id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
197k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
GHSA-453c-hx6c-v5gq
IBM Cloud App Management 2019.3.0 and 2019.4.0 reveals a stack trace on certain API requests which can allow an attacker further information about the implementation of the offering. IBM X-Force ID: 173311.
[]
null
null
null
null
GHSA-89qq-xm3r-9xgv
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Format actions of TextBox objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code under the context of the current process. Was ZDI-CAN-5571.
[]
null
null
8.8
null
GHSA-9m4h-w5f9-qjgv
Inappropriate implementation in Full screen mode in Google Chrome on Android prior to 99.0.4844.51 allowed a remote attacker to hide the contents of the Omnibox (URL bar) via a crafted HTML page.
[]
null
6.5
null
null
GHSA-5575-w787-j9qq
SQL injection vulnerability in the CMSJunkie J-ClassifiedsManager component for Joomla! allows remote attackers to execute arbitrary SQL commands via the id parameter in a viewad task to classifieds/offerring-ads.
[]
null
null
null
null
CVE-2024-35265
Windows Perception Service Elevation of Privilege Vulnerability
Windows Perception Service Elevation of Privilege Vulnerability
[ "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*" ]
null
7
null
null
CVE-2022-39326
kartverket/github-workflows's run-terraform allows for RCE via terraform plan
kartverket/github-workflows are shared reusable workflows for GitHub Actions. Prior to version 2.7.5, all users of the `run-terraform` reusable workflow from the kartverket/github-workflows repo are affected by a code injection vulnerability. A malicious actor could potentially send a PR with a malicious payload leading to execution of arbitrary JavaScript code in the context of the workflow. Users should upgrade to at least version 2.7.5 to resolve the issue. As a workaround, review any pull requests from external users for malicious payloads before allowing them to trigger a build.
[ "cpe:2.3:a:kartverket:github-workflows:*:*:*:*:*:*:*:*" ]
null
8.8
null
null
CVE-2012-0856
Heap-based buffer overflow in the MPV_frame_start function in libavcodec/mpegvideo.c in FFmpeg before 0.9.1, when the lowres option is enabled, allows remote attackers to cause a denial of service (application crash) via a crafted H263 media file. NOTE: this vulnerability exists because of a regression error.
[ "cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.3:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.4.5:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.4.6:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.4.7:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.4.8:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.4.9:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.4.9:pre1:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.5:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.6:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.7:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.7.2:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.7.3:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.7.6:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.7.7:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.7.8:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.7.9:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.7.11:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.7.12:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.8.0:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.8.2:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.8.5:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.8.6:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.8.7:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.8.8:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.8.10:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:0.8.11:*:*:*:*:*:*:*" ]
null
null
null
2.6
GHSA-4fxg-w3g2-qr6r
A remote code execution vulnerability exists in the way affected Microsoft scripting engines render when handling objects in memory in Microsoft browsers. These vulnerabilities could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited the vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. This vulnerability is different from those described in CVE-2017-0010, CVE-2017-0015, CVE-2017-0032, CVE-2017-0035, CVE-2017-0067, CVE-2017-0070, CVE-2017-0071, CVE-2017-0094, CVE-2017-0131, CVE-2017-0132, CVE-2017-0134, CVE-2017-0136, CVE-2017-0137, CVE-2017-0138, CVE-2017-0141, CVE-2017-0150, and CVE-2017-0151.
[]
null
null
7.5
null
CVE-2015-5945
The Sandbox subsystem in Apple OS X before 10.11.1 allows local users to gain privileges via vectors involving NVRAM parameters.
[ "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*" ]
null
null
null
7.2
GHSA-pm3v-cfmp-f7x4
An issue was discovered in SeaCMS 6.64. XSS exists in admin_datarelate.php via the time or maxHit parameter in a dorandomset action.
[]
null
null
6.1
null
GHSA-6396-m98j-2qhj
A vulnerability has been found in obsproject OBS Studio up to 30.0.2 on Windows and classified as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to untrusted search path. The attack needs to be approached locally. The complexity of an attack is rather high. The exploitation appears to be difficult. It is recommended to apply a patch to fix this issue. The vendor disagrees that this issue is "something worth reporting, as every attack surface requires privileged access/user compromise".
[]
2
4.5
null
null
GHSA-jpr6-88j2-72pf
The node management page in SolarWinds Orion Platform before 2020.2.5 HF1 allows an attacker to create or delete a node (outside of the attacker's perimeter) via an account with write permissions. This occurs because node IDs are predictable (with incrementing numbers) and the access control on Services/NodeManagement.asmx/DeleteObjNow is incorrect. To exploit this, an attacker must be authenticated and must have node management rights associated with at least one valid group on the platform.
