id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
197k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
patch_commit_url
stringlengths
38
232
GHSA-2hrr-4p8h-j38c
Cross-Site Request Forgery (CSRF) vulnerability leading to Stored Cross-Site Scripting (XSS) in Vladimir Anokhin's Shortcodes Ultimate plugin <= 5.12.0 on WordPress.
[]
null
8.8
null
null
null
CVE-2024-2993
Tenda FH1203 QuickIndex formQuickIndex stack-based overflow
A vulnerability was found in Tenda FH1203 2.0.1.6. It has been classified as critical. Affected is the function formQuickIndex of the file /goform/QuickIndex. The manipulation of the argument PPPOEPassword leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-258162 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
[ "cpe:2.3:o:tenda:fh1203_firmware:2.0.1.6:*:*:*:*:*:*:*" ]
null
8.8
8.8
9
null
CVE-2012-2302
Site Documentation (Sitedoc) module for Drupal 6.x-1.x before 6.x-1.4 does not properly check the save location when archiving, which allows remote attackers to obtain sensitive information via unspecified vectors.
[ "cpe:2.3:a:nancy_wichmann:sitedoc:6.x-1.0:*:*:*:*:*:*:*", "cpe:2.3:a:nancy_wichmann:sitedoc:6.x-1.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:nancy_wichmann:sitedoc:6.x-1.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:nancy_wichmann:sitedoc:6.x-1.0:rc4:*:*:*:*:*:*", "cpe:2.3:a:nancy_wichmann:sitedoc:6.x-1.1:*:*:*:*:*:*:*", "cpe:2.3:a:nancy_wichmann:sitedoc:6.x-1.2:*:*:*:*:*:*:*", "cpe:2.3:a:nancy_wichmann:sitedoc:6.x-1.3:*:*:*:*:*:*:*", "cpe:2.3:a:nancy_wichmann:sitedoc:6.x-1.x:dev:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:-:*:*:*:*:*:*:*" ]
null
null
null
5
null
CVE-2020-10912
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 9.7.0.29478. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the SetFieldValue command of the communication API. The issue results from the lack of proper validation of user-supplied data, which can result in a type confusion condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-9945.
[ "cpe:2.3:a:foxitsoftware:phantompdf:*:*:*:*:*:*:*:*", "cpe:2.3:a:foxitsoftware:reader:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
null
7.8
null
null
CVE-2024-13588
Simplebooklet PDF Viewer and Embedder <= 1.1.0 - Authenticated (Contributor+) Stored Cross-Site Scripting
The Simplebooklet PDF Viewer and Embedder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'simplebooklet' shortcode in all versions up to, and including, 1.1.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
6.4
null
null
null
GHSA-jhvm-j3gg-ph57
The EbmlUnicodeString::UpdateFromUTF8 function in libEBML before 1.3.3 allows context-dependent attackers to obtain sensitive information from process heap memory via a crafted UTF-8 string, which triggers an invalid memory access.
[]
null
null
4.3
null
null
CVE-2021-3779
Ruby-MySQL Gem Client File Read
A malicious MySQL server can request local file content from a client using ruby-mysql prior to version 2.10.0 without explicit authorization from the user. This issue was resolved in version 2.10.0 and later.
[ "cpe:2.3:a:ruby-mysql_project:ruby-mysql:*:*:*:*:*:ruby:*:*" ]
null
6.5
null
4.3
null
GHSA-gm56-mmwh-c4q9
The implementation of OutputMediator objects in IBM WebSphere Portal 6.0.1.7, and 7.0.0.1 before CF002, allows remote authenticated users to cause a denial of service (memory consumption) via requests.
[]
null
null
null
null
null
CVE-2025-28892
WordPress FTP Sync plugin <= 1.1.6 - CSRF to Stored XSS vulnerability
Cross-Site Request Forgery (CSRF) vulnerability in a2rocklobster FTP Sync allows Stored XSS. This issue affects FTP Sync: from n/a through 1.1.6.
[]
null
7.1
null
null
null
cisco-sa-asaftd-mgmt-privesc-BMFMUvye
Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Web Services Interface Privilege Escalation Vulnerability
A vulnerability in the web services interface for remote access VPN features of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, but unprivileged, remote attacker to elevate privileges to level 15. This vulnerability is due to improper separation of authentication and authorization scopes. An attacker could exploit this vulnerability by sending crafted HTTPS messages to the web services interface of an affected device. A successful exploit could allow the attacker to gain privilege level 15 access to the web management interface of the device. This includes privilege level 15 access to the device using management tools like the Cisco Adaptive Security Device Manager (ASDM) or the Cisco Security Manager (CSM). Note: With Cisco FTD Software, the impact is lower than the CVSS score suggests because the affected web management interface allows for read access only. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-mgmt-privesc-BMFMUvye"]https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-mgmt-privesc-BMFMUvye ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-mgmt-privesc-BMFMUvye"] This advisory is part of the April 2022 release of the Cisco ASA, FTD, and FMC Security Advisory Bundled publication. For a complete list of the advisories and links to them, see Cisco Event Response: April 2022 Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication ["https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-74836"].
[]
null
8.8
null
null
null
CVE-2024-32624
HDF5 Library through 1.14.3 contains a heap-based buffer overflow in H5T__ref_mem_setnull in H5Tref.c (called from H5T__conv_ref in H5Tconv.c), resulting in the corruption of the instruction pointer.
[ "cpe:2.3:a:hdfgroup:hdf5:*:*:*:*:*:*:*:*" ]
null
7.4
null
null
null
CVE-2023-33518
emoncms v11 and later was discovered to contain an information disclosure vulnerability which allows attackers to obtain the web directory path and other information leaked by the server via a crafted web request.
