id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
189k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
patch_commit_url
stringlengths
36
232
GHSA-jx7f-v5r5-55j4
The Mojolicious module before 8.65 for Perl is vulnerable to secure_compare timing attacks that allow an attacker to guess the length of a secret string. Only versions after 1.74 are affected.
[]
null
7.5
null
null
null
GHSA-63j4-jx57-q5fw
Trash Bin plugin 1.1.3 for MyBB has cross-site scripting (XSS) via a thread subject and a cross-site request forgery (CSRF) via a post subject.
[]
null
null
8.8
null
null
CVE-2020-26547
Monal before 4.9 does not implement proper sender verification on MAM and Message Carbon (XEP-0280) results. This allows a remote attacker (able to send stanzas to a victim) to inject arbitrary messages into the local history, with full control over the sender and receiver displayed to the victim.
[ "cpe:2.3:a:monal:monal:*:*:*:*:*:iphone_os:*:*" ]
null
9.8
null
5
null
GHSA-g8gg-rcmj-jj2r
Untrusted search path vulnerability in hsolinkcontrol in hsolink 1.0.118 allows local users to gain privileges via a modified PATH environment variable, which is used during execution of the (1) route, (2) mv, and (3) cp programs, a different vulnerability than CVE-2010-1671.
[]
null
null
null
null
null
GHSA-7f6x-229m-7w2q
An attacker could utilize SQL commands to create a new user MDT AutoSave versions prior to v6.02.06 and update the user’s permissions, granting the attacker the ability to login.
[]
null
9.8
null
null
null
CVE-2019-18858
CODESYS 3 web server before 3.5.15.20, as distributed with CODESYS Control runtime systems, has a Buffer Overflow.
[ "cpe:2.3:a:codesys:control_for_beaglebone:*:*:*:*:*:*:*:*", "cpe:2.3:a:codesys:control_for_empc-a\\/imx6:*:*:*:*:*:*:*:*", "cpe:2.3:a:codesys:control_for_iot2000:*:*:*:*:*:*:*:*", "cpe:2.3:a:codesys:control_for_linux:*:*:*:*:*:*:*:*", "cpe:2.3:a:codesys:control_for_pfc100:*:*:*:*:*:*:*:*", "cpe:2.3:a:codesys:control_for_pfc200:*:*:*:*:*:*:*:*", "cpe:2.3:a:codesys:control_for_plcnext:*:*:*:*:*:*:*:*", "cpe:2.3:a:codesys:control_for_raspberry_pi:*:*:*:*:*:*:*:*", "cpe:2.3:a:codesys:control_rte:*:*:*:*:*:*:*:*", "cpe:2.3:a:codesys:control_runtime_system_toolkit:*:*:*:*:*:*:*:*", "cpe:2.3:a:codesys:control_win:*:*:*:*:*:*:*:*", "cpe:2.3:a:codesys:embedded_target_visu_toolkit:*:*:*:*:*:*:*:*", "cpe:2.3:a:codesys:hmi:*:*:*:*:*:*:*:*", "cpe:2.3:a:codesys:remote_target_visu_toolkit:*:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
null
GHSA-22cq-qqmm-44qr
A vulnerability classified as problematic has been found in code-projects Payroll Management System 1.0. Affected is an unknown function of the file /home_employee.php. The manipulation of the argument division leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.
[]
5.1
3.5
null
null
null
GHSA-2fc3-gg5g-pf65
In JetBrains Hub before 2021.1.13690, the authentication throttling mechanism could be bypassed.
[]
null
9.8
null
null
null
GHSA-vjwc-c2cc-76g5
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 7.0.12. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox as well as unauthorized update, insert or delete access to some of Oracle VM VirtualBox accessible data and unauthorized read access to a subset of Oracle VM VirtualBox accessible data. Note: Only applicable to 7.0.x platform. CVSS 3.1 Base Score 7.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:H).
[]
null
7.3
null
null
null
GHSA-qhwv-rq72-8hq4
SWS web server 0.0.4, 0.0.3 and 0.1.0 allows remote attackers to cause a denial of service (crash) via a URL request that does not end with a newline.
[]
null
null
null
null
null
GHSA-wv8g-fx9j-q2jg
phpMyAdmin cross-site scripting Vulnerability via ENUM value
Multiple cross-site scripting (XSS) vulnerabilities in phpMyAdmin 4.0.x before 4.0.10.4, 4.1.x before 4.1.14.5, and 4.2.x before 4.2.9.1 allow remote authenticated users to inject arbitrary web script or HTML via a crafted ENUM value that is improperly handled during rendering of the (1) table search or (2) table structure page, related to `libraries/TableSearch.class.php` and `libraries/Util.class.php`.
[]
null
null
null
null
null
CVE-2014-1583
The Alarm API in Mozilla Firefox before 33.0 and Firefox ESR 31.x before 31.2 does not properly restrict toJSON calls, which allows remote attackers to bypass the Same Origin Policy via crafted API calls that access sensitive information within the JSON data of an alarm.
[ "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*" ]
null
null
null
5
null
GHSA-rgvr-75f6-hq78
Microsoft SharePoint Server 2013 Service Pack 1 allows an elevation of privilege vulnerability when it fails to properly sanitize a specially crafted web request to an affected SharePoint server, aka "Microsoft SharePoint XSS Vulnerability".
[]
null
null
5.4
null
null
CVE-2023-40505
LG Simple Editor createThumbnailByMovie Command Injection Remote Code Execution Vulnerability
LG Simple Editor createThumbnailByMovie Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of LG Simple Editor. Authentication is not required to exploit this vulnerability. The specific flaw exists within the createThumbnailByMovie method. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. . Was ZDI-CAN-19978.