[]
null
5.4
null
null
CVE-2020-10275
RVD#2565: Weak token generation for the REST API.
The access tokens for the REST API are directly derived from the publicly available default credentials for the web interface. Given a USERNAME and a PASSWORD, the token string is generated directly with base64(USERNAME:sha256(PASSWORD)). An unauthorized attacker inside the network can use the default credentials to compute the token and interact with the REST API to exfiltrate, infiltrate or delete data.
[ "cpe:2.3:o:mobile-industrial-robots:mir100_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:mobile-industrial-robots:mir100:-:*:*:*:*:*:*:*", "cpe:2.3:o:mobile-industrial-robots:mir200_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:mobile-industrial-robots:mir200:-:*:*:*:*:*:*:*", "cpe:2.3:o:mobile-industrial-robots:mir250_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:mobile-industrial-robots:mir250:-:*:*:*:*:*:*:*", "cpe:2.3:o:mobile-industrial-robots:mir500_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:mobile-industrial-robots:mir500:-:*:*:*:*:*:*:*", "cpe:2.3:o:mobile-industrial-robots:mir1000_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:mobile-industrial-robots:mir1000:-:*:*:*:*:*:*:*", "cpe:2.3:o:easyrobotics:er200_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:easyrobotics:er200:-:*:*:*:*:*:*:*", "cpe:2.3:o:easyrobotics:er-lite_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:easyrobotics:er-lite:-:*:*:*:*:*:*:*", "cpe:2.3:o:easyrobotics:er-flex_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:easyrobotics:er-flex:-:*:*:*:*:*:*:*", "cpe:2.3:o:easyrobotics:er-one_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:easyrobotics:er-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:uvd-robots:uvd_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:uvd-robots:uvd:-:*:*:*:*:*:*:*" ]
null
null
9.8
null
GHSA-chrc-q6v3-jfv8
Liferay Portal has Inefficient Regular Expression
Pattern Redirects in Liferay Portal 7.4.3.48 through 7.4.3.76, and Liferay DXP 7.4 update 48 through 76 allows regular expressions that are vulnerable to ReDoS attacks to be used as patterns, which allows remote attackers to consume an excessive amount of server resources via crafted request URLs.
[]
null
6.5
null
null
RHSA-2012:0301
Red Hat Security Advisory: ImageMagick security and bug fix update
ImageMagick: configuration files read from $CWD may allow arbitrary code execution
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
CVE-2023-48626
Adobe Substance 3D Sampler v4.2.1Build3527 OOBW Vulnerability V
Adobe Substance 3D Sampler versions 4.2.1 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[ "cpe:2.3:a:adobe:substance_3d_sampler:*:*:*:*:*:*:*:*" ]
null
7.8
null
null
CVE-2021-46446
H.H.G Multistore v5.1.0 and below was discovered to contain a SQL injection vulnerability via /admin/admin.php?module=admin_access_group_edit&aagID.
[ "cpe:2.3:a:hhg-multistore:multistore:*:*:*:*:enterprise:*:*:*", "cpe:2.3:a:hhg-multistore:multistore:4.10.3:*:*:*:community:*:*:*" ]
null
9.8
null
7.5
CVE-2022-29339
In GPAC 2.1-DEV-rev87-g053aae8-master, function BS_ReadByte() in utils/bitstream.c has a failed assertion, which causes a Denial of Service. This vulnerability was fixed in commit 9ea93a2.
[ "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*" ]
null
7.5
null
5
GHSA-57hp-xp39-9m3w
A Stored Cross-Site Scripting (XSS) vulnerability has been identified in OpenText ArcSight Enterprise Security Manager and ArcSight Platform. The vulnerability could be remotely exploited.
[]
null
8.7
null
null
GHSA-6rj9-p8fm-j3vm
Certain NETGEAR devices are affected by stored XSS. This affects D7800 before 1.0.1.56, R7500v2 before 1.0.3.46, R7800 before 1.0.2.68, R8900 before 1.0.4.28, R9000 before 1.0.4.28, RAX120 before 1.0.0.78, RBR50 before 2.3.5.30, RBS50 before 2.3.5.30, RBK50 before 2.3.5.30, XR500 before 2.3.2.56, and XR700 before 1.0.1.10.