[ "cpe:2.3:a:emoncms:emoncms:11.0:*:*:*:*:*:*:*" ]
null
5.3
null
null
null
CVE-2020-0898
An elevation of privilege vulnerability exists when the Windows Graphics Component improperly handles objects in memory, aka 'Windows Graphics Component Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0791.
[ "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*" ]
null
7.8
null
7.2
null
GHSA-vqxg-8xhm-jf4p
Missing Authorization vulnerability in PressMaximum Customify allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Customify: from n/a through 0.4.8.
[]
null
5.4
null
null
null
CVE-2020-11027
Password reset links invalidation issue in WordPress
In affected versions of WordPress, a password reset link emailed to a user does not expire upon changing the user password. Access would be needed to the email account of the user by a malicious party for successful execution. This has been patched in version 5.4.1, along with all the previously affected versions via a minor release (5.3.3, 5.2.6, 5.1.5, 5.0.9, 4.9.14, 4.8.13, 4.7.17, 4.6.18, 4.5.21, 4.4.22, 4.3.23, 4.2.27, 4.1.30, 4.0.30, 3.9.31, 3.8.33, 3.7.33).
[ "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:5.4:*:*:*:*:*:*:*" ]
null
6.1
null
null
null
GHSA-j6x2-cm38-9jrr
A vulnerability was found in PHPGurukul Boat Booking System 1.0. It has been classified as problematic. This affects an unknown part of the file book-boat.php?bid=1 of the component Book a Boat Page. The manipulation of the argument phone_number leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
[]
5.3
3.5
null
null
null
GHSA-vmfp-2wcq-pwmg
A vulnerability classified as critical has been found in PHPGurukul Medical Card Generation System 1.0. This affects an unknown part of the file /admin/readenq.php. The manipulation of the argument ID leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
[]
5.3
6.3
null
null
null
CVE-2024-49982
aoe: fix the potential use-after-free problem in more places
In the Linux kernel, the following vulnerability has been resolved: aoe: fix the potential use-after-free problem in more places For fixing CVE-2023-6270, f98364e92662 ("aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts") makes tx() calling dev_put() instead of doing in aoecmd_cfg_pkts(). It avoids that the tx() runs into use-after-free. Then Nicolai Stange found more places in aoe have potential use-after-free problem with tx(). e.g. revalidate(), aoecmd_ata_rw(), resend(), probe() and aoecmd_cfg_rsp(). Those functions also use aoenet_xmit() to push packet to tx queue. So they should also use dev_hold() to increase the refcnt of skb->dev. On the other hand, moving dev_put() to tx() causes that the refcnt of skb->dev be reduced to a negative value, because corresponding dev_hold() are not called in revalidate(), aoecmd_ata_rw(), resend(), probe(), and aoecmd_cfg_rsp(). This patch fixed this issue.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.19.311:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:5.4.273:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*" ]
null
7.8
null
null
null
GHSA-hchj-593h-jx3r
In the Linux kernel, the following vulnerability has been resolved:efi: fix panic in kdump kernelCheck if get_next_variable() is actually valid pointer before calling it. In kdump kernel this method is set to NULL that causes panic during the kexec-ed kernel boot.Tested with QEMU and OVMF firmware.
[]
null
null
null
null
null
CVE-2024-1637
The 360 Javascript Viewer plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check and nonce exposure on several AJAX actions in all versions up to, and including, 1.7.12. This makes it possible for authenticated attackers, with subscriber access or higher, to update plugin settings.
[]
null
4.3
null
null
null
GHSA-cxh8-g9m3-hh5f
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Kangu para WooCommerce plugin <= 2.2.9 versions.
[]
null
7.1
null
null
null
GHSA-9p28-hjc9-q5m3
Unspecified vulnerability in CA IdentityMinder r12.0 through CR16, r12.5 before SP15, and r12.6 GA allows remote attackers to bypass intended access restrictions via unknown vectors.
[]
null
null
null
null
null
GHSA-hqqc-crjh-93xx
Race condition in the WorkerPrivate::NotifyFeatures function in Mozilla Firefox before 41.0 allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free and application crash) by leveraging improper interaction between shared workers and the IndexedDB implementation.
[]
null
null
null
null
null
CVE-2007-6653
Directory traversal vulnerability in download.php in Mihalism Multi Host 2.0.7 allows remote attackers to read arbitrary files via a .. (dot dot) in the file parameter.
[ "cpe:2.3:a:mihalism:multi_host:2.07:*:*:*:*:*:*:*" ]
null
null
null
5
null
GHSA-p3qg-g339-wcxc
Acrobat Reader DC version 22.001.2011x (and earlier), 20.005.3033x (and earlier) and 17.012.3022x (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[]
null
5.5
null
null
null
GHSA-vhf9-r8ff-33pc
Firewall-1 does not properly filter script tags, which allows remote attackers to bypass the "Strip Script Tags" restriction by including an extra < in front of the SCRIPT tag.
[]
null
null
null
null
null
GHSA-wmx3-4x6f-q9q9
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in RistrettoApps Dashing Memberships allows Reflected XSS.This issue affects Dashing Memberships: from n/a through 1.1.
[]
null
7.1
null
null
null
GHSA-pg6g-7pwc-wmq6
An elevation of privilege vulnerability exists when Azure DevOps Server and Team Foundation Services improperly handle pipeline job tokens, aka 'Azure DevOps Server and Team Foundation Services Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0758.
