mjs_exec.c. This vulnerability can lead to a Denial of Service (DoS).
[]
null
null
null
null
CVE-2012-6583
Cross-site scripting (XSS) vulnerability in the Imagemenu module 6.x-1.x before 6.x-1.4 for Drupal allows remote authenticated users with the "administer imagemenu" permission to inject arbitrary web script or HTML via an image file name.
[ "cpe:2.3:a:imagemenu_project:imagemenu:6.x-1.0:*:*:*:*:*:*:*", "cpe:2.3:a:imagemenu_project:imagemenu:6.x-1.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:imagemenu_project:imagemenu:6.x-1.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:imagemenu_project:imagemenu:6.x-1.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:imagemenu_project:imagemenu:6.x-1.0:rc4:*:*:*:*:*:*", "cpe:2.3:a:imagemenu_project:imagemenu:6.x-1.0:rc5:*:*:*:*:*:*", "cpe:2.3:a:imagemenu_project:imagemenu:6.x-1.1:*:*:*:*:*:*:*", "cpe:2.3:a:imagemenu_project:imagemenu:6.x-1.2:*:*:*:*:*:*:*", "cpe:2.3:a:imagemenu_project:imagemenu:6.x-1.3:*:*:*:*:*:*:*", "cpe:2.3:a:imagemenu_project:imagemenu:6.x-1.x:dev:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:-:*:*:*:*:*:*:*" ]
null
null
null
2.1
RHSA-2024:10518
Red Hat Security Advisory: OpenShift Container Platform 4.17.7 bug fix and security update
go-retryablehttp: url might write sensitive information to log file QEMU: Denial of Service via Improper Synchronization in QEMU NBD Server During Socket Closure pam: Improper Hostname Interpretation in pam_access Leads to Access Control Bypass cross-spawn: regular expression denial of service
[ "cpe:/a:redhat:openshift:4.17::el9" ]
null
4.4
7.5
null
GHSA-7fr5-wc4r-qrrc
The Web Panel in Netsweeper before 4.0.5 has a default password of branding for the branding account, which makes it easier for remote attackers to obtain access via a request to webadmin/.
[]
null
null
null
null
GHSA-c9g7-6vjc-r2p5
Cross-site request forgery (CSRF) vulnerability in admin/index.php in 11in1 1.2.1 stable 12-31-2011 allows remote attackers to hijack the authentication of administrators for requests that add new topics via an addTopic action.
[]
null
null
null
null
CVE-2024-3534
Campcodes Church Management System login.php sql injection
A vulnerability, which was classified as critical, has been found in Campcodes Church Management System 1.0. Affected by this issue is some unknown functionality of the file login.php. The manipulation of the argument password leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-259904.
[ "cpe:2.3:a:campcodes:church_management_system:1.0:*:*:*:*:*:*:*" ]
null
7.3
7.3
7.5
CVE-2018-19620
ShowDoc 2.4.1 allows remote attackers to edit other users' notes by navigating with a modified page_id.
[ "cpe:2.3:a:showdoc:showdoc:2.4.1:*:*:*:*:*:*:*" ]
null
null
4.3
4
GHSA-gv7v-mp3w-gfvh
Redmine before 4.0.9 and 4.1.x before 4.1.3 allows an attacker to learn the values of internal authentication keys by observing timing differences in string comparison operations within SysController and MailHandlerController.
