id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
197k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
GHSA-3g83-whg6-2g8h
file.cgi in Secure Computing SecurityReporter (aka Network Security Analyzer) 4.6.3 allows remote attackers to bypass authentication via a name parameter that specifies the eventcache directory and a non-GIF file, which causes the $dontvalidate variable to be set to true. NOTE: a separate traversal vulnerability could be leveraged to download arbitrary files.
[]
null
null
null
null
GHSA-r8rx-jmjw-9g68
There is command injection in the meshd program in the routing system, resulting in command execution under administrator authority on Xiaomi router AX3600 with ROM version =< 1.1.12
[]
null
null
null
null
GHSA-cc3w-r3w8-hfh7
Magento Improper Authorization vulnerability in the customers module
Magento versions 2.4.2 (and earlier), 2.4.1-p1 (and earlier) and 2.3.6-p1 (and earlier) are vulnerable to an Improper Authorization vulnerability in the customers module. Successful exploitation could allow a low-privileged user to modify customer data. Access to the admin console is required for successful exploitation.
[]
null
5
null
null
GHSA-6hxc-5477-3vmj
Microsoft Internet Explorer 6.0 does not properly handle Drag and Drop events, which allows remote user-assisted attackers to execute arbitrary code via a link to an SMB file share with a filename that contains encoded ..\ (%2e%2e%5c) sequences and whose extension contains the CLSID Key identifier for HTML Applications (HTA), aka "Folder GUID Code Execution Vulnerability." NOTE: directory traversal sequences were used in the original exploit, although their role is not clear.
[]
null
null
null
null
CVE-2014-8244
Linksys SMART WiFi firmware on EA2700 and EA3500 devices; before 2.1.41 build 162351 on E4200v2 and EA4500 devices; before 1.1.41 build 162599 on EA6200 devices; before 1.1.40 build 160989 on EA6300, EA6400, EA6500, and EA6700 devices; and before 1.1.42 build 161129 on EA6900 devices allows remote attackers to obtain sensitive information or modify data via a JNAP action in a JNAP/ HTTP request.
[ "cpe:2.3:o:linksys:ea3500_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:linksys:ea3500:-:*:*:*:*:*:*:*", "cpe:2.3:o:linksys:ea6700_firmware:*:153731:*:*:*:*:*:*", "cpe:2.3:h:linksys:ea6700:-:*:*:*:*:*:*:*", "cpe:2.3:o:linksys:ea6500_firmware:*:153731:*:*:*:*:*:*", "cpe:2.3:h:linksys:ea6500:-:*:*:*:*:*:*:*", "cpe:2.3:o:linksys:ea4500_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:linksys:ea4500:-:*:*:*:*:*:*:*", "cpe:2.3:o:linksys:ea6900_firmware:*:158863:*:*:*:*:*:*", "cpe:2.3:h:linksys:ea6900:-:*:*:*:*:*:*:*", "cpe:2.3:o:linksys:ea2700_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:linksys:ea2700:-:*:*:*:*:*:*:*", "cpe:2.3:o:linksys:ea6400_firmware:*:153731:*:*:*:*:*:*", "cpe:2.3:h:linksys:ea6400:-:*:*:*:*:*:*:*", "cpe:2.3:o:linksys:ea6200_firmware:*:153743:*:*:*:*:*:*", "cpe:2.3:h:linksys:ea6200:-:*:*:*:*:*:*:*", "cpe:2.3:o:linksys:ea6300_firmware:*:153731:*:*:*:*:*:*", "cpe:2.3:h:linksys:ea6300:-:*:*:*:*:*:*:*", "cpe:2.3:o:linksys:e4200v2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:linksys:e4200v2:-:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-94h4-5c8j-gcwp
In validationtools, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed
[]
null
5.5
null
null
CVE-2014-6333
Microsoft Word 2007 SP3, Word Viewer, and Office Compatibility Pack SP3 allow remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Office Double Delete Remote Code Execution Vulnerability."
[ "cpe:2.3:a:microsoft:office_compatibility_pack:*:sp3:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office_word_viewer:*:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:word:2007:sp3:*:*:*:*:*:*" ]
null
null
null
9.3
GHSA-q2gf-x8hw-3h4r
Cross-site request forgery (CSRF) vulnerability in the Facebook Members plugin before 5.0.5 for WordPress allows remote attackers to hijack the authentication of administrators for requests that modify this plugin's settings.
[]
null
null
null
null
GHSA-hjg2-q3h8-v7hh
GE Healthcare CADStream Server has a default password of confirma for the admin user, which has unspecified impact and attack vectors.
[]
null
null
null
null
CVE-2023-4035
Simple Blog Card < 1.31 - Contributor+ Stored XSS via Shortcode
The Simple Blog Card WordPress plugin before 1.31 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks
[ "cpe:2.3:a:riverforest-wp:simple_blog_card:*:*:*:*:*:wordpress:*:*" ]
null
5.4
null
null
GHSA-h6xw-cc87-5xrh
Adobe Flash Player before 18.0.0.252 and 19.x before 19.0.0.207 on Windows and OS X and before 11.2.202.535 on Linux, Adobe AIR before 19.0.0.213, Adobe AIR SDK before 19.0.0.213, and Adobe AIR SDK & Compiler before 19.0.0.213 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-7625, CVE-2015-7627, CVE-2015-7630, CVE-2015-7633, and CVE-2015-7634.