[]
null
null
null
null
null
RHSA-2022:6967
Red Hat Security Advisory: compat-expat1 security update
expat: a use-after-free in the doContent function in xmlparse.c
[ "cpe:/o:redhat:rhel_els:6" ]
null
8.1
null
null
null
GHSA-c6hg-x56f-2f88
An Unquoted Search Path or Element issue was discovered in Automated Logic Corporation (ALC) ALC WebCTRL, i-Vu, SiteScan Web 6.5 and prior; ALC WebCTRL, SiteScan Web 6.1 and prior; ALC WebCTRL, i-Vu 6.0 and prior; ALC WebCTRL, i-Vu, SiteScan Web 5.5 and prior; and ALC WebCTRL, i-Vu, SiteScan Web 5.2 and prior. An unquoted search path vulnerability may allow a non-privileged local attacker to change files in the installation directory and execute arbitrary code with elevated privileges.
[]
null
null
7
null
null
cisco-sa-broad-as-inf-disc-ZUXGFFXQ
Cisco BroadWorks Application Server Information Disclosure Vulnerability
A vulnerability in the XSI-Actions interface of Cisco BroadWorks Application Server could allow an authenticated, remote attacker to access sensitive information on an affected system. This vulnerability is due to improper input validation and authorization of specific commands that a user can execute within the XSI-Actions interface. An attacker could exploit this vulnerability by authenticating to an affected device and issuing a specific set of commands. A successful exploit could allow the attacker to join a Call Center instance and have calls that they do not have permissions to access distributed to them from the Call Center queue. At the time of publication, Cisco had not released updates that address this vulnerability for Cisco BroadWorks Application Server. However, firmware patches are available. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-broad-as-inf-disc-ZUXGFFXQ ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-broad-as-inf-disc-ZUXGFFXQ"]
[]
null
4.3
null
null
null
GHSA-5r8q-qv6x-h2vp
The LadiApp plugin for WordPress is vulnerable to Cross-Site Request Forgery due to a missing nonce check on the save_config() function in versions up to, and including, 4.3. This makes it possible for unauthenticated attackers to update the 'ladipage_config' option via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
[]
null
4.3
null
null
null
CVE-2018-14089
An issue was discovered in a smart contract implementation for Virgo_ZodiacToken, an Ethereum token. In this contract, 'bool sufficientAllowance = allowance <= _value' will cause an arbitrary transfer in the function transferFrom because '<=' is used instead of '>=' (which was intended). An attacker can transfer from any address to his address, and does not need to meet the 'allowance > value' condition.
[ "cpe:2.3:a:virgo_zodiactoken_project:virgo_zodiactoken:-:*:*:*:*:*:*:*" ]
null
null
7.5
5
null
CVE-2010-4778
Multiple cross-site scripting (XSS) vulnerabilities in fetchmailprefs.php in Horde IMP before 4.3.8, and Horde Groupware Webmail Edition before 1.2.7, allow remote attackers to inject arbitrary web script or HTML via the (1) username (aka fmusername), (2) password (aka fmpassword), or (3) server (aka fmserver) field in a fetchmail_prefs_save action, related to the Fetchmail configuration, a different issue than CVE-2010-3695. NOTE: some of these details are obtained from third party information.
[ "cpe:2.3:a:horde:imp:*:*:*:*:*:*:*:*", "cpe:2.3:a:horde:imp:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:horde:imp:2.2:*:*:*:*:*:*:*", "cpe:2.3:a:horde:imp:2.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:horde:imp:2.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:horde:imp:2.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:horde:imp:2.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:horde:imp:2.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:horde:imp:2.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:horde:imp:2.2.7:*:*:*:*:*:*:*", "cpe:2.3:a:horde:imp:2.2.8:*:*:*:*:*:*:*", "cpe:2.3:a:horde:imp:2.3:*:*:*:*:*:*:*", "cpe:2.3:a:horde:imp:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:horde:imp:3.1:*:*:*:*:*:*:*", "cpe:2.3:a:horde:imp:3.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:horde:imp:3.2:*:*:*:*:*:*:*", "cpe:2.3:a:horde:imp:3.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:horde:imp:3.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:horde:imp:3.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:horde:imp:3.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:horde:imp:3.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:horde:imp:3.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:horde:imp:3.2.7:*:*:*:*:*:*:*", "cpe:2.3:a:horde:imp:3.2.7:rc1:*:*:*:*:*:*", "cpe:2.3:a:horde:imp:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:horde:imp:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:horde:imp:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:horde:imp:4.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:horde:imp:4.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:horde:imp:4.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:horde:imp:4.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:horde:imp:4.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:horde:imp:4.2:*:*:*:*:*:*:*", "cpe:2.3:a:horde:imp:4.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:horde:imp:4.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:horde:imp:4.3:*:*:*:*:*:*:*", "cpe:2.3:a:horde:imp:4.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:horde:imp:4.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:horde:imp:4.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:horde:imp:4.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:horde:imp:4.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:horde:imp:4.3.6:*:*:*:*:*:*:*", "cpe:2.3:a:horde:groupware:*:*:*:*:*:*:*:*", "cpe:2.3:a:horde:groupware:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:horde:groupware:1.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:horde:groupware:1.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:horde:groupware:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:horde:groupware:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:horde:groupware:1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:horde:groupware:1.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:horde:groupware:1.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:horde:groupware:1.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:horde:groupware:1.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:horde:groupware:1.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:horde:groupware:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:horde:groupware:1.1:rc1:*:*:*:*:*:*", "cpe:2.3:a:horde:groupware:1.1:rc2:*:*:*:*:*:*", "cpe:2.3:a:horde:groupware:1.1:rc3:*:*:*:*:*:*", "cpe:2.3:a:horde:groupware:1.1:rc4:*:*:*:*:*:*", "cpe:2.3:a:horde:groupware:1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:horde:groupware:1.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:horde:groupware:1.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:horde:groupware:1.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:horde:groupware:1.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:horde:groupware:1.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:horde:groupware:1.2:*:*:*:*:*:*:*", "cpe:2.3:a:horde:groupware:1.2:rc1:*:*:*:*:*:*", "cpe:2.3:a:horde:groupware:1.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:horde:groupware:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:horde:groupware:1.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:horde:groupware:1.2.3:rc1:*:*:*:*:*:*", "cpe:2.3:a:horde:groupware:1.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:horde:groupware:1.2.5:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
CVE-2009-0418
The IPv6 Neighbor Discovery Protocol (NDP) implementation in HP HP-UX B.11.11, B.11.23, and B.11.31 does not validate the origin of Neighbor Discovery messages, which allows remote attackers to cause a denial of service (loss of connectivity), read private network traffic, and possibly execute arbitrary code via a spoofed message that modifies the Forward Information Base (FIB), a related issue to CVE-2008-2476.
