id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
189k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
patch_commit_url
stringlengths
36
232
GHSA-fr6h-cjvx-hrf6
Buffer overflow in gwwww1.dll in GroupWise Internet Agent (GWIA) in Novell GroupWise before 8.02HP2 allows remote attackers to execute arbitrary code via a crafted TZID variable in a VCALENDAR message.
[]
null
null
null
null
null
CVE-2017-12288
A vulnerability in the web-based management interface of Cisco Unified Contact Center Express could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of an affected device. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of the affected device. An attacker could exploit this vulnerability by persuading a user of the interface to click a malicious link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or allow the attacker to access sensitive browser-based information. Cisco Bug IDs: CSCvf09173.
[ "cpe:2.3:a:cisco:finesse:11.5\\(1\\):*:*:*:*:*:*:*" ]
null
null
6.1
4.3
null
CVE-2017-8420
SWFTools 2013-04-09-1007 on Windows has a "Data from Faulting Address controls Branch Selection starting at image00000000_00400000+0x0000000000003e71" issue. This issue can be triggered by a malformed TTF file that is mishandled by font2swf. Attackers could exploit this issue for DoS (Access Violation).
[ "cpe:2.3:a:swftools:swftools:2013-04-09-1007:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
null
6.5
4.3
null
CVE-2007-4511
The Sun Admin Console in Sun Application Server 9.0_0.1 does not apply certain configuration changes persistently, which causes the (1) SSL and (2) SSL_MutualAuth ORB listener services to enable all protocols and ciphers after the services are restarted, possibly allowing remote attackers to bypass intended policy.
[ "cpe:2.3:a:sun:java_system_application_server:9.0_0.1:*:*:*:*:*:*:*" ]
null
null
null
5
null
GHSA-v5xm-mrqq-93p7
Zimbra Collaboration Suite (ZCS) 6.0.16 and earlier allows man-in-the-middle attackers to obtain access by sniffing the network and replaying the ZM_AUTH_TOKEN token.
[]
null
null
null
null
null
RHSA-2012:0542
Red Hat Security Advisory: httpd security and bug fix update
httpd: mod_proxy_ajp remote temporary DoS httpd: reverse web proxy vulnerability httpd: ap_pregsub Integer overflow to buffer overflow httpd: NULL pointer dereference crash in mod_log_config httpd: possible crash on shutdown due to flaw in scoreboard handling httpd: cookie exposure due to error responses
[ "cpe:/a:redhat:jboss_enterprise_web_server:1::el5", "cpe:/a:redhat:jboss_enterprise_web_server:1::el6" ]
null
null
null
null
null
GHSA-m2fx-h52g-p764
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.20. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 7.1 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N).
[]
null
7.1
null
null
null
CVE-1999-1267
KDE file manager (kfm) uses a TCP server for certain file operations, which allows remote attackers to modify arbitrary files by sending a copy command to the server.
[ "cpe:2.3:o:kde:kde:*:*:*:*:*:*:*:*" ]
null
null
null
5
null
GHSA-rp63-jfmw-532w
Mail Gem Improper Input Validation vulnerability
The Mail gem before 2.4.3 for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in a (1) sendmail or (2) exim delivery.
[]
null
null
null
null
null
GHSA-8pm2-xpgg-f6c8
Incorrect access control in luowice v3.5.18 allows attackers to access cloud source code information via modification fo the Verify parameter in a warning message.
[]
null
7.5
null
null
null
CVE-2014-3075
Cross-site scripting (XSS) vulnerability in IBM Business Process Manager (BPM) 7.5.x through 8.5.5 and WebSphere Lombardi Edition 7.2.0.x allows remote authenticated users to inject arbitrary web script or HTML via an uploaded file.
[ "cpe:2.3:a:ibm:business_process_manager:7.5.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:business_process_manager:7.5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:business_process_manager:7.5.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:business_process_manager:7.5.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:business_process_manager:7.5.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.0.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.0.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.0.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.0.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.5.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.5.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:7.2:*:*:*:lombardi:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:7.2.0.1:*:*:*:lombardi:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:7.2.0.2:*:*:*:lombardi:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:7.2.0.3:*:*:*:lombardi:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:7.2.0.4:*:*:*:lombardi:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:7.2.0.5:*:*:*:lombardi:*:*:*" ]
null
null
null
3.5
null
CVE-2025-1523
Ultimate Dashboard < 3.8.6 - Admin+ Stored XSS
The Ultimate Dashboard WordPress plugin before 3.8.6 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
[]
null
3.5
null
null
null
GHSA-vpvf-xh3j-pfxr
Windows iSCSI Service Denial of Service Vulnerability.
[]
null
7.5
null
null
null
CVE-2020-1794
There is an improper authentication vulnerability in several smartphones. The applock does not perform a sufficient authentication in certain scenarios, successful exploit could allow the attacker to gain certain data of the application which is locked. Affected product versions include:HUAWEI Mate 20 versions Versions earlier than 10.0.0.188(C00E74R3P8);HUAWEI Mate 30 Pro versions Versions earlier than 10.0.0.203(C00E202R7P2).
[ "cpe:2.3:o:huawei:mate_20_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:mate_20:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:mate_30_pro_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:mate_30_pro:-:*:*:*:*:*:*:*" ]
null
4.6
null
2.1
null
CVE-2023-25742
When importing a SPKI RSA public key as ECDSA P-256, the key would be handled incorrectly causing the tab to crash. This vulnerability affects Firefox < 110, Thunderbird < 102.8, and Firefox ESR < 102.8.
[ "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*" ]
null
6.5
null
null
null
CVE-2017-14756
OpenText Document Sciences xPression (formerly EMC Document Sciences xPression) v4.5SP1 Patch 13 (older versions might be affected as well) is prone to Cross-Site Scripting: /xAdmin/html/Deployment (cat_id).