[ "cpe:2.3:a:lg:simple_editor:*:*:*:*:*:*:*:*" ]
null
null
9.8
null
null
GHSA-xfg7-2jxx-2vg8
A vulnerability classified as critical has been found in 1000 Projects Portfolio Management System MCA 1.0. Affected is an unknown function of the file /add_personal_details.php. The manipulation of the argument profile leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
[]
5.3
6.3
null
null
null
CVE-2009-5000
Multiple cross-site scripting (XSS) vulnerabilities in the Workplace (aka WP) component in IBM FileNet P8 Application Engine (P8AE) 4.0.2.x before 4.0.2.3-P8AE-FP003 allow remote attackers to inject arbitrary web script or HTML via unspecified parameters to .jsp pages.
[ "cpe:2.3:a:ibm:filenet_p8_application_engine:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:filenet_p8_application_engine:4.0.2:001:*:*:*:*:*:*", "cpe:2.3:a:ibm:filenet_p8_application_engine:4.0.2:002:*:*:*:*:*:*" ]
null
null
null
4.3
null
CVE-2007-2350
admin/config.php in the music-on-hold module in freePBX 2.2.x allows remote authenticated administrators to execute arbitrary commands via shell metacharacters in the del parameter.
[ "cpe:2.3:a:freepbx:freepbx:*:*:*:*:*:*:*:*" ]
null
null
null
6.5
null
CVE-2023-2958
IDOR in ATS Pro
Authorization Bypass Through User-Controlled Key vulnerability in Origin Software ATS Pro allows Authentication Abuse, Authentication Bypass.This issue affects ATS Pro: before 20230714.
[ "cpe:2.3:a:orjinyazilim:ats_pro:*:*:*:*:*:*:*:*" ]
null
9.8
null
null
null
GHSA-xpm4-75c2-wrgc
A flaw was found in GDM in versions prior to 3.38.2.1. A race condition in the handling of session shutdown makes it possible to bypass the lock screen for a user that has autologin enabled, accessing their session without authentication. This is similar to CVE-2017-12164, but requires more difficult conditions to exploit.
[]
null
null
null
null
null
GHSA-42m5-34mg-qrv6
cPanel before 60.0.25 allows file-overwrite operations during preparation for MySQL upgrades (SEC-161).
[]
null
null
6.5
null
null
CVE-2023-47031
An issue in NCR Terminal Handler v.1.5.1 allows a remote attacker to escalate privileges via a crafted POST request to the grantRolesToUsers, grantRolesToGroups, and grantRolesToOrganization SOAP API component.
[]
null
null
null
null
null
GHSA-57rv-fpf7-pch9
The Countdown Timer for WordPress Block Editor WordPress plugin through 1.0.5 does not validate and escape some of its block options before outputting them back in a page/post where the block is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
[]
null
6.5
null
null
null
CVE-2020-1778
Bypassing user account validation
When OTRS uses multiple backends for user authentication (with LDAP), agents are able to login even if the account is set to invalid. This issue affects OTRS; 8.0.9 and prior versions.
[ "cpe:2.3:a:otrs:otrs:*:*:*:*:*:*:*:*" ]
null
4.1
null
null
null
CVE-2025-22798
WordPress Responsive jQuery Slider plugin <= 1.1.1 - Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in CHR Designer Responsive jQuery Slider allows Stored XSS.This issue affects Responsive jQuery Slider: from n/a through 1.1.1.
[]
null
6.5
null
null
null
CVE-2017-10232
Vulnerability in the Hospitality WebSuite8 Cloud Service component of Oracle Hospitality Applications (subcomponent: General). Supported versions that are affected are 8.9.6 and 8.10.x. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Hospitality WebSuite8 Cloud Service. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Hospitality WebSuite8 Cloud Service accessible data as well as unauthorized update, insert or delete access to some of Hospitality WebSuite8 Cloud Service accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Hospitality WebSuite8 Cloud Service. CVSS 3.0 Base Score 7.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L).
[ "cpe:2.3:a:oracle:hospitality_websuite8_cloud_service:8.9.6:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:hospitality_websuite8_cloud_service:8.10.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:hospitality_websuite8_cloud_service:8.10.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:hospitality_websuite8_cloud_service:8.10.2:*:*:*:*:*:*:*" ]
null
null
7.6
6.5
null
CVE-2023-38586
An access issue was addressed with additional sandbox restrictions. This issue is fixed in macOS Sonoma 14. A sandboxed process may be able to circumvent sandbox restrictions.
[ "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*" ]
null
10
null
null
null
GHSA-5r36-3w36-p2fp
VAXstations running Open VMS 5.3 through 5.5-2 with VMS DECwindows or MOTIF do not properly disable access to user accounts that exceed the break-in limit threshold for failed login attempts, which makes it easier for attackers to conduct brute force password guessing.
[]
null
9.8
null
null
null
CVE-2020-10914
This vulnerability allows remote attackers to execute arbitrary code on affected installations of VEEAM One Agent 9.5.4.4587. Authentication is not required to exploit this vulnerability. The specific flaw exists within the PerformHandshake method. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-10400.
[ "cpe:2.3:a:veeam:one:9.5.4.4587:*:*:*:*:*:*:*" ]
null
null
9.8
null
null
GHSA-fq66-4fw4-f434
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Diagnostics). Supported versions that are affected are 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle WebLogic Server accessible data. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).
[]
null
5.3
null
null
null
CVE-2016-8298
Vulnerability in the Oracle FLEXCUBE Private Banking component of Oracle Financial Services Applications (subcomponent: Product / Instrument Search). Supported versions that are affected are 2.0.1, 2.2.0 and 12.0.1. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle FLEXCUBE Private Banking. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle FLEXCUBE Private Banking accessible data as well as unauthorized access to critical data or complete access to all Oracle FLEXCUBE Private Banking accessible data. CVSS v3.0 Base Score 8.1 (Confidentiality and Integrity impacts).