[]
null
5.3
null
null
GHSA-j4qq-hcfp-m638
In the Linux kernel, the following vulnerability has been resolved:mm: migrate: fix getting incorrect page mapping during page migrationWhen running stress-ng testing, we found below kernel crash after a few hours:Unable to handle kernel NULL pointer dereference at virtual address 0000000000000000 pc : dentry_name+0xd8/0x224 lr : pointer+0x22c/0x370 sp : ffff800025f134c0 ...... Call trace: dentry_name+0xd8/0x224 pointer+0x22c/0x370 vsnprintf+0x1ec/0x730 vscnprintf+0x2c/0x60 vprintk_store+0x70/0x234 vprintk_emit+0xe0/0x24c vprintk_default+0x3c/0x44 vprintk_func+0x84/0x2d0 printk+0x64/0x88 __dump_page+0x52c/0x530 dump_page+0x14/0x20 set_migratetype_isolate+0x110/0x224 start_isolate_page_range+0xc4/0x20c offline_pages+0x124/0x474 memory_block_offline+0x44/0xf4 memory_subsys_offline+0x3c/0x70 device_offline+0xf0/0x120 ......After analyzing the vmcore, I found this issue is caused by page migration. The scenario is that, one thread is doing page migration, and we will use the target page's ->mapping field to save 'anon_vma' pointer between page unmap and page move, and now the target page is locked and refcount is 1.Currently, there is another stress-ng thread performing memory hotplug, attempting to offline the target page that is being migrated. It discovers that the refcount of this target page is 1, preventing the offline operation, thus proceeding to dump the page. However, page_mapping() of the target page may return an incorrect file mapping to crash the system in dump_mapping(), since the target page->mapping only saves 'anon_vma' pointer without setting PAGE_MAPPING_ANON flag.There are seveval ways to fix this issue: (1) Setting the PAGE_MAPPING_ANON flag for target page's ->mapping when saving 'anon_vma', but this can confuse PageAnon() for PFN walkers, since the target page has not built mappings yet. (2) Getting the page lock to call page_mapping() in __dump_page() to avoid crashing the system, however, there are still some PFN walkers that call page_mapping() without holding the page lock, such as compaction. (3) Using target page->private field to save the 'anon_vma' pointer and 2 bits page state, just as page->mapping records an anonymous page, which can remove the page_mapping() impact for PFN walkers and also seems a simple way.So I choose option 3 to fix this issue, and this can also fix other potential issues for PFN walkers, such as compaction.
[]
null
5.5
null
null
CVE-2016-9816
Xen through 4.7.x allows local ARM guest OS users to cause a denial of service (host crash) via vectors involving an asynchronous abort while at EL2.
[ "cpe:2.3:o:xen:xen:4.7.0:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:4.7.1:*:*:*:*:*:*:*" ]
null
null
6.5
4.9
GHSA-w8x6-88rf-9hhp
The Hello World plugin for WordPress is vulnerable to Arbitrary File Reading in all versions up to, and including, 2.1.1 via the hello_world_lyric() function. This makes it possible for authenticated attackers, with subscriber-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information.
[]
null
6.5
null
null
CVE-2025-32649
WordPress GB Gallery Slideshow Plugin <= 1.3 - Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in gb-plugins GB Gallery Slideshow allows Reflected XSS. This issue affects GB Gallery Slideshow: from n/a through 1.3.
[]
null
7.1
null
null
CVE-2019-11021
admin/app/mediamanager in Schlix CMS 2.1.8-7 allows Authenticated Unrestricted File Upload, leading to remote code execution. NOTE: "While inadvertently allowing a PHP file to be uploaded via Media Manager was an oversight, it still requires an admin permission. We think it's pretty rare for an administrator to exploit a bug on his/her own site to own his/her own site.
[ "cpe:2.3:a:schlix:cms:2.1.8-7:*:*:*:*:*:*:*" ]
null
7.2
null
6.5
CVE-2018-9935
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 8.3.2.25013. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the addField method. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code under the context of the current process. Was ZDI-CAN-5312.
[ "cpe:2.3:a:foxitsoftware:phantompdf:*:*:*:*:*:*:*:*", "cpe:2.3:a:foxitsoftware:foxit_reader:*:*:*:*:*:*:*:*" ]
null
null
8.8
6.8
CVE-2024-8888
Insufficient Session Expiration vulnerability on CIRCUTOR Q-SMT
An attacker with access to the network where CIRCUTOR Q-SMT is located in its firmware version 1.0.4, could steal the tokens used on the web, since these have no expiration date to access the web application without restrictions. Token theft can originate from different methods such as network captures, locally stored web information, etc.
[ "cpe:2.3:a:circutor:circutor_q_smt:*:*:*:*:*:*:*:*", "cpe:2.3:o:circutor:q-smt_firmware:1.0.4:*:*:*:*:*:*:*", "cpe:2.3:h:circutor:q-smt:-:*:*:*:*:*:*:*" ]
null
10
null
null
CVE-2022-26897
Azure Site Recovery Information Disclosure Vulnerability
Azure Site Recovery Information Disclosure Vulnerability
[ "cpe:2.3:a:microsoft:azure_site_recovery:*:*:*:*:vmware_to_azure:*:*:*" ]
null
4.9
null
null
CVE-2024-4551
Video Gallery – YouTube Playlist, Channel Gallery by YotuWP <= 1.3.13 - Authenticated (Contributor+) Arbitrary File Inclusion via Shortcode
The Video Gallery – YouTube Playlist, Channel Gallery by YotuWP plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1.3.13 via the display function. This makes it possible for authenticated attackers, with contributor access and higher, to include and execute arbitrary php files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included.
