id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
189k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
patch_commit_url
stringlengths
36
232
CVE-2011-0561
Adobe Flash Player before 10.2.152.26 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0559, CVE-2011-0560, CVE-2011-0571, CVE-2011-0572, CVE-2011-0573, CVE-2011-0574, CVE-2011-0578, CVE-2011-0607, and CVE-2011-0608.
[ "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:6.0.21.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:6.0.79:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:7.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:7.0.14.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:7.0.19.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:7.0.24.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:7.0.25:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:7.0.53.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:7.0.60.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:7.0.61.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:7.0.63:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:7.0.66.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:7.0.67.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:7.0.68.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:7.0.69.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:7.0.70.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:7.0.73.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:7.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:7.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:7.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:8.0.22.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:8.0.24.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:8.0.33.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:8.0.34.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:8.0.35.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:8.0.42.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.16:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.18d60:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.20:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.20.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.28:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.28.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.31:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.31.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.45.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.47.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.48.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.112.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.124.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.125.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.151.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.152.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.155.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.159.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.246.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.260.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.262.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.277.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.283.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.125.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.0.0.584:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.0.12.10:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.0.12.36:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.0.15.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.0.22.87:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.0.32.18:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.0.42.34:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.0.45.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.1.52.14.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.1.52.15:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.1.53.64:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.1.82.76:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.1.85.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.1.92.8:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.1.92.10:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.1.95.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.1.95.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.1.102.64:*:*:*:*:*:*:*" ]
null
null
null
9.3
null
CVE-2008-7012
courier/1000@/api_error_email.html (aka "error reporting page") in Accellion File Transfer Appliance FTA_7_0_178, and possibly other versions before FTA_7_0_189, allows remote attackers to send spam e-mail via modified description and client_email parameters.
[ "cpe:2.3:h:accellion:secure_file_transfer_appliance:*:*:*:*:*:*:*:*", "cpe:2.3:h:accellion:secure_file_transfer_appliance:7_0_135:*:*:*:*:*:*:*" ]
null
null
null
7.8
null
CVE-2023-4805
Tutor LMS < 2.3.0 - Subscriber+ Stored Cross-Site Scripting
The Tutor LMS WordPress plugin before 2.3.0 does not sanitise and escape some of its settings, which could allow users such as subscriber to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
[ "cpe:2.3:a:themeum:tutor_lms:*:*:*:*:*:wordpress:*:*" ]
null
5.4
null
null
null
GHSA-7m9j-326v-p83m
Cross-site scripting (XSS) vulnerability in services/diagnostics.php in the WordPress Social Login plugin 2.0.3 and earlier for WordPress allows remote attackers to inject arbitrary web script or HTML via the xhrurl parameter.
[]
null
null
null
null
null
RHSA-2014:0897
Red Hat Security Advisory: Red Hat JBoss Enterprise Web Platform 5.2.0 security update
PicketLink: XXE via insecure DocumentBuilderFactory usage
[ "cpe:/a:redhat:jboss_enterprise_web_platform:5.2.0" ]
null
null
null
null
null
CVE-2008-1876
PHP remote file inclusion vulnerability in index.php in VisualPic 0.3.1 allows remote attackers to execute arbitrary PHP code via a URL in the _CONFIG[files][functions_page] parameter.
[ "cpe:2.3:a:snarky:visualpic:0.3.1:*:*:*:*:*:*:*" ]
null
null
null
6.8
null
CVE-2021-22148
Elastic Enterprise Search App Search versions before 7.14.0 was vulnerable to an issue where API keys were not bound to the same engines as their creator. This could lead to a less privileged user gaining access to unauthorized engines.
[ "cpe:2.3:a:elastic:enterprise_search:*:*:*:*:*:*:*:*" ]
null
8.8
null
6.5
null
GHSA-j4rg-rp32-grwp
Improper access control for some Intel(R) EMA software before version 1.13.1.0 may allow an authenticated user to potentially enable escalation of privilege via local access.
[]
7
8.2
null
null
null
CVE-2024-43391
Phoenix Contact: Firewall reconfiguration through the FW_PORTFORWARDING.SRC_IP in MGUARD devices
A low privileged remote attacker can perform configuration changes of the firewall services, including packet filter, packet forwarding, network access control or NAT through the FW_PORTFORWARDING.SRC_IP environment variable which can lead to a DoS.