[ "cpe:2.3:a:oracle:flexcube_private_banking:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:flexcube_private_banking:2.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:flexcube_private_banking:12.0.1:*:*:*:*:*:*:*" ]
null
null
8.1
5.5
null
CVE-2022-40359
Cross site scripting (XSS) vulnerability in kfm through 1.4.7 via crafted GET request to /kfm/index.php.
[ "cpe:2.3:a:kfm_project:kfm:*:*:*:*:*:*:*:*" ]
null
6.1
null
null
null
GHSA-q823-fhxh-997g
In the Linux kernel, the following vulnerability has been resolved:drm/amd/display: Fix index out of bounds in degamma hardware format translationFixes index out of bounds issue in `cm_helper_translate_curve_to_degamma_hw_format` function. The issue could occur when the index 'i' exceeds the number of transfer function points (TRANSFER_FUNC_POINTS).The fix adds a check to ensure 'i' is within bounds before accessing the transfer function points. If 'i' is out of bounds the function returns false to indicate an error.Reported by smatch: drivers/gpu/drm/amd/amdgpu/../display/dc/dcn10/dcn10_cm_common.c:594 cm_helper_translate_curve_to_degamma_hw_format() error: buffer overflow 'output_tf->tf_pts.red' 1025 <= s32max drivers/gpu/drm/amd/amdgpu/../display/dc/dcn10/dcn10_cm_common.c:595 cm_helper_translate_curve_to_degamma_hw_format() error: buffer overflow 'output_tf->tf_pts.green' 1025 <= s32max drivers/gpu/drm/amd/amdgpu/../display/dc/dcn10/dcn10_cm_common.c:596 cm_helper_translate_curve_to_degamma_hw_format() error: buffer overflow 'output_tf->tf_pts.blue' 1025 <= s32max
[]
null
7.8
null
null
null
CVE-2017-13136
The image_alloc function in bpgenc.c in libbpg 0.9.7 has an integer overflow, with a resultant invalid malloc and NULL pointer dereference.
[ "cpe:2.3:a:libbpg_project:libbpg:0.9.7:*:*:*:*:*:*:*" ]
null
null
8.8
6.8
null
GHSA-86q5-qcjc-7pv4
Presto JDBC Server-Side Request Forgery by nextUri
SummaryPresto JDBC is vulnerable to Server-Side Request Forgery (SSRF) when connecting a remote Presto server. An attacker can modify the nextUri parameter to internal server in response content that Presto JDBC client will request next and view sensitive information from highly sensitive internal servers or perform a local port scan.DetailsThe Presto protocol has a nextUri parameter that specifies which URI the client will request next to obtain more query data. Presto JDBC will directly use the nextUri returned by the remote Presto server as the URL for the next request. So if a malicious server modify the nextUri parameter to the internal server, JDBC will request it and cause SSRF.For unexpected responses, JDBC will put the response body into the error. So the response of the internal server will be leaked if the server also returns the error directly to the user.The relevant code is in file path `/presto-client/src/main/java/com/facebook/presto/client/StatementClientV1.java` and function `advance` .The flowchart is as follows:PoCRunning an HTTP service to route POST /v1/statement redirect to the intranet. For example, using these Python code:Connecting to the malicious server using JDBC:Pwned!ImpactWhen the target remote Presto server to be connected is controllable, an attacker can view sensitive information from highly sensitive internal servers or perform a local port scan.Vulnerability Discovery Credit: Jianyu Li @ WuHeng Lab of ByteDance
[]
null
7.6
null
null
null
CVE-2022-48730
dma-buf: heaps: Fix potential spectre v1 gadget
In the Linux kernel, the following vulnerability has been resolved: dma-buf: heaps: Fix potential spectre v1 gadget It appears like nr could be a Spectre v1 gadget as it's supplied by a user and used as an array index. Prevent the contents of kernel memory from being leaked to userspace via speculative execution by using array_index_nospec. [sumits: added fixes and cc: stable tags]
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:5.17:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:5.17:rc2:*:*:*:*:*:*" ]
null
5.5
null
null
null
RHSA-2014:1836
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 5.2.0 security update
CXF: SSL hostname verification bypass, incomplete CVE-2012-5783 fix CXF: SSL hostname verification bypass, incomplete CVE-2012-6153 fix
[ "cpe:/a:redhat:jboss_enterprise_application_platform:5.2.0" ]
null
null
4.8
null
null
GHSA-4wvm-v4fc-prp5
An issue was discovered in function _libssh2_packet_add in libssh2 1.10.0 allows attackers to access out of bounds memory.
[]
null
7.5
null
null
null
CVE-2014-2287
channels/chan_sip.c in Asterisk Open Source 1.8.x before 1.8.26.1, 11.8.x before 11.8.1, and 12.1.x before 12.1.1, and Certified Asterisk 1.8.15 before 1.8.15-cert5 and 11.6 before 11.6-cert2, when chan_sip has a certain configuration, allows remote authenticated users to cause a denial of service (channel and file descriptor consumption) via an INVITE request with a (1) Session-Expires or (2) Min-SE header with a malformed or invalid value.
