id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
189k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
patch_commit_url
stringlengths
36
232
GHSA-2j5g-w3c2-pj99
Unauthenticated SQL Injection in Huge-IT Video Gallery v1.0.9 for Joomla
[]
null
null
9.8
null
null
CVE-2020-18716
SQL Injection in Rockoa v1.8.7 allows remote attackers to gain privileges due to loose filtering of parameters in wordAction.php.
[ "cpe:2.3:a:rockoa:rockoa:1.8.7:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
null
GHSA-g6f4-4jhr-qjg5
Mozilla before 1.7.6, and Firefox before 1.0.1, allows remote attackers to spoof arbitrary web sites by injecting content from one window into a target window whose name is known but resides in a different domain, as demonstrated using a pop-up window on a trusted web site, aka the "window injection" vulnerability.
[]
null
null
null
null
null
GHSA-rcqf-p42r-px29
Vulnerability in the Oracle WebCenter Content product of Oracle Fusion Middleware (component: Search). Supported versions that are affected are 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebCenter Content. While the vulnerability is in Oracle WebCenter Content, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle WebCenter Content accessible data as well as unauthorized read access to a subset of Oracle WebCenter Content accessible data. CVSS 3.1 Base Score 7.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N).
[]
null
7.2
null
null
null
GHSA-vhf9-5f69-9hjm
A flaw was found in the QEMU built-in VNC server. When a client connects to the VNC server, QEMU checks whether the current number of connections crosses a certain threshold and if so, cleans up the previous connection. If the previous connection happens to be in the handshake phase and fails, QEMU cleans up the connection again, resulting in a NULL pointer dereference issue. This could allow a remote unauthenticated client to cause a denial of service.
[]
null
7.5
null
null
null
CVE-2025-53274
WordPress WP Permalink Translator plugin <= 1.7.6 - Cross Site Request Forgery (CSRF) Vulnerability
Cross-Site Request Forgery (CSRF) vulnerability in Hossin Asaadi WP Permalink Translator allows Stored XSS. This issue affects WP Permalink Translator: from n/a through 1.7.6.
[]
null
7.1
null
null
null
GHSA-w774-j42f-mmcj
A memory leak in the fsl_lpspi_probe() function in drivers/spi/spi-fsl-lpspi.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering pm_runtime_get_sync() failures, aka CID-057b8945f78f.
[]
null
7.5
null
null
null
CVE-2018-8253
An elevation of privilege vulnerability exists when Microsoft Cortana allows arbitrary website browsing on the lockscreen, aka "Microsoft Cortana Elevation of Privilege Vulnerability." This affects Windows Server 2016, Windows 10.
[ "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*" ]
null
null
4.6
2.1
null
GHSA-mc3q-fp5f-mp68
Use-after-free vulnerability in the SVG implementation in Google Chrome before 27.0.1453.110 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.
[]
null
null
null
null
null
RHSA-2016:0043
Red Hat Security Advisory: openssh security update
OpenSSH: Client Information leak due to use of roaming connection feature OpenSSH: Client buffer-overflow when using roaming connections
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
null
GHSA-p6fg-p4c2-4gjj
A vulnerability classified as problematic was found in FFmpeg 2.0. Affected by this vulnerability is the function intra_pred of the file libavcodec/hevcpred_template.c. The manipulation leads to memory corruption. The attack can be launched remotely. It is recommended to apply a patch to fix this issue.
[]
null
5.5
null
null
null
CVE-2024-7841
SourceCodester Clinics Patient Management System check_user_name.php sql injection
A vulnerability classified as critical was found in SourceCodester Clinics Patient Management System 1.0. This vulnerability affects unknown code of the file /pms/ajax/check_user_name.php. The manipulation of the argument user_name leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
[ "cpe:2.3:a:sourcecodester:clinics_patient_management_system:*:*:*:*:*:*:*:*", "cpe:2.3:a:oretnom23:clinics_patient_management_system:1.0:*:*:*:*:*:*:*" ]
5.3
6.3
6.3
6.5
null
CVE-2023-4225
Chamilo LMS File Upload Functionality Remote Code Execution
Unrestricted file upload in `/main/inc/ajax/exercise.ajax.php` in Chamilo LMS <= v1.11.24 allows authenticated attackers with learner role to obtain remote code execution via uploading of PHP files.
[ "cpe:2.3:a:chamilo:chamilo:1.11.2:*:*:*:*:*:*:*", "cpe:2.3:a:chamilo:chamilo_lms:*:*:*:*:*:*:*:*" ]
null
8.8
null
null
https://github.com/chamilo/chamilo-lms/commit/6f32625a012d5de2dfe8edbccb4ed14a85e310d4
GHSA-57r6-94mj-2fjf
A vulnerability was found in INSTAR 2K+ and 4K 3.11.1 Build 1124. This issue affects some unknown processing of the component UART Interface. The manipulation leads to improper physical access control. It is possible to launch the attack on the physical device. The exploit has been disclosed to the public and may be used.
[]
5.2
6.8
null
null
null
PYSEC-2012-7
null
The django.http.HttpRequest.get_host function in Django 1.3.x before 1.3.4 and 1.4.x before 1.4.2 allows remote attackers to generate and display arbitrary URLs via crafted username and password Host header values.
[]
null
null
null
null
null
CVE-2020-6060
A stack buffer overflow vulnerability exists in the way MiniSNMPD version 1.4 handles multiple connections. A specially timed sequence of SNMP connections can trigger a stack overflow, resulting in a denial of service. To trigger this vulnerability, an attacker needs to simply initiate multiple connections to the server.
[ "cpe:2.3:a:minisnmpd_project:minisnmpd:1.4:*:*:*:*:*:*:*" ]
null
null
7.5
null
null
GHSA-5g87-97pw-p9m9
Microsoft Internet Explorer 5.22, and other 5 through 6 SP1 versions, sends Referer headers containing https:// URLs in requests for http:// URLs, which allows remote attackers to obtain potentially sensitive information by reading Referer log data.
[]
null
null
null
null
null
RHSA-2019:4090
Red Hat Security Advisory: OpenShift Container Platform 4.1 libseccomp-golang security update
libseccomp-golang: mishandling of multiple argument rules leading to a bypass of intended access restrictions
[ "cpe:/a:redhat:openshift:4.1::el7" ]
null
null
6.5
null
null
CVE-2022-4467
Search & Filter < 1.2.16 - Contributor+ Stored XSS
The Search & Filter WordPress plugin before 1.2.16 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admin.