[ "cpe:2.3:a:yotuwp:video_gallery:*:*:*:*:*:wordpress:*:*" ]
null
6.4
null
null
CVE-2024-54105
Read/Write vulnerability in the image decoding module Impact: Successful exploitation of this vulnerability will affect availability.
[ "cpe:2.3:o:huawei:harmonyos:5.0.0:*:*:*:*:*:*:*" ]
null
5.1
null
null
GHSA-p569-737x-7h7p
An issue was discovered in PHP before 5.6.33, 7.0.x before 7.0.27, 7.1.x before 7.1.13, and 7.2.x before 7.2.1. There is Reflected XSS on the PHAR 404 error page via the URI of a request for a .phar file.
[]
null
null
6.1
null
CVE-2022-2378
Easy Student Results <= 2.2.8 - Reflected Cross-Site Scripting
The Easy Student Results WordPress plugin through 2.2.8 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting
[ "cpe:2.3:a:easy_student_results_project:easy_student_results:*:*:*:*:*:wordpress:*:*" ]
null
6.1
null
null
CVE-2002-0407
htcgibin.exe in Lotus Domino server 5.0.9a and earlier allows remote attackers to determine the physical pathname for the server via requests that contain certain MS-DOS device names such as com5, such as (1) a request with a .pl or .java extension, or (2) a request containing a large number of periods, which causes htcgibin.exe to leak the pathname in an error message.
[ "cpe:2.3:a:lotus:domino:*:*:*:*:*:*:*:*" ]
null
null
null
5
CVE-2015-8984
The fnmatch function in the GNU C Library (aka glibc or libc6) before 2.22 might allow context-dependent attackers to cause a denial of service (application crash) via a malformed pattern, which triggers an out-of-bounds read.
[ "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*" ]
null
null
5.9
4.3
GHSA-h77j-6rq9-4jc3
Heap-based buffer overflow in ImageIO in Apple Mac OS X before 10.6.8 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted TIFF image.
[]
null
null
null
null
GHSA-4q76-q6w7-7fw8
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the getAnnot method. By performing actions in JavaScript, an attacker can trigger a type confusion condition. An attacker can leverage this vulnerability to execute code under the context of the current process. Was ZDI-CAN-6013.
[]
null
null
8.8
null
CVE-2024-10291
ZZCMS phome.php Ebak_DotranExecutSQL sql injection
A vulnerability has been found in ZZCMS 2023 and classified as critical. This vulnerability affects the function Ebak_DoExecSQL/Ebak_DotranExecutSQL of the file 3/Ebak5.1/upload/phome.php. The manipulation of the argument phome leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
[ "cpe:2.3:a:zzcms:zzcms:*:*:*:*:*:*:*:*", "cpe:2.3:a:zzcms:zzcms:2023:*:*:*:*:*:*:*" ]
5.3
6.3
6.3
6.5
GHSA-4h58-f788-v8pw
There exists interger overflows in libvpx in versions prior to 1.14.1. Calling vpx_img_alloc() with a large value of the d_w, d_h, or align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned vpx_image_t struct may be invalid. Calling vpx_img_wrap() with a large value of the d_w, d_h, or stride_align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned vpx_image_t struct may be invalid. We recommend upgrading to version 1.14.1 or beyond
[]
null
null
null
null
GHSA-63rf-cwpf-vw2p
The dashboard report in Puppet Enterprise before 3.0.1 allows attackers to execute arbitrary YAML code via a crafted report-specific type.
[]
null
null
null
null
GHSA-5cfp-mpf4-f8hr
VMware vRealize Operations contains a privilege escalation vulnerability. A malicious actor with administrative network access can escalate privileges to root.