[ "cpe:2.3:a:opentext:document_sciences_xpression:*:sp1_p13:*:*:*:*:*:*" ]
null
null
6.1
4.3
null
GHSA-5hjh-923j-ff4c
** DISPUTED ** Directory traversal vulnerability in check_vote.php in Weekly Drawing Contest 0.0.1 allows remote attackers to read arbitrary files via a .. (dot dot) in the order parameter. NOTE: another researcher disputes this vulnerability, noting that the order variable is not used in any context that allows opening files.
[]
null
null
null
null
null
GHSA-qjgv-xj3p-jhxq
On all versions of 16.1.x, 15.1.x, 14.1.x, 13.1.x, 12.1.x, and 11.6.x of F5 BIG-IP (fixed in 17.0.0), a cross-site request forgery (CSRF) vulnerability exists in an undisclosed page of the BIG-IP Configuration utility. This vulnerability allows an attacker to run a limited set of commands: ping, traceroute, and WOM diagnostics. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated
[]
null
4.3
null
null
null
CVE-2023-33175
ToUI allows user-specific variables to be shared between users
ToUI is a Python package for creating user interfaces (websites and desktop apps) from HTML. ToUI is using Flask-Caching (SimpleCache) to store user variables. Websites that use `Website.user_vars` property. It affects versions 2.0.1 to 2.4.0. This issue has been patched in version 2.4.1.
[ "cpe:2.3:a:toui_project:toui:*:*:*:*:*:*:*:*" ]
null
9.1
null
null
null
GHSA-h6m6-jj8v-94jj
SQL injection in litellm
An SQL Injection vulnerability exists in the berriai/litellm repository, specifically within the `/global/spend/logs` endpoint. The vulnerability arises due to improper neutralization of special elements used in an SQL command. The affected code constructs an SQL query by concatenating an unvalidated `api_key` parameter directly into the query, making it susceptible to SQL Injection if the `api_key` contains malicious data. This issue affects the latest version of the repository. Successful exploitation of this vulnerability could lead to unauthorized access, data manipulation, exposure of confidential information, and denial of service (DoS).
[]
null
null
6.4
null
null
CVE-2010-2079
DataTrack System 3.5 allows remote attackers to bypass intended restrictions on file extensions, and read arbitrary files, via a trailing backslash in a URI, as demonstrated by (1) web.config\ and (2) .ascx\ files.
[ "cpe:2.3:a:magnoware:datatrack_system:3.5:*:*:*:*:*:*:*" ]
null
null
null
5
null
CVE-2025-38490
net: libwx: remove duplicate page_pool_put_full_page()
In the Linux kernel, the following vulnerability has been resolved: net: libwx: remove duplicate page_pool_put_full_page() page_pool_put_full_page() should only be invoked when freeing Rx buffers or building a skb if the size is too short. At other times, the pages need to be reused. So remove the redundant page put. In the original code, double free pages cause kernel panic: [ 876.949834] __irq_exit_rcu+0xc7/0x130 [ 876.949836] common_interrupt+0xb8/0xd0 [ 876.949838] </IRQ> [ 876.949838] <TASK> [ 876.949840] asm_common_interrupt+0x22/0x40 [ 876.949841] RIP: 0010:cpuidle_enter_state+0xc2/0x420 [ 876.949843] Code: 00 00 e8 d1 1d 5e ff e8 ac f0 ff ff 49 89 c5 0f 1f 44 00 00 31 ff e8 cd fc 5c ff 45 84 ff 0f 85 40 02 00 00 fb 0f 1f 44 00 00 <45> 85 f6 0f 88 84 01 00 00 49 63 d6 48 8d 04 52 48 8d 04 82 49 8d [ 876.949844] RSP: 0018:ffffaa7340267e78 EFLAGS: 00000246 [ 876.949845] RAX: ffff9e3f135be000 RBX: 0000000000000002 RCX: 0000000000000000 [ 876.949846] RDX: 000000cc2dc4cb7c RSI: ffffffff89ee49ae RDI: ffffffff89ef9f9e [ 876.949847] RBP: ffff9e378f940800 R08: 0000000000000002 R09: 00000000000000ed [ 876.949848] R10: 000000000000afc8 R11: ffff9e3e9e5a9b6c R12: ffffffff8a6d8580 [ 876.949849] R13: 000000cc2dc4cb7c R14: 0000000000000002 R15: 0000000000000000 [ 876.949852] ? cpuidle_enter_state+0xb3/0x420 [ 876.949855] cpuidle_enter+0x29/0x40 [ 876.949857] cpuidle_idle_call+0xfd/0x170 [ 876.949859] do_idle+0x7a/0xc0 [ 876.949861] cpu_startup_entry+0x25/0x30 [ 876.949862] start_secondary+0x117/0x140 [ 876.949864] common_startup_64+0x13e/0x148 [ 876.949867] </TASK> [ 876.949868] ---[ end trace 0000000000000000 ]--- [ 876.949869] ------------[ cut here ]------------ [ 876.949870] list_del corruption, ffffead40445a348->next is NULL [ 876.949873] WARNING: CPU: 14 PID: 0 at lib/list_debug.c:52 __list_del_entry_valid_or_report+0x67/0x120 [ 876.949875] Modules linked in: snd_hrtimer(E) bnep(E) binfmt_misc(E) amdgpu(E) squashfs(E) vfat(E) loop(E) fat(E) amd_atl(E) snd_hda_codec_realtek(E) intel_rapl_msr(E) snd_hda_codec_generic(E) intel_rapl_common(E) snd_hda_scodec_component(E) snd_hda_codec_hdmi(E) snd_hda_intel(E) edac_mce_amd(E) snd_intel_dspcfg(E) snd_hda_codec(E) snd_hda_core(E) amdxcp(E) kvm_amd(E) snd_hwdep(E) gpu_sched(E) drm_panel_backlight_quirks(E) cec(E) snd_pcm(E) drm_buddy(E) snd_seq_dummy(E) drm_ttm_helper(E) btusb(E) kvm(E) snd_seq_oss(E) btrtl(E) ttm(E) btintel(E) snd_seq_midi(E) btbcm(E) drm_exec(E) snd_seq_midi_event(E) i2c_algo_bit(E) snd_rawmidi(E) bluetooth(E) drm_suballoc_helper(E) irqbypass(E) snd_seq(E) ghash_clmulni_intel(E) sha512_ssse3(E) drm_display_helper(E) aesni_intel(E) snd_seq_device(E) rfkill(E) snd_timer(E) gf128mul(E) drm_client_lib(E) drm_kms_helper(E) snd(E) i2c_piix4(E) joydev(E) soundcore(E) wmi_bmof(E) ccp(E) k10temp(E) i2c_smbus(E) gpio_amdpt(E) i2c_designware_platform(E) gpio_generic(E) sg(E) [ 876.949914] i2c_designware_core(E) sch_fq_codel(E) parport_pc(E) drm(E) ppdev(E) lp(E) parport(E) fuse(E) nfnetlink(E) ip_tables(E) ext4 crc16 mbcache jbd2 sd_mod sfp mdio_i2c i2c_core txgbe ahci ngbe pcs_xpcs libahci libwx r8169 phylink libata realtek ptp pps_core video wmi [ 876.949933] CPU: 14 UID: 0 PID: 0 Comm: swapper/14 Kdump: loaded Tainted: G W E 6.16.0-rc2+ #20 PREEMPT(voluntary) [ 876.949935] Tainted: [W]=WARN, [E]=UNSIGNED_MODULE [ 876.949936] Hardware name: Micro-Star International Co., Ltd. MS-7E16/X670E GAMING PLUS WIFI (MS-7E16), BIOS 1.90 12/31/2024 [ 876.949936] RIP: 0010:__list_del_entry_valid_or_report+0x67/0x120 [ 876.949938] Code: 00 00 00 48 39 7d 08 0f 85 a6 00 00 00 5b b8 01 00 00 00 5d 41 5c e9 73 0d 93 ff 48 89 fe 48 c7 c7 a0 31 e8 89 e8 59 7c b3 ff <0f> 0b 31 c0 5b 5d 41 5c e9 57 0d 93 ff 48 89 fe 48 c7 c7 c8 31 e8 [ 876.949940] RSP: 0018:ffffaa73405d0c60 EFLAGS: 00010282 [ 876.949941] RAX: 0000000000000000 RBX: ffffead40445a348 RCX: 0000000000000000 [ 876.949942] RDX: 0000000000000105 RSI: 00000 ---truncated---
[]
null
null
null
null
null
CVE-2014-2219
Cross-site scripting (XSS) vulnerability in whizzywig/wb.php in CMSimple Classic 3.54 and earlier, possibly as downloaded before February 26, 2014, allows remote attackers to inject arbitrary web script or HTML via the d parameter.
[ "cpe:2.3:a:cmsimple:cmsimple_classic:*:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
GHSA-6xc3-4939-rjv8
A command injection vulnerability in the web server functionality of Moxa EDR-810 V4.2 build 18041013 allows remote attackers to execute arbitrary OS commands with root privilege via the caname parameter to the /xml/net_WebCADELETEGetValue URI.
[]
null
null
8.8
null
null
CVE-2006-4821
Cross-site scripting (XSS) vulnerability in the Drupal 4.7 Userreview module before 1.19 2006/09/12 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
[ "cpe:2.3:a:drupal:drupal_userreview_module:4.7:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
CVE-2024-33405
SQL injection vulnerability in add_friends.php in campcodes Complete Web-Based School Management System 1.0 allows attacker to execute arbitrary SQL commands via the friend_index parameter.
[ "cpe:2.3:a:campcodes:complete_web-based_school_management_system:-:*:*:*:*:*:*:*" ]
null
8.6
null
null
null
GHSA-9x96-x4jj-wpm6
jc21 Nginx Proxy Manager before 2.0.13 allows %2e%2e%2f directory traversal.
[]
null
null
5.5
null
null
RHSA-2019:2892
Red Hat Security Advisory: qemu-kvm security update
QEMU: ne2000: integer overflow leads to buffer overflow issue QEMU: slirp: heap buffer overflow while reassembling fragmented datagrams QEMU: pcnet: integer overflow leads to buffer overflow QEMU: slirp: heap buffer overflow in tcp_emu() QEMU: qxl: null pointer dereference while releasing spice resources
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
3.8
null
null
CVE-2019-6258
D-Link DIR-822 Rev.Bx devices with firmware v.202KRb06 and older allow a buffer overflow via long MacAddress data in a /HNAP1/SetClientInfo HNAP protocol message, which is mishandled in /usr/sbin/udhcpd during reading of the /var/servd/LAN-1-udhcpd.conf file.
[ "cpe:2.3:o:d-link:dir-822_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:dir-822:-:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
null
GHSA-5q57-j272-7x8p
There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash.
[]
null
null
null
null
null
GHSA-66rq-9hrq-6rw4
ZyXEL Prestige routers, including P-660, P-661, and P-662 models with firmware 3.40(PE9) and 3.40(AGD.2) through 3.40(AHQ.3), do not use a salt when calculating an MD5 password hash, which makes it easier for attackers to crack passwords.
[]
null
7.5
null
null
null
CVE-2010-1597
Stack-based buffer overflow in zgtips.dll in ZipGenius 6.3.1.2552 allows user-assisted remote attackers to execute arbitrary code via a ZIP file containing an entry with a long filename.