[ "cpe:2.3:a:codeamp:search_\\&_filter:*:*:*:*:*:wordpress:*:*" ]
null
5.4
null
null
null
CVE-2014-7612
The e-Kiosk (aka com.ekioskreader.android.pdfviewer) application 1.74 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[ "cpe:2.3:a:e-kiosk:e-kiosk:1.74:*:*:*:*:android:*:*" ]
null
null
null
5.4
null
CVE-2012-6539
The dev_ifconf function in net/socket.c in the Linux kernel before 3.6 does not initialize a certain structure, which allows local users to obtain sensitive information from kernel stack memory via a crafted application.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0:rc4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0:rc5:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0:rc6:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0:rc7:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.8:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.9:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.10:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.11:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.12:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.13:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.14:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.15:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.16:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.17:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.18:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.19:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.20:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.21:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.22:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.23:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.24:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.25:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.26:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.27:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.28:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.29:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.30:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.31:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.32:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.33:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.34:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.35:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.36:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.37:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.38:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.39:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.40:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.41:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.42:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.43:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.44:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.45:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.46:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.47:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.48:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.49:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.50:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.51:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.52:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.53:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.54:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.55:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.56:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.57:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.58:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.59:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.60:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.61:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.62:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.63:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.64:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.65:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.66:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.67:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.68:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.1:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.1:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.1:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.1:rc4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.1.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.1.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.1.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.1.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.1.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.1.8:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.1.9:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.1.10:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2:rc4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2:rc5:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2:rc6:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2:rc7:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.8:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.9:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.10:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.11:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.12:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.13:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.14:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.15:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.16:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.17:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.18:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.19:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.20:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.21:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.22:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.23:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.24:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.25:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.26:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.27:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.28:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.29:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.30:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.3:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.3:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.3:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.3:rc4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.3:rc5:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.3:rc6:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.3:rc7:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.3.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.3.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.3.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.3.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.3.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.3.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.3.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.3.8:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4:rc4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4:rc5:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4:rc6:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4:rc7:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.8:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.9:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.10:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.11:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.12:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.13:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.14:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.15:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.16:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.17:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.18:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.19:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.20:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.21:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.22:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.23:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.24:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.25:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.26:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.27:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.28:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.29:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.30:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.31:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.32:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.5.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.5.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.5.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.5.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.5.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.5.6:*:*:*:*:*:*:*" ]
null
null
null
1.9
null
CVE-2020-2007
PAN-OS: OS command injection in management server
An OS command injection vulnerability in the management server component of PAN-OS allows an authenticated user to potentially execute arbitrary commands with root privileges. This issue affects: All PAN-OS 7.1 versions; PAN-OS 8.1 versions earlier than 8.1.14; PAN-OS 9.0 versions earlier than 9.0.7.
[ "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*" ]
null
7.2
null
null
null
GHSA-mvpq-r829-8jx3
A vulnerability was found in kitsada8621 Digital Library Management System 1.0. It has been classified as problematic. Affected is the function JwtRefreshAuth of the file middleware/jwt_refresh_token_middleware.go. The manipulation of the argument Authorization leads to improper output neutralization for logs. It is possible to launch the attack remotely. The name of the patch is 81b3336b4c9240f0bf50c13cb8375cf860d945f1. It is recommended to apply a patch to fix this issue.
[]
6.9
5.3
null
null
null
GHSA-8hqw-hxvh-xj96
The SchoolXM (aka apprentice.schoolxm) application 1.2 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[]
null
null
null
null
null
CVE-2018-9961
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of the rect Field attribute. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code under the context of the current process. Was ZDI-CAN-5434.
[ "cpe:2.3:a:foxitsoftware:foxit_reader:*:*:*:*:*:*:*:*", "cpe:2.3:a:foxitsoftware:phantompdf:*:*:*:*:*:*:*:*" ]
null
null
8.8
6.8
null
RHSA-2014:1307
Red Hat Security Advisory: nss security update
nss: RSA PKCS#1 signature verification forgery flaw (MFSA 2014-73)
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation", "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
null
CVE-2012-0043
Buffer overflow in the reassemble_message function in epan/dissectors/packet-rlc.c in the RLC dissector in Wireshark 1.4.x before 1.4.11 and 1.6.x before 1.6.5 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a series of fragmented RLC packets.
[ "cpe:2.3:a:wireshark:wireshark:1.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.4.5:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.4.6:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.4.7:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.4.8:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.4.9:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.4.10:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.6.3:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.6.4:*:*:*:*:*:*:*" ]
null
null
null
5.8
null
GHSA-pjpq-3pxj-qvhp
PHP remote file inclusion vulnerability in auth.php in PHPNews 1.2.4 and possibly 1.2.3, allows remote attackers to execute arbitrary PHP code via the path parameter.
[]
null
null
null
null
null
CVE-2025-25221
The LuxCal Web Calendar prior to 5.3.3M (MySQL version) and prior to 5.3.3L (SQLite version) contains an SQL injection vulnerability in pdf.php. If this vulnerability is exploited, information in a database may be deleted, altered, or retrieved.
[]
null
null
7.3
null
null
GHSA-f3rf-2wrm-7mv6
The dynamic-widgets plugin before 1.5.11 for WordPress has XSS via the wp-admin/admin-ajax.php?action=term_tree prefix or widget_id parameter.
[]
null
5.4
null
null
null
CVE-2007-1399
Stack-based buffer overflow in the zip:// URL wrapper in PECL ZIP 1.8.3 and earlier, as bundled with PHP 5.2.0 and 5.2.1, allows remote attackers to execute arbitrary code via a long zip:// URL, as demonstrated by actively triggering URL access from a remote PHP interpreter via avatar upload or blog pingback.
[ "cpe:2.3:a:pecl_zip:1.8.3:*:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.2.1:*:*:*:*:*:*:*" ]
null
null
null
10
null
GHSA-hqxj-h2gh-2rq4
Cross-site scripting (XSS) vulnerability in signupconfirm.php in phpBannerExchange 1.2 Arabic allows remote attackers to inject arbitrary web script or HTML via the bannerurl parameter.