[]
null
null
null
null
CVE-2008-7027
Libra File Manager 1.18 and earlier allows remote attackers to bypass authentication and gain privileges by setting the user and pass cookies to 1.
[ "cpe:2.3:a:libra_file_manager:php_filemanager:*:*:*:*:*:*:*:*", "cpe:2.3:a:libra_file_manager:php_filemanager:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:libra_file_manager:php_filemanager:1.03:*:*:*:*:*:*:*", "cpe:2.3:a:libra_file_manager:php_filemanager:1.05:*:*:*:*:*:*:*", "cpe:2.3:a:libra_file_manager:php_filemanager:1.08:*:*:*:*:*:*:*", "cpe:2.3:a:libra_file_manager:php_filemanager:1.17:*:*:*:*:*:*:*" ]
null
null
null
7.5
RHSA-2023:3517
Red Hat Security Advisory: kpatch-patch security update
kernel: use-after-free in l2cap_connect and l2cap_le_connect_req in net/bluetooth/l2cap_core.c
[ "cpe:/o:redhat:rhel_e4s:8.4::baseos" ]
null
8.1
null
null
GHSA-7wvg-v832-h9xq
Emuse - eServices / eNvoice SQL injection can be used in various ways ranging from bypassing login authentication or dumping the whole database to full RCE on the affected endpoints. The SQLi caused by CWE-209: Generation of Error Message Containig Sensetive Information, showing parts of the aspx code and the webroot location , information an attacker can leverage to further compromise the host.
[]
null
null
null
null
GHSA-w4wp-6c4p-vfjm
In the Linux kernel, the following vulnerability has been resolved:mtd: rawnand: gpmi: don't leak PM reference in error pathIf gpmi_nfc_apply_timings() fails, the PM runtime usage counter must be dropped.
[]
null
7.8
null
null
CVE-2020-36134
AOM v2.0.1 was discovered to contain a segmentation violation via the component aom_dsp/x86/obmc_sad_avx2.c.
[ "cpe:2.3:a:aomedia:aomedia:2.0.1:*:*:*:*:*:*:*" ]
null
6.5
null
4.3
CVE-2021-26248
Philips MRI 1.5T and 3T Incorrect Ownership Assignment
Philips MRI 1.5T and MRI 3T Version 5.x.x assigns an owner who is outside the intended control sphere to a resource.
[ "cpe:2.3:o:philips:mri_3t_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:philips:mri_3t:-:*:*:*:*:*:*:*", "cpe:2.3:o:philips:mri_1.5t_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:philips:mri_1.5t:-:*:*:*:*:*:*:*" ]
null
6.2
null
null
CVE-2021-4229
ua-parser-js Crypto Mining backdoor
A vulnerability was found in ua-parser-js 0.7.29/0.8.0/1.0.0. It has been rated as critical. This issue affects the crypto mining component which introduces a backdoor. Upgrading to version 0.7.30, 0.8.1 and 1.0.1 is able to address this issue. It is recommended to upgrade the affected component.
[ "cpe:2.3:a:ua-parser-js_project:ua-parser-js:0.7.29:*:*:*:*:node.js:*:*", "cpe:2.3:a:ua-parser-js_project:ua-parser-js:0.8.0:*:*:*:*:node.js:*:*", "cpe:2.3:a:ua-parser-js_project:ua-parser-js:1.0.0:*:*:*:*:node.js:*:*" ]
null
5
null
null
GHSA-c93g-8734-9cr8
In the Linux kernel, the following vulnerability has been resolved:cachefiles: remove requests from xarray during flushing requestsEven with CACHEFILES_DEAD set, we can still read the requests, so in the following concurrency the request may be used after it has been freed:cachefiles_ondemand_init_object cachefiles_ondemand_send_req REQ_A = kzalloc(sizeof(*req) + data_len) wait_for_completion(&REQ_A->done) cachefiles_daemon_read cachefiles_ondemand_daemon_read // close dev fd cachefiles_flush_reqs complete(&REQ_A->done) kfree(REQ_A) xa_lock(&cache->reqs); cachefiles_ondemand_select_req req->msg.opcode != CACHEFILES_OP_READ // req use-after-free !!! xa_unlock(&cache->reqs); xa_destroy(&cache->reqs)Hence remove requests from cache->reqs when flushing them to avoid accessing freed requests.
[]
null
null
null
null
CVE-2021-41231
OpenMage LTS DataFlow upload remote code execution vulnerability
OpenMage LTS is an e-commerce platform. Prior to versions 19.4.22 and 20.0.19, an administrator with the permissions to upload files via DataFlow and to create products was able to execute arbitrary code via the convert profile. Versions 19.4.22 and 20.0.19 contain a patch for this issue.
[ "cpe:2.3:a:openmage:magento:*:*:*:*:lts:*:*:*" ]
null
7.2
null
null
GHSA-5rjw-mmw7-hxjc
Tenda W30E V1.0.1.25(633) was discovered to contain a stack overflow via the cmdinput parameter at /goform/exeCommand.