[ "cpe:2.3:a:zipgenius:zipgenius:6.3.1.2552:*:*:*:*:*:*:*" ]
null
null
null
9.3
null
GHSA-f39r-cpmj-whcg
Command Injection in ffmpegdotjs
This affects all versions of package ffmpegdotjs. If attacker-controlled user input is given to the trimvideo function, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization.
[]
null
9.8
null
null
null
CVE-2017-1303
IBM WebSphere Portal and Web Content Manager 7.0, 8.0, 8.5, and 9.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 125457.
[ "cpe:2.3:a:ibm:websphere_portal:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:8.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:9.0:*:*:*:*:*:*:*" ]
null
null
6.1
4.3
null
GHSA-5ghp-9mw7-g5cq
Unspecified vulnerability in the message-protocol implementation in the Mount service in IBM Tivoli Storage Manager (TSM) FastBack 5.x.x before 5.5.7, and 6.1.0.0, allows remote attackers to cause a denial of service (recovery failure), and possibly trigger loss of data, via unknown vectors.
[]
null
null
null
null
null
GHSA-5wfq-mm77-25rh
In netdiag, there is a possible symbolic link following due to an improper link resolution. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06308877; Issue ID: ALPS06308877.
[]
null
6.7
null
null
null
CVE-2020-26144
An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept plaintext A-MSDU frames as long as the first 8 bytes correspond to a valid RFC1042 (i.e., LLC/SNAP) header for EAPOL. An adversary can abuse this to inject arbitrary network packets independent of the network configuration.
[ "cpe:2.3:o:samsung:galaxy_i9305_firmware:4.4.4:*:*:*:*:*:*:*", "cpe:2.3:h:samsung:galaxy_i9305:-:*:*:*:*:*:*:*", "cpe:2.3:o:arista:c-250_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:arista:c-250:-:*:*:*:*:*:*:*", "cpe:2.3:o:arista:c-260_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:arista:c-260:-:*:*:*:*:*:*:*", "cpe:2.3:o:arista:c-230_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:arista:c-230:-:*:*:*:*:*:*:*", "cpe:2.3:o:arista:c-235_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:arista:c-235:-:*:*:*:*:*:*:*", "cpe:2.3:o:arista:c-200_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:arista:c-200:-:*:*:*:*:*:*:*", "cpe:2.3:o:arista:c-120_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:arista:c-120:-:*:*:*:*:*:*:*", "cpe:2.3:o:arista:c-130_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:arista:c-130:-:*:*:*:*:*:*:*", "cpe:2.3:o:arista:c-100_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:arista:c-100:-:*:*:*:*:*:*:*", "cpe:2.3:o:arista:c-110_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:arista:c-110:-:*:*:*:*:*:*:*", "cpe:2.3:o:arista:o-105_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:arista:o-105:-:*:*:*:*:*:*:*", "cpe:2.3:o:arista:w-118_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:arista:w-118:-:*:*:*:*:*:*:*", "cpe:2.3:o:arista:c-75_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:c-75:-:*:*:*:*:*:*:*", "cpe:2.3:o:arista:o-90_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:o-90:-:*:*:*:*:*:*:*", "cpe:2.3:o:arista:c-65_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:c-65:-:*:*:*:*:*:*:*", "cpe:2.3:o:arista:w-68_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:w-68:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_w700_ieee_802.11ax_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_w700_ieee_802.11ax:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_w700_ieee_802.11n_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_w700_ieee_802.11n:-:*:*:*:*:*:*:*" ]
null
6.5
null
3.3
null
GHSA-pq68-xwgm-w862
A Reflected Cross Site Scripting (XSS) vulnerability was found in /odms/admin/user-search.php in PHPGurukul Online DJ Booking Management System v1.0, which allows remote attackers to execute arbitrary code via the searchdata parameter.
[]
null
6.1
null
null
null
CVE-2003-1214
Unknown vulnerability in the server login for VisualShapers ezContents 2.02 and earlier allows remote attackers to bypass access restrictions and gain access to restricted functions.
[ "cpe:2.3:a:visualshapers:ezcontents:1.40:*:*:*:*:*:*:*", "cpe:2.3:a:visualshapers:ezcontents:1.41:*:*:*:*:*:*:*", "cpe:2.3:a:visualshapers:ezcontents:1.42:*:*:*:*:*:*:*", "cpe:2.3:a:visualshapers:ezcontents:1.43:*:*:*:*:*:*:*", "cpe:2.3:a:visualshapers:ezcontents:1.44:*:*:*:*:*:*:*", "cpe:2.3:a:visualshapers:ezcontents:1.45:*:*:*:*:*:*:*", "cpe:2.3:a:visualshapers:ezcontents:1.45b:*:*:*:*:*:*:*", "cpe:2.3:a:visualshapers:ezcontents:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:visualshapers:ezcontents:2.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:visualshapers:ezcontents:2.0_rc1:*:*:*:*:*:*:*", "cpe:2.3:a:visualshapers:ezcontents:2.0_rc2:*:*:*:*:*:*:*", "cpe:2.3:a:visualshapers:ezcontents:2.0_rc3:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2005-3663
Unquoted Windows search path vulnerability in Kaspersky Anti-Virus 5.0 might allow local users to gain privileges via a malicious "program.exe" file in the C: folder.
[ "cpe:2.3:a:kaspersky_lab:kaspersky_anti-virus:5.0:*:windows_file_servers:*:*:*:*:*" ]
null
null
null
7.2
null
CVE-2021-29076
Certain NETGEAR devices are affected by command injection by an unauthenticated attacker. This affects RBK852 before 3.2.17.12, RBK853 before 3.2.17.12, RBK854 before 3.2.17.12, RBR850 before 3.2.17.12, and RBS850 before 3.2.17.12.