[ "cpe:2.3:a:digium:certified_asterisk:1.8.0.0:-:*:*:*:*:*:*", "cpe:2.3:a:digium:certified_asterisk:1.8.0.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:digium:certified_asterisk:1.8.0.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:digium:certified_asterisk:1.8.0.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:digium:certified_asterisk:1.8.0.0:beta4:*:*:*:*:*:*", "cpe:2.3:a:digium:certified_asterisk:1.8.0.0:beta5:*:*:*:*:*:*", "cpe:2.3:a:digium:certified_asterisk:1.8.0.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:certified_asterisk:1.8.0.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:certified_asterisk:1.8.0.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:digium:certified_asterisk:1.8.0.0:rc4:*:*:*:*:*:*", "cpe:2.3:a:digium:certified_asterisk:1.8.0.0:rc5:*:*:*:*:*:*", "cpe:2.3:a:digium:certified_asterisk:1.8.1.0:-:*:*:*:*:*:*", "cpe:2.3:a:digium:certified_asterisk:1.8.1.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:certified_asterisk:1.8.2.0:-:*:*:*:*:*:*", "cpe:2.3:a:digium:certified_asterisk:1.8.2.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:certified_asterisk:1.8.3.0:-:*:*:*:*:*:*", "cpe:2.3:a:digium:certified_asterisk:1.8.3.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:certified_asterisk:1.8.3.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:certified_asterisk:1.8.3.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:digium:certified_asterisk:1.8.4.0:-:*:*:*:*:*:*", "cpe:2.3:a:digium:certified_asterisk:1.8.4.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:certified_asterisk:1.8.4.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:certified_asterisk:1.8.4.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:digium:certified_asterisk:1.8.5.0:-:*:*:*:*:*:*", "cpe:2.3:a:digium:certified_asterisk:1.8.5.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:certified_asterisk:1.8.6.0:-:*:*:*:*:*:*", "cpe:2.3:a:digium:certified_asterisk:1.8.6.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:certified_asterisk:1.8.6.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:certified_asterisk:1.8.6.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:digium:certified_asterisk:1.8.7.0:-:*:*:*:*:*:*", "cpe:2.3:a:digium:certified_asterisk:1.8.7.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:certified_asterisk:1.8.7.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:certified_asterisk:1.8.8.0:-:*:*:*:*:*:*", "cpe:2.3:a:digium:certified_asterisk:1.8.8.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:certified_asterisk:1.8.8.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:certified_asterisk:1.8.8.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:digium:certified_asterisk:1.8.8.0:rc4:*:*:*:*:*:*", "cpe:2.3:a:digium:certified_asterisk:1.8.8.0:rc5:*:*:*:*:*:*", "cpe:2.3:a:digium:certified_asterisk:1.8.9.0:-:*:*:*:*:*:*", "cpe:2.3:a:digium:certified_asterisk:1.8.9.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:certified_asterisk:1.8.9.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:certified_asterisk:1.8.9.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:digium:certified_asterisk:1.8.10.0:-:*:*:*:*:*:*", "cpe:2.3:a:digium:certified_asterisk:1.8.10.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:certified_asterisk:1.8.10.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:certified_asterisk:1.8.10.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:digium:certified_asterisk:1.8.10.0:rc4:*:*:*:*:*:*", "cpe:2.3:a:digium:certified_asterisk:1.8.11.0:-:*:*:*:*:*:*", "cpe:2.3:a:digium:certified_asterisk:1.8.11.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:certified_asterisk:1.8.11.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:certified_asterisk:1.8.11.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:digium:certified_asterisk:1.8.12.0:-:*:*:*:*:*:*", "cpe:2.3:a:digium:certified_asterisk:1.8.12.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:certified_asterisk:1.8.12.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:certified_asterisk:1.8.12.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:digium:certified_asterisk:1.8.13.0:-:*:*:*:*:*:*", "cpe:2.3:a:digium:certified_asterisk:1.8.13.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:certified_asterisk:1.8.13.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:certified_asterisk:1.8.14.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:certified_asterisk:1.8.14.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:certified_asterisk:1.8.15:-:*:*:*:*:*:*", "cpe:2.3:a:digium:certified_asterisk:1.8.15:cert1:*:*:*:*:*:*", "cpe:2.3:a:digium:certified_asterisk:1.8.15:cert1_rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:certified_asterisk:1.8.15:cert1_rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:certified_asterisk:1.8.15:cert1_rc3:*:*:*:*:*:*", "cpe:2.3:a:digium:certified_asterisk:1.8.15:cert2:*:*:*:*:*:*", "cpe:2.3:a:digium:certified_asterisk:1.8.15:cert3:*:*:*:*:*:*", "cpe:2.3:a:digium:certified_asterisk:1.8.15:cert4:*:*:*:*:*:*", "cpe:2.3:a:digium:certified_asterisk:11.6:cert1:*:*:*:*:*:*", "cpe:2.3:a:digium:certified_asterisk:11.6:cert1_rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:certified_asterisk:11.6:cert1_rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:certified_asterisk:11.6.0:-:*:*:*:*:*:*", "cpe:2.3:a:digium:certified_asterisk:11.6.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:certified_asterisk:11.6.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.0:beta4:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.0:beta5:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.0:rc4:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.0:rc5:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.1:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.2:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.3:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.3:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.3:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.3:rc3:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.4:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.4:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.4:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.4:rc3:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.5:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.5:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.6.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.6.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.6.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.7.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.7.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.8.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.8.0:-:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.8.0:patch:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.8.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.8.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.8.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.8.0:rc4:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.8.0:rc5:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.8.2:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.9.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.9.0:-:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.9.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.9.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.9.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.9.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.9.2:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.9.3:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.10.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.10.0:-:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.10.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.10.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.10.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.10.0:rc4:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.10.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.11.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.11.0:-:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.11.0:patch:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.11.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.11.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.11.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.11.1:-:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.11.1:patch:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.12:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.12.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.12.0:-:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.12.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.12.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.12.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.12.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.12.2:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.13.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.13.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.13.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.13.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.14.0:-:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.14.0:patch:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.14.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.14.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.14.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.14.1:-:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.14.1:patch:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.15.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.15.0:-:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.15.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.15.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.16.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.16.0:-:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.16.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.16.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.17.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.17.0:-:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.17.0:patch:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.17.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.17.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.17.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.18.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.18.0:-:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.18.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.18.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.19.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.19.0:-:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.19.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.19.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.19.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.20.0:-:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.20.0:patch:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.20.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.20.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.20.1:-:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.20.1:patch:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.20.2:-:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.20.2:patch:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.21.0:-:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.21.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.21.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.22.0:-:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.22.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.22.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.23.0:-:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.23.0:patch:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.23.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.23.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.23.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.24.0:-:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.24.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.24.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.24.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.25.0:-:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.25.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.25.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.26.0:-:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.26.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:11.8.0:-:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:11.8.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:11.8.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:11.8.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:12.1.0:-:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:12.1.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:12.1.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:12.1.0:rc3:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*" ]
null
null
null
3.5
null
CVE-2025-32800
Conda-build vulnerable to supply chain attack vector due to pyproject.toml referring to dependencies not present in PyPI
Conda-build contains commands and tools to build conda packages. Prior to version 25.3.0, the pyproject.toml lists conda-index as a Python dependency. This package is not published in PyPI. An attacker could claim this namespace and upload arbitrary (malicious) code to the package, and then exploit pip install commands by injecting the malicious dependency in the solve. This issue has been fixed in version 25.3.0. A workaround involves using --no-deps for pip install-ing the project from the repository.