[ "cpe:2.3:o:phoenixcontact:tc_mguard_rs4000_4g_vzw_vpn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:tc_mguard_rs4000_4g_vzw_vpn:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:tc_mguard_rs4000_4g_vpn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:tc_mguard_rs4000_4g_vpn:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:tc_mguard_rs4000_4g_att_vpn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:tc_mguard_rs4000_4g_att_vpn:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:tc_mguard_rs4000_3g_vpn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:tc_mguard_rs4000_3g_vpn:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:tc_mguard_rs2000_4g_vzw_vpn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:tc_mguard_rs2000_4g_vzw_vpn:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:tc_mguard_rs2000_4g_vpn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:tc_mguard_rs2000_4g_vpn:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:tc_mguard_rs2000_4g_att_vpn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:tc_mguard_rs2000_4g_att_vpn:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:tc_mguard_rs2000_3g_vpn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:tc_mguard_rs2000_3g_vpn:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_smart2_vpn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_mguard_smart2_vpn:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_smart2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_mguard_smart2:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_rs4004_tx\\/dtx_vpn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_mguard_rs4004_tx\\/dtx_vpn:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_rs4004_tx\\/dtx_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_mguard_rs4004_tx\\/dtx:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_rs4000_tx\\/tx_vpn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_mguard_rs4000_tx\\/tx_vpn:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_rs4000_tx\\/tx-p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_mguard_rs4000_tx\\/tx-p:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_rs4000_tx\\/tx-m_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_mguard_rs4000_tx\\/tx-m:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_rs4000_tx\\/tx_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_mguard_rs4000_tx\\/tx:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_rs2005_tx_vpn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_mguard_rs2005_tx_vpn:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_rs2000_tx\\/tx_vpn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_mguard_rs2000_tx\\/tx_vpn:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_rs2000_tx\\/tx-b_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_mguard_rs2000_tx\\/tx-b:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_pcie4000_vpn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_mguard_pcie4000_vpn:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_pcie4000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_mguard_pcie4000:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_pci4000_vpn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_mguard_pci4000_vpn:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_pci4000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_mguard_pci4000:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_gt\\/gt_vpn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_mguard_gt\\/gt_vpn:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_gt\\/gt_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_mguard_gt\\/gt:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_delta_tx\\/tx_vpn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_mguard_delta_tx\\/tx_vpn:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_delta_tx\\/tx_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_mguard_delta_tx\\/tx:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_core_tx_vpn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_mguard_core_tx_vpn:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_core_tx_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_mguard_core_tx:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_centerport_vpn-1000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_mguard_centerport_vpn-1000:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_4305_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_mguard_4305:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_4302_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_mguard_4302:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_4102_pcie_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_mguard_4102_pcie:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_4102_pci_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_mguard_4102_pci:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_2105_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_mguard_2105:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_2102_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_mguard_2102:-:*:*:*:*:*:*:*" ]
null
8.1
null
null
null
GHSA-rfcv-37mc-m46j
Reflected cross site scripting (XSS)
[]
null
6.1
null
null
null
RHSA-2023:4341
Red Hat Security Advisory: Logging Subsystem 5.7.4 - Red Hat OpenShift bug fix and security update
nodejs-semver: Regular expression denial of service rubygem-activesupport: Regular Expression Denial of Service
[ "cpe:/a:redhat:logging:5.7::el8" ]
null
7.5
null
null
null
CVE-2024-41376
dzzoffice 2.02.1 is vulnerable to Directory Traversal via user/space/about.php.
[ "cpe:2.3:a:dzzoffice:dzzoffice:2.02.1:*:*:*:*:*:*:*" ]
null
8.8
null
null
null
GHSA-xh4q-pv2r-82c7
Mozilla Firefox 1.5.0.3 allows remote attackers to cause a denial of service via a web page with a large number of IMG elements in which the SRC attribute is a mailto URI. NOTE: another researcher found that the web page caused a temporary browser slowdown instead of a crash.
[]
null
null
null
null
null
CVE-2019-2301
Possibility of out-of-bound read if id received from SPI is not in range of FIFO in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in IPQ4019, IPQ8064, MSM8909W, MSM8996AU, QCA9980, QCS605, Qualcomm 215, SD 425, SD 439 / SD 429, SD 450, SD 625, SD 632, SD 636, SD 712 / SD 710 / SD 670, SD 820A, SD 845 / SD 850, SD 855, SDM439, SDM660, SDX24
[ "cpe:2.3:o:qualcomm:ipq4019_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ipq4019:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ipq8064_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ipq8064:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:msm8909w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:msm8909w:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:msm8996au:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca9980_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca9980:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcs605_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcs605:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qualcomm_215_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qualcomm_215:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_425_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_425:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_439_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_439:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_429_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_429:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_450_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_450:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_625_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_625:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_632_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_632:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_636_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_636:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_712_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_712:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_710_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_710:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_670_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_670:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_820a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_820a:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_845_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_845:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_850_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_850:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_855_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_855:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdm439_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm439:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdm660_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm660:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdx24_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdx24:-:*:*:*:*:*:*:*" ]
null
null
7.8
4.6
null
CVE-2017-13015
The EAP parser in tcpdump before 4.9.2 has a buffer over-read in print-eap.c:eap_print().
[ "cpe:2.3:a:tcpdump:tcpdump:*:*:*:*:*:*:*:*" ]
null
null
9.8
7.5
null
CVE-2024-51697
WordPress Doofinder plugin <= 0.5.4 - Reflected Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Doofinder allows Reflected XSS.This issue affects Doofinder: from n/a through 0.5.4.
[]
null
7.1
null
null
null
GHSA-2v7h-5r83-vh8r
GNU Emacs before 25.3 allows remote attackers to execute arbitrary code via email with crafted "Content-Type: text/enriched" data containing an x-display XML element that specifies execution of shell commands, related to an unsafe text/enriched extension in lisp/textmodes/enriched.el, and unsafe Gnus support for enriched and richtext inline MIME objects in lisp/gnus/mm-view.el. In particular, an Emacs user can be instantly compromised by reading a crafted email message (or Usenet news article).
[]
null
null
8.8
null
null
GHSA-rw5r-82jx-qr25
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).
[]
null
null
7.8
null
null
GHSA-h4f9-wrfv-243r
Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Utilities). Supported versions that are affected are Java SE: 7u221, 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
[]
null
null
5.3
null
null
GHSA-756j-8p5m-2p7m
libraries/common.inc.php in phpMyAdmin 4.0.x before 4.0.10.7, 4.1.x before 4.1.14.8, and 4.2.x before 4.2.13.1 allows remote attackers to cause a denial of service (resource consumption) via a long password.
[]
null
null
null
null
null
CVE-2024-0932
Tenda AC10U setSmartPowerManagement stack-based overflow
A vulnerability, which was classified as critical, has been found in Tenda AC10U 15.03.06.49_multi_TDE01. This issue affects the function setSmartPowerManagement. The manipulation of the argument time leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-252137 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
[ "cpe:2.3:o:tendacn:ac10u_firmware:15.03.06.49_multi_tde01:*:*:*:*:*:*:*", "cpe:2.3:h:tendacn:ac10u:1.0:*:*:*:*:*:*:*" ]
null
4.7
4.7
5.8
null
GHSA-3w3w-pxmm-2w2j
crypto-js uses insecure random numbers
The crypto-js package before 3.2.1 for Node.js generates random numbers by concatenating the string "0." with an integer, which makes the output more predictable than necessary.