[]
null
7.5
null
null
GHSA-wcmp-f6cg-hwcq
Unspecified vulnerability in ez Publish 4.1.4, 4.2, 4.3, 4.4, 4.5, and 4.6 has unknown impact and attack vectors related to an insecure direct object reference.
[]
null
null
null
null
GHSA-h983-8jqg-vmp6
WebKit in Apple Safari before 4.0.3 does not properly restrict the URL scheme of the pluginspage attribute of an EMBED element, which allows user-assisted remote attackers to launch arbitrary file: URLs and obtain sensitive information via a crafted HTML document.
[]
null
null
null
null
GHSA-984x-rxr3-qf5j
In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, improper input validation for vent->vdev_id in wma_action_frame_filter_mac_event_handler(), which is received from firmware, leads to arbitrary code execution.
[]
null
null
7.8
null
CVE-2008-3240
SQL injection vulnerability in index.php in AlstraSoft Affiliate Network Pro allows remote attackers to execute arbitrary SQL commands via the pgm parameter in a directory action.
[ "cpe:2.3:a:alstrasoft:affiliate_network_pro:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2007-4483
Cross-site scripting (XSS) vulnerability in index.php in the WordPress Classic 1.5 theme in WordPress before 2.1.3 allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO (PHP_SELF).
[ "cpe:2.3:a:wordpress:wordpressclassic:1.5:*:*:*:*:*:*:*" ]
null
null
null
4.3
RHSA-2019:2483
Red Hat Security Advisory: Red Hat Single Sign-On 7.3.3 security update
keycloak: CSRF check missing in My Resources functionality in the Account Console keycloak: SAML broker does not check existence of signature on document allowing any user impersonation
[ "cpe:/a:redhat:jboss_single_sign_on:7.3" ]
null
null
8.1
null
CVE-2000-0799
inpview in InPerson in SGI IRIX 5.3 through IRIX 6.5.10 allows local users to gain privileges via a symlink attack on the .ilmpAAA temporary file.
[ "cpe:2.3:o:sgi:irix:6.5:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.5.1:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.5.2m:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.5.3:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.5.3f:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.5.3m:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.5.4:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.5.6:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.5.7:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.5.8:*:*:*:*:*:*:*" ]
null
null
null
3.7
GHSA-48c2-5hjw-583c
SQL injection vulnerability in ADbNewsSender before 1.5.2 allows remote attackers to execute arbitrary SQL commands via unspecified vectors in (1) opt_in_out.php.inc, (2) confirmation.php.inc, and (3) renewal.php.inc in mailinglist/.
[]
null
null
null
null
GHSA-xcmq-73gm-f83r
Off-by-one error in NcFTPd FTP server before 2.4.1 allows a remote attacker to cause a denial of service (crash) via a long PORT command.
[]
null
7.5
null
null
GHSA-2qqx-w9hr-q5gx
angular vulnerable to regular expression denial of service via the $resource service
All versions of the package angular are vulnerable to Regular Expression Denial of Service (ReDoS) via the $resource service due to the usage of an insecure regular expression. Exploiting this vulnerability is possible by a large carefully-crafted input, which can result in catastrophic backtracking.
[]
null
5.3
null
null
GHSA-8phw-p6c6-5mx9
Buffer overflow in cfgmgr in IBM AIX 5.2.0 and 5.3.0 allows local users to execute arbitrary code via a long directory path argument.
[]
null
null
null
null
CVE-2020-24983
An issue was discovered in Quadbase EspressReports ES 7 Update 9. An unauthenticated attacker can create a malicious HTML file that houses a POST request made to the DashboardBuilder within the target web application. This request will utilise the target admin session and perform the authenticated request (to change the Dashboard name) as if the victim had done so themselves, aka CSRF.
[ "cpe:2.3:a:quadbase:espressreports_es:7:update_9:*:*:*:*:*:*" ]
null
8.8
null
6.8
CVE-2020-20914
SQL Injection vulnerability found in San Luan PublicCMS v.4.0 allows a remote attacker to execute arbitrary code via the sql parameter.
[ "cpe:2.3:a:publiccms:publiccms:4.0:*:*:*:*:*:*:*" ]
null
9.8
null
null
CVE-2019-1724
Cisco Small Business RV320 and RV325 Routers Session Hijacking Vulnerability
A vulnerability in the session management functionality of the web-based interface for Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers could allow an unauthenticated, remote attacker to hijack a valid user session on an affected system. An attacker could use this impersonated session to create a new user account or otherwise control the device with the privileges of the hijacked session. The vulnerability is due to a lack of proper session management controls. An attacker could exploit this vulnerability by sending a crafted HTTP request to a targeted device. A successful exploit could allow the attacker to take control of an existing user session on the device. Exploitation of the vulnerability requires that an authorized user session is active and that the attacker can craft an HTTP request to impersonate that session.