[]
null
7.2
null
null
GHSA-7hvj-fm99-26hr
Certain NETGEAR devices are affected by a a hardcoded password. This affects D6200 before 1.1.00.36, D7000 before 1.0.1.74, PR2000 before 1.0.0.30, R6020 before 1.0.0.42, R6080 before 1.0.0.42, R6050 before 1.0.1.24, JR6150 before 1.0.1.24, R6120 before 1.0.0.48, R6220 before 1.1.0.86, R6230 before 1.1.0.86, R6260 before 1.1.0.64, R6700v2 before 1.2.0.62, R6800 before 1.2.0.62, R6900v2 before 1.2.0.62, and WNR2020 before 1.1.0.62.
[]
null
null
null
null
CVE-2018-20640
PHP Scripts Mall Entrepreneur Job Portal Script 3.0.1 has stored Cross-Site Scripting (XSS) via the Full Name field.
[ "cpe:2.3:a:entrepreneur_job_portal_script_project:entrepreneur_job_portal_script:3.0.1:*:*:*:*:*:*:*" ]
null
null
5.4
3.5
GHSA-9wqc-q367-q634
An issue in Beijing Panabit Network Software Co., Ltd Panalog big data analysis platform v. 20240323 and before allows attackers to execute arbitrary code via the exportpdf.php component.
[]
null
9.8
null
null
RHSA-2018:1130
Red Hat Security Advisory: kernel security and bug fix update
hw: cpu: speculative execution branch target injection kernel: Use-after-free vulnerability in DCCP socket kernel: Incorrect type conversion for size during dma allocation kernel: v4l2: disabled memory access protection mechanism allowing privilege escalation kernel: Use-after-free in snd_seq_ioctl_create_port() kernel: Missing namespace check in net/netlink/af_netlink.c allows for network monitors to observe systemwide activity kernel: netfilter: use-after-free in tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c kernel: kvm: Reachable BUG() on out-of-bounds guest IRQ kernel: Stack information leak in the EFS element
[ "cpe:/o:redhat:rhel_eus:7.4::computenode", "cpe:/o:redhat:rhel_eus:7.4::server" ]
null
null
6.5
null
CVE-2023-49436
Tenda AX9 V22.03.01.46 has been discovered to contain a command injection vulnerability in the 'list' parameter at /goform/SetNetControlList.
[ "cpe:2.3:o:tenda:ax9_firmware:22.03.01.46:*:*:*:*:*:*:*", "cpe:2.3:h:tenda:ax9:-:*:*:*:*:*:*:*" ]
null
9.8
null
null
GHSA-g8p2-c9gc-6wh6
sdbstarter in SAP MaxDB 7.6.0.37, and possibly other versions, allows local users to execute arbitrary commands by using unspecified environment variables to modify configuration settings.
[]
null
null
null
null
GHSA-p2hf-v29f-72xj
SQL injection vulnerability in janobe Online Job Portal v.2020 allows a remote attacker to execute arbitrary code via the ForPass.php component.
[]
null
9.8
null
null
CVE-2017-3893
In BlackBerry QNX Software Development Platform (SDP) 6.6.0, the default configuration of the QNX SDP system did not in all circumstances prevent attackers from modifying the GOT or PLT tables with buffer overflow attacks.
[ "cpe:2.3:a:blackberry:qnx_software_development_platform:6.6.0:*:*:*:*:*:*:*" ]
null
null
7.5
6.4
GHSA-pqvp-99qr-6m3h
wps_shop.cgi in WPS Web Portal System 0.7.0 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) art and (2) cat variables.
[]
null
null
null
null
RHSA-2021:4373
Red Hat Security Advisory: pcre security update
pcre: Buffer over-read in JIT when UTF is disabled and \X or \R has fixed quantifier greater than 1 pcre: Integer overflow when parsing callout numeric arguments
[ "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
5.3
null
null
CVE-2024-9504
Booking calendar, Appointment Booking System <= 3.2.15 - Unauthenticated Stored Cross-Site Scripting via SVG File Upload
The Booking calendar, Appointment Booking System plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 3.2.15 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file.
[ "cpe:2.3:a:wpdevart:booking_calendar:*:*:*:*:*:wordpress:*:*" ]
null
7.2
null
null
GHSA-qj4x-mh6f-mw42
A privilege escalation vulnerability exists in the Rockwell Automation affected products. The vulnerability occurs due to improper default file permissions allowing users to exfiltrate credentials and escalate privileges.
[]
7.7
8.8
null
null
CVE-2012-5582
opendnssec misuses libcurl API
[ "cpe:2.3:a:opendnssec:opendnssec:-:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
GHSA-jvjq-8w6h-2qr7
To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used.