[ "cpe:2.3:o:netgear:rbk852_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:rbk852:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:rbk853_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:rbk853:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:rbk854_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:rbk854:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:rbr850_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:rbr850:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:rbs850_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:rbs850:-:*:*:*:*:*:*:*" ]
null
9.6
null
null
null
CVE-2019-9557
Ability Mail Server 4.2.6 has Persistent Cross Site Scripting (XSS) via the body e-mail body. To exploit the vulnerability, the victim must open an email with malicious Javascript inserted into the body of the email as an iframe.
[ "cpe:2.3:a:codecrafters:ability_mail_server:4.2.6:*:*:*:*:*:*:*" ]
null
null
6.1
4.3
null
GHSA-2363-cqg2-863c
XML External Entity (XXE) Injection in JDOM
An XXE issue in SAXBuilder in JDOM through 2.0.6 allows attackers to cause a denial of service via a crafted HTTP request. As a workaround, to avoid external entities being expanded, one can call `builder.setExpandEntities(false)` and they won't be expanded.
[]
null
7.5
null
null
null
GHSA-2m57-hf25-phgg
sqlparse parsing heavily nested list leads to Denial of Service
SummaryPassing a heavily nested list to sqlparse.parse() leads to a Denial of Service due to RecursionError.Details + PoCRunning the following code will raise Maximum recursion limit exceeded exception:We expect a traceback of RecursionError:Fix suggestionThe [flatten()](https://github.com/andialbrecht/sqlparse/blob/master/sqlparse/sql.py#L207) function of TokenList class should limit the recursion to a maximal depth:ImpactDenial of Service (the impact depends on the use). Anyone parsing a user input with sqlparse.parse() is affected.
[]
null
7.5
null
null
null
CVE-2014-4298
Unspecified vulnerability in the SQLJ component in Oracle Database Server 11.1.0.7, 11.2.0.3, 11.2.0.4, 12.1.0.1, and 12.1.0.2 allows remote authenticated users to affect confidentiality via unknown vectors, a different vulnerability than CVE-2014-4299, CVE-2014-4300, CVE-2014-6452, CVE-2014-6454, and CVE-2014-6542.
[ "cpe:2.3:a:oracle:database_server:11.1.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:database_server:11.2.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:database_server:11.2.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:database_server:12.1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:database_server:12.1.0.2:*:*:*:*:*:*:*" ]
null
null
null
4
null
CVE-2016-10560
galenframework-cli is the node wrapper for the Galen Framework. galenframework-cli below 2.3.1 download binary resources over HTTP, which leaves it vulnerable to MITM attacks. It may be possible to cause remote code execution (RCE) by swapping out the requested binary with an attacker controlled binary if the attacker is on the network or positioned in between the user and the remote server.
[ "cpe:2.3:a:galenframework:galenframework-cli:*:*:*:*:*:node.js:*:*" ]
null
8.1
null
9.3
null
RHSA-2022:6717
Red Hat Security Advisory: thunderbird security update
Mozilla: Remote content specified in an HTML document that was nested inside an iframe's srcdoc attribute was not blocked Mozilla: Leaking of sensitive information when composing a response to an HTML email with a META refresh tag Mozilla: An iframe element in an HTML email could trigger a network request Mozilla: Out of bounds read when decoding H264 Mozilla: Matrix SDK bundled with Thunderbird vulnerable to denial-of-service attack Mozilla: Content-Security-Policy base-uri bypass Mozilla: Incoherent instruction cache when building WASM on ARM64 Mozilla: Bypassing Secure Context restriction for cookies with __Host and __Secure prefix Mozilla: Bypassing FeaturePolicy restrictions on transient pages Mozilla: Data-race when parsing non-UTF-8 URLs in threads Mozilla: Memory safety bugs fixed in Firefox 105 and Firefox ESR 102.3
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
8.8
7.5
null
null
GHSA-x8qg-82x8-gf44
** DISPUTED ** PHP remote file inclusion vulnerability in common.php in Yuuki Yoshizawa Exporia 0.3.0 allows remote attackers to execute arbitrary PHP code via a URL in the lan parameter. NOTE: SecurityFocus disputes this issue, saying "further analysis reveals that the application is not vulnerable." NOTE: this issue may overlap CVE-2006-5113.
[]
null
null
null
null
null
GHSA-4c3f-2c97-5p6f
SQL injection vulnerability found in PrestaShop lekerawen_ocs before v.1.4.1 allow a remote attacker to gain privileges via the KerawenHelper::setCartOperationInfo, and KerawenHelper::resetCheckoutSessionData components.
[]
null
9.8
null
null
null
GHSA-827h-95hf-vfq5
F-Secure Anti-Virus, Safe Anywhere, and PSB Workstation Security before 11500 for Mac OS X allows local users to disable the Mac OS X firewall via unspecified vectors.
[]
null
null
null
null
null
GHSA-p6qq-g625-pr6v
An elevation of privilege vulnerability in the NVIDIA I2C HID driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel 3.10 and Kernel 3.18. Android ID: A-33040280. References: N-CVE-2017-0325.
[]
null
null
7
null
null
CVE-2014-8089
SQL injection vulnerability in Zend Framework before 1.12.9, 2.2.x before 2.2.8, and 2.3.x before 2.3.3, when using the sqlsrv PHP extension, allows remote attackers to execute arbitrary SQL commands via a null byte.
[ "cpe:2.3:a:zend:zend_framework:*:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
null
CVE-2021-36979
Unicorn Engine 1.0.2 has an out-of-bounds write in tb_flush_armeb (called from cpu_arm_exec_armeb and tcg_cpu_exec_armeb).
[ "cpe:2.3:a:unicorn-engine:unicorn_engine:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*" ]
null
5.5
null
4.3
null
CVE-2021-26529
The mg_tls_init function in Cesanta Mongoose HTTPS server 7.0 and 6.7-6.18 (compiled with mbedTLS support) is vulnerable to remote OOB write attack via connection request after exhausting memory pool.