[ "cpe:2.3:o:cisco:rv325_dual_wan_gigabit_vpn_router_firmware:1.3.1.12:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:rv325_dual_wan_gigabit_vpn_router:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv320_dual_gigabit_wan_vpn_router_software:1.3.1.12:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:rv320_dual_gigabit_wan_vpn_router:-:*:*:*:*:*:*:*" ]
null
null
8.8
null
CVE-2020-0715
An elevation of privilege vulnerability exists when the Windows Graphics Component improperly handles objects in memory, aka 'Windows Graphics Component Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0745, CVE-2020-0792.
[ "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*" ]
null
7.8
null
7.2
GHSA-5hj4-25hp-v3g9
The Galil RIO-47100 Pocket PLC allows remote attackers to cause a denial of service via a session that includes "repeated requests."
[]
null
null
null
null
GHSA-jqmc-fxxp-r589
Deserialization of Untrusted Data in Tendenci
Tendenci 12.0.10 allows unrestricted deserialization in apps\helpdesk\views\staff.py.
[]
9.3
9.8
null
null
RHSA-2020:2851
Red Hat Security Advisory: kernel security and bug fix update
kernel: denial of service via ioctl call in network tun handling kernel: usb: missing size check in the __usb_get_extra_descriptor() leading to DoS kernel: perf_event_open() and execve() race in setuid programs allows a data leak kernel: Count overflow in FUSE request leading to use-after-free issues. kernel: use-after-free in arch/x86/lib/insn-eval.c Kernel: KVM: OOB memory access via mmio ring buffer kernel: memory leak in register_queue_kobjects() in net/core/net-sysfs.c leads to denial of service kernel: powerpc: incomplete Spectre-RSB mitigation leads to information exposure Kernel: vfio: access to disabled MMIO space of some devices may lead to DoS scenario
[ "cpe:/o:redhat:enterprise_linux:7::hypervisor", "cpe:/o:redhat:rhel_eus:7.6::computenode", "cpe:/o:redhat:rhel_eus:7.6::server" ]
null
5.3
5.5
null
GHSA-rqp5-pg7w-832p
datagrid contains code Injection backdoor
The datagrid gem 1.0.6 for Ruby, as distributed on RubyGems.org, included a code-execution backdoor inserted by a third party.
[]
null
null
9.8
null
CVE-2015-1349
named in ISC BIND 9.7.0 through 9.9.6 before 9.9.6-P2 and 9.10.x before 9.10.1-P2, when DNSSEC validation and the managed-keys feature are enabled, allows remote attackers to cause a denial of service (assertion failure and daemon exit, or daemon crash) by triggering an incorrect trust-anchor management scenario in which no key is ready for use.
[ "cpe:2.3:a:isc:bind:9.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.7.0:b1:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.7.0:p1:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.7.0:p2:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.7.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.7.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.7.1:p1:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.7.1:p2:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.7.1:rc1:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.7.2:*:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.7.2:p1:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.7.2:p2:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.7.2:p3:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.7.2:rc1:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.7.3:*:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.7.3:b1:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.7.3:p1:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.7.3:rc1:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.7.4:*:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.7.4:b1:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.7.4:p1:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.7.4:rc1:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.7.5:*:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.7.5:b1:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.7.5:rc1:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.7.5:rc2:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.7.6:*:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.7.6:p1:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.7.6:p2:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.7.7:*:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.8.0:*:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.8.0:a1:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.8.0:b1:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.8.0:p1:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.8.0:p2:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.8.0:p4:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.8.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.8.1:b1:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.8.1:b2:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.8.1:b3:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.8.1:p1:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.8.1:rc1:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.8.2:b1:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.8.2:rc1:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.8.2:rc2:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.8.3:*:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.8.3:p1:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.8.3:p2:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.8.4:*:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.8.5:*:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.8.5:b1:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.8.5:b2:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.8.5:p1:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.8.5:p2:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.8.5:rc1:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.8.5:rc2:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.8.6:b1:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.8.6:rc1:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.8.6:rc2:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.9.0:*:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.9.0:a1:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.9.0:a2:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.9.0:a3:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.9.0:b1:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.9.0:b2:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.9.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.9.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.9.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.9.0:rc4:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.9.1:*:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.9.1:p1:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.9.1:p2:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.9.2:*:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.9.3:*:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.9.3:b1:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.9.3:b2:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.9.3:p1:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.9.3:p2:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.9.3:rc1:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.9.3:rc2:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.9.4:b1:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.9.5:*:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.9.6:*:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.9.6:p1:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.9.7:b1:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.10.0:*:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.10.1:*:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.10.1:p1:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.10.2:b1:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.10.2:rc1:*:*:*:*:*:*" ]
null
null
null
5.4
CVE-2025-1919
Out of bounds read in Media in Google Chrome prior to 134.0.6998.35 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page. (Chromium security severity: Medium)
[]
null
8.8
null
null
GHSA-vq53-fvjx-3c2c
Microsoft Internet Explorer 4.0 through 6.0 could allow local users to differentiate between alphanumeric and non-alphanumeric characters used in a password by pressing certain control keys that jump between non-alphanumeric characters, which makes it easier to conduct a brute-force password guessing attack.
[]
null
null
null
null
CVE-2025-0253
HCL IEM is affected by a cookie attribute not set vulnerability
HCL IEM is affected by a cookie attribute not set vulnerability due to inconsistency of certain security-related configurations which could increase exposure to potential vulnerabilities.