[]
null
null
null
null
CVE-2021-20135
Nessus versions 8.15.2 and earlier were found to contain a local privilege escalation vulnerability which could allow an authenticated, local administrator to run specific executables on the Nessus Agent host. Tenable has included a fix for this issue in Nessus 10.0.0. The installation files can be obtained from the Tenable Downloads Portal (https://www.tenable.com/downloads/nessus).
[ "cpe:2.3:a:tenable:nessus:*:*:*:*:*:*:*:*" ]
null
6.7
null
4.6
GHSA-qxh7-4xcw-xqvm
The PluginContext object of Opera 6.05 and 7.0 allows remote attackers to cause a denial of service (crash) via an HTTP request containing a long string that gets passed to the ShowDocument method.
[]
null
null
null
null
CVE-2021-42195
An issue was discovered in swftools through 20201222. A heap-buffer-overflow exists in the function handleEditText() located in swfdump.c. It allows an attacker to cause code Execution.
[ "cpe:2.3:a:swftools:swftools:*:*:*:*:*:*:*:*" ]
null
7.8
null
6.8
GHSA-r5pq-3cxr-5rmc
The WPQA Builder Plugin WordPress plugin before 5.2, used as a companion plugin for the Discy and Himer , does not validate that the message_id of the wpqa_message_view ajax action belongs to the requesting user, leading to any user being able to read messages for any other users via a Insecure Direct Object Reference (IDOR) vulnerability.
[]
null
4.3
null
null
CVE-2017-15783
XnView Classic for Windows Version 2.43 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .dwg file, related to "Data from Faulting Address controls Branch Selection starting at CADImage+0x0000000000285ce1."
[ "cpe:2.3:a:xnview:xnview:2.43:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*" ]
null
null
7.8
6.8
GHSA-9jq6-f57r-6g4c
Cross-site scripting (XSS) vulnerability in Cybozu Office 9.0.0 through 10.3.0 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2015-7795, CVE-2015-7796, CVE-2015-7797, CVE-2015-7798, and CVE-2016-1150.
[]
null
null
6.1
null
CVE-2003-1121
Services in ScriptLogic 4.01, and possibly other versions before 4.14, process client requests at raised privileges, which allows remote attackers to (1) modify arbitrary registry entries via the ScriptLogic RPC service (SLRPC) or (2) modify arbitrary configuration via the RunAdmin services (SLRAserver.exe and SLRAclient.exe).
[ "cpe:2.3:a:scriptlogic:scriptlogic:4.1:*:*:*:*:*:*:*" ]
null
null
null
10
CVE-2014-1842
Directory traversal vulnerability in the web interface in Titan FTP Server before 10.40 build 1829 allows remote attackers to list all usernames via a Go action with a .. (dot dot) in the search-bar value.
[ "cpe:2.3:a:southrivertech:titan_ftp_server:*:*:*:*:*:*:*:*", "cpe:2.3:a:southrivertech:titan_ftp_server:10.0.1733:*:*:*:*:*:*:*", "cpe:2.3:a:southrivertech:titan_ftp_server:10.01.1740:*:*:*:*:*:*:*", "cpe:2.3:a:southrivertech:titan_ftp_server:10.30:*:*:*:*:*:*:*" ]
null
null
null
5
CVE-2025-2563
User Registration & Membership < 4.1.2- Unauthenticated Privilege Escalation
The User Registration & Membership WordPress plugin before 4.1.2 does not prevent users to set their account role when the Membership Addon is enabled, leading to a privilege escalation issue and allowing unauthenticated users to gain admin privileges
[]
null
8.1
null
null
CVE-2023-6076
PHPGurukul Restaurant Table Booking System Reservation Status booking-details.php information disclosure
A vulnerability classified as problematic was found in PHPGurukul Restaurant Table Booking System 1.0. Affected by this vulnerability is an unknown functionality of the file booking-details.php of the component Reservation Status Handler. The manipulation of the argument bid leads to information disclosure. The attack can be launched remotely. The identifier VDB-244945 was assigned to this vulnerability.
[ "cpe:2.3:a:phpgurukul:restaurant_table_booking_system:1.0:*:*:*:*:*:*:*" ]
null
5.3
5.3
5
CVE-2024-52891
IBM Concert Software log manipulation
IBM Concert Software 1.0.0, 1.0.1, 1.0.2, 1.0.2.1, and 1.0.3 could allow an authenticated user to inject malicious information or obtain information from log files due to improper log neutralization.