[ "cpe:2.3:a:cesanta:mongoose:*:*:*:*:*:*:*:*", "cpe:2.3:a:cesanta:mongoose:7.0:*:*:*:*:*:*:*" ]
null
9.1
null
6.4
null
CVE-2014-5815
The Solitaire Arena (aka com.mavenhut.solitaire) application 1.0.15 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[ "cpe:2.3:a:mavenhut:solitaire_arena:1.0.15:*:*:*:*:android:*:*" ]
null
null
null
5.4
null
CVE-2022-33077
An access control issue in nopcommerce v4.50.2 allows attackers to arbitrarily modify any customer's address via the addressedit endpoint.
[ "cpe:2.3:a:nopcommerce:nopcommerce:*:*:*:*:*:*:*:*" ]
null
7.5
null
null
null
CVE-2014-1903
admin/libraries/view.functions.php in FreePBX 2.9 before 2.9.0.14, 2.10 before 2.10.1.15, 2.11 before 2.11.0.23, and 12 before 12.0.1alpha22 does not restrict the set of functions accessible to the API handler, which allows remote attackers to execute arbitrary PHP code via the function and args parameters to admin/config.php.
[ "cpe:2.3:a:freepbx:freepbx:2.10:*:*:*:*:*:*:*", "cpe:2.3:a:freepbx:freepbx:2.11:*:*:*:*:*:*:*", "cpe:2.3:a:freepbx:freepbx:2.12:*:*:*:*:*:*:*", "cpe:2.3:a:sangoma:freepbx:2.9:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
GHSA-7qgm-4p8r-73hq
PlayTube 1.8 allows disclosure of user details via ajax.php?type=../admin-panel/autoload&page=manage-users directory traversal, aka local file inclusion.
[]
null
null
null
null
null
CVE-2024-21575
ComfyUI-Impact-Pack is vulnerable to Path Traversal. The issue stems from missing validation of the `image.filename` field in a POST request sent to the `/upload/temp` endpoint added by the extension to the server. This results in writing arbitrary files to the file system which may, under some conditions, result in remote code execution (RCE).
[]
9.2
8.6
null
null
null
GHSA-39p9-vqpx-2vp6
Time-of-check Time-of-use Race Condition in some Intel(R) processors with Intel(R) ACTM may allow a privileged user to potentially enable escalation of privilege via local access.
[]
8.5
7.2
null
null
null
GHSA-4mwx-89hh-m9vr
IBM Security Verify Governance 10.0 stores user credentials in plain clear text which can be read by a local user. IBM X-Force ID: 225232.
[]
null
5.5
null
null
null
CVE-2019-15996
Cisco DNA Spaces: Connector Privilege Escalation Vulnerability
A vulnerability in Cisco DNA Spaces: Connector could allow an authenticated, local attacker to elevate privileges and execute arbitrary commands on the underlying operating system as root. The vulnerability is due to insufficient restrictions during the execution of an affected CLI command. An attacker could exploit this vulnerability by leveraging the insufficient restrictions to modify sensitive files. A successful exploit could allow the attacker to elevate privileges and execute arbitrary commands on the underlying operating system as root.
[ "cpe:2.3:a:cisco:dna_spaces\\:_connector:*:*:*:*:*:*:*:*" ]
null
null
6.7
null
null
RHSA-2024:4375
Red Hat Security Advisory: postgresql-jdbc security update
pgjdbc: PostgreSQL JDBC Driver allows attacker to inject SQL if using PreferQueryMode=SIMPLE
[ "cpe:/a:redhat:rhel_aus:8.4::appstream", "cpe:/a:redhat:rhel_e4s:8.4::appstream", "cpe:/a:redhat:rhel_tus:8.4::appstream" ]
null
9.8
null
null
null
GHSA-q3x2-wj66-pg83
Multiple SQL injection vulnerabilities in AFFcommerce 1.1.4 allow remote attackers to execute arbitrary SQL commands via (1) the cl parameter to SubCategory.php and the item_id parameter in (2) ItemInfo.php and (3) ItemReview.php.
[]
null
null
null
null
null
GHSA-8756-x628-mfxg
Memory leak in the crypto functionality in Cisco Adaptive Security Appliance (ASA) 5500 devices 7.2 before 7.2(4)2, 8.0 before 8.0(3)14, and 8.1 before 8.1(1)4, when configured as a clientless SSL VPN endpoint, allows remote attackers to cause a denial of service (memory consumption and VPN hang) via a crafted SSL or HTTP packet, aka Bug ID CSCso66472.
[]
null
null
null
null
null
GHSA-33q3-54qh-6h84
Adobe Bridge version 12.0.1 (and earlier versions) is affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[]
null
5.5
null
null
null
RHSA-2025:9726
Red Hat Security Advisory: OpenShift Container Platform 4.18.19 packages and security update
podman: podman missing TLS verification
[ "cpe:/a:redhat:openshift:4.18::el8", "cpe:/a:redhat:openshift:4.18::el9" ]
null
8.3
null
null
null
CVE-2020-8614
An issue was discovered on Askey AP4000W TDC_V1.01.003 devices. An attacker can perform Remote Code Execution (RCE) by sending a specially crafted network packer to the bd_svr service listening on TCP port 54188.
[ "cpe:2.3:o:askey:ap4000w_firmware:tdc_v1.01.003:*:*:*:*:*:*:*", "cpe:2.3:h:askey:ap4000w:-:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
null
CVE-2021-1041
In (TBD) of (TBD), there is a possible out of bounds read due to memory corruption. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-182950799References: N/A
[ "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*" ]
null
5.5
null
2.1
null
GHSA-fxf7-m32w-qh93
Nextcloud Server before 9.0.55 and 10.0.2 suffers from a bypass in the quota limitation. Due to not properly sanitizing values provided by the `OC-Total-Length` HTTP header an authenticated adversary may be able to exceed their configured user quota. Thus using more space than allowed by the administrator.