[]
null
null
null
null
null
CVE-2010-2716
Multiple SQL injection vulnerabilities in PsNews 1.3 allow remote attackers to execute arbitrary SQL commands via the id parameter to (1) ndetail.php and (2) print.php.
[ "cpe:2.3:a:rich_kavanagh:psnews:1.3:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
GHSA-63vf-8cxj-r6hq
Microsoft .NET Framework 1.1 SP1, 2.0 SP2, 3.5, 3.5.1, 4, 4.5, and 4.5.1 does not properly determine TCP connection states, which allows remote attackers to cause a denial of service (ASP.NET daemon hang) via crafted HTTP requests that trigger persistent resource consumption for a (1) stale or (2) closed connection, as exploited in the wild in February 2014, aka "POST Request DoS Vulnerability."
[]
null
null
null
null
null
GHSA-jm8h-r9wg-2qjw
A reflected cross-site scripting (XSS) vulnerability exists in the PAM UI web interface. A remote attacker able to convince a PAM user to click on a specially crafted link to the PAM UI web interface could potentially execute arbitrary client-side code in the context of PAM UI.
[]
6.8
6.1
null
null
null
GHSA-74g6-hx95-wj53
Use-after-free vulnerability in the nsHostResolver::ConditionallyRefreshRecord function in libxul.so in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors related to host resolution.
[]
null
9.8
null
null
null
CVE-2021-37542
In JetBrains TeamCity before 2020.2.3, XSS was possible.
[ "cpe:2.3:a:jetbrains:teamcity:*:*:*:*:*:*:*:*" ]
null
6.1
null
4.3
null
CVE-2024-20295
A vulnerability in the CLI of the Cisco Integrated Management Controller (IMC) could allow an authenticated, local attacker to perform command injection attacks on the underlying operating system and elevate privileges to root. To exploit this vulnerability, the attacker must have read-only or higher privileges on an affected device. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by submitting a crafted CLI command. A successful exploit could allow the attacker to elevate privileges to root.
[ "cpe:2.3:a:cisco:unified_computing_system:-:*:*:*:*:*:*:*" ]
null
8.8
null
null
null
CVE-2022-44168
Tenda AC15 V15.03.05.18 is vulnerable to Buffer Overflow via function fromSetRouteStatic..
[ "cpe:2.3:o:tenda:ac15_firmware:15.03.05.18:*:*:*:*:*:*:*", "cpe:2.3:h:tenda:ac15:-:*:*:*:*:*:*:*" ]
null
7.5
null
null
null
GHSA-h87r-9587-v4mp
Cross-site scripting (XSS) vulnerability in index.php in PropertyMax Pro FREE 0.3 allows remote attackers to inject arbitrary web script or HTML via the pl parameter in a mi action.
[]
null
null
null
null
null
GHSA-9q9g-fwr6-596x
The myCred WordPress plugin before 2.4.3.1 does not have any authorisation in place in its mycred-tools-select-user AJAX action, allowing any authenticated user, such as subscriber to call and retrieve all email addresses from the blog
[]
null
4.3
null
null
null
GHSA-7g6w-wx5f-p467
An integer overflow in the batchTransfer function of a smart contract implementation for Beauty Ecosystem Coin (BEC), the Ethereum ERC20 token used in the Beauty Chain economic system, allows attackers to accomplish an unauthorized increase of digital assets by providing two _receivers arguments in conjunction with a large _value argument, as exploited in the wild in April 2018, aka the "batchOverflow" issue.
[]
null
null
7.5
null
null
CVE-2017-14731
ofx_proc_file in ofx_preproc.cpp in LibOFX 0.9.12 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted file, as demonstrated by an ofxdump call.
[ "cpe:2.3:a:libofx_project:libofx:0.9.12:*:*:*:*:*:*:*" ]
null
null
6.5
4.3
null
CVE-2009-5003
SQL injection vulnerability in click.php in e-soft24 Banner Exchange Script 1.0 allows remote attackers to execute arbitrary SQL commands via the targetid parameter.
[ "cpe:2.3:a:e-soft24:banner_exchange_script:1.0:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2013-1988
Multiple integer overflows in X.org libXRes 1.0.6 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XResQueryClients and (2) XResQueryClientResources functions.
[ "cpe:2.3:a:x:libxres:*:*:*:*:*:*:*:*", "cpe:2.3:a:x:libxres:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:x:libxres:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:x:libxres:1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:x:libxres:1.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:x:libxres:1.0.5:*:*:*:*:*:*:*" ]
null
null
null
6.8
null
CVE-2023-31174
Cross-Site Request Forgery (CSRF)
A Cross-Site Request Forgery (CSRF) vulnerability in the Schweitzer Engineering Laboratories SEL-5037 SEL Grid Configurator could allow an attacker to embed instructions that could be executed by an authorized device operator. See Instruction Manual Appendix A and Appendix E dated 20230615 for more details. This issue affects SEL-5037 SEL Grid Configurator: before 4.5.0.20.
[ "cpe:2.3:a:selinc:sel-5037_sel_grid_configurator:*:*:*:*:*:*:*:*" ]
null
7.4
null
null
null
GHSA-9pp6-7chj-q7jg
Microsoft Publisher 2003 SP3 does not properly validate the size of an unspecified array, which allows remote attackers to execute arbitrary code via a crafted Publisher file, aka "Publisher Negative Value Allocation Vulnerability."
[]
null
null
null
null
null
GHSA-3jjx-7p6f-wf65
Wedding Management System v1.0 is vulnerable to SQL Injection via \admin\blog_events_edit.php.
[]
null
7.2
null
null
null
CVE-2025-3438
MStore API – Create Native Android & iOS Apps On The Cloud <= 4.17.4 - Unauthenticated Limited Privilege Escalation
The MStore API – Create Native Android & iOS Apps On The Cloud plugin for WordPress is vulnerable to limited privilege escalation in all versions up to, and including, 4.17.4. This is due to a lack of restriction of role when registering. This makes it possible for unauthenticated attackers to to register with the 'wcfm_vendor' role, which is a Store Vendor role in the WCFM Marketplace – Multivendor Marketplace for WooCommerce plugin for WordPress. The vulnerability can only be exploited if the WCFM Marketplace – Multivendor Marketplace for WooCommerce plugin is installed and activated. The vulnerability was partially patched in version 4.17.3.