[]
null
2
null
null
CVE-2024-29967
In Brocade SANnav before v2.31 and v2.3.0a, it was observed that Docker instances inside the appliance have insecure mount points
In Brocade SANnav before Brocade SANnav v2.31 and v2.3.0a, it was observed that Docker instances inside the appliance have insecure mount points, allowing reading and writing access to sensitive files. The vulnerability could allow a sudo privileged user on the host OS to read and write access to these files.
[ "cpe:2.3:a:brocade:sannav:*:*:*:*:*:*:*:*" ]
null
4.4
null
null
GHSA-j42q-mr6r-qh9r
Maya-L02,VKY-L09,VTR-L29,Vicky-AL00A,Victoria-AL00A,Warsaw-AL00 smart phones with software of earlier than Maya-L02C636B126 versions,earlier than VKY-L29C10B151 versions,earlier than VTR-L29C10B151 versions,earlier than Vicky-AL00AC00B162 versions,earlier than Victoria-AL00AC00B167 versions,earlier than Warsaw-AL00C00B200 versions have a Factory Reset Protection (FRP) bypass security vulnerability. When re-configuring the mobile phone using the factory reset protection (FRP) function, an attacker can login the configuration flow by some secret code and can perform some operations to update the Google account. As a result, the FRP function is bypassed.
[]
null
null
4.6
null
CVE-2016-5235
A Cross Site Scripting (XSS) vulnerability in versions of F5 WebSafe Dashboard 3.9.x and earlier, aka F5 WebSafe Alert Server, allows an unauthenticated user to inject HTML via a crafted alert.
[ "cpe:2.3:a:f5:websafe_alert_server:*:*:*:*:*:*:*:*" ]
null
null
6.1
4.3
CVE-2022-20505
In openFile of CallLogProvider.java, there is a possible permission bypass due to a path traversal error. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitationProduct: AndroidVersions: Android-13Android ID: A-225981754
[ "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*" ]
null
6.7
null
null
GHSA-48cg-hm45-pp65
Buffer underflow in some Zoom Workplace Apps may allow an authenticated user to conduct an escalation of privilege via network access.
[]
null
8.5
null
null
GHSA-7wvr-wmwr-47p5
Adobe Experience Manager versions 6.5.22 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
[]
null
5.4
null
null
GHSA-pqwc-c6p6-66pq
AVEVA Software, LLC InduSoft Web Studio prior to Version 8.1 SP3 and InTouch Edge HMI (formerly InTouch Machine Edition) prior to Version 2017 Update. An unauthenticated remote user could use a specially crafted database connection configuration file to execute an arbitrary process on the server machine.
[]
null
null
9.8
null
GHSA-rcp2-f7p8-xf3c
Unspecified vulnerability in the Siebel Core - Server Infrastructure component in Oracle Siebel CRM 8.1.1 and 8.2.2 allows remote attackers to affect confidentiality via unknown vectors related to Security.
[]
null
null
null
null
CVE-2018-12984
Hycus CMS 1.0.4 allows Authentication Bypass via "'=' 'OR'" credentials.
[ "cpe:2.3:a:hycus_cms_project:hycus_cms:1.0.4:*:*:*:*:*:*:*" ]
null
null
9.8
7.5
GHSA-39wj-j3jc-858m
XSS vulnerability leveraged through referrers could allow un-authorized admin access in Mautic
ImpactThis is a cross-site scripting vulnerability which affects every version of Mautic and could allow an attacker unauthorised administrator level access to Mautic.This vulnerability was reported by Naveen Sunkavally at Horizon3.ai.PatchesUpgrade to 3.2.4 or 2.16.5.Link to patch for 2.x versions: https://github.com/mautic/mautic/compare/2.16.4...2.16.5.diffLink to patch for 3.x versions: https://github.com/mautic/mautic/compare/3.2.2...3.2.4.diffWorkaroundsNoneFor more informationIf you have any questions or comments about this advisory:Post in https://forum.mautic.org/c/supportEmail us at security@mautic.org
[]
null
null
null
null
GHSA-v93v-q555-chw5
PHPJabbers Shared Asset Booking System v1.0 is vulnerable to Multiple Stored Cross-Site Scripting (XSS) in the "title, name" parameters.
[]
null
5.4
null
null
CVE-2001-1373
MailSafe in Zone Labs ZoneAlarm 2.6 and earlier and ZoneAlarm Pro 2.6 and 2.4 does not block prohibited file types with long file names, which allows remote attackers to send potentially dangerous attachments.
[ "cpe:2.3:a:zonelabs:zonealarm:2.1:*:*:*:*:*:*:*", "cpe:2.3:a:zonelabs:zonealarm:2.2:*:*:*:*:*:*:*", "cpe:2.3:a:zonelabs:zonealarm:2.3:*:*:*:*:*:*:*", "cpe:2.3:a:zonelabs:zonealarm:2.4:*:*:*:*:*:*:*", "cpe:2.3:a:zonelabs:zonealarm:2.4:*:pro:*:*:*:*:*", "cpe:2.3:a:zonelabs:zonealarm:2.5:*:*:*:*:*:*:*", "cpe:2.3:a:zonelabs:zonealarm:2.6:*:*:*:*:*:*:*", "cpe:2.3:a:zonelabs:zonealarm:2.6:*:pro:*:*:*:*:*" ]
null
null
null
5
GHSA-62p4-wgww-h3qr
Stack-based buffer overflow in the megasas_ctrl_get_info function in QEMU, when built with SCSI MegaRAID SAS HBA emulation support, allows local guest users to cause a denial of service (QEMU instance crash) via a crafted SCSI controller CTRL_GET_INFO command.