[ "cpe:2.3:a:ibm:concert:1.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:concert:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:concert:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:concert:1.0.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:concert:1.0.3:*:*:*:*:*:*:*" ]
null
5.4
null
null
CVE-2005-3091
Cross-site scripting (XSS) vulnerability in Mantis before 1.0.0rc1 allows remote attackers to inject arbitrary web script or HTML via unknown attack vectors, as identified by bug#0005751 "thraxisp".
[ "cpe:2.3:a:mantis:mantis:0.9.0:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:0.9.1:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:0.10.0:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:0.10.1:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:0.10.2:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:0.11.0:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:0.11.1:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:0.12.0:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:0.13.0:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:0.13.1:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:0.14.0:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:0.14.1:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:0.14.2:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:0.14.3:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:0.14.4:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:0.14.5:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:0.14.6:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:0.14.7:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:0.14.8:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:0.15.0:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:0.15.1:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:0.15.2:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:0.15.3:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:0.15.4:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:0.15.5:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:0.15.6:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:0.15.7:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:0.15.8:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:0.15.9:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:0.15.10:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:0.15.11:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:0.15.12:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:0.16.0:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:0.16.1:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:0.17.0:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:0.17.1:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:0.17.2:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:0.17.3:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:0.17.4:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:0.17.4a:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:0.17.5:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:0.18.0:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:0.18.0_rc1:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:0.18.0a1:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:0.18.0a2:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:0.18.0a3:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:0.18.0a4:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:0.18.1:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:0.18.2:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:0.18.3:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:0.19.0:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:0.19.0_rc1:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:0.19.0a1:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:0.19.0a2:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:0.19.1:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:0.19.2:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:1.0.0a1:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:1.0.0a2:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:1.0.0a3:*:*:*:*:*:*:*" ]
null
null
null
4.3
GHSA-wggh-x2ch-8rhx
Authentication Bypass by Spoofing in org.onosproject.acl (access control) and org.onosproject.mobility (host mobility) in ONOS v2.0 and earlier allows attackers to bypass network access control via data plane packet injection. To exploit the vulnerability, an attacker sends a gratuitous ARP reply that causes the host mobility application to remove existing access control flow denial rules in the network. The access control application does not re-install flow deny rules, so the attacker can bypass the intended access control policy.
[]
null
null
null
null
CVE-2020-9882
A buffer overflow issue was addressed with improved memory handling. This issue is fixed in iOS 13.6 and iPadOS 13.6, macOS Catalina 10.15.6, watchOS 6.2.8. Processing a maliciously crafted USD file may lead to unexpected application termination or arbitrary code execution.
[ "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*" ]
null
7.8
null
6.8
CVE-2004-2402
Cross-site scripting (XSS) vulnerability in YaBB.pl in YaBB 1 GOLD SP 1.3.2 allows remote attackers to inject arbitrary web script or HTML via a hex-encoded to parameter. NOTE: some sources say that the board parameter is affected, but this is incorrect.
[ "cpe:2.3:a:yabb:yabb:1.40:*:*:*:*:*:*:*", "cpe:2.3:a:yabb:yabb:1.41:*:*:*:*:*:*:*", "cpe:2.3:a:yabb:yabb:1_gold_-_sp_1:*:*:*:*:*:*:*", "cpe:2.3:a:yabb:yabb:1_gold_-_sp_1.2:*:*:*:*:*:*:*", "cpe:2.3:a:yabb:yabb:1_gold_-_sp_1.3:*:*:*:*:*:*:*", "cpe:2.3:a:yabb:yabb:1_gold_-_sp_1.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:yabb:yabb:1_gold_-_sp_1.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:yabb:yabb:1_gold_release:*:*:*:*:*:*:*", "cpe:2.3:a:yabb:yabb:2000-09-01:*:*:*:*:*:*:*", "cpe:2.3:a:yabb:yabb:2000-09-11:*:*:*:*:*:*:*" ]
null
null
null
4.3
GHSA-j5rc-gv5c-g3gv
The Slope Widgets plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'slope-reservations' shortcode in all versions up to, and including, 4.2.11 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
6.4
null
null
GHSA-64gc-rw82-mfm5
Cross-site scripting (XSS) vulnerability in Adobe ColdFusion 8.0 through 9.0.1 allows remote attackers to inject arbitrary web script or HTML via the cfform tag.