[]
null
5.3
null
null
null
CVE-2004-2497
Cross-site scripting (XSS) vulnerability in the error handler in Hitachi Web Page Generator and Web Page Generator Enterprise 4.01 and earlier, when using the default error template and debug mode is set to ON, allows remote attackers to inject arbitrary web script or HTML via unknown attack vectors.
[ "cpe:2.3:a:hitachi:web_page_generator:01_00:*:*:*:*:*:*:*", "cpe:2.3:a:hitachi:web_page_generator:01_01_c:*:*:*:*:*:*:*", "cpe:2.3:a:hitachi:web_page_generator:02_00:*:*:*:*:*:*:*", "cpe:2.3:a:hitachi:web_page_generator:02_00_c:*:*:*:*:*:*:*", "cpe:2.3:a:hitachi:web_page_generator_enterprise:03_00:*:*:*:*:*:*:*", "cpe:2.3:a:hitachi:web_page_generator_enterprise:03_02_c:*:*:*:*:*:*:*", "cpe:2.3:a:hitachi:web_page_generator_enterprise:03_03:*:*:*:*:*:*:*", "cpe:2.3:a:hitachi:web_page_generator_enterprise:03_03_c:*:*:*:*:*:*:*", "cpe:2.3:a:hitachi:web_page_generator_enterprise:03_03_d:*:*:*:*:*:*:*", "cpe:2.3:a:hitachi:web_page_generator_enterprise:04_00:*:*:*:*:*:*:*", "cpe:2.3:a:hitachi:web_page_generator_enterprise:04_00_c:*:*:*:*:*:*:*", "cpe:2.3:a:hitachi:web_page_generator_enterprise:04_01:*:*:*:*:*:*:*", "cpe:2.3:a:hitachi:web_page_generator_enterprise:04_01_b:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
GHSA-3qpr-v3fc-q5q5
In the Linux kernel, the following vulnerability has been resolved:arm64: errata: Add Cortex-A520 speculative unprivileged load workaroundImplement the workaround for ARM Cortex-A520 erratum 2966298. On an affected Cortex-A520 core, a speculatively executed unprivileged load might leak data from a privileged load via a cache side channel. The issue only exists for loads within a translation regime with the same translation (e.g. same ASID and VMID). Therefore, the issue only affects the return to EL0.The workaround is to execute a TLBI before returning to EL0 after all loads of privileged data. A non-shareable TLBI to any address is sufficient.The workaround isn't necessary if page table isolation (KPTI) is enabled, but for simplicity it will be. Page table isolation should normally be disabled for Cortex-A520 as it supports the CSV3 feature and the E0PD feature (used when KASLR is enabled).
[]
null
4.7
null
null
null
CVE-2025-0344
leiyuxi cy-fast listData sql injection
A vulnerability has been found in leiyuxi cy-fast 1.0 and classified as critical. Affected by this vulnerability is the function listData of the file /commpara/listData. The manipulation of the argument order leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
[]
5.3
6.3
6.3
6.5
null
GHSA-rrmc-jw5p-mf7q
D-Link DSR-150 with firmware before 1.08B44; DSR-150N with firmware before 1.05B64; DSR-250 and DSR-250N with firmware before 1.08B44; and DSR-500, DSR-500N, DSR-1000, and DSR-1000N with firmware before 1.08B77 have a hardcoded account of username gkJ9232xXyruTRmY, which makes it easier for remote attackers to obtain access by leveraging knowledge of the username.
[]
null
null
null
null
null
CVE-2024-50417
WordPress Bold Page Builder plugin <= 5.1.3 - Broken Access Control vulnerability
Missing Authorization vulnerability in BoldThemes Bold Page Builder allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Bold Page Builder: from n/a through 5.1.3.
[ "cpe:2.3:a:bold-themes:bold_page_builder:*:*:*:*:*:wordpress:*:*" ]
null
4.3
null
null
null
GHSA-vhfq-gpqw-p5cw
A Regular Expression Denial of Service (ReDoS) vulnerability exists in gaizhenbiao/chuanhuchatgpt, as of commit 20b2e02. The server uses the regex pattern `r'<[^>]+>'` to parse user input. In Python's default regex engine, this pattern can take polynomial time to match certain crafted inputs. An attacker can exploit this by uploading a malicious JSON payload, causing the server to consume 100% CPU for an extended period. This can lead to a Denial of Service (DoS) condition, potentially affecting the entire server.
[]
null
null
6.5
null
null
CVE-2007-1973
Race condition in the Virtual DOS Machine (VDM) in the Windows Kernel in Microsoft Windows NT 4.0 allows local users to modify memory and gain privileges via the temporary \Device\PhysicalMemory section handle, a related issue to CVE-2007-1206.
[ "cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*" ]
null
null
null
6.9
null
CVE-2021-21156
Heap buffer overflow in V8 in Google Chrome prior to 88.0.4324.182 allowed a remote attacker to potentially exploit heap corruption via a crafted script.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*" ]
null
8.8
null
6.8
null
CVE-2017-3578
Vulnerability in the Sun ZFS Storage Appliance Kit (AK) component of Oracle Sun Systems Products Suite (subcomponent: RAS subsystems). The supported version that is affected is AK 2013. Easily "exploitable" vulnerability allows low privileged attacker with logon to the infrastructure where Sun ZFS Storage Appliance Kit (AK) executes to compromise Sun ZFS Storage Appliance Kit (AK). While the vulnerability is in Sun ZFS Storage Appliance Kit (AK), attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Sun ZFS Storage Appliance Kit (AK). CVSS 3.0 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H).