[]
null
6.5
null
null
RHSA-2011:1265
Red Hat Security Advisory: java-1.4.2-ibm-sap security update
IBM JDK Class file parsing denial-of-service JDK: unspecified vulnerabilities fixed in 6u26 (Sound) JDK: unspecified vulnerabilities fixed in 6u26 (Sound) OpenJDK: integer overflows in JPEGImageReader and font SunLayoutEngine (2D, 7013519) OpenJDK: Deserialization allows creation of mutable SignedObject (Deserialization, 6618658) OpenJDK: NetworkInterface information leak (Networking, 7013969) OpenJDK: MediaTracker created Component instances with unnecessary privileges (Swing, 7020198) java-1.4.2-ibm: DoS via class file parser in IBM Java 1.4.2.SR13.FP9
[ "cpe:/a:redhat:rhel_extras_sap:4", "cpe:/a:redhat:rhel_extras_sap:5" ]
null
null
null
null
GHSA-mhg3-f832-7ww5
Multiple vulnerabilities in the web-based management interface of Cisco Security Manager could allow an unauthenticated, remote attacker to conduct cross-site scripting attacks against a user of the interface. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by persuading a user to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information.
[]
null
null
null
null
GHSA-wxh7-crxj-886h
Linear eMerge E3-Series devices allow Privilege Escalation.
[]
null
8.8
null
null
CVE-2025-0719
IBM Cloud Pak for Data cross-site scripting
IBM Cloud Pak for Data 4.0.0 through 4.8.5 and 5.0.0 is vulnerable to cross-site scripting. This vulnerability allows an unauthenticated attacker to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.
[ "cpe:2.3:a:ibm:cloud_pak_for_data:4.0:-:*:*:*:*:*:*", "cpe:2.3:a:ibm:cloud_pak_for_data:4.8.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:cloud_pak_for_data:5.0:*:*:*:*:*:*:*" ]
null
6.1
null
null
GHSA-3gwv-gfjh-3v8x
An authenticated, remote attacker may use a stack based out-of-bounds write vulnerability in the CmpAppForce Component of multiple CODESYS products in multiple versions to write data into the stack which can lead to a denial-of-service condition, memory overwriting, or remote code execution.
[]
null
8.8
null
null
CVE-2024-3031
Fluid Notification Bar <= 3.2.3 - Authenticated (Admin+) Stored Cross-Site Scripting
The Fluid Notification Bar plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 3.2.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
[]
null
4.4
null
null
GHSA-rg44-hwh5-vcpq
The Samba AD DC includes checks when adding service principals names (SPNs) to an account to ensure that SPNs do not alias with those already in the database. Some of these checks are able to be bypassed if an account modification re-adds an SPN that was previously present on that account, such as one added when a computer is joined to a domain. An attacker who has the ability to write to an account can exploit this to perform a denial-of-service attack by adding an SPN that matches an existing service. Additionally, an attacker who can intercept traffic can impersonate existing services, resulting in a loss of confidentiality and integrity.
[]
null
8.8
null
null
CVE-2009-2946
Eval injection vulnerability in scripts/uscan.pl before Rev 1984 in devscripts allows remote attackers to execute arbitrary Perl code via crafted pathnames on distribution servers for upstream source code used in Debian GNU/Linux packages.
[ "cpe:2.3:a:devscripts_devel_team:devscripts:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:linux:*:*:*:*:*:*:*:*" ]
null
null
null
9.3
CVE-2018-17828
Directory traversal vulnerability in ZZIPlib 0.13.69 allows attackers to overwrite arbitrary files via a .. (dot dot) in a zip file, because of the function unzzip_cat in the bins/unzzipcat-mem.c file.
[ "cpe:2.3:a:zziplib_project:zziplib:0.13.69:*:*:*:*:*:*:*" ]
null
null
5.5
5.8
GHSA-xq72-m3h5-wf3q
Mecha CMS 3.0.0 is vulnerable to Directory Traversal. An attacker can construct cookies and URIs that bypass user identity checks. Parameters can then be passed through the POST method, resulting in the Deletion of Arbitrary Files or Website Takeover.
[]
null
9.1
null
null
GHSA-m34p-hw58-6hwf
All versions of VAMPSET software produced by Schneider Electric, prior to V2.2.189, are susceptible to a memory corruption vulnerability when a corrupted vf2 file is used. This vulnerability causes the software to halt or not start when trying to open the corrupted file. This vulnerability occurs when fill settings are intentionally malformed and is opened in a standalone state, without connection to a protection relay. This attack is not considered to be remotely exploitable. This vulnerability has no effect on the operation of the protection relay to which VAMPSET is connected. As Windows operating system remains operational and VAMPSET responds, it is able to be shut down through its normal closing protocol.