[ "cpe:2.3:o:hp:hp-ux:b.11.11:*:*:*:*:*:*:*", "cpe:2.3:o:hp:hp-ux:b.11.23:*:*:*:*:*:*:*", "cpe:2.3:o:hp:hp-ux:b.11.31:*:*:*:*:*:*:*" ]
null
null
null
9.3
null
GHSA-69cr-qg65-xgm7
PolarSSL versions prior to v1.1 use the HAVEGE random number generation algorithm. At its heart, this uses timing information based on the processor's high resolution timer (the RDTSC instruction). This instruction can be virtualized, and some virtual machine hosts have chosen to disable this instruction, returning 0s or predictable results.
[]
null
null
null
null
null
CVE-2008-1607
SQL injection vulnerability in haberoku.php in Serbay Arslanhan Bomba Haber 2.0 allows remote attackers to execute arbitrary SQL commands via the haber parameter.
[ "cpe:2.3:a:serby_arslanhan:bomba_haber:2.0:*:*:*:*:*:*:*" ]
null
null
null
6.8
null
CVE-2017-3626
Vulnerability in the Oracle GlassFish Server component of Oracle Fusion Middleware (subcomponent: Java Server Faces). The supported version that is affected is 3.1.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle GlassFish Server. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle GlassFish Server accessible data. CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).
[ "cpe:2.3:a:oracle:glassfish_server:3.1.2:*:*:*:*:*:*:*" ]
null
null
3.1
2.6
null
GHSA-g52v-9w2f-w8h4
A cross-site scripting (XSS) vulnerability in flickrRSS.php in the flickrRSS plugin 5.3.1 for WordPress allows remote attackers to inject arbitrary web script or HTML via the flickrRSS_tags parameter to wp-admin/options-general.php.
[]
null
null
6.1
null
null
CVE-2013-3499
GroundWork Monitor Enterprise 6.7.0 performs authentication on the basis of the HTTP Referer header, which allows remote attackers to obtain administrative privileges or access files via a crafted header.
[ "cpe:2.3:a:gwos:groundwork_monitor:6.7.0:-:enterprise:*:*:*:*:*" ]
null
null
null
7.5
null
GHSA-9599-9mhm-gvxp
Multiple cross-site scripting (XSS) vulnerabilities in Web Reference Database (aka refbase) through 0.9.6 and bleeding-edge through 2015-04-28 allow remote attackers to inject arbitrary web script or HTML via the (1) adminUserName, (2) pathToMYSQL, (3) databaseStructureFile, or (4) pathToBibutils parameter to install.php or the (5) adminUserName parameter to update.php.
[]
null
null
null
null
null
GHSA-xpvq-w32j-6px4
A vulnerability classified as problematic has been found in Open Asset Import Library Assimp 5.4.3. This affects the function MDLImporter::ParseSkinLump_3DGS_MDL7 of the file assimp/code/AssetLib/MDL/MDLMaterialLoader.cpp. The manipulation leads to out-of-bounds read. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The project decided to collect all Fuzzer bugs in a main-issue to address them in the future.
[]
4.8
3.3
null
null
null
GHSA-h2pj-2gpr-72vh
Deserialization of Untrusted Data vulnerability in GoodLayers Goodlayers Hotel allows Object Injection. This issue affects Goodlayers Hotel: from n/a through 3.1.4.
[]
null
9.8
null
null
null
GHSA-573p-3w7c-mcjh
Multiple cross-site scripting (XSS) vulnerabilities in pages/3DComplete.php in the WooCommerce SagePay Direct Payment Gateway plugin before 0.1.6.7 for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) MD or (2) PARes parameter.
[]
null
null
null
null
null
GHSA-4jwq-572w-4388
Memory over-allocation in evm crate
ImpactPrior to the patch, when executing specific EVM opcodes related to memory operations that use `evm_core::Memory::copy_large`, the crate can over-allocate memory when it is not needed, making it possible for an attacker to perform denial-of-service attack.PatchesThe flaw was corrected in commit `19ade85`. Users should upgrade to `==0.21.1, ==0.23.1, ==0.24.1, ==0.25.1, >=0.26.1`.WorkaroundsNone. Please upgrade your `evm` crate versionReferencesFix commit: https://github.com/rust-blockchain/evm/commit/19ade858c430ab13eb562764a870ac9f8506f8ddFor more informationIf you have any questions or comments about this advisory:Open an issue in [evm repo](https://github.com/rust-blockchain/evm)Email [Wei](mailto:wei@that.world)
[]
null
6.5
null
null
null
CVE-2004-1340
Debian GNU/Linux 3.0 installs the libpam-radius-auth package with the pam_radius_auth.conf set to be world-readable, which allows local users to obtain sensitive information.