[]
null
null
null
null
GHSA-323q-9369-p5wm
PHP remote file inclusion vulnerability in genpage-cgi.php in Brian Fraval hitweb 4.2 and possibly earlier versions allows remote attackers to execute arbitrary PHP code via the REP_INC parameter.
[]
null
null
null
null
CVE-2021-46459
Victor CMS v1.0 was discovered to contain multiple SQL injection vulnerabilities in the component admin/users.php?source=add_user. These vulnerabilities can be exploited through a crafted POST request via the user_name, user_firstname,user_lastname, or user_email parameters.
[ "cpe:2.3:a:victor_cms_project:victor_cms:1.0:*:*:*:*:*:*:*" ]
null
7.5
null
5
GHSA-rq4h-wrjf-38w8
Dell ThinOS version 2408 contains an Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability. An unauthenticated attacker with local access could potentially exploit this vulnerability, leading to Command execution
[]
null
8.4
null
null
GHSA-wgj9-rrf6-3qqq
A vulnerability was found in DedeCMS 5.7. It has been classified as problematic. Affected is an unknown function of the file /src/dede/member_rank.php. The manipulation leads to cross-site request forgery. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-258918 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
[]
null
4.3
null
null
CVE-2023-29203
Unauthenticated user can have information about hidden users on subwikis through uorgsuggest.vm
XWiki Commons are technical libraries common to several other top level XWiki projects. It's possible to list some users who are normally not viewable from subwiki by requesting users on a subwiki which allows only global users with `uorgsuggest.vm`. This issue only concerns hidden users from main wiki. Note that the disclosed information are the username and the first and last name of users, no other information is leaked. The problem has been patched on XWiki 13.10.8, 14.4.3 and 14.7RC1.
[ "cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*", "cpe:2.3:a:xwiki:xwiki:13.9:rc1:*:*:*:*:*:*" ]
null
3.7
null
null
CVE-2010-1234
Unspecified vulnerability in Google Chrome before 4.1.249.1036 allows remote attackers to truncate the URL shown in the HTTP Basic Authentication dialog via unknown vectors.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:0.1.38.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:0.1.38.2:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:0.1.38.4:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:0.1.40.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:0.1.42.2:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:0.1.42.3:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:1.0.154.53:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:1.0.154.59:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:1.0.154.64:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:1.0.154.65:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:2.0.169.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:2.0.169.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:2.0.170.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:2.0.172.2:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:2.0.172.8:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:2.0.172.27:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:2.0.172.28:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:2.0.172.30:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:2.0.172.33:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:2.0.172.37:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:2.0.172.38:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:3.0.182.2:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:3.0.190.2:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:3.0.195.25:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:3.0.195.27:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:3.0.195.33:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:3.0.195.36:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:3.0.195.37:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:3.0.195.38:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.212.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.212.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.221.8:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.222.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.222.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.222.5:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.222.12:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.223.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.223.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.223.2:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.223.4:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.223.5:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.223.7:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.223.8:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.223.9:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.224.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.229.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.235.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.236.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.237.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.237.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.239.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.240.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.241.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.242.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.243.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.244.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.245.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.245.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.246.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.247.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.248.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.2:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.3:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.4:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.5:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.6:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.7:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.8:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.9:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.10:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.11:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.12:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.14:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.16:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.17:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.18:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.19:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.20:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.21:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.22:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.23:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.24:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.25:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.26:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.27:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.28:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.29:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.30:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.31:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.32:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.33:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.34:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.35:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.36:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.37:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.38:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.39:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.40:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.41:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.42:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.43:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.44:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.45:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.46:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.47:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.48:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.49:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.50:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.51:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.52:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.53:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.54:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.55:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.56:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.57:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.58:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.59:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.60:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.61:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.62:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.63:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.64:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.65:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.66:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.67:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.68:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.69:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.70:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.71:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.72:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.73:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.74:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.75:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.76:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.77:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.78:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.78:beta:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.79:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.80:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.81:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.82:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.249.89:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.250.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.250.2:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.251.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.252.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.254.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.255.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.256.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.257.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.258.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.259.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.260.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.261.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.262.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.263.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.264.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.265.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.266.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.267.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.268.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.269.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.271.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.272.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.275.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.275.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.276.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.277.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.278.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.286.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.287.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.288.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.288.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.289.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.290.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.292.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.294.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.295.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.296.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.299.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.300.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.301.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.302.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.302.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.302.2:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.302.3:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.303.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.304.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.0.305.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1001:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1004:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1006:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1007:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1008:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1009:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1010:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1011:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1012:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1013:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1014:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1015:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1016:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1017:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1018:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1019:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1020:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1021:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1022:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1023:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1024:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1025:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1026:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1027:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1028:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1029:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1030:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1031:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1032:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1033:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:4.1.249.1034:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2023-22052
Vulnerability in the Java VM component of Oracle Database Server. Supported versions that are affected are 19.3-19.19 and 21.3-21.10. Difficult to exploit vulnerability allows low privileged attacker having Create Session, Create Procedure privilege with network access via multiple protocols to compromise Java VM. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java VM accessible data. CVSS 3.1 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N).