[]
null
null
4.3
null
null
CVE-2011-4871
Open Automation Software OPC Systems.NET before 5.0 allows remote attackers to cause a denial of service via a malformed .NET RPC packet on TCP port 58723.
[ "cpe:2.3:a:opcsystems:opcsystems.net:*:*:*:*:*:*:*:*" ]
null
null
null
5
null
GHSA-3xr9-56qc-vgpf
Buffer overflow in Tetrix TetriNet daemon 1.13.16 allows remote attackers to cause a denial of service and possibly execute arbitrary commands by connecting to port 31457 from a host with a long DNS hostname.
[]
null
null
null
null
null
CVE-2018-17462
Incorrect refcounting in AppCache in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to perform a sandbox escape via a crafted HTML page.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:linux_desktop:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:linux_workstation:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" ]
null
null
9.6
6.8
null
GHSA-w6g4-j7xw-wrv7
IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 11.5 federated server is vulnerable to a denial of service when a specially crafted cursor is used. IBM X-Force ID: 269367.
[]
null
5.9
null
null
null
GHSA-hj43-82fq-hmhx
Cross-site scripting (XSS) vulnerability in HP System Management Homepage (SMH) before 7.2.1 allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors.
[]
null
null
null
null
null
CVE-2009-2518
Integer overflow in GDI+ in Microsoft Office XP SP3 allows remote attackers to execute arbitrary code via an Office document with a bitmap (aka BMP) image that triggers memory corruption, aka "Office BMP Integer Overflow Vulnerability."
[ "cpe:2.3:a:microsoft:office:xp:sp3:*:*:*:*:*:*" ]
null
null
null
9.3
null
CVE-2013-2458
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality and integrity via unknown vectors related to Libraries. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via "an error related to method handles."
[ "cpe:2.3:a:oracle:jre:*:update21:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update1:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update10:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update11:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update13:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update15:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update17:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update2:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update3:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update4:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update5:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update6:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update7:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update9:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:*:update21:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update1:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update10:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update11:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update13:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update15:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update17:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update2:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update3:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update4:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update5:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update6:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update7:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update9:*:*:*:*:*:*" ]
null
null
null
5.8
null
GHSA-wrqx-442q-74r6
The server in Babo Violent 2 2.08.00 and earlier does not properly implement password protection, which might allow remote attackers to bypass authentication by reconnecting after a connection closes.
[]
null
null
null
null
null
GHSA-9p4m-gvr2-2mpp
Patient Information Center iX (PICiX) Versions B.02, C.02, C.03, PerformanceBridge Focal Point Version A.01, IntelliVue patient monitors MX100, MX400-MX850, and MP2-MP90 Versions N and prior, IntelliVue X3 and X2 Versions N and prior. The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is then used as a webpage and served to other users. Successful exploitation could lead to unauthorized access to patient data via a read-only web application.
[]
null
3.5
null
null
null
GHSA-6mpr-24px-gq7m
A heap overflow flaw was found in the Linux kernel, all versions 3.x.x and 4.x.x before 4.18.0, in Marvell WiFi chip driver. The vulnerability allows a remote attacker to cause a system crash, resulting in a denial of service, or execute arbitrary code. The highest threat with this vulnerability is with the availability of the system. If code execution occurs, the code will run with the permissions of root. This will affect both confidentiality and integrity of files on the system.
[]
null
9.8
null
null
null
CVE-2025-49221
Unauthenticated Access to Channel Subscription in Mattermost Confluence Plugin
Mattermost Confluence Plugin version <1.5.0 fails to enforce authentication of the user to the Mattermost instance which allows unauthenticated attackers to access subscription details without via API call to GET subscription endpoint.
[]
null
3.7
null
null
null
GHSA-w4x5-wwqg-53mx
Cross-Site Request Forgery (CSRF) vulnerability in Justin Klein WP Social AutoConnect plugin <= 4.6.1 versions.
[]
null
5.4
null
null
null
CVE-2014-7692
The Lent Experience (aka com.wLentExperience) application 0.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[ "cpe:2.3:a:rowlandsolutions:lent_experience:0.1:*:*:*:*:android:*:*" ]
null
null
null
5.4
null
GHSA-xq5w-599v-6rhj
The Client/Server Run-time Subsystem (CSRSS) in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to obtain sensitive information via a crafted application that continues to execute during a subsequent user's login session, aka "Windows CSRSS Elevation of Privilege Vulnerability."
[]
null
null
null
null
null
GHSA-wpq3-wrwx-wvhp
The TCP/IP fragment reassembly handling in the Linux kernel 2.4 allows remote attackers to cause a denial of service (CPU consumption) via certain packets that cause a large number of hash table collisions.
[]
null
null
null
null
null
CVE-2003-0110
The Winsock Proxy service in Microsoft Proxy Server 2.0 and the Microsoft Firewall service in Internet Security and Acceleration (ISA) Server 2000 allow remote attackers to cause a denial of service (CPU consumption or packet storm) via a spoofed, malformed packet to UDP port 1745.
[ "cpe:2.3:a:microsoft:isa_server:2000:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:isa_server:2000:fp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:isa_server:2000:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:proxy_server:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:proxy_server:2.0:sp1:*:*:*:*:*:*" ]
null
null
null
5
null
GHSA-274w-2mj6-9594
Unspecified vulnerability in HP ArcSight Connector Appliance 6.3 and earlier and ArcSight Logger 5.2 and earlier allows remote authenticated users to obtain sensitive information, modify data, or cause a denial of service via unknown vectors.