[ "cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*" ]
null
null
null
2.1
null
CVE-2011-0221
WebKit, as used in Apple Safari before 5.0.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2011-07-20-1.
[ "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.0:beta:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.0.0b1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.0.0b2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.0.3:85.8:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.0.3:85.8.1:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.3:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.3.2:312.5:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.3.2:312.6:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:2.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:2.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:2.0.3:417.8:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:2.0.3:417.9:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:2.0.3:417.9.2:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:2.0.3:417.9.3:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:2.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:3:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.0.0b:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.0.1b:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.0.2b:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.0.3b:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.0.4b:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.1.0b:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:4.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:4.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:4.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:5.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:5.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:apple:webkit:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.5.8:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.6.8:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.6.9:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.7.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.5.8:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.6.8:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.6.9:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.7.0:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*" ]
null
null
null
9.3
null
GHSA-g2mr-q8jv-5635
The Smart Maintenance Mode WordPress plugin before 1.5.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
[]
null
3.5
null
null
null
CVE-2024-12481
cjbi wetech-cms UserDao.java findUser sql injection
A vulnerability was found in cjbi wetech-cms 1.0/1.1/1.2. It has been declared as critical. Affected by this vulnerability is the function findUser of the file wetech-cms-master\wetech-core\src\main\java\tech\wetech\cms\dao\UserDao.java. The manipulation of the argument searchValue/gId/rId leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
[ "cpe:2.3:a:cjbi:wetech-cms:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:cjbi:wetech-cms:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:cjbi:wetech-cms:1.2:*:*:*:*:*:*:*" ]
5.3
6.3
6.3
6.5
null
CVE-2016-8292
Unspecified vulnerability in the PeopleSoft Enterprise HCM component in Oracle PeopleSoft Products 9.2 allows remote authenticated users to affect confidentiality and integrity via vectors related to Talent Acquisition Manager.
[ "cpe:2.3:a:oracle:peoplesoft_enterprise_human_capital_management_talent_acquisition_manager:9.2:*:*:*:*:*:*:*" ]
null
null
4.2
5.8
null
CVE-2020-15961
Insufficient policy validation in extensions in Google Chrome prior to 85.0.4183.121 allowed an attacker who convinced a user to install a malicious extension to potentially perform a sandbox escape via a crafted Chrome Extension.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*", "cpe:2.3:a:opensuse:backports_sle:15.0:sp2:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*" ]
null
9.6
null
6.8
null
CVE-2013-3115
Microsoft Internet Explorer 7 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3162.
[ "cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*" ]
null
null
null
9.3
null
GHSA-7g5h-7xwq-xxrp
Unspecified vulnerability in Oracle Java SE 7u45 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.
[]
null
null
null
null
null
CVE-2020-27917
A use after free issue was addressed with improved memory management. This issue is fixed in macOS Big Sur 11.0.1, watchOS 7.1, iOS 14.2 and iPadOS 14.2, iCloud for Windows 11.5, tvOS 14.2, iTunes 12.11 for Windows. Processing maliciously crafted web content may lead to code execution.
[ "cpe:2.3:a:apple:icloud:*:*:*:*:*:windows:*:*", "cpe:2.3:a:apple:itunes:*:*:*:*:*:windows:*:*", "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*" ]
null
7.8
null
9.3
null
CVE-2024-33597
WordPress SSU plugin <= 1.5.0 - Broken Access Control vulnerability
Missing Authorization vulnerability in ProFaceOff SSU.This issue affects SSU: from n/a through 1.5.0.
[]
null
7.5
null
null
null
CVE-2017-0130
The scripting engine in Microsoft Internet Explorer 9 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Scripting Engine Memory Corruption Vulnerability." This vulnerability is different from that described in CVE-2017-0040.
[ "cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:11:*:*:*:*:*:*:*" ]
null
null
7.5
7.6
null
GHSA-p9wg-pjwr-cp67
The WP JobSearch WordPress plugin before 2.3.4 does not prevent attackers from logging-in as any users with the only knowledge of that user's email address.
[]
null
7.5
null
null
null
CVE-2018-19193
An issue was discovered in XiaoCms 20141229. There is XSS via the largest input box on the "New news" screen.
[ "cpe:2.3:a:xiaocms:xiaocms:20141229:*:*:*:*:*:*:*" ]
null
null
6.1
4.3
null
CVE-2012-1314
The WAAS Express feature in Cisco IOS 15.1 and 15.2 allows remote attackers to cause a denial of service (memory consumption or device reload) via crafted transit traffic, aka Bug ID CSCtt45381.
[ "cpe:2.3:o:cisco:ios:15.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.2:*:*:*:*:*:*:*" ]
null
null
null
7.8
null
CVE-2008-6452
SQL injection vulnerability in show_vote.php in Oceandir 2.9 and earlier allows remote attackers to execute arbitrary SQL commands via the id parameter.
[ "cpe:2.3:a:oceandir:oceandir:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2024-33530
In Jitsi Meet before 9391, a logic flaw in password-protected Jitsi meetings (that make use of a lobby) leads to the disclosure of the meeting password when a user is invited to a call after waiting in the lobby.
[ "cpe:2.3:a:jitsi:meet:*:*:*:*:*:moodle:*:*" ]
null
7.5
null
null
null
GHSA-48mm-j996-px5g
A vulnerability was found in GNU PSPP 82fb509fb2fedd33e7ac0c46ca99e108bb3bdffb. It has been declared as problematic. This vulnerability affects the function calloc of the file pspp-convert.c. The manipulation of the argument -l leads to integer overflow. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used.