[]
null
6.5
null
null
null
GHSA-488m-6gh8-9j36
bracket-template vulnerable to reflected XSS
bracket-template suffers from reflected XSS possible when variable passed via GET parameter is used in template
[]
null
6.1
null
null
null
CVE-2017-3357
Vulnerability in the Oracle Marketing component of Oracle E-Business Suite (subcomponent: User Interface). Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5 and 12.2.6. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Marketing. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Marketing, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Marketing accessible data as well as unauthorized update, insert or delete access to some of Oracle Marketing accessible data. CVSS v3.0 Base Score 8.2 (Confidentiality and Integrity impacts).
[ "cpe:2.3:a:oracle:marketing:12.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:marketing:12.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:marketing:12.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:marketing:12.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:marketing:12.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:marketing:12.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:marketing:12.2.6:*:*:*:*:*:*:*" ]
null
null
8.2
5.8
null
GHSA-qp5r-8crg-2gcx
Multiple vulnerabilities in the web-based management interface of Cisco Unified Communications Manager (Unified CM), Cisco Unified Communications Manager IM &amp; Presence Service (Unified CM IM&amp;P), Cisco Unified Communications Manager Session Management Edition (Unified CM SME), and Cisco Unity Connection could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against an interface user. These vulnerabilities exist because the web-based management interface does not properly validate user-supplied input. An attacker could exploit these vulnerabilities by persuading an interface user to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive browser-based information.
[]
null
null
null
null
null
GHSA-g7qq-2qq9-j34m
Denial of service of inetd on Linux through SYN and RST packets.
[]
null
null
null
null
null
CVE-2023-27807
H3C Magic R100 R100V100R005.bin was discovered to contain a stack overflow via the Delstlist interface at /goform/aspForm. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted payload.
[ "cpe:2.3:o:h3c:magic_r100_firmware:v100r005:*:*:*:*:*:*:*", "cpe:2.3:o:h3c:magic_r100_firmware:-:*:*:*:*:*:*:*" ]
null
4.9
null
null
null
GHSA-g94q-cc43-mm5v
Mozilla Firefox 3.0.x before 3.0.18 and 3.5.x before 3.5.8, and SeaMonkey before 2.0.3, does not properly support the application/octet-stream content type as a protection mechanism against execution of web script in certain circumstances involving SVG and the EMBED element, which allows remote attackers to bypass the Same Origin Policy and conduct cross-site scripting (XSS) attacks via an embedded SVG document.
[]
null
null
null
null
null
CVE-2017-2097
Cross-site request forgery (CSRF) vulnerability in Knowledge versions prior to v1.7.0 allows remote attackers to hijack the authentication of administrators via unspecified vectors.
[ "cpe:2.3:a:support-project:knowledge:*:*:*:*:*:*:*:*", "cpe:2.3:a:support-project:knowledge:1.5.0:-:*:*:*:*:*:*", "cpe:2.3:a:support-project:knowledge:1.5.0:pre1:*:*:*:*:*:*", "cpe:2.3:a:support-project:knowledge:1.6.0:-:*:*:*:*:*:*", "cpe:2.3:a:support-project:knowledge:1.6.0:pre1:*:*:*:*:*:*", "cpe:2.3:a:support-project:knowledge:1.6.0:pre2:*:*:*:*:*:*", "cpe:2.3:a:support-project:knowledge:1.6.0:pre3:*:*:*:*:*:*", "cpe:2.3:a:support-project:knowledge:1.6.0:pre4:*:*:*:*:*:*" ]
null
8.8
null
6.8
null
GHSA-qq4x-wmg9-v33w
OTFCC commit 617837b was discovered to contain a heap buffer overflow via /release-x64/otfccdump+0x6b0478.
[]
null
6.5
null
null
null
GHSA-6rw8-gjq2-3x69
Unspecified vulnerability on IBM WebSphere DataPower XC10 Appliance devices 2.0 and 2.1 through 2.1 FP3 allows remote attackers to bypass authentication and perform administrative actions via unknown vectors.
[]
null
null
null
null
null
GHSA-vjh8-wgcx-46j4
In the Linux kernel, the following vulnerability has been resolved:drm/nouveau: fix off by one in BIOS boundary checkingBounds checking when parsing init scripts embedded in the BIOS reject access to the last byte. This causes driver initialization to fail on Apple eMac's with GeForce 2 MX GPUs, leaving the system with no working console.This is probably only seen on OpenFirmware machines like PowerPC Macs because the BIOS image provided by OF is only the used parts of the ROM, not a power-of-two blocks read from PCI directly so PCs always have empty bytes at the end that are never accessed.
[]
null
7.8
null
null
null
RHSA-2020:3833
Red Hat Security Advisory: firefox security update
Mozilla: Memory safety bugs fixed in Firefox 81 and Firefox ESR 78.3 Mozilla: XSS when pasting attacker-controlled data into a contenteditable element Mozilla: Download origin spoofing via redirect Mozilla: When recursing through layers while scrolling, an iterator may have become invalid, resulting in a potential use-after-free scenario
[ "cpe:/a:redhat:rhel_eus:8.1::appstream" ]
null
8.8
6.1
null
null
GHSA-932h-84vw-p6cw
In the Linux kernel, the following vulnerability has been resolved:net/mlx5e: Avoid field-overflowing memcpy()In preparation for FORTIFY_SOURCE performing compile-time and run-time field bounds checking for memcpy(), memmove(), and memset(), avoid intentionally writing across neighboring fields.Use flexible arrays instead of zero-element arrays (which look like they are always overflowing) and split the cross-field memcpy() into two halves that can be appropriately bounds-checked by the compiler.We were doing:target is wqe->eth.inline_hdr.start (which the compiler sees as being 2 bytes in size), but copying 18, intending to write across start (really vlan_tci, 2 bytes). The remaining 16 bytes get written into wqe->data[0], covering byte_count (4 bytes), lkey (4 bytes), and addr (8 bytes).struct mlx5e_tx_wqe { struct mlx5_wqe_ctrl_seg ctrl; /* 0 16 */ struct mlx5_wqe_eth_seg eth; /* 16 16 */ struct mlx5_wqe_data_seg data[]; /* 32 0 */};struct mlx5_wqe_eth_seg { u8 swp_outer_l4_offset; /* 0 1 */ u8 swp_outer_l3_offset; /* 1 1 */ u8 swp_inner_l4_offset; /* 2 1 */ u8 swp_inner_l3_offset; /* 3 1 */ u8 cs_flags; /* 4 1 */ u8 swp_flags; /* 5 1 */ __be16 mss; /* 6 2 */ __be32 flow_table_metadata; /* 8 4 */ union { struct { __be16 sz; /* 12 2 */ u8 start[2]; /* 14 2 */ } inline_hdr; /* 12 4 */ struct { __be16 type; /* 12 2 */ __be16 vlan_tci; /* 14 2 */ } insert; /* 12 4 */ __be32 trailer; /* 12 4 */ }; /* 12 4 */};struct mlx5_wqe_data_seg { __be32 byte_count; /* 0 4 */ __be32 lkey; /* 4 4 */ __be64 addr; /* 8 8 */};So, split the memcpy() so the compiler can reason about the buffer sizes."pahole" shows no size nor member offset changes to struct mlx5e_tx_wqe nor struct mlx5e_umr_wqe. "objdump -d" shows no meaningful object code changes (i.e. only source line number induced differences and optimizations).