[ "cpe:2.3:a:oracle:sun_zfs_storage_appliance_kit_software:2013:*:*:*:*:*:*:*" ]
null
null
8.8
4.6
null
GHSA-wh2j-cwv9-298v
An unspecified ActiveX control in Schneider Electric SoMachine HVAC Programming Software for M171/M172 Controllers before 2.1.0 allows remote attackers to execute arbitrary code via unknown vectors, related to the INTERFACESAFE_FOR_UNTRUSTED_CALLER (aka safe for scripting) flag.
[]
null
7.3
null
null
null
CVE-2017-13711
Use-after-free vulnerability in the sofree function in slirp/socket.c in QEMU (aka Quick Emulator) allows attackers to cause a denial of service (QEMU instance crash) by leveraging failure to properly clear ifq_so from pending packets.
[ "cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" ]
null
7.5
null
5
null
RHSA-2015:2661
Red Hat Security Advisory: Red Hat JBoss Web Server 3.0.2 security update
httpd: bypass of mod_headers rules via chunked requests tomcat: non-persistent DoS attack by feeding data by aborting an upload httpd: NULL pointer dereference in mod_cache if Content-Type has empty value httpd: HTTP request smuggling attack against chunked request parser tomcat: URL Normalization issue
[ "cpe:/a:redhat:jboss_enterprise_web_server:3.0" ]
null
null
4.3
null
null
CVE-2017-9346
In Wireshark 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the SoulSeek dissector could go into an infinite loop. This was addressed in epan/dissectors/packet-slsk.c by making loop bounds more explicit.
[ "cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*" ]
null
null
7.5
7.8
null
CVE-2014-4887
The Joint Radio Blues (aka com.nobexinc.wls_69685189.rc) application 3.2.3 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[ "cpe:2.3:a:nobexrc:joint_radio_blues:3.2.3:*:*:*:*:android:*:*" ]
null
null
null
5.4
null
CVE-2020-2275
Jenkins Copy data to workspace Plugin 1.0 and earlier does not limit which directories can be copied from the Jenkins controller to job workspaces, allowing attackers with Job/Configure permission to read arbitrary files on the Jenkins controller.
[ "cpe:2.3:a:jenkins:copy_data_to_workspace:*:*:*:*:*:jenkins:*:*" ]
null
6.5
null
4
null
GHSA-84xj-78rw-rf33
An Insufficient Verification of Data Authenticity vulnerability in B. Braun SpaceCom2 prior to 012U000062 allows a remote unauthenticated attacker to send the device malicious data that will be used in place of the correct data. This results in full system command access and execution because of the lack of cryptographic signatures on critical data sets.
[]
null
9.8
null
null
null
CVE-2008-2002
Multiple cross-site request forgery (CSRF) vulnerabilities on Motorola Surfboard with software SB5100-2.3.3.0-SCM00-NOSH allow remote attackers to (1) cause a denial of service (device reboot) via the "Restart Cable Modem" value in the BUTTON_INPUT parameter to configdata.html, and (2) cause a denial of service (hard reset) via the "Reset All Defaults" value in the BUTTON_INPUT parameter to configdata.html.
[ "cpe:2.3:h:motorola:surfboard:sb5100:*:*:*:*:*:*:*" ]
null
null
null
7.8
null
GHSA-c5rq-j6hh-2mxr
In the Linux kernel, the following vulnerability has been resolved:vdpa: ifcvf: Do proper cleanup if IFCVF init failsifcvf_mgmt_dev leaks memory if it is not freed before returning. Call is made to correct return statement so memory does not leak. ifcvf_init_hw does not take care of this so it is needed to do it here.
[]
null
5.5
null
null
null
GHSA-724m-f653-3f8m
The Auto Affiliate Links plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the aalAddLink function in all versions up to, and including, 6.4.3. This makes it possible for authenticated attackers, with subscriber access or higher, to add arbitrary links to posts.
[]
null
4.3
null
null
null
CVE-2019-14391
cPanel before 82.0.2 does not properly enforce Reseller package creation ACLs (SEC-514).
[ "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*" ]
null
null
3.3
2.1
null
GHSA-h35x-4m68-cvrj
ptrace on HP-UX 11.00 through 11.11 allows local users to cause a denial of service (data page fault panic) via "an incorrect reference to thread register state."
[]
null
null
null
null
null
CVE-2024-56036
WordPress odPhotogallery plugin <= 0.5.3 - Reflected Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Ondrej Donek odPhotogallery allows Reflected XSS.This issue affects odPhotogallery: from n/a through 0.5.3.
[]
null
7.1
null
null
null
CVE-2010-4512
Cobbler before 2.0.4 uses an incorrect umask value, which allows local users to have an unspecified impact by leveraging world writable permissions for files and directories.
[ "cpe:2.3:a:michael_dehaan:cobbler:*:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:0.1.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:0.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:0.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:0.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:0.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:0.2.7:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:0.2.8:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:0.2.9:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:0.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:0.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:0.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:0.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:0.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:0.3.6:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:0.3.7:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:0.3.9:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:0.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:0.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:0.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:0.4.5:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:0.4.6:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:0.4.7:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:0.4.8:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:0.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:0.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:0.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:0.6.3:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:0.6.4:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:0.6.5:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:0.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:0.8.3:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:1.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:1.0.2-1:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:1.0.3-1:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:1.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:1.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:1.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:1.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:1.2.7:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:1.2.8:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:1.2.8-1:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:1.2.9:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:1.2.9-1:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:1.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:1.3.1-1:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:1.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:1.3.3-1:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:1.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:1.3.4-1:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:1.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:1.4.0-2:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:1.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:1.4.1-1:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:1.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:1.4.2-1:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:1.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:1.4.3-4:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:1.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:1.6.1-1:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:1.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:1.6.2-1:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:1.6.3:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:1.6.3-1:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:1.6.4:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:1.6.4-1:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:1.6.5:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:1.6.5-1:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:1.6.6:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:1.6.6-1:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:1.6.8:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:1.6.8-1:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:2.0.0-1:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:2.0.1-1:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:2.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:michael_dehaan:cobbler:2.0.3.1:*:*:*:*:*:*:*" ]
null
null
null
7.2
null
CVE-2015-0515
Unrestricted file upload vulnerability in EMC M&R (aka Watch4Net) before 6.5u1 and ViPR SRM before 3.6.1 allows remote authenticated users to execute arbitrary code by uploading and then accessing an executable file.