[ "cpe:2.3:a:oracle:database_server:*:*:*:*:*:*:*:*" ]
null
3.1
null
null
GHSA-9g9h-7mhh-5mcr
Hotel Management v1.0 is vulnerable to multiple authenticated Reflected Cross-Site Scripting vulnerabilities. The 'check_out_date' parameter of the reservation.php resource is copied into the HTML document as plain text between tags. Any input is echoed unmodified in the application's response.
[]
null
5.4
null
null
RHSA-2010:0380
Red Hat Security Advisory: kernel security and bug fix update
kernel: mac80211: fix spurious delBA handling kernel: ext4: avoid divide by zero when trying to mount a corrupted file system kernel: bug in GFS/GFS2 locking code leads to dos kernel: ipv6: skb is unexpectedly freed
[ "cpe:/o:redhat:rhel_eus:5.4" ]
null
null
null
null
CVE-2005-0720
PHP remote file inclusion vulnerability in admin/header.php in PHP mcNews 1.3 allows remote attackers to execute arbitrary PHP code by modifying the skinfile parameter to reference a URL on a remote web server that contains the code.
[ "cpe:2.3:a:mcnews:mcnews:1.3:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-q4jv-8wfr-4pf8
An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to cause a denial of service by leveraging a long-running operation that exists to support restartability of PTE updates.
[]
null
6.5
null
null
CVE-2023-29043
Presentations may contain references to images, which are user-controlled, and could include malicious script code that is being processed when editing a document. Script code embedded in malicious documents could be executed in the context of the user editing the document when performing certain actions, like copying content. The relevant attribute does now get encoded to avoid the possibility of executing script code. No publicly available exploits are known.
[ "cpe:2.3:a:open-xchange:open-xchange_appsuite:*:*:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:-:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6069:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6073:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6080:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6085:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6093:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6102:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6112:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6121:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6133:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6138:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6141:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6146:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6147:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6148:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6150:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6156:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6161:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6166:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6173:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6176:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6178:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6189:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6194:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6199:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6204:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6205:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6209:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6210:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6214:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6215:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6216:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6218:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6219:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6220:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6227:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6230:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6233:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6235:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6236:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6239:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.6:patch_release_6241:*:*:*:*:*:*" ]
null
6.1
null
null
GHSA-rc5q-3pm2-x989
An issue was discovered in Joomla! 3.1.0 through 3.9.23. The lack of escaping of image-related parameters in multiple com_tags views cause lead to XSS attack vectors.
[]
null
null
null
null
GHSA-gxpp-9rc5-5w9w
In app/Model/MispObject.php in MISP 2.4.141, an incorrect sharing group association could lead to information disclosure on an event edit. When an object has a sharing group associated with an event edit, the sharing group object is ignored and instead the passed local ID is reused.
[]
null
null
null
null
GHSA-3xf5-6j2f-h2hr
Sophos Disk Encryption (SDE) 5.x in Sophos Enterprise Console (SEC) 5.x before 5.2.2 does not enforce intended authentication requirements for a resume action from sleep mode, which allows physically proximate attackers to obtain desktop access by leveraging the absence of a login screen.
[]
null
6.8
null
null
GHSA-c5jp-vv5q-7wc3
Cross-Site Request Forgery (CSRF) vulnerability in bytesforall Atahualpa.This issue affects Atahualpa: from n/a through 3.7.24.
[]
null
5.4
null
null