[]
null
null
null
null
GHSA-mjf6-gmwv-grxx
The Atlassian Application Links plugin is vulnerable to cross-site request forgery (CSRF). The following versions are affected: all versions prior to 5.4.21, from version 6.0.0 before version 6.0.12, from version 6.1.0 before version 6.1.2, from version 7.0.0 before version 7.0.2, and from version 7.1.0 before version 7.1.3. The vulnerable plugin is used by Atlassian Jira Server and Data Center before version 8.7.0. An attacker could exploit this by tricking an administrative user into making malicious HTTP requests, allowing the attacker to enumerate hosts and open ports on the internal network where Jira server is present.
[]
null
4.7
null
null
CVE-2021-32956
Advantech WebAccess/SCADA Versions 9.0.1 and prior is vulnerable to redirection, which may allow an attacker to send a maliciously crafted URL that could result in redirecting a user to a malicious webpage.
[ "cpe:2.3:a:advantech:webaccess\\/scada:*:*:*:*:*:*:*:*" ]
null
6.1
null
5.8
CVE-2014-4338
cups-browsed in cups-filters before 1.0.53 allows remote attackers to bypass intended access restrictions in opportunistic circumstances by leveraging a malformed cups-browsed.conf BrowseAllow directive that is interpreted as granting browse access to all IP addresses.
[ "cpe:2.3:a:linuxfoundation:cups-filters:*:*:*:*:*:*:*:*" ]
null
null
null
4
CVE-2024-31219
Discourse-reactions' reaction data and public topic whisper content exposed on reactions given user activity page
Discourse-reactions is a plugin that allows user to add their reactions to the post. When whispers are enabled on a site via `whispers_allowed_groups` and reactions are made on whispers on public topics, the contents of the whisper and the reaction data are shown on the `/u/:username/activity/reactions` endpoint.
[]
null
4.3
null
null
GHSA-j4pw-hgvj-fq4w
The client in MongoDB uses world-readable permissions on .dbshell history files, which might allow local users to obtain sensitive information by reading these files.
[]
null
null
5.5
null
CVE-2020-4513
IBM QRadar SIEM 7.3 and 7.4 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 182368.
[ "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.3:-:*:*:*:*:*:*", "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.3:p1:*:*:*:*:*:*", "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.3:p2:*:*:*:*:*:*", "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.3:p3:*:*:*:*:*:*", "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.4.0:-:*:*:*:*:*:*", "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.4.0:p1:*:*:*:*:*:*", "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.4.0:p2:*:*:*:*:*:*" ]
null
null
6.1
null
GHSA-ccrj-63hr-x5gh
Adobe Experience Manager versions 6.5.21 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
[]
null
5.4
null
null
GHSA-v8rc-qj98-2pv7
Weak encryption mechanisms in RFID Tags in Yale IA-210 Alarm v1.0 allows attackers to create a cloned tag via physical proximity to the original.
[]
null
6.5
null
null
CVE-2020-27587
Quick Heal Total Security before 19.0 allows attackers with local admin rights to obtain access to files in the File Vault via a brute-force attack on the password.
[ "cpe:2.3:a:quickheal:total_security:*:*:*:*:*:*:*:*" ]
null
6.7
null
2.1
RHSA-2021:0706
Red Hat Security Advisory: container-tools:2.0 security update
golang: math/big: panic during recursive division of very large numbers podman: container users permissions are not respected in privileged containers
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7
null
null
RHSA-2024:1874
Red Hat Security Advisory: rhc-worker-script security and enhancement update
golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
5.9
null
null
CVE-2024-52877
An issue was discovered in Insyde InsydeH2O kernel 5.2 before version 05.29.50, kernel 5.3 before version 05.38.50, kernel 5.4 before version 05.46.50, kernel 5.5 before version 05.54.50, kernel 5.6 before version 05.61.50, and kernel 5.7 before version 05.70.50. In VariableRuntimeDxe driver, callback function SmmCreateVariableLockList () calls CreateVariableLockListInSmm (). In CreateVariableLockListInSmm (), it uses StrSize () to get variable name size and it could lead to a buffer over-read.
[]
null
7.5
null
null
GHSA-2xvc-p88c-94vw
SAP UI5 Variant Management - versions SAP_UI 750, SAP_UI 754, SAP_UI 755, SAP_UI 756, SAP_UI 757, UI_700 200, does not sufficiently encode user-controlled inputs on reading data from the server, resulting in Stored Cross-Site Scripting (Stored XSS) vulnerability. After successful exploitation, an attacker with user level access can cause high impact on confidentiality, modify some information and can cause unavailability of the application at user level.