[ "cpe:2.3:a:emc:watch4net:*:*:*:*:*:*:*:*", "cpe:2.3:a:emc:vipr_srm:*:*:*:*:*:*:*:*" ]
null
null
null
6.5
null
CVE-2008-6769
Unrestricted file upload vulnerability in upload.php in YourPlace 1.0.2 and earlier allows remote authenticated users to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file.
[ "cpe:2.3:a:peterselie:yourplace:*:*:*:*:*:*:*:*", "cpe:2.3:a:peterselie:yourplace:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:peterselie:yourplace:1.0.1:*:*:*:*:*:*:*" ]
null
null
null
6
null
CVE-2018-12827
Adobe Flash Player 30.0.0.134 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
[ "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:chrome:*:*", "cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:edge:*:*", "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:internet_explorer_11:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*" ]
null
null
7.5
5
null
RHSA-2025:14421
Red Hat Security Advisory: webkit2gtk3 security update
angle: insufficient input validation can cause undefined behavior webkitgtk: Processing maliciously crafted web content may lead to memory corruption webkitgtk: Processing maliciously crafted web content may lead to memory corruption webkitgtk: Processing web content may lead to a denial-of-service webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash webkitgtk: Processing maliciously crafted web content may disclose sensitive user information webkitgtk: A download’s origin may be incorrectly associated webkitgtk: Processing maliciously crafted web content may disclose internal states of the app
[ "cpe:/a:redhat:rhel_e4s:9.2::appstream" ]
null
6.5
null
null
null
GHSA-86q4-677r-wjxv
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: PAM Auth Plugin). Supported versions that are affected are 5.7.32 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
[]
null
null
null
null
null
CVE-2022-44444
In wlan driver, there is a possible missing bounds check. This could lead to local denial of service in wlan services.
[ "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:sc7731e:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:sc9832e:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t310:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*" ]
null
5.5
null
null
null
CVE-2023-41050
Information disclosure through Python's "format" functionality in Zope AccessControl
AccessControl provides a general security framework for use in Zope. Python's "format" functionality allows someone controlling the format string to "read" objects accessible (recursively) via attribute access and subscription from accessible objects. Those attribute accesses and subscriptions use Python's full blown `getattr` and `getitem`, not the policy restricted `AccessControl` variants `_getattr_` and `_getitem_`. This can lead to critical information disclosure. `AccessControl` already provides a safe variant for `str.format` and denies access to `string.Formatter`. However, `str.format_map` is still unsafe. Affected are all users who allow untrusted users to create `AccessControl` controlled Python code and execute it. A fix has been introduced in versions 4.4, 5.8 and 6.2. Users are advised to upgrade. There are no known workarounds for this vulnerability.
[ "cpe:2.3:a:zope:accesscontrol:*:*:*:*:*:*:*:*", "cpe:2.3:a:zope:zope:*:*:*:*:*:*:*:*" ]
null
6.8
null
null
null
GHSA-6fxj-c35j-cj8x
SAP Web Dynpro ABAP allow an attacker to redirect users to a malicious site due to Reverse Tabnabbing vulnerabilities.
[]
null
null
null
null
null
GHSA-g7h8-p22m-2rvx
Prototype Pollution in flat-wrap
All versions of `flat-wrap` are vulnerable to prototype pollution. The function `unflatten` does not restrict the modification of an Object's prototype, which may allow an attacker to add or modify an existing property that will exist on all objects.RecommendationNo fix is currently available. Consider using an alternative package until a fix is made available.
[]
null
null
null
null
null
CVE-2015-8124
Session fixation vulnerability in the "Remember Me" login feature in Symfony 2.3.x before 2.3.35, 2.6.x before 2.6.12, and 2.7.x before 2.7.7 allows remote attackers to hijack web sessions via a session id.