[]
7.2
null
null
null
null
RHSA-2012:1301
Red Hat Security Advisory: JBoss Enterprise Data Services Platform 5.3.0 update
Teiid: JDBC socket does not encrypt client login messages by default
[ "cpe:/a:redhat:jboss_enterprise_data_services:5.3" ]
null
null
null
null
null
GHSA-vgfm-52g5-pjww
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in The CSSIgniter Team Elements Plus! allows Stored XSS.This issue affects Elements Plus!: from n/a through 2.16.3.
[]
null
6.5
null
null
null
GHSA-r6w2-wcgh-gxjv
Buffer overflow in Adobe Shockwave Player before 11.6.8.638 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2012-4173, CVE-2012-4174, CVE-2012-4175, and CVE-2012-5273.
[]
null
null
null
null
null
GHSA-v24h-h5qr-mqm8
Driver Booster v10.6 was discovered to contain a buffer overflow via the Host parameter under the Customize proxy module.
[]
null
7.5
null
null
null
CVE-2020-19112
SQL Injection vulnerability in Online Book Store v1.0 via the bookisbn parameter to admin_delete.php, which could let a remote malicious user execute arbitrary code.
[ "cpe:2.3:a:projectworlds:online_book_store_project_in_php:1.0:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
null
GHSA-jfh5-68jv-jpmr
In on_l2cap_data_ind of btif_sock_l2cap.cc, there is possible memory corruption due to a use after free. This could lead to remote code execution over Bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-10Android ID: A-175686168
[]
null
null
null
null
null
GHSA-q74f-hvfr-7jqc
Korenix Jetwave 4200 Series 1.3.0 and JetWave 3000 Series 1.6.0 are vulnerable to Command Injection via /goform/formSysCmd. An attacker an modify the sysCmd parameter in order to execute commands as root.
[]
null
8.8
null
null
null
CVE-2022-26889
Path Traversal in search parameter results in external content injection
In Splunk Enterprise versions before 8.1.2, the uri path to load a relative resource within a web page is vulnerable to path traversal. It allows an attacker to potentially inject arbitrary content into the web page (e.g., HTML Injection, XSS) or bypass SPL safeguards for risky commands. The attack is browser-based. An attacker cannot exploit the attack at will and requires the attacker to initiate a request within the victim's browser (e.g., phishing).
[ "cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*" ]
null
8.8
null
null
null
CVE-2020-9629
Adobe DNG Software Development Kit (SDK) 1.5 and earlier versions have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
[ "cpe:2.3:a:adobe:digital_negative_software_development_kit:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
5.5
null
4.3
null
CVE-2022-22411
IBM Spectrum Scale Data Access Services (DAS) 5.1.3.1 could allow an authenticated user to insert code which could allow the attacker to manipulate cluster resources due to excessive permissions. IBM X-Force ID: 223016.
[ "cpe:2.3:a:ibm:spectrum_scale_data_access_services:5.1.3.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*" ]
null
null
6.3
null
null
CVE-2024-2221
Path Traversal and Arbitrary File Upload Vulnerability in qdrant/qdrant
qdrant/qdrant is vulnerable to a path traversal and arbitrary file upload vulnerability via the `/collections/{COLLECTION}/snapshots/upload` endpoint, specifically through the `snapshot` parameter. This vulnerability allows attackers to upload and overwrite any file on the filesystem, leading to potential remote code execution. This issue affects the integrity and availability of the system, enabling unauthorized access and potentially causing the server to malfunction.
[ "cpe:2.3:a:qdrant:qdrant:*:*:*:*:*:*:*:*" ]
null
null
9.8
null
null
CVE-2025-49669
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network.
[]
null
8.8
null
null
null
GHSA-rf6q-m37m-q323
SQL injection vulnerability in includes/count_dl_or_link.inc.php in the astatsPRO (com_astatspro) 1.0.1 component for Joomla! allows remote attackers to execute arbitrary SQL commands via the id parameter to getfile.php, a different vector than CVE-2008-0839. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
[]
null
null
null
null
null
GHSA-2hgr-r3c9-m9jw
Memory safety bugs present in Firefox ESR 115.26, Firefox ESR 128.13, Thunderbird ESR 128.13, Firefox ESR 140.1, Thunderbird ESR 140.1, Firefox 141 and Thunderbird 141. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 142, Firefox ESR < 115.27, Firefox ESR < 128.14, Firefox ESR < 140.2, Thunderbird < 142, Thunderbird < 128.14, and Thunderbird < 140.2.