[]
null
null
null
null
null
GHSA-48fj-24fp-5q3v
Cross-Site Request Forgery (CSRF) vulnerability in LionScripts.Com LionScripts: IP Blocker Lite plugin <= 11.1.1 versions.
[]
null
5.4
null
null
null
GHSA-36g4-5894-v55m
NmConsole/Login.asp in Ipswitch WhatsUp Professional 2006 and Ipswitch WhatsUp Professional 2006 Premium generates different error messages in a way that allows remote attackers to enumerate valid usernames. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
[]
null
null
null
null
null
CVE-2017-7294
The vmw_surface_define_ioctl function in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel through 4.10.6 does not validate addition of certain levels data, which allows local users to trigger an integer overflow and out-of-bounds write, and cause a denial of service (system hang or crash) or possibly gain privileges, via a crafted ioctl call for a /dev/dri/renderD* device.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
null
7.8
null
7.2
null
CVE-2017-5794
A Remote Arbitrary File Download vulnerability in HPE Intelligent Management Center (IMC) PLAT version 7.2 E0403P06 was found.
[ "cpe:2.3:a:hp:intelligent_management_center:7.2:e0403p06:*:*:*:*:*:*" ]
null
null
8.8
9
null
CVE-2017-16725
A Stack-based Buffer Overflow issue was discovered in Xiongmai Technology IP Cameras and DVRs using the NetSurveillance Web interface. The stack-based buffer overflow vulnerability has been identified, which may allow an attacker to execute code remotely or crash the device. After rebooting, the device restores itself to a more vulnerable state in which Telnet is accessible.
[ "cpe:2.3:o:xiongmaitech:ahb7008f8-h_firmware:4.02.r11.3070:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ahb7008f8-h:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ahb7008f4-h_firmware:4.02.r11.3070:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ahb7008f4-h:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ahb7008f2-h_firmware:4.02.r11.3070:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ahb7008f2-h:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ahb7008t-mh-v2_firmware:4.02.r11.7601:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ahb7008t-mh-v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ahb7004t-mh-v2_firmware:4.02.r11.7601:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ahb7004t-mh-v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ahb7004t-h-v2_firmware:4.02.r11.7601:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ahb7004t-h-v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ahb7016t-lm-v2_firmware:4.02.r11.7601:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ahb7016t-lm-v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ahb7008t-lm-v2_firmware:4.02.r11.7601:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ahb7008t-lm-v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ahb7016t4-mh-v2_firmware:4.02.r11.7601:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ahb7016t4-mh-v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ahb7016t-mh-v2_firmware:4.02.r11.7601:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ahb7016t-mh-v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ahb7008t4-h-v2_firmware:4.02.r11.7601:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ahb7008t4-h-v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ahb7008t-h-v2_firmware:4.02.r11.7601:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ahb7008t-h-v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ahb7008t4-h-v2:_firmware:4.02.r11.7601:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ahb7032f8-lm-v2_firmware:4.02.r11.7601:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ahb7032f8-lm-v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ahb7032f4-lm-v2_firmware:4.02.r11.7601:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ahb7032f4-lm-v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ahb7808r-ms-v3_firmware:4.02.r11.nat.onvifc.20170327:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ahb7808r-ms-v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ahb7804r-ms-v3_firmware:4.02.r11.nat.onvifc.20170327:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ahb7804r-ms-v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ahb7016t-lm-v3_firmware:4.02.r11.3070:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ahb7016t-lm-v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ahb7008t-lm-v3_firmware:4.02.r11.3070:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ahb7008t-lm-v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ahb7004t-lm-v3_firmware:4.02.r11.3070:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ahb7004t-lm-v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ahb7016t4-gs-v3_firmware:4.02.r11.7601:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ahb7016t4-gs-v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ahb7016t-gs-v3_firmware:4.02.r11.7601:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ahb7016t-gs-v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ahb7008t-gs-v3_firmware:4.02.r11.7601:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ahb7008t-gs-v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ahb7004t-gs-v3_firmware:4.02.r11.7601:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ahb7004t-gs-v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ahb7016t-mh-v3_firmware:4.02.r11.7601:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ahb7016t-mh-v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ahb7008t-mh-v3_firmware:4.02.r11.7601:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ahb7008t-mh-v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ahb7004t-mh-v3_firmware:4.02.r11.7601:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ahb7004t-mh-v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ahb7008t-gl-v4_firmware:4.02.r11.7601:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ahb7008t-gl-v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ahb7004t-gl-v4_firmware:4.02.r11.7601:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ahb7004t-gl-v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ahb7004t-g-v4_firmware:4.02.r11.7601:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ahb7004t-g-v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ahb7016f8-gs-v3_firmware:4.02.r11.7601:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ahb7016f8-gs-v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ahb7016f8-gl-v4_firmware:4.02.r11.7601:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ahb7016f8-gl-v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ahb7016f4-gl-v4_firmware:4.02.r11.7601:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ahb7016f4-gl-v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ahb7016f2-gl-v4_firmware:4.02.r11.7601:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ahb7016f2-gl-v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ahb7808r-lm-v3_firmware:4.02.r11.nat.onvifc.20171120:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ahb7808r-lm-v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ahb7804r-lm-v3_firmware:4.02.r11.nat.onvifc.20171120:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ahb7804r-lm-v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ahb7804r-lms-v3_firmware:4.02.r11.nat.onvifc.20171019:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ahb7804r-lms-v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ahb7008f8-g-v4_firmware:4.02.r11.7601:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ahb7008f8-g-v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ahb7008f4-g-v4_firmware:4.02.r11.7601:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ahb7008f4-g-v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ahb7008f2-g-v4_firmware:4.02.r11.7601:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ahb7008f2-g-v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ahb7032f4-lm-v3_firmware:4.02.r11.7601:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ahb7032f4-lm-v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ahb7032f2-lm-v3_firmware:4.02.r11.7601:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ahb7032f2-lm-v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ahb7032f8-gs-v3_firmware:4.02.r11.7601:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ahb7032f8-gs-v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ahb7032f4-gs-v3_firmware:4.02.r11.7601:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ahb7032f4-gs-v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ahb7032f2-gs-v3_firmware:4.02.r11.7601:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ahb7032f2-gs-v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ahb7016t-lme-v3_firmware:4.02.r11.7601:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ahb7016t-lme-v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ahb7008t-lme-v3_firmware:4.02.r11.7601:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ahb7008t-lme-v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ahb7004t-lme-v3_firmware:4.02.r11.7601:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ahb7004t-lme-v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ahb7808r-mh-v3_firmware:4.02.r11.7601:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ahb7808r-mh-v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ahb7804r-mh-v3_firmware:4.02.r11.7601:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ahb7804r-mh-v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-50h10pl-p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-50h10pl-p:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-50h10pl-b_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-50h10pl-b:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-50h10pl-ae_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-50h10pl-ae:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-50h10pl-s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-50h10pl-s:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-52h10pl-p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-52h10pl-p:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-52h10pl-b_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-52h10pl-b:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-53h13pet-s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-53h13pet-s:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