[ "cpe:2.3:a:sensiolabs:symfony:2.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:sensiolabs:symfony:2.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:sensiolabs:symfony:2.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:sensiolabs:symfony:2.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:sensiolabs:symfony:2.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:sensiolabs:symfony:2.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:sensiolabs:symfony:2.3.6:*:*:*:*:*:*:*", "cpe:2.3:a:sensiolabs:symfony:2.3.7:*:*:*:*:*:*:*", "cpe:2.3:a:sensiolabs:symfony:2.3.8:*:*:*:*:*:*:*", "cpe:2.3:a:sensiolabs:symfony:2.3.9:*:*:*:*:*:*:*", "cpe:2.3:a:sensiolabs:symfony:2.3.10:*:*:*:*:*:*:*", "cpe:2.3:a:sensiolabs:symfony:2.3.11:*:*:*:*:*:*:*", "cpe:2.3:a:sensiolabs:symfony:2.3.12:*:*:*:*:*:*:*", "cpe:2.3:a:sensiolabs:symfony:2.3.13:*:*:*:*:*:*:*", "cpe:2.3:a:sensiolabs:symfony:2.3.14:*:*:*:*:*:*:*", "cpe:2.3:a:sensiolabs:symfony:2.3.15:*:*:*:*:*:*:*", "cpe:2.3:a:sensiolabs:symfony:2.3.16:*:*:*:*:*:*:*", "cpe:2.3:a:sensiolabs:symfony:2.3.17:*:*:*:*:*:*:*", "cpe:2.3:a:sensiolabs:symfony:2.3.18:*:*:*:*:*:*:*", "cpe:2.3:a:sensiolabs:symfony:2.3.19:*:*:*:*:*:*:*", "cpe:2.3:a:sensiolabs:symfony:2.3.20:*:*:*:*:*:*:*", "cpe:2.3:a:sensiolabs:symfony:2.3.21:*:*:*:*:*:*:*", "cpe:2.3:a:sensiolabs:symfony:2.3.22:*:*:*:*:*:*:*", "cpe:2.3:a:sensiolabs:symfony:2.3.23:*:*:*:*:*:*:*", "cpe:2.3:a:sensiolabs:symfony:2.3.24:*:*:*:*:*:*:*", "cpe:2.3:a:sensiolabs:symfony:2.3.25:*:*:*:*:*:*:*", "cpe:2.3:a:sensiolabs:symfony:2.3.26:*:*:*:*:*:*:*", "cpe:2.3:a:sensiolabs:symfony:2.3.27:*:*:*:*:*:*:*", "cpe:2.3:a:sensiolabs:symfony:2.3.28:*:*:*:*:*:*:*", "cpe:2.3:a:sensiolabs:symfony:2.3.29:*:*:*:*:*:*:*", "cpe:2.3:a:sensiolabs:symfony:2.3.30:*:*:*:*:*:*:*", "cpe:2.3:a:sensiolabs:symfony:2.3.31:*:*:*:*:*:*:*", "cpe:2.3:a:sensiolabs:symfony:2.3.32:*:*:*:*:*:*:*", "cpe:2.3:a:sensiolabs:symfony:2.3.33:*:*:*:*:*:*:*", "cpe:2.3:a:sensiolabs:symfony:2.3.34:*:*:*:*:*:*:*", "cpe:2.3:a:sensiolabs:symfony:2.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:sensiolabs:symfony:2.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:sensiolabs:symfony:2.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:sensiolabs:symfony:2.6.3:*:*:*:*:*:*:*", "cpe:2.3:a:sensiolabs:symfony:2.6.4:*:*:*:*:*:*:*", "cpe:2.3:a:sensiolabs:symfony:2.6.5:*:*:*:*:*:*:*", "cpe:2.3:a:sensiolabs:symfony:2.6.6:*:*:*:*:*:*:*", "cpe:2.3:a:sensiolabs:symfony:2.6.7:*:*:*:*:*:*:*", "cpe:2.3:a:sensiolabs:symfony:2.6.8:*:*:*:*:*:*:*", "cpe:2.3:a:sensiolabs:symfony:2.6.9:*:*:*:*:*:*:*", "cpe:2.3:a:sensiolabs:symfony:2.6.10:*:*:*:*:*:*:*", "cpe:2.3:a:sensiolabs:symfony:2.6.11:*:*:*:*:*:*:*", "cpe:2.3:a:sensiolabs:symfony:2.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:sensiolabs:symfony:2.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:sensiolabs:symfony:2.7.2:*:*:*:*:*:*:*", "cpe:2.3:a:sensiolabs:symfony:2.7.3:*:*:*:*:*:*:*", "cpe:2.3:a:sensiolabs:symfony:2.7.4:*:*:*:*:*:*:*", "cpe:2.3:a:sensiolabs:symfony:2.7.5:*:*:*:*:*:*:*", "cpe:2.3:a:sensiolabs:symfony:2.7.6:*:*:*:*:*:*:*" ]
null
null
null
6.8
null
RHSA-2021:3814
Red Hat Security Advisory: kpatch-patch security update
kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c kernel: powerpc: KVM guest OS users can cause host OS memory corruption
[ "cpe:/o:redhat:rhel_e4s:7.6::server" ]
null
7.8
null
null
null
GHSA-cpgf-3whm-jr4g
member/Orderinfo.asp in ASP4CMS AspCMS 2.7.2 allows remote authenticated users to read arbitrary order information via a modified OrderNo parameter.
[]
null
null
6.5
null
null
CVE-2024-42029
xdg-desktop-portal-hyprland (aka an XDG Desktop Portal backend for Hyprland) before 1.3.3 allows OS command execution, e.g., because single quotes are not used when sending a list of app IDs and titles via the environment.
[ "cpe:2.3:a:xdg:desktop_portal_hyperland:*:*:*:*:*:*:*:*" ]
null
6.3
null
null
null
CVE-2022-24502
Windows HTML Platforms Security Feature Bypass Vulnerability
Windows HTML Platforms Security Feature Bypass Vulnerability
[ "cpe:2.3:o:microsoft:windows_10:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*" ]
null
4.3
null
null
null
RHSA-2018:3461
Red Hat Security Advisory: [ansible] security update
Ansible: Information leak in "user" module
[ "cpe:/a:redhat:ansible_engine:2.5::el7" ]
null
null
7.8
null
null
CVE-2022-20473
In toLanguageTag of LocaleListCache.cpp, there is a possible out of bounds read due to an incorrect bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-239267173
[ "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*" ]
null
9.8
null
null
null
GHSA-f23h-w38w-mpqj
Cross-site scripting (XSS) vulnerability in Splunk Web in Splunk 5.0.0 through 5.0.2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
[]
null
null
null
null
null
CVE-2017-13056
The launchURL function in PDF-XChange Viewer 2.5 (Build 314.0) might allow remote attackers to execute arbitrary code via a crafted PDF file.
[ "cpe:2.3:a:tracker-software:pdf-xchange_viewer:2.5:*:*:*:*:*:*:*" ]
null
null
7.8
6.8
null
GHSA-44jj-9jpw-493g
SQL injection vulnerability in modules/blog/index.php in AneCMS Blog 1.3 and possibly earlier allows remote attackers to execute arbitrary SQL commands via the PATH_INFO.
[]
null
null
null
null
null
CVE-2022-46770
qubes-mirage-firewall (aka Mirage firewall for QubesOS) 0.8.x through 0.8.3 allows guest OS users to cause a denial of service (CPU consumption and loss of forwarding) via a crafted multicast UDP packet (IP address range of 224.0.0.0 through 239.255.255.255).