[]
null
null
5.5
null
CVE-2016-3113
Cross-site scripting (XSS) vulnerability in ovirt-engine allows remote attackers to inject arbitrary web script or HTML.
[ "cpe:2.3:a:redhat:ovirt-engine:-:*:*:*:*:*:*:*" ]
null
6.1
null
4.3
GHSA-h2p7-j73q-gv3r
Unspecified vulnerability in the Hyperion Financial Reporting component in Oracle Hyperion 11.1.2.4 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Security Models.
[]
null
null
9.8
null
GHSA-4cvq-vvgx-cv87
A directory traversal within the ‘ftpservlet’ of the FileCatalyst Workflow Web Portal allows files to be uploaded outside of the intended ‘uploadtemp’ directory with a specially crafted POST request. In situations where a file is successfully uploaded to web portal’s DocumentRoot, specially crafted JSP files could be used to execute code, including web shells.
[]
null
9.8
null
null
CVE-2020-7914
In JetBrains IntelliJ IDEA 2019.2, an XSLT debugger plugin misconfiguration allows arbitrary file read operations over the network. This issue was fixed in 2019.3.
[ "cpe:2.3:a:jetbrains:intellij_idea:*:*:*:*:*:*:*:*" ]
null
7.5
null
5
CVE-2009-4366
Cross-site scripting (XSS) vulnerability in index.php in ScriptsEz Ez Blog 1.0 allows remote attackers to inject arbitrary web script or HTML via the yr parameter in a bmonth action.
[ "cpe:2.3:a:scriptsez:ez_blog:1.0:*:*:*:*:*:*:*" ]
null
null
null
4.3
RHSA-2025:9043
Red Hat Security Advisory: golang security update
net/http: Request smuggling due to acceptance of invalid chunked data in net/http
[ "cpe:/a:redhat:rhel_e4s:9.0::appstream" ]
null
5.4
null
null
GHSA-2c8h-6hfp-gpv6
Multiple improper array index validation vulnerabilities exist in the fstReaderIterBlocks2 tdelta functionality of GTKWave 3.3.115. A specially crafted .fst file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the tdelta indexing when signal_lens is 2 or more.
[]
null
7.8
null
null
CVE-2007-0528
The admin web console implemented by the Centrality Communications (aka Aredfox) PA168 chipset and firmware 1.54 and earlier, as provided by various IP phones, does not require passwords or authentication tokens when using HTTP, which allows remote attackers to connect to existing superuser sessions and obtain sensitive information (passwords and configuration data).
[ "cpe:2.3:h:centrality_communications:pa168_chipset:*:*:*:*:*:*:*:*" ]
null
null
null
9
GHSA-q9gj-23xf-h9v8
In vow, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07628530; Issue ID: ALPS07628530.
[]
null
6.7
null
null
GHSA-p9m3-293j-mh24
CWE-269: Improper Privilege Management vulnerability exists that could cause unauthorized access, loss of confidentiality, integrity, and availability of the workstation when non-admin authenticated user tries to perform privilege escalation by tampering with the binaries
[]
null
7.8
null
null
GHSA-gqxh-jf4f-xfjr
Null source pointer passed as an argument to memcpy() function within TIFFFetchNormalTag () in tif_dirread.c in libtiff versions up to 4.3.0 could lead to Denial of Service via crafted TIFF file.
[]
null
5.5
null
null
CVE-2024-13202
wander-chu SpringBoot-Blog Blog Article PageController.java modifiyArticle cross site scripting
A vulnerability was found in wander-chu SpringBoot-Blog 1.0 and classified as problematic. This issue affects the function modifiyArticle of the file src/main/java/com/my/blog/website/controller/admin/PageController.java of the component Blog Article Handler. The manipulation of the argument content leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
[]
5.1
2.4
2.4
3.3
GHSA-7gfw-hc24-935p
Cross-Site Request Forgery (CSRF) vulnerability in Podlove Podlove Podcast Publisher allows Code Injection.This issue affects Podlove Podcast Publisher: from n/a through 4.1.13.
[]
null
9.6
null
null
CVE-2007-4906
PHP remote file inclusion vulnerability in tasks/send_queued_emails.php in NuclearBB Alpha 2, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the root_path parameter.
[ "cpe:2.3:a:nuclearbb:nuclearbb:alpha_2:*:*:*:*:*:*:*" ]
null
null
null
6.8
GHSA-8j33-7wqq-q3wh
Cross-site scripting (XSS) vulnerability in the profile editing functionality in Injader before 2.1.2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. NOTE: some of these details are obtained from third party information.
[]
null
null
null
null
GHSA-xf4w-mx95-2v47
A SQL injection vulnerability in Snare Central before 7.4.5 allows remote authenticated attackers to execute arbitrary SQL commands via the AgentConsole/UserGroupQuery.php ShowUser parameter.