-53h13pls-s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-53h13pls-s:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-53h13pes-s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-53h13pes-s:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-53h13pes-sl_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-53h13pes-sl:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-53h13pl-p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-53h13pl-p:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-53h13pl-b_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-53h13pl-b:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-53h13pl-ae_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-53h13pl-ae:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-53h13pl-s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-53h13pl-s:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-53h13p-p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-53h13p-p:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-53h13p-b_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-53h13p-b:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-53h13p-ae_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-53h13p-ae:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-53h13p-s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-53h13p-s:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-83h40pl-b_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-83h40pl-b:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-83h40pl-p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-83h40pl-p:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-83h50p-p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-83h50p-p:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-83h50p-b_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-83h50p-b:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-53h10pe-s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-53h10pe-s:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-50h10pe-sl_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-50h10pe-sl:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-50h10pe-s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-50h10pe-s:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipm-50hv10pt-wr_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipm-50hv10pt-wr:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipm-50v10pl-wr_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipm-50v10pl-wr:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipm-50h10pe-wr_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipm-50h10pe-wr:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-54h13pe-s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-54h13pe-s:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-54h20pl-s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-54h20pl-s:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-50h10pl-r_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-50h10pl-r:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipm-50h10pe-o\\(r\\)_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipm-50h10pe-o\\(r\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-53h13pl-r_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-53h13pl-r:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-50h10pe-wp_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-50h10pe-wp:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-50hv10pt-wp_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-50hv10pt-wp:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-53hv13pa-wp_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-53hv13pa-wp:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-53h13pe-wp_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-53h13pe-wp:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-53h20pl-p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-53h20pl-p:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-53h20pl-b_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-53h20pl-b:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-53h20pl-ae_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-53h20pl-ae:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-53h20pl-s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-53h20pl-s:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-50hv20pet-a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-50hv20pet-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-50hv20pet-s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-50hv20pet-s:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-50hv20pes-s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-50hv20pes-s:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-50h10pe-wk_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-50h10pe-wk:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-53h13pe-wk_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-53h13pe-wk:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-53h13pe-s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-53h13pe-s:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipm-50h10pe-wrm_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipm-50h10pe-wrm:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipm-53h13pe-wrm_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipm-53h13pe-wrm:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-83h40af_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-83h40af:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipm-50v10pl-wrc_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipm-50h10pe-wrc_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipm-50h10pe-wrc:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-50x10pt-s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-50x10pt-s:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-50x10pe-s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-50x10pe-s:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-53x13pt-s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-53x13pt-s:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-53x13pa-s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-53x13pa-s:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-53x13pe-s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-53x13pe-s:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipm-53h13pe-wrc_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipm-53h13pe-wrc:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipm-53hv13pe-wr_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipm-53hv13pe-wr:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipm-53v13pl-wr_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipm-53v13pl-wr:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipm-53h13pe-wr_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipm-53h13pe-wr:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-50h10pe-wk-2f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-50h10pe-wk-2f:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-83h20pl-p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-83h20pl-p:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-83h20pl-b_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-83h20pl-b:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-53hv13pt-s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-53hv13pt-s:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-53hv13pa-a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-53hv13pa-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-53hv13pa-s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-53hv13pa-s:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipm-50hv20pe-wr_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipm-50hv20pe-wr:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-50hv10pt-a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-50hv10pt-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-50hv10pt-s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-50hv10pt-s:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-50hv10pv-a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-50hv10pv-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-50hv10pv-s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-50hv10pv-s:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-80h20pt-a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-80h20pt-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-80h20pt-s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-80h20pt-s:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-50h20pt-s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-50h20pt-s:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-53h20py-s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-53h20py-s:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-53h13pe-wk-4f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-53h13pe-wk-4f:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-83h20pa-a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-83h20pa-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-83h20pa-s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-83h20pa-s:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-50hv20psa-s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-50hv20psa-s:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-50hv20psb-a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-50hv20psb-a:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-50hv20psb-s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-50hv20psb-s:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ivg-hp203y-ae_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ivg-hp203y-ae:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ivg-hp203y-se_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ivg-hp203y-se:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-hp500nr-s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-hp500nr-s:-:*:*:*:*:*:*:*", "cpe:2.3:o:xiongmaitech:ipg-80he20ps-s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:xiongmaitech:ipg-80he20ps-s:-:*:*:*:*:*:*:*" ]
null
null
9.8
10
null
GHSA-p357-v8vp-cvmx
A remote code execution vulnerability in the Android media framework (libhevc). Product: Android. Versions: 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0. Android ID: A-64893226.