[]
4.8
3.3
null
null
null
GHSA-3hmp-qggx-jm2c
The ERP WordPress plugin before 1.12.4 does not properly sanitise and escape the `type` parameter in the `erp/v1/accounting/v1/people` REST API endpoint before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users such as admin.
[]
null
7.2
null
null
null
GHSA-j8w6-jmwh-mmx8
In the Linux kernel, the following vulnerability has been resolved:ASoC: qcom: Fix sc7280 lpass potential buffer overflowCase values introduced in commit 5f78e1fb7a3e ("ASoC: qcom: Add driver support for audioreach solution") cause out of bounds access in arrays of sc7280 driver data (e.g. in case of RX_CODEC_DMA_RX_0 in sc7280_snd_hw_params()).Redefine LPASS_MAX_PORTS to consider the maximum possible port id for q6dsp as sc7280 driver utilizes some of those values.Found by Linux Verification Center (linuxtesting.org) with SVACE.
[]
null
null
null
null
null
CVE-2006-0479
pmwiki.php in PmWiki 2.1 beta 20, with register_globals enabled, allows remote attackers to bypass protection mechanisms that deregister global variables by setting both a GPC variable and a GLOBALS[] variable with the same name, which causes PmWiki to unset the GLOBALS[] variable but not the GPC variable, which creates resultant vulnerabilities such as remote file inclusion and cross-site scripting (XSS).
[ "cpe:2.3:a:pmwiki:pmwiki:2.1_beta_20:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
GHSA-p5wp-2qp8-cc84
An issue was discovered in Zoho ManageEngine AssetExplorer 6.5. During an upgrade of the Windows agent, it does not validate the source and binary downloaded. This allows an attacker on an adjacent network to execute code with NT AUTHORITY/SYSTEM privileges on the agent machines by providing an arbitrary executable via a man-in-the-middle attack.
[]
null
6.4
null
null
null
CVE-2018-12395
By rewriting the Host: request headers using the webRequest API, a WebExtension can bypass domain restrictions through domain fronting. This would allow access to domains that share a host that are otherwise restricted. This vulnerability affects Firefox ESR < 60.3 and Firefox < 63.
[ "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*" ]
null
null
7.5
5
null
GHSA-23wj-r557-8c5p
tinyexr 0.9.5 has an assertion failure in DecodePixelData in tinyexr.h.
[]
null
null
7.5
null
null
GHSA-pqxx-3j4c-c42x
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow an authenticated, remote attacker to inject arbitrary commands that are executed with root privileges. These vulnerabilities are due to improper validation of user-supplied input in the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to a targeted device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system. To exploit these vulnerabilities, an attacker would need to have valid administrator credentials on an affected device.
[]
null
7.2
null
null
null
GHSA-vvjf-wxwg-9pcv
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 7.0.20. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).
[]
null
8.2
null
null
null
CVE-2024-56443
Cross-process screen stack vulnerability in the UIExtension module Impact: Successful exploitation of this vulnerability may affect service confidentiality.
[ "cpe:2.3:o:huawei:harmonyos:5.0.0:*:*:*:*:*:*:*" ]
null
6.2
null
null
null
CVE-2007-5298
Multiple PHP remote file inclusion vulnerabilities in CMS Creamotion allow remote attackers to execute arbitrary PHP code via a URL in the cfg[document_uri] parameter to (1) _administration/securite.php and (2) _administration/gestion_configurations/save_config.php.
[ "cpe:2.3:a:creamotion:creamotion:.:*:*:*:*:*:*:*" ]
null
null
null
6.4
null
GHSA-ghmw-rwh8-6qmr
pyload Log Injection vulnerability
SummaryA log injection vulnerability was identified in `pyload`. This vulnerability allows any unauthenticated actor to inject arbitrary messages into the logs gathered by `pyload`.Details`pyload` will generate a log entry when attempting to sign in with faulty credentials. This entry will be in the form of `Login failed for user 'USERNAME'`. However, when supplied with a username containing a newline, this newline is not properly escaped. Newlines are also the delimiter between log entries. This allows the attacker to inject new log entries into the log file.PoCRun `pyload` in the default configuration by running the following commandWe can now sign in as the pyload user and view the logs at `http://localhost:8000/logs`. ![Viewing the logs](https://user-images.githubusercontent.com/44903767/294433796-f2c96e39-8000-4649-99bb-9c50e786243d.png)Any unauthenticated attacker can now make the following request to inject arbitrary logs.If we now were to look at the logs again, we see that the entry has successfully been injected. ![PoC2](https://user-images.githubusercontent.com/44903767/294434785-2fc6dce4-3e2c-4da0-8e80-a6bba882f756.png)ImpactForged or otherwise, corrupted log files can be used to cover an attacker’s tracks or even to implicate another party in the commission of a malicious act.
[]
null
5.3
null
null
null
CVE-2020-26111
cPanel before 90.0.10 allows self XSS via the WHM Edit DNS Zone interface (SEC-566).
[ "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*" ]
null
6.1
null
4.3
null
GHSA-mq67-mxx2-598j
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in madfishdigital Bulk NoIndex & NoFollow Toolkit allows Reflected XSS. This issue affects Bulk NoIndex & NoFollow Toolkit: from n/a through 2.16.