[]
null
8.1
null
null
null
CVE-2020-19293
A stored cross-site scripting (XSS) vulnerability in the /article/add component of Jeesns 1.4.2 allows attackers to execute arbitrary web scripts or HTML via a crafted payload in a posted article.
[ "cpe:2.3:a:jeesns:jeesns:1.4.2:*:*:*:*:*:*:*" ]
null
5.4
null
3.5
null
RHSA-2013:1170
Red Hat Security Advisory: mongodb and pymongo security and enhancement update
MongoDB: Server Side JavaScript Includes allow Remote Code Execution pymongo: null pointer when decoding invalid DBRef
[ "cpe:/a:redhat:enterprise_mrg:2:server:el6" ]
null
null
null
null
null
CVE-2023-51712
An issue was discovered in Trusted Firmware-M through 2.0.0. The lack of argument verification in the logging subsystem allows attackers to read sensitive data via the login function.
[ "cpe:2.3:o:arm:trusted_firmware-m:*:*:*:*:*:*:*:*" ]
null
4.7
null
null
null
CVE-2019-15427
The Xiaomi Mi Mix Android device with a build fingerprint of Xiaomi/lithium/lithium:6.0.1/MXB48T/7.1.5:user/release-keys contains a pre-installed app with a package name of com.miui.powerkeeper app (versionCode=40000, versionName=4.0.00) that allows unauthorized wireless settings modification via a confused deputy attack. This capability can be accessed by any app co-located on the device.
[ "cpe:2.3:o:mi:mix_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:mi:mix:-:*:*:*:*:*:*:*" ]
null
3.3
null
2.1
null
RHSA-2003:270
Red Hat Security Advisory: kdebase security update
security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws" ]
null
null
null
null
null
GHSA-mhxp-j75h-h86w
Unspecified vulnerability in Panda Gold Protection and Global Protection 2014 7.01.01 and earlier, Internet Security 2014 19.01.01 and earlier, and AV Pro 2014 13.01.01 and earlier allows local users to gain privileges via unspecified vectors.
[]
null
null
null
null
null
CVE-2018-20874
cPanel before 74.0.8 allows self XSS in the WHM "Create a New Account" interface (SEC-428).
[ "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*" ]
null
null
5.4
3.5
null
GHSA-2f7m-mw9v-6jvp
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in VaultDweller Leyka allows Stored XSS. This issue affects Leyka: from n/a through 3.31.8.
[]
null
6.5
null
null
null
CVE-2020-14629
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 6.0 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N).
[ "cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*" ]
null
6
null
null
null
GHSA-69hc-w7p9-9v7x
vRealize Operations for Horizon Adapter (6.7.x prior to 6.7.1 and 6.6.x prior to 6.6.1) uses a JMX RMI service which is not securely configured. An unauthenticated remote attacker who has network access to vRealize Operations, with the Horizon Adapter running, may be able to execute arbitrary code in vRealize Operations.
[]
null
null
null
null
null
CVE-2020-22158
MediaKind (formerly Ericsson) RX8200 5.13.3 devices are vulnerable to multiple reflected and stored XSS. An attacker has to inject JavaScript code directly in the "path" or "Services+ID" parameters and send the URL to a user in order to exploit reflected XSS. In the case of stored XSS, an attacker must modify the "name" parameter with the malicious code.
[ "cpe:2.3:o:mediakind:rx8200_firmware:5.13.3:*:*:*:*:*:*:*", "cpe:2.3:h:mediakind:rx8200:-:*:*:*:*:*:*:*" ]
null
6.1
null
4.3
null
CVE-2023-31065
Apache InLong: Insufficient Session Expiration in InLong
Insufficient Session Expiration vulnerability in Apache Software Foundation Apache InLong.This issue affects Apache InLong: from 1.4.0 through 1.6.0.  An old session can be used by an attacker even after the user has been deleted or the password has been changed. Users are advised to upgrade to Apache InLong's 1.7.0 or cherry-pick https://github.com/apache/inlong/pull/7836 https://github.com/apache/inlong/pull/7836 , https://github.com/apache/inlong/pull/7884 https://github.com/apache/inlong/pull/7884 to solve it.
[ "cpe:2.3:a:apache:inlong:*:*:*:*:*:*:*:*" ]
null
9.1
null
null
null
CVE-2016-7508
Multiple SQL injection vulnerabilities in GLPI 0.90.4 allow an authenticated remote attacker to execute arbitrary SQL commands by using a certain character when the database is configured to use Big5 Asian encoding.
[ "cpe:2.3:a:glpi-project:glpi:0.90.4:*:*:*:*:*:*:*" ]
null
null
7.5
6
null
GHSA-hcrc-4mmf-w8v9
An issue was discovered in Avast Antivirus before 20. The aswTask RPC endpoint for the TaskEx library in the Avast Service (AvastSvc.exe) allows attackers to enumerate the network interfaces and access points from a Low Integrity process via RPC.
[]
null
null
null
null
null
GHSA-936g-q8pj-qjhp
Vulnerability in AMSS++ version 4.31, which does not sufficiently encode user-controlled input, resulting in a Cross-Site Scripting (XSS) vulnerability through /amssplus/modules/book/main/bookdetail_school_person.php, in the 'b_id' parameter. This vulnerability could allow a remote attacker to send a specially crafted URL to an authenticated user and steal their session cookie credentials.