[ "cpe:2.3:a:linuxfoundation:mirage_firewall:*:*:*:*:*:qubesos:*:*" ]
null
7.5
null
null
null
ICSA-24-298-02
iniNet Solutions SpiderControl SCADA PC HMI Editor
iniNet Solutions SpiderControl SCADA PC HMI Editor has a path traversal vulnerability. When the software loads a malicious ‘ems' project template file constructed by an attacker, it can write files to arbitrary directories. This can lead to overwriting system files, causing system paralysis, or writing to startup items, resulting in remote control.
[]
null
8
null
null
null
GHSA-242w-4wxg-327r
Unspecified vulnerability in the WebLogic Server Administration Console for BEA WebLogic Server 9.0 prevents the console from setting custom JDBC security policies correctly, which could allow attackers to bypass intended policies.
[]
null
null
null
null
null
GHSA-77wj-vr78-f57f
Cross-site scripting (XSS) vulnerability in the product-creation administrative page in Cisco WebEx Sales Center allows remote attackers to inject arbitrary web script or HTML via a crafted URL, aka Bug ID CSCul25540.
[]
null
null
null
null
null
GHSA-7x3w-gm8r-m55v
Directory traversal vulnerability in posts.php in SimpleBBS 1.0.6 through 1.1 allows remote attackers to include and execute arbitrary files via ".." sequences in the language cookie, as demonstrated by by injecting the code into the gl_session cookie of users.php, which is stored in error.log.
[]
null
null
null
null
null
CVE-2020-27717
On BIG-IP DNS 16.0.0-16.0.0.1, 15.1.0-15.1.0.5, 14.1.0-14.1.3, 13.1.0-13.1.3.4, and 12.1.0-12.1.5.2, undisclosed series of DNS requests may cause TMM to restart and generate a core file.
[ "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*" ]
null
7.5
null
7.8
null
GHSA-2f2p-6v5f-w6gc
A vulnerability was found in Ubiquiti EdgeRouter X up to 2.0.9-hotfix.6 and classified as critical. This issue affects some unknown processing of the component Web Management Interface. The manipulation of the argument src leads to command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-227651.
[]
null
null
6.3
null
null
CVE-2023-52865
clk: mediatek: clk-mt6797: Add check for mtk_alloc_clk_data
In the Linux kernel, the following vulnerability has been resolved: clk: mediatek: clk-mt6797: Add check for mtk_alloc_clk_data Add the check for the return value of mtk_alloc_clk_data() in order to avoid NULL pointer dereference.
[]
null
5.5
null
null
null
GHSA-hc92-m58j-m3m5
When creating a callback over IPC for showing the Color Picker window, multiple of the same callbacks could have been created at a time and eventually all simultaneously destroyed as soon as one of the callbacks finished. This could have led to a use-after-free causing a potentially exploitable crash. This vulnerability affects Firefox < 117, Firefox ESR < 102.15, Firefox ESR < 115.2, and Thunderbird < 115.2.
[]
null
6.5
null
null
null
CVE-2024-5213
Exposure of Sensitive Information in mintplex-labs/anything-llm
In mintplex-labs/anything-llm versions up to and including 1.5.3, an issue was discovered where the password hash of a user is returned in the response after login (`POST /api/request-token`) and after account creations (`POST /api/admin/users/new`). This exposure occurs because the entire User object, including the bcrypt password hash, is included in the response sent to the frontend. This practice could potentially lead to sensitive information exposure despite the use of bcrypt, a strong hashing algorithm. It is recommended not to expose any clues about passwords to the frontend.
[ "cpe:2.3:a:mintplexlabs:anythingllm:*:*:*:*:*:*:*:*" ]
null
null
5.3
null
null
GHSA-x48q-c6cq-c3hg
In iaxxx_btp_write_words of iaxxx-btp.c, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-198653629References: N/A
[]
null
4.4
null
null
null
GHSA-83qj-2pwf-j9c2
Microsoft Internet Explorer 11 and Microsoft Edge allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Microsoft Browser Memory Corruption Vulnerability."
[]
null
null
7.5
null
null
GHSA-wcwp-7phh-vvr5
The vCenter Server contains an information disclosure vulnerability due to an unauthenticated appliance management API. A malicious actor with network access to port 443 on vCenter Server may exploit this issue to gain access to sensitive information.
[]
null
7.5
null
null
null
CVE-2022-21379
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Group Replication Plugin). Supported versions that are affected are 8.0.27 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
[ "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*" ]
null
4.9
null
null
null
CVE-2022-33749
XAPI open file limit DoS It is possible for an unauthenticated client on the network to cause XAPI to hit its file-descriptor limit. This causes XAPI to be unable to accept new requests for other (trusted) clients, and blocks XAPI from carrying out any tasks that require the opening of file descriptors.
[ "cpe:2.3:o:xen:xapi:*:*:*:*:*:*:*:*" ]
null
5.3
null
null
null
GHSA-w2f8-46cp-3x6r
An elevation of privilege vulnerability exists when the Microsoft Store Runtime improperly handles memory.To exploit this vulnerability, an attacker would first have to gain execution on the victim system, aka 'Microsoft Store Runtime Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1222.
[]
null
null
null
null
null
GHSA-9f7c-p7m5-r79c
Buffer overflow in PCMan FTP Server 2.0.7 allows for remote code execution via the APPE command.
[]
null
null
9.8
null
null
CVE-2014-9443
Cross-site scripting (XSS) vulnerability in the Relevanssi plugin before 3.3.8 for WordPress allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
[ "cpe:2.3:a:relevanssi:relevanssi:3.3.7.1:*:*:*:*:wordpress:*:*" ]
null
null
null
4.3
null
GHSA-wr6h-vrp6-vq67
Unrestricted file upload vulnerability in upload.php in WikkiTikkiTavi 1.11 allows remote attackers to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in img/.