[]
null
7.1
null
null
null
GHSA-5ggj-xwvc-9x57
In the Linux kernel, the following vulnerability has been resolved:drm/mediatek: Fix potential NULL dereference in mtk_crtc_destroy()In mtk_crtc_create(), if the call to mbox_request_channel() fails then we set the "mtk_crtc->cmdq_client.chan" pointer to NULL. In that situation, we do not call cmdq_pkt_create().During the cleanup, we need to check if the "mtk_crtc->cmdq_client.chan" is NULL first before calling cmdq_pkt_destroy(). Calling cmdq_pkt_destroy() is unnecessary if we didn't call cmdq_pkt_create() and it will result in a NULL pointer dereference.
[]
null
5.5
null
null
null
GHSA-q23w-6cjf-xvf4
The ELEX WooCommerce Dynamic Pricing and Discounts plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the elex_dp_export_rules() and elex_dp_import_rules() functions in all versions up to, and including, 2.1.7. This makes it possible for unauthenticated attackers to import and export product rules along with obtaining phpinfo() data
[]
null
6.5
null
null
null
CVE-2023-25292
Reflected Cross Site Scripting (XSS) in Intermesh BV Group-Office version 6.6.145, allows attackers to gain escalated privileges and gain sensitive information via the GO_LANGUAGE cookie.
[ "cpe:2.3:a:group-office:group_office:6.6.145:*:*:*:*:*:*:*" ]
null
6.1
null
null
null
GHSA-4f59-47pg-p4cc
Microsoft Internet Explorer 8 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."
[]
null
null
null
null
null
CVE-2024-35011
idccms v1.35 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /admin/infoType_deal.php?mudi=rev&nohrefStr=close.
[ "cpe:2.3:a:idccms_project:idccms:*:*:*:*:*:*:*:*" ]
null
5.4
null
null
null
GHSA-m8pw-46hr-f4pf
The gst_riff_create_audio_caps function in gst-libs/gst/riff/riff-media.c in gst-plugins-base in GStreamer before 1.10.3 allows remote attackers to cause a denial of service (floating point exception and crash) via a crafted video file.
[]
null
null
5.5
null
null
GHSA-6m45-m4hg-v9vc
Cross-site scripting (XSS) vulnerability in Dell OpenManage Server Administrator (OMSA) before 6.5.0.1, 7.0 before 7.0.0.1, and 7.1 before 7.1.0.1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
[]
null
null
null
null
null
CVE-2023-34462
netty-handler SniHandler 16MB allocation
Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. The `SniHandler` can allocate up to 16MB of heap for each channel during the TLS handshake. When the handler or the channel does not have an idle timeout, it can be used to make a TCP server using the `SniHandler` to allocate 16MB of heap. The `SniHandler` class is a handler that waits for the TLS handshake to configure a `SslHandler` according to the indicated server name by the `ClientHello` record. For this matter it allocates a `ByteBuf` using the value defined in the `ClientHello` record. Normally the value of the packet should be smaller than the handshake packet but there are not checks done here and the way the code is written, it is possible to craft a packet that makes the `SslClientHelloHandler`. This vulnerability has been fixed in version 4.1.94.Final.
[ "cpe:2.3:a:netty:netty:*:*:*:*:*:*:*:*" ]
null
6.5
null
null
null
RHSA-2013:1537
Red Hat Security Advisory: augeas security, bug fix, and enhancement update
augeas: susceptible to symlink attack augeas: susceptible to mountpoint attack
[ "cpe:/a:redhat:enterprise_linux:6::hypervisor", "cpe:/a:redhat:storage:3:server:el6", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
null
CVE-2017-15835
In all android releases(Android for MSM, Firefox OS for MSM, QRD Android) from CAF using the linux kernel, While processing the RIC Data Descriptor IE in an artificially crafted 802.11 frame with IE length more than 255, an infinite loop may potentially occur resulting in a denial of service.
[ "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*" ]
null
null
6.5
3.3
null
CVE-2024-35305
Unauth Time-Based SQL Injection via API
Unauth Time-Based SQL Injection in API allows to exploit HTTP request Authorization header. This issue affects Pandora FMS: from 700 through <777.
[ "cpe:2.3:a:artica:pandora_fms:*:*:*:*:*:*:*:*" ]
8.9
null
null
null
null
GHSA-5gj7-9vg9-w5rc
The Pricing Tables WordPress Plugin WordPress plugin before 3.2.1 does not sanitise and escape parameter before outputting it back in a page available to any user (both authenticated and unauthenticated) when a specific setting is enabled, leading to a Reflected Cross-Site Scripting
[]
null
6.1
null
null
null
CVE-2008-5406
Stack-based buffer overflow in Apple QuickTime Player 7.5.5 and iTunes 8.0.2.20 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a MOV file with "long arguments," related to an "off by one overflow."
[ "cpe:2.3:a:apple:itunes:8.0.2.20:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.5.5:*:*:*:*:*:*:*" ]
null
null
null
9.3
null
GHSA-4m48-j3xj-px27
MyBatis plus v3.4.3 was discovered to contain a SQL injection vulnerability via the Column parameter in /core/conditions/AbstractWrapper.java.