[]
null
7.1
null
null
null
CVE-2019-14998
The Webwork action Cross-Site Request Forgery (CSRF) protection implementation in Jira before version 8.4.0 allows remote attackers to bypass its protection via "cookie tossing" a CSRF cookie from a subdomain of a Jira instance.
[ "cpe:2.3:a:atlassian:jira_server:*:*:*:*:*:*:*:*" ]
null
6.5
null
4.3
null
GHSA-2c3g-5x92-qfrv
Local privilege escalation due to insecure folder permissions. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 39900.
[]
null
7.8
null
null
null
GHSA-2qxv-pr9r-9797
An input validation weakness was discovered in XCC that could allow a valid, authenticated XCC user with elevated privileges to perform command injection or cause a recoverable denial of service using a specially crafted file.
[]
null
7.2
null
null
null
CVE-2019-4161
IBM Security Information Queue (ISIQ) 1.0.0, 1.0.1, and 1.0.2 discloses sensitive information to unauthorized users. The information can be used to mount further attacks on the system. IBM X-Force ID: 158660.
[ "cpe:2.3:a:ibm:security_information_queue:1.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:security_information_queue:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:security_information_queue:1.0.2:*:*:*:*:*:*:*" ]
null
null
4
null
null
GHSA-rm9p-68g4-m5r5
An issue discovered in phpwcms 1.9.25 allows remote attackers to run arbitrary code via DB user field during installation.
[]
null
9.8
null
null
null
GHSA-f4h5-j74p-qq45
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Bit Apps Bit Form Pro.This issue affects Bit Form Pro: from n/a through 2.6.4.
[]
null
6.5
null
null
null
GHSA-xv6x-456v-24xh
gotify/server vulnerable to Cross-site Scripting in the application image file upload
ImpactThe XSS vulnerability allows authenticated users to upload .html files. With that, an attacker could execute client side scripts **if** another user opened a link, such as:An attacker could potentially take over the account of the user that clicked the link. Keep in mind, the Gotify UI won't natively expose such a malicious link, so an attacker has to get the user to open the malicious link in a context outside of Gotify.PatchesThe vulnerability has been fixed in version 2.2.2.WorkaroundsYou can block access to non image files via a reverse proxy in the `./image` directory.Referenceshttps://github.com/gotify/server/pull/534 https://github.com/gotify/server/pull/535Thanks to rickshang (aka 无在无不在) for discovering and reporting this bug.
[]
null
4.6
null
null
null
CVE-2015-0972
Pearson ProctorCache before 2015.1.17 uses the same hardcoded password across different customers' installations, which allows remote attackers to modify test metadata or cause a denial of service (test disruption) by leveraging knowledge of this password.
[ "cpe:2.3:a:pearson:proctorcache:*:*:*:*:*:*:*:*" ]
null
null
null
5
null
GHSA-7rp4-4g4h-9gwv
RuvarOA v6.01 and v12.01 were discovered to contain a SQL injection vulnerability via the id parameter at /AddressBook/address_public_show.aspx.
[]
null
9.8
null
null
null
CVE-2015-7091
Apple QuickTime before 7.7.9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted movie file, a different vulnerability than CVE-2015-7085, CVE-2015-7086, CVE-2015-7087, CVE-2015-7088, CVE-2015-7089, CVE-2015-7090, CVE-2015-7092, and CVE-2015-7117.
[ "cpe:2.3:a:apple:quicktime:*:*:*:*:*:*:*:*" ]
null
null
6.6
6.8
null
GHSA-4xvh-94m9-fjgr
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Options). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all MySQL Server accessible data. CVSS 3.1 Base Score 4.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N).
[]
null
null
null
null
null
CVE-2023-23551
X-600M Code Injection
Control By Web X-600M devices run Lua scripts and are vulnerable to code injection, which could allow an attacker to remotely execute arbitrary code.
[ "cpe:2.3:o:controlbyweb:x-600m_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:controlbyweb:x-600m:-:*:*:*:*:*:*:*" ]
null
9.1
null
null
null
CVE-2019-17180
Valve Steam Client before 2019-09-12 allows placing or appending partially controlled filesystem content, as demonstrated by file modifications on Windows in the context of NT AUTHORITY\SYSTEM. This could lead to denial of service, elevation of privilege, or unspecified other impact.
[ "cpe:2.3:a:valvesoftware:steam_client:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
7.8
null
7.2
null
CVE-2006-6570
Unrestricted file upload vulnerability in upload.php in GenesisTrader 1.0 allows remote authenticated users to upload arbitrary files via unspecified vectors, possibly involving form.php and the ajoutfich "foap" action.
[ "cpe:2.3:a:genesistrader:genesistrader:1.0:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
GHSA-f22m-r62p-8qrj
Vulnerability in the Oracle Advanced Outbound Telephony product of Oracle E-Business Suite (component: Calendar). Supported versions that are affected are 12.1.1-12.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Advanced Outbound Telephony. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Advanced Outbound Telephony, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Advanced Outbound Telephony accessible data as well as unauthorized update, insert or delete access to some of Oracle Advanced Outbound Telephony accessible data. CVSS 3.0 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N).