[]
null
null
null
null
null
GHSA-8gwh-x546-9265
An Buffer Overflow vulnerability leading to remote code execution was discovered in MEX01. Remote attackers can use this vulnerability by using the property that the target program copies parameter values to memory through the strcpy() function.
[]
null
9.8
null
null
null
CVE-2018-8999
In Advanced SystemCare Ultimate 11.0.1.58, the driver file (Monitor_win7_x64.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x9c4060c4.
[ "cpe:2.3:a:iobit:advanced_systemcare_ultimate:11.0.1.58:*:*:*:*:*:*:*" ]
null
null
7.8
6.1
null
GHSA-9h69-wwg8-442f
Stored Cross Site Scripting vulnerabilities exist in ASPECT if administrator creden-tials become compromisedThis issue affects ASPECT-Enterprise: through 3.*; NEXUS Series: through 3.*; MATRIX Series: through 3.*.
[]
4.6
4.8
null
null
null
GHSA-fg3c-pj38-fxr2
Cross-site scripting (XSS) vulnerability in link.php in Cacti 1.1.12 allows remote anonymous users to inject arbitrary web script or HTML via the id parameter, related to the die_html_input_error function in lib/html_validate.php.
[]
null
null
5.4
null
null
CVE-2002-0134
Telnet proxy in Avirt Gateway Suite 4.2 does not require authentication for connecting to the proxy system itself, which allows remote attackers to list file contents of the proxy and execute arbitrary commands via a "dos" command.
[ "cpe:2.3:a:avirt:avirt_gateway_suite:4.2:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
GHSA-wvf7-94g7-p6gg
Use after free in Microsoft Office allows an unauthorized attacker to execute code locally.
[]
null
7.8
null
null
null
RHSA-2021:5128
Red Hat Security Advisory: Openshift Logging security and bug update (5.1.5)
netty: Request smuggling via content-length header netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way log4j-core: Remote code execution in Log4j 2.x when logs contain an attacker-controlled string value log4j-core: DoS in log4j 2.x with thread context message pattern and context lookup pattern (incomplete fix for CVE-2021-44228)
[ "cpe:/a:redhat:logging:5.1::el8" ]
null
8.1
null
null
null
CVE-2017-12243
A vulnerability in the Cisco Unified Computing System (UCS) Manager, Cisco Firepower 4100 Series Next-Generation Firewall (NGFW), and Cisco Firepower 9300 Security Appliance could allow an authenticated, local attacker to obtain root shell privileges on the device, aka Command Injection. The vulnerability is due to improper validation of string input in the shell application. An attacker could exploit this vulnerability through the use of malicious commands. A successful exploit could allow the attacker to obtain root shell privileges on the device. Cisco Bug IDs: CSCvf20741, CSCvf60078.
[ "cpe:2.3:o:cisco:unified_computing_system_manager_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:unified_computing_system_manager:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:firepower_9300_security_appliance_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:firepower_9300_security_appliance:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:firepower_4100_next-generation_firewall_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:firepower_4110_next-generation_firewall:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:firepower_4120_next-generation_firewall:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:firepower_4140_next-generation_firewall:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:firepower_4150_next-generation_firewall:-:*:*:*:*:*:*:*" ]
null
null
7.8
7.2
null
CVE-2018-1002102
Kubernetes API server follows unvalidated redirects from streaming Kubelet endpoints
Improper validation of URL redirection in the Kubernetes API server in versions prior to v1.14.0 allows an attacker-controlled Kubelet to redirect API server requests from streaming endpoints to arbitrary hosts. Impacted API servers will follow the redirect as a GET request with client-certificate credentials for authenticating to the Kubelet.
[ "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "cpe:2.3:a:kubernetes:kubernetes:1.14.0:alpha0:*:*:*:*:*:*", "cpe:2.3:a:kubernetes:kubernetes:1.14.0:alpha1:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*" ]
null
2.6
null
null
null
GHSA-rx7j-mw4c-76g9
Authlogic Information Exposure vulnerability
The Authlogic gem for Ruby on Rails prior to version 3.3.0 makes potentially unsafe `find_by_id` method calls, which might allow remote attackers to conduct CVE-2012-6496 SQL injection attacks via a crafted parameter in environments that have a known secret_token value, as demonstrated by a value contained in `secret_token.rb` in an open-source product.
[]
null
null
null
null
null
CVE-1999-0736
The showcode.asp sample file in IIS and Site Server allows remote attackers to read arbitrary files.
[ "cpe:2.3:a:microsoft:internet_information_server:4.0:*:*:*:*:*:*:*" ]
null
null
null
5
null
GHSA-j5hm-cjrm-f26f
A tampering vulnerability exists when Microsoft IIS Server improperly handles malformed request headers, aka 'Microsoft IIS Server Tampering Vulnerability'.
[]
null
null
null
null
null
GHSA-hcc9-635h-2qg5
SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer over-read in IMA_ADPCM_decode in audio/SDL_wave.c.
[]
null
8.8
null
null
null
GHSA-9gf4-mq65-qx36
Improper authentication in MTP application prior to SMR Jul-2024 Release 1 allows local attackers to enter MTP mode without proper authentication.
[]
null
4
null
null
null
GHSA-p4rj-67hc-w5ff
The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect system availability.
[]
null
7.5
null
null
null
CVE-2018-14332
An issue was discovered in Clementine Music Player 1.3.1. Clementine.exe is vulnerable to a user mode write access violation due to a NULL pointer dereference in the Init call in the MoodbarPipeline::NewPadCallback function in moodbar/moodbarpipeline.cpp. The vulnerability is triggered when the user opens a malformed mp3 file.
[ "cpe:2.3:a:clementine-player:clementine:1.3.1:*:*:*:*:*:*:*" ]
null
null
5.5
1.9
null
GHSA-wj5f-6f57-f3p5
piwigo has XSS in password.php
[]
null
null
null
null
null