[]
null
9.8
null
null
null
CVE-2021-0466
In startIpClient of ClientModeImpl.java, there is a possible identifier which could be used to track a device. This could lead to remote information disclosure to a proximal attacker, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-154114734
[ "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*" ]
null
7.5
null
5
null
cisco-sa-20190417-aap-dos
Cisco Aironet Series Access Points Quality of Service Denial of Service Vulnerability
A vulnerability in the quality of service (QoS) feature of Cisco Aironet Series Access Points (APs) could allow an authenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper input validation on QoS fields within Wi-Fi frames by the affected device. An attacker could exploit this vulnerability by sending malformed Wi-Fi frames to an affected device. A successful exploit could allow the attacker to cause the affected device to crash, resulting in a DoS condition. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190417-aap-dos ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190417-aap-dos"]
[]
null
null
6.8
null
null
CVE-2007-2848
Stack-based buffer overflow in the SetPath function in the shComboBox ActiveX control (shcmb80.ocx) in Sky Software Shell MegaPack ActiveX 8.0 allows remote attackers to execute arbitrary code via a long argument. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
[ "cpe:2.3:a:sky_software:shcombobox_activex_control:*:*:*:*:*:*:*:*", "cpe:2.3:a:sky_software:shell_megapack_activex:8.0:*:*:*:*:*:*:*" ]
null
null
null
10
null
GHSA-j5rp-qhhj-8vw3
Certain NETGEAR devices are affected by a stack-based buffer overflow by an authenticated user. This affects DGN2200Bv4 before 1.0.0.102, DGN2200v4 before 1.0.0.102, EX3700 before 1.0.0.70, EX3800 before 1.0.0.70, EX6000 before 1.0.0.30, EX6100 before 1.0.2.22, EX6120 before 1.0.0.40, EX6130 before 1.0.0.22, EX6150 before 1.0.0.38, EX6200 before 1.0.3.86, EX7000 before 1.0.0.64, R6300v2 before 1.0.4.22, R6900P before 1.3.0.18, R7000P before 1.3.0.18, R7300DST before 1.0.0.62, R7900P before 1.3.0.10, R8000 before 1.0.4.12, R8000P before 1.3.0.10, WN2500RPv2 before 1.0.1.52, and WNDR3400v3 before 1.0.1.18.
[]
null
null
null
null
null
CVE-2018-6806
Marked 2 through 2.5.11 allows remote attackers to read arbitrary files via a crafted HTML document that triggers a redirect to an x-marked://preview?text= URL. The value of the text parameter can include arbitrary JavaScript code, e.g., making XMLHttpRequest calls.
[ "cpe:2.3:a:marked_2_project:marked_2:*:*:*:*:*:*:*:*" ]
null
6.5
null
4.3
null
GHSA-2mph-6q9x-rcfr
Cross-Site Request Forgery (CSRF) vulnerability in Realbig Team Realbig For WordPress plugin <= 1.0.3 versions.
[]
null
4.3
null
null
null
CVE-2022-46752
Dell BIOS contains an Improper Authorization vulnerability. An unauthenticated physical attacker may potentially exploit this vulnerability, leading to denial of service.
[ "cpe:2.3:o:dell:inspiron_14_plus_7420_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_14_plus_7420:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_14_plus_7620_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_14_plus_7620:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3511_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3511:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3520_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3520:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5310_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5310:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5320_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5320:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5410_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5410:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5420_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5420:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5510_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5510:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5620_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5620:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7420_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7420:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7510_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7510:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7610_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7610:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7620_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7620:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3140_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3140:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3320_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3320:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3330_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3330:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3420_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3420:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3430_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3430:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3520_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3520:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3530_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3530:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5330_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5330:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5420_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5420:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5430_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5430:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5430_rugged_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5430_rugged:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5431_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5431:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5520_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5520:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5521_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5521:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5530_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5530:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5531_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5531:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7320_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7320:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7320_detachable_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7320_detachable:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7330_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7330:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7420_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7420:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7430_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7430:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7520_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7520:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7530_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7530:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_9330_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_9330:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_9420_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_9420:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_9430_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_9430:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_9510_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_9510:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_9520_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_9520:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_rugged_7330_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_rugged_7330:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5421_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5421:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3470_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3470:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3560_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3560:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3561_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3561:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3570_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3570:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3571_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3571:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_5470_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_5470:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_5560_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_5560:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_5570_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_5570:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_5760_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_5760:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_5770_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_5770:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_7560_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_7560:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_7670_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_7670:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_7760_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_7760:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_7770_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_7770:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3420_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3420:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3510_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3510:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3520_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3520:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_5310_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_5310:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_5320_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_5320:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_5410_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_5410:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_5510_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_5510:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_5620_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_5620:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_7510_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_7510:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_7620_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_7620:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_13_9315_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_13_9315:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_13_9315_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_13_9315_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_13_9320_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_13_9320:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_15_9510_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_15_9510:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_15_9520_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_15_9520:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_17_9710_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_17_9710:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_17_9720_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_17_9720:-:*:*:*:*:*:*:*" ]
null
4.6
null
null
null
GHSA-fp2q-62rv-wjc8
FATEK Automation WinProladder versions 3.30 and prior lacks proper validation of user-supplied data when parsing project files, which could result in an out-of-bounds write. An attacker could leverage this vulnerability to execute arbitrary code.
[]
null
null
null
null
null
RHSA-2025:1130
Red Hat Security Advisory: OpenShift Container Platform 4.15.45 packages and security update
jinja2: Jinja has a sandbox breakout through malicious filenames jinja2: Jinja has a sandbox breakout through indirect reference to format method
[ "cpe:/a:redhat:openshift:4.15::el8", "cpe:/a:redhat:openshift:4.15::el9", "cpe:/a:redhat:openshift_ironic:4.15::el9" ]
null
6.3
null
null
null
GHSA-j97r-g55p-x5hc
Directory traversal vulnerability in glossary.php in PROPS 0.6.1 allows remote attackers to view arbitrary files via a .. (dot dot) in (1) module or (2) format variables.
[]
null
null
null
null
null
GHSA-95hh-399q-cvw3
Multiple vulnerabilities in Konqueror in KDE 3.3.1 and earlier (1) allow access to restricted Java classes via JavaScript and (2) do not properly restrict access to certain Java classes from the Java applet, which allows remote attackers to bypass sandbox restrictions and read or write arbitrary files.
[]
null
null
null
null
null