[]
null
null
7.2
null
RHSA-2020:0946
Red Hat Security Advisory: Red Hat Single Sign-On 7.3.7 security update on RHEL 7
keycloak: failedLogin Event not sent to BruteForceProtector when using Post Login Flow with Conditional-OTP
[ "cpe:/a:redhat:red_hat_single_sign_on:7::el7" ]
null
5.6
null
null
RHSA-2024:5529
Red Hat Security Advisory: curl security update
curl: HTTP/2 push headers memory-leak
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
7.5
null
null
GHSA-hx56-ccjh-7r85
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in CreativeMindsSolutions CM Email Registration Blacklist and Whitelist allows Reflected XSS. This issue affects CM Email Registration Blacklist and Whitelist: from n/a through 1.5.5.
[]
null
7.1
null
null
GHSA-hw8j-q3v2-5j9q
Novell GroupWise Messenger (GWIM) before 2.0.3 Hot Patch 1 allows remote attackers to cause a denial of service (crash) via a long user ID, possibly involving a popup alert. NOTE: it is not clear whether this issue crosses privilege boundaries.
[]
null
null
null
null
CVE-2024-47562
A vulnerability has been identified in Siemens SINEC Security Monitor (All versions < V4.9.0). The affected application does not properly neutralize special elements in user input to the ```ssmctl-client``` command. This could allow an authenticated, lowly privileged local attacker to execute privileged commands in the underlying OS.
[ "cpe:2.3:a:siemens:sinec_security_monitor:*:*:*:*:*:*:*:*" ]
9.3
8.8
null
null
CVE-2021-43284
An issue was discovered on Victure WR1200 devices through 1.0.3. The root SSH password never gets updated from its default value of admin. This enables an attacker to gain control of the device through SSH (regardless of whether the admin password was changed on the web interface).
[ "cpe:2.3:o:govicture:wr1200_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:govicture:wr1200:-:*:*:*:*:*:*:*" ]
null
7.8
null
7.2
CVE-2022-33643
Azure Site Recovery Elevation of Privilege Vulnerability
Azure Site Recovery Elevation of Privilege Vulnerability
[ "cpe:2.3:a:microsoft:azure_site_recovery_vmware_to_azure:*:*:*:*:*:*:*:*" ]
null
6.5
null
null
GHSA-67qp-jc76-wwrg
Workspace ONE Launcher contains a Privilege Escalation Vulnerability. A malicious actor with physical access to Workspace ONE Launcher could utilize the Edge Panel feature to bypass setup to gain access to sensitive information.
[]
null
4.6
null
null
CVE-2017-3060
Adobe Flash Player versions 25.0.0.127 and earlier have an exploitable memory corruption vulnerability in the ActionScript2 code parser. Successful exploitation could lead to arbitrary code execution.
[ "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:edge:*:*", "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:internet_explorer:*:*", "cpe:2.3:o:microsoft:windows_10:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:chrome:*:*", "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*" ]
null
null
9.8
10
GHSA-6xv5-5crc-p22v
SQL injection vulnerability in index.php in BXCP 0.299 allows remote attackers to execute arbitrary SQL commands via the tid parameter.
[]
null
null
null
null
GHSA-5445-rx9p-gmmp
A flaw was found in, Fedora versions of krb5 from 1.16.1 to, including 1.17.x, in the way a Kerberos client could crash the KDC by sending one of the RFC 4556 "enctypes". A remote unauthenticated user could use this flaw to crash the KDC.
[]
null
7.5
null
null
RHSA-2025:0115
Red Hat Security Advisory: OpenShift Container Platform 4.17.12 bug fix and security update
runc: file descriptor leak golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html GraphQL: Information Disclosure via GraphQL Introspection in OpenShift
[ "cpe:/a:redhat:openshift:4.17::el9" ]
null
5.3
null
null
CVE-2019-20086
GoPro GPMF-parser 1.2.3 has a heap-based buffer over-read in GPMF_Next in GPMF_parser.c.
[ "cpe:2.3:a:gopro:gpmf-parser:1.2.3:*:*:*:*:*:*:*" ]
null
8.8
null
6.8
CVE-2015-5901
The Secure Empty Trash feature in Finder in Apple OS X before 10.11 improperly deletes Trash files, which might allow local users to obtain sensitive information by reading storage media, as demonstrated by reading a flash drive.
[ "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*" ]
null
null
null
2.1
GHSA-2wm7-mmgc-qxr3
Magento Open Source allows Incorrect Authorization
Adobe Commerce versions 2.4.4-p2 (and earlier) and 2.4.5-p1 (and earlier) are affected by an Incorrect Authorization vulnerability. A low-privileged authenticated attacker could leverage this vulnerability to achieve minor information disclosure.
[]
5.3
4.3
null
null
cisco-sa-clamav-html-XAuOK8mR
ClamAV HTML Scanning Memory Leak Vulnerability Affecting Cisco Products: May 2022
On May 4, 2022, the following vulnerability in the ClamAV scanning library versions 0.103.5 and earlier and 0.104.2 and earlier was disclosed: A vulnerability in HTML file parser of Clam AntiVirus (ClamAV) versions 0.104.0 through 0.104.2 and LTS version 0.103.5 and prior versions could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. For a description of this vulnerability, see the ClamAV blog ["https://blog.clamav.net/2022/05/clamav-01050-01043-01036-released.html"].
[]
null
7.5
null
null