[]
null
null
7.8
null
null
GHSA-g57f-vww4-m67v
, aka 'Hyper-V Remote Code Execution Vulnerability'.
[]
null
8.5
null
null
null
CVE-2005-2503
AppKit for Mac OS X 10.3.9 and 10.4.2 allows attackers with physical access to create local accounts by forcing a particular error to occur at the login window.
[ "cpe:2.3:o:apple:mac_os_x:10.3.9:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.4.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.3.9:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.4.2:*:*:*:*:*:*:*" ]
null
null
null
4.6
null
CVE-2019-17495
A Cascading Style Sheets (CSS) injection vulnerability in Swagger UI before 3.23.11 allows attackers to use the Relative Path Overwrite (RPO) technique to perform CSS-based input field value exfiltration, such as exfiltration of a CSRF token value. In other words, this product intentionally allows the embedding of untrusted JSON data from remote servers, but it was not previously known that <style>@import within the JSON data was a functional attack method.
[ "cpe:2.3:a:smartbear:swagger_ui:*:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:banking_apis:*:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:banking_apis:19.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:banking_apis:19.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:banking_apis:20.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:banking_apis:21.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:banking_digital_experience:*:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:banking_digital_experience:19.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:banking_digital_experience:19.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:banking_digital_experience:20.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:banking_digital_experience:21.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:banking_platform:*:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:primavera_gateway:*:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:utilities_framework:4.3.0.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:utilities_framework:4.4.0.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:utilities_framework:4.4.0.2.0:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
null
CVE-2018-12779
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
[ "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
null
6.5
4.3
null
GHSA-6349-m4mx-wm2j
This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader 8.3.2.25013. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the ImageField node of XFA forms. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the current process. Was ZDI-CAN-5281.
[]
null
null
6.5
null
null
GHSA-3vc4-357p-hh5q
The SSL server implementation in NILE.NLM in Novell NetWare 6.5 and Novell Open Enterprise Server (OES) permits encryption with a NULL key, which results in cleartext communication that allows remote attackers to read an SSL protected session by sniffing network traffic.
[]
null
null
null
null
null
GHSA-xxqf-46rv-f5hw
There is a Null pointer dereference vulnerability in the camera module in smartphones. Successful exploitation of this vulnerability may affect service integrity.
[]
null
null
null
null
null
GHSA-r22x-56pw-w758
AMI AptioV contains a vulnerability in BIOS where an Attacker may use an improper input validation via the local network. A successful exploit of this vulnerability may lead to a loss of confidentiality, integrity and availability.
[]
null
7.5
null
null
null
GHSA-88hc-cq92-6755
TOTOLINK X5000R V9.1.0cu.2350_B20230313 was discovered to contain an authenticated remote command execution (RCE) vulnerability via the "ipsecL2tpEnable" parameter in the "cstecgi.cgi" binary.
[]
null
8.8
null
null
null
GHSA-wppj-3pjr-9w79
crater is vulnerable to Unrestricted Upload of File with Dangerous Type
crater is vulnerable to Unrestricted Upload of File with Dangerous Type
[]
null
8.8
null
null
null
CVE-2023-34130
SonicWall GMS and Analytics use outdated Tiny Encryption Algorithm (TEA) with a hardcoded key to encrypt sensitive data. This issue affects GMS: 9.3.2-SP1 and earlier versions; Analytics: 2.5.0.4-R7 and earlier versions.
[ "cpe:2.3:a:sonicwall:analytics:*:*:*:*:*:*:*:*", "cpe:2.3:a:sonicwall:global_management_system:*:*:*:*:*:*:*:*", "cpe:2.3:a:sonicwall:global_management_system:9.3.2:-:*:*:*:*:*:*", "cpe:2.3:a:sonicwall:global_management_system:9.3.2:sp1:*:*:*:*:*:*" ]
null
9.8
null
null
null
CVE-2007-5651
Unspecified vulnerability in the Extensible Authentication Protocol (EAP) implementation in Cisco IOS 12.3 and 12.4 on Cisco Access Points and 1310 Wireless Bridges (Wireless EAP devices), IOS 12.1 and 12.2 on Cisco switches (Wired EAP devices), and CatOS 6.x through 8.x on Cisco switches allows remote attackers to cause a denial of service (device reload) via a crafted EAP Response Identity packet.
[ "cpe:2.3:o:cisco:catos:6.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:catos:6.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:catos:6.3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:catos:6.4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:catos:7.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:catos:7.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:catos:7.3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:catos:7.4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:catos:7.5:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:catos:7.6:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:catos:8.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:catos:8.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:catos:8.3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:catos:8.4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:catos:8.5:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3ja:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3jea:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3jeb:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3jec:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4ja:*:*:*:*:*:*:*" ]
null
null
null
7.1
null
CVE-2020-2762
Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.19 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
[ "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*", "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*", "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*" ]
null
null
4.9
null
null
CVE-2023-34205
In Moov signedxml through 1.0.0, parsing the raw XML (as received) can result in different output than parsing the canonicalized XML. Thus, signature validation can be bypassed via a Signature Wrapping attack (aka XSW).
[ "cpe:2.3:a:moov:signedxml:1.0.0:*:*:*:*:go:*:*" ]
null
9.1
null
null
null
CVE-2021-38351
OSD Subscribe <= 1.2.3 Reflected Cross-Site Scripting
The OSD Subscribe WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the osd_subscribe_message parameter found in the ~/options/osd_subscribe_options_subscribers.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 1.2.3.
[ "cpe:2.3:a:outsidesource:osd_subscribe:*:*:*:*:*:wordpress:*:*" ]
null
6.1
null
null
null
CVE-2020-6347
SAP 3D Visual Enterprise Viewer, version - 9, allows a user to open manipulated HDR file received from untrusted sources which results in crashing of the application and becoming temporarily unavailable until the user restarts the application, this is caused due to Improper Input Validation.
[ "cpe:2.3:a:sap:3d_visual_enterprise_viewer:9:*:*:*:*:*:*:*" ]
null
null
4.3
null
null
GHSA-jqgc-ch7p-x5g4
The Memberful plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.73.9 via the WordPress core search feature. This makes it possible for unauthenticated attackers to extract sensitive data from posts that have been restricted to higher-level roles such as site members.