[]
null
null
null
null
null
GHSA-gj57-j72r-r89g
NVIDIA CUDA Toolkit SDK contains an integer overflow vulnerability in cuobjdump.To exploit this vulnerability, a remote attacker would require a local user to download a specially crafted, corrupted file and locally execute cuobjdump against the file. Such an attack may lead to remote code execution that causes complete denial of service and an impact on data confidentiality and integrity.
[]
null
7.8
null
null
null
GHSA-f38f-jvqj-mfg6
NodeJS version of HAX CMS Has Insecure Default Configuration That Leads to Unauthenticated Access
SummaryThe NodeJS version of HAX CMS uses an insecure default configuration designed for local development. The default configuration does not perform authorization or authentication checks.DetailsIf a user were to deploy haxcms-nodejs without modifying the default settings, ‘HAXCMS_DISABLE_JWT_CHECKS‘ would be set to ‘true‘ and their deployment would lack session authentication.![insecure-default-configuration-code](https://github.com/user-attachments/assets/af58b08a-8a26-4ef5-8deb-e6e9d4efefaa)Affected Resources[package.json:13](https://github.com/haxtheweb/haxcms-nodejs/blob/a4d2f18341ff63ad2d97c35f9fc21af8b965248b/package.json#L13)PoCTo reproduce this vulnerability, [install](https://github.com/haxtheweb/haxcms-nodejs) HAX CMS NodeJS. The application will load without JWT checks enabled.ImpactWithout security checks in place, an unauthenticated remote attacker could access, modify, and delete all site information.
[]
9.3
null
null
null
null
CVE-2024-13223
Tabulate <= 2.10.3 - Reflected XSS
The Tabulate WordPress plugin through 2.10.3 does not sanitise and escape some parameters before outputting them back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.
[]
null
6.1
null
null
null
GHSA-22xv-2q85-75xq
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier allows remote attackers to affect confidentiality, related to JMX.
[]
null
null
null
null
null
CVE-2013-0502
Cross-site scripting (XSS) vulnerability in IBM InfoSphere Information Server 8.1, 8.5 through FP3, 8.7 through FP2, and 9.1 allows remote attackers to inject arbitrary web script or HTML via a malformed URL.
[ "cpe:2.3:a:ibm:infosphere_information_server:8.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:infosphere_information_server:8.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:infosphere_information_server:8.5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:infosphere_information_server:8.5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:infosphere_information_server:8.5.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:infosphere_information_server:8.7:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:infosphere_information_server:8.7.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:infosphere_information_server:8.7.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:infosphere_information_server:9.1:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
CVE-2021-22855
Soar Cloud System Co., Ltd. HR Portal - Arbitrary Code Execution
The specific function of HR Portal of Soar Cloud System accepts any type of object to be deserialized. Attackers can send malicious serialized objects to execute arbitrary commands.
[ "cpe:2.3:a:hr_portal_project:hr_portal:7.3.2020.1013:*:*:*:*:*:*:*" ]
null
9.8
null
null
null
CVE-2007-3873
Stack-based buffer overflow in vstlib32.dll 1.2.0.1012 in the SSAPI Engine 5.0.0.1066 through 5.2.0.1012 in Trend Micro AntiSpyware 3.5 and PC-Cillin Internet Security 2007 15.0 through 15.3, when the Venus Spy Trap (VST) feature is enabled, allows local users to cause a denial of service (service crash) or execute arbitrary code via a file with a long pathname, which triggers the overflow during a ReadDirectoryChangesW callback notification.
[ "cpe:2.3:a:trend_micro:antispyware:3.5:*:*:*:*:*:*:*", "cpe:2.3:a:trend_micro:pc-cillin_internet_security_2007:15.0:*:*:*:*:*:*:*", "cpe:2.3:a:trend_micro:pc-cillin_internet_security_2007:15.2:*:*:*:*:*:*:*", "cpe:2.3:a:trend_micro:pc-cillin_internet_security_2007:15.2_patch:*:*:*:*:*:*:*", "cpe:2.3:a:trend_micro:pc-cillin_internet_security_2007:15.3:*:*:*:*:*:*:*" ]
null
null
null
6.9
null
GHSA-36xh-276f-w5j9
The Accordion Image Menu WordPress plugin through 3.1.3 does not have CSRF check in some places, and is missing sanitisation as well as escaping, which could allow attackers to make logged in admin add Stored XSS payloads via a CSRF attack.
[]
null
5.4
null
null
null
GHSA-3ph4-552r-r3pc
In android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, array access out of bounds may occur in the camera driver in the kernel
[]
null
null
7.8
null
null
GHSA-x7rf-8px6-3v7g
qpkg in Gentoolkit 0.2.0_pre10 and earlier allows local users to overwrite arbitrary files via a symlink attack on a temporary directory.
[]
null
null
null
null
null
GHSA-42fq-x79v-5vv5
In the Linux kernel, the following vulnerability has been resolved:udmabuf: fix a buf size overflow issue during udmabuf creationby casting size_limit_mb to u64 when calculate pglimit.
[]
null
7.8
null
null
null
GHSA-4hp3-f9mj-xjxq
NTLM Security Feature Bypass Vulnerability
[]
null
8.8
null
null
null
CVE-2023-29005
No Rate Limiting on Login AUTH DB
Flask-AppBuilder versions before 4.3.0 lack rate limiting which can allow an attacker to brute-force user credentials. Version 4.3.0 includes the ability to enable rate limiting using `AUTH_RATE_LIMITED = True`, `RATELIMIT_ENABLED = True`, and setting an `AUTH_RATE_LIMIT`.
[ "cpe:2.3:a:flask-appbuilder_project:flask-appbuilder:*:*:*:*:*:*:*:*" ]
null
7.5
null
null
null