[]
null
null
null
null
null
RHSA-2019:0229
Red Hat Security Advisory: ghostscript security and bug fix update
ghostscript: use-after-free in copydevice handling (699661) ghostscript: access bypass in psi/zdevice2.c (700153) ghostscript: access bypass in psi/zicc.c (700169) ghostscript: access bypass in psi/zfjbig2.c (700168) ghostscript: subroutines within pseudo-operators must themselves be pseudo-operators (700317)
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
7.3
null
null
RHSA-2021:2307
Red Hat Security Advisory: microcode_ctl security, bug fix and enhancement update
hw: vt-d related privilege escalation hw: improper isolation of shared resources in some Intel Processors hw: observable timing discrepancy in some Intel Processors hw: information disclosure on some Intel Atom processors
[ "cpe:/o:redhat:rhel_eus:8.2::baseos" ]
null
5.6
null
null
null
GHSA-9fjq-qvpr-gcq2
Integer overflow in the fts_build function in fts.c in libc in (1) OpenBSD 4.4 and earlier and (2) Microsoft Interix 6.0 build 10.0.6030.0 allows context-dependent attackers to cause a denial of service (application crash) via a deep directory tree, related to the fts_level structure member, as demonstrated by (a) du, (b) rm, (c) chmod, and (d) chgrp on OpenBSD; and (e) SearchIndexer.exe on Vista Enterprise.
[]
null
null
null
null
null
GHSA-36c3-jcm2-rm3j
ChakraCore RCE Vulnerability
The Chakra JavaScript engine in Microsoft Edge allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Scripting Engine Memory Corruption Vulnerability," a different vulnerability than CVE-2016-3386, CVE-2016-3389, and CVE-2016-7190.
[]
null
null
7.5
null
null
GHSA-6mmm-fwjc-qrhc
In the Linux kernel, the following vulnerability has been resolved:io_uring: check if iowq is killed before queuingtask work can be executed after the task has gone through io_uring termination, whether it's the final task_work run or the fallback path. In this case, task work will find ->io_wq being already killed and null'ed, which is a problem if it then tries to forward the request to io_queue_iowq(). Make io_queue_iowq() fail requests in this case.Note that it also checks PF_KTHREAD, because the user can first close a DEFER_TASKRUN ring and shortly after kill the task, in which case ->iowq check would race.
[]
null
null
null
null
null
CVE-2021-40564
A Segmentation fault caused by null pointer dereference vulnerability eists in Gpac through 1.0.2 via the avc_parse_slice function in av_parsers.c when using mp4box, which causes a denial of service.
[ "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*" ]
null
5.5
null
4.3
null
GHSA-8qxp-976h-rx2p
Vulnerability in the Oracle Retail Customer Management and Segmentation Foundation product of Oracle Retail Applications (component: Internal Operations). The supported version that is affected is 19.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Retail Customer Management and Segmentation Foundation. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Retail Customer Management and Segmentation Foundation accessible data as well as unauthorized read access to a subset of Oracle Retail Customer Management and Segmentation Foundation accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Retail Customer Management and Segmentation Foundation. CVSS 3.1 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L).
[]
null
null
null
null
null
CVE-2021-35554
Vulnerability in the Oracle Trade Management product of Oracle E-Business Suite (component: Quotes). Supported versions that are affected are 12.1.1-12.1.3 and 12.2.3-12.2.10. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Trade Management. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Trade Management accessible data. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).
[ "cpe:2.3:a:oracle:trade_management:*:*:*:*:*:*:*:*" ]
null
5.3
null
null
null
GHSA-9vvm-3ggf-936m
A logic issue was addressed with improved restrictions. This issue is fixed in iOS 15.4 and iPadOS 15.4, macOS Monterey 12.3. A malicious application may be able to leak sensitive user information.
[]
null
5.5
null
null
null
RHSA-2014:1997
Red Hat Security Advisory: kernel security and bug fix update
Kernel: net: guard tcp_set_keepalive against crash kernel: sctp: skb_over_panic when receiving malformed ASCONF chunks kernel: net: sctp: fix panic on duplicate ASCONF chunks kernel: net: sctp: remote memory pressure from excessive queueing kernel: isofs: unbound recursion when processing relocated directories kernel: isofs: unbound recursion when processing relocated directories kernel: udf: Avoid infinite loop when processing indirect ICBs kernel: x86: local privesc due to bad_iret and paranoid entry incompatibility
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
8.4
null
null
GHSA-52fv-pgw9-4xgg
Cross-site request forgery (CSRF) vulnerability in ecrire/action/logout.php in SPIP before 2.1.24 allows remote attackers to hijack the authentication of arbitrary users for requests that logout the user via unspecified vectors.
[]
null
null
null
null
null
GHSA-xcmh-fgq9-r6jc
Type Confusion in V8 in Google Chrome prior to 131.0.6778.139 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
[]
null
8.8
null
null
null
CVE-2024-36505
An improper access control vulnerability [CWE-284] in FortiOS 7.4.0 through 7.4.3, 7.2.5 through 7.2.7, 7.0.12 through 7.0.14 and 6.4.x may allow an attacker who has already successfully obtained write access to the underlying system (via another hypothetical exploit) to bypass the file integrity checking system.
[ "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*" ]
null
4.7
null
null
null
GHSA-48mx-245h-4c59
libX11 X library allows remote attackers to cause a denial of service via a resource mask of 0, which causes libX11 to go into an infinite loop.
[]
null
null
null
null
null
CVE-2018-8058
CMS Made Simple (CMSMS) 2.2.6 has XSS in admin/moduleinterface.php via the pagedata parameter.
[ "cpe:2.3:a:cmsmadesimple:cms_made_simple:2.2.6:*:*:*:*:*:*:*" ]
null
null
4.8
3.5
null
GHSA-9gx2-ffqm-p293
Auth. (admin+) Cross-Site Scripting (XSS) vulnerability in Link Software LLC WP Terms Popup plugin <= 2.6.0 versions.
[]
null
4.8
null
null
null
GHSA-448r-5hhg-h92c
Chicken before 4.8.0 does not properly handle NUL bytes in certain strings, which allows an attacker to conduct "poisoned NUL byte attack."
[]
null
6.5
null
null
null