[]
null
5.3
null
null
null
GHSA-5g4j-78x8-fff7
All versions of ETIC Telecom Remote Access Server (RAS) 4.5.0 and prior’s web portal is vulnerable to accepting malicious firmware packages that could provide a backdoor to an attacker and provide privilege escalation to the device.
[]
null
10
null
null
null
GHSA-5wpm-mmfv-62g9
In the Linux kernel, the following vulnerability has been resolved:drm/msm/disp/dpu1: set vbif hw config to NULL to avoid use after memory free during pm runtime resumeBUG: Unable to handle kernel paging request at virtual address 006b6b6b6b6b6be3Call trace: dpu_vbif_init_memtypes+0x40/0xb8 dpu_runtime_resume+0xcc/0x1c0 pm_generic_runtime_resume+0x30/0x44 __genpd_runtime_resume+0x68/0x7c genpd_runtime_resume+0x134/0x258 __rpm_callback+0x98/0x138 rpm_callback+0x30/0x88 rpm_resume+0x36c/0x49c __pm_runtime_resume+0x80/0xb0 dpu_core_irq_uninstall+0x30/0xb0 dpu_irq_uninstall+0x18/0x24 msm_drm_uninit+0xd8/0x16cPatchwork: https://patchwork.freedesktop.org/patch/483255/ [DB: fixed Fixes tag]
[]
null
7.8
null
null
null
CVE-2006-6608
Unspecified vulnerability in SSH key based authentication in HP Integrated Lights Out (iLO) 1.70 through 1.87, and iLO 2 1.00 through 1.11, on Proliant servers, allows remote attackers to "gain unauthorized access."
[ "cpe:2.3:a:hp:proliant_integrated_lights_out:1.70:*:*:*:*:*:*:*", "cpe:2.3:a:hp:proliant_integrated_lights_out:1.87:*:*:*:*:*:*:*", "cpe:2.3:a:hp:proliant_integrated_lights_out_2:1.00:*:*:*:*:*:*:*", "cpe:2.3:a:hp:proliant_integrated_lights_out_2:1.11:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
RHSA-2011:0869
Red Hat Security Advisory: flash-plugin security update
flash-plugin: memory corruption can lead to arbitrary code execution (APSB11-18)
[ "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server", "cpe:/a:redhat:rhel_extras:6" ]
null
null
null
null
null
GHSA-w36m-cghg-r636
Nagios XI 5.6.11 allows XSS via the includes/components/ldap_ad_integration/ username parameter.
[]
null
null
null
null
null
CVE-2023-1571
DataGear pagingQueryData sql injection
A vulnerability, which was classified as critical, was found in DataGear up to 4.5.0. This affects an unknown part of the file /analysisProject/pagingQueryData. The manipulation of the argument queryOrder leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 4.5.1 is able to address this issue. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-223563.
[ "cpe:2.3:a:datagear:datagear:*:*:*:*:*:*:*:*" ]
null
6.3
6.3
6.5
null
CVE-2022-2073
Code Injection in getgrav/grav
Code Injection in GitHub repository getgrav/grav prior to 1.7.34.
[ "cpe:2.3:a:getgrav:grav:*:*:*:*:*:*:*:*" ]
null
null
9.1
null
null
GHSA-gqj6-vmc3-r4wc
An issue was discovered in Zoho ManageEngine ServiceDesk Plus 9.3. There is XSS via the SolutionSearch.do searchText parameter.
[]
null
null
6.1
null
null
GHSA-mw8w-3fmh-xxvw
Improper access control in LeAudioService prior to SMR Jul-2025 Release 1 allows local attackers to stop broadcasting Auracast.
[]
null
6.2
null
null
null
GHSA-xm85-wv7w-pf5x
rendersystemdx9.dll in Valve Dota 2 before 7.23f allows remote attackers to achieve code execution or denial of service by creating a gaming server and inviting a victim to this server, because a crafted map is affected by memory corruption.
[]
null
null
null
null
null
CVE-2024-36361
Pug through 3.0.2 allows JavaScript code execution if an application accepts untrusted input for the name option of the compileClient, compileFileClient, or compileClientWithDependenciesTracked function. NOTE: these functions are for compiling Pug templates into JavaScript, and there would typically be no reason to allow untrusted callers.
[ "cpe:2.3:a:pugjs:pug:0.0.2:*:*:*:*:node.js:*:*" ]
null
6.8
null
null
null
CVE-2014-10398
Multiple cross-site scripting (XSS) vulnerabilities in bsi.dll in Bank Soft Systems (BSS) RBS BS-Client. Private Client (aka RBS BS-Client. Retail Client) 2.5, 2.4, and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) DICTIONARY, (2) FILTERIDENT, (3) FROMSCHEME, (4) FromPoint, or (5) FName_0 parameter and a valid sid parameter value.
[ "cpe:2.3:a:bssys:rbs_bs-client._retail_client:*:*:*:*:*:*:*:*", "cpe:2.3:a:bssys:rbs_bs-client._retail_client:2.5:*:*:*:*:*:*:*" ]
null
6.1
null
4.3
null
CVE-2024-51107
Multiple stored cross-site scripting (XSS) vulnerabilities in the component /mcgs/admin/contactus.php of PHPGURUKUL Medical Card Generation System using PHP and MySQL v1.0 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the pagetitle, pagedes, and email parameters.
[]
null
4.8
null
null
null
CVE-2019-6630
On F5 SSL Orchestrator 14.1.0-14.1.0.5 and 14.0.0-14.0.0.4, undisclosed traffic flow may cause TMM to restart under certain circumstances.
[ "cpe:2.3:a:f5:ssl_orchestrator:*:*:*:*:*:*:*:*" ]
null
null
7.5
5
null
GHSA-wv99-wmpf-jrqr
Cross-site scripting in Liferay Portal
Cross-site scripting (XSS) vulnerability in the Web Content Display widget's article selector in Liferay Liferay Portal 7.4.3.50, and Liferay DXP 7.4 update 50 allows remote attackers to inject arbitrary web script or HTML via a crafted payload injected into a web content article's `Title` field.
[]
null
6.4
null
null
null
GHSA-365v-p82c-m3cj
Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Sumo Social Share Boost plugin <= 4.4 versions.
[]
null
6.5
null
null
null