[]
null
8.2
null
null
CVE-2018-10408
An issue was discovered in VirusTotal. A maliciously crafted Universal/fat binary can evade third-party code signing checks. By not completing full inspection of the Universal/fat binary, the user of the third-party tool will believe that the code is signed by Apple, but the malicious unsigned code will execute.
[ "cpe:2.3:a:virustotal:virustotal:-:*:*:*:*:*:*:*" ]
null
null
7.8
6.8
CVE-2018-8170
An elevation of privilege vulnerability exists in the way that the Windows kernel image handles objects in memory, aka "Windows Image Elevation of Privilege Vulnerability." This affects Windows 10, Windows 10 Servers.
[ "cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1709:*:*:*:*:*:*:*" ]
null
null
7
4.4
GHSA-46m8-42hm-wvvw
Cross-Site Scripting in emojione
Affected versions of `emojione` are vulnerable to cross-site scripting when user input is passed into the `toShort()`, `shortnameToImage()`, `unicodeToImage()`, and `toImage()` functions.RecommendationUpdate to version 1.3.1 or later.
[]
null
null
null
null
CVE-2025-4837
projectworlds Student Project Allocation System make_group_sql.php sql injection
A vulnerability classified as critical has been found in projectworlds Student Project Allocation System 1.0. This affects an unknown part of the file /make_group_sql.php. The manipulation of the argument mem1/mem2/mem3 leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
[]
6.9
7.3
7.3
7.5
CVE-2018-8518
An elevation of privilege vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server, aka "Microsoft SharePoint Elevation of Privilege Vulnerability." This affects Microsoft SharePoint. This CVE ID is unique from CVE-2018-8480, CVE-2018-8488, CVE-2018-8498.
[ "cpe:2.3:a:microsoft:sharepoint_enterprise_server:2013:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sharepoint_enterprise_server:2016:*:*:*:*:*:*:*" ]
null
null
5.4
3.5
GHSA-g93h-75m9-3qq4
pngcrush-installer downloads Resources over HTTP
Affected versions of `pngcrush-installer` insecurely download an executable over an unencrypted HTTP connection.In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `pngcrush-installer`.RecommendationUpdate to version 1.8.10 or later.
[]
null
null
8.1
null
CVE-2024-3072
The ACF Front End Editor plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the update_texts() function in all versions up to, and including, 2.0.2. This makes it possible for authenticated attackers, with subscriber-level access and above, to update arbitrary post title, content, and ACF data.
[]
null
4.3
null
null
GHSA-943h-97rc-v23r
A privacy issue was addressed with improved handling of temporary files. This issue is fixed in macOS Ventura 13.4, tvOS 16.5, iOS 16.5 and iPadOS 16.5, watchOS 9.5. An app may be able to access user-sensitive data.
[]
null
5.5
null
null
GHSA-rf7c-xh3f-99v4
A use after free issue was addressed with improved memory management. This issue is fixed in macOS Big Sur 11.6.6, macOS Monterey 12.3, Security Update 2022-004 Catalina. A remote user may cause an unexpected app termination or arbitrary code execution
[]
null
9.8
null
null
GHSA-mpxv-mc7c-75m5
Buffer overflow in Resco Photo Viewer for PocketPC 4.11 and 6.01, as used in mobile devices running Windows Mobile 5.0, 2003, and 2003SE, allows remote attackers to execute arbitrary code via a crafted PNG image.
[]
null
null
null
null
GHSA-496p-8p53-pf9q
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound FS Poster allows Reflected XSS. This issue affects FS Poster: from n/a through 6.5.8.
[]
null
7.1
null
null
GHSA-hc96-wp9w-2cq9
Unspecified vulnerability in the Finder Get Info window for Mac OS X 10.4 up to 10.4.2 causes Finder to misrepresent file and group ownership information. NOTE: it is not clear whether this issue satisfies the CVE definition of a vulnerability.
[]
null
null
null
null
GHSA-hm4p-g93x-crgm
The unofficial GLSL Linting extension before 1.4.0 for Visual Studio Code allows remote code execution via a crafted glslangValidatorPath in the workspace configuration.
[]
null
9.8
null
null
CVE-2024-5066
PHPGurukul Online Course Registration System pincode-verification.php sql injection
A vulnerability classified as critical was found in PHPGurukul Online Course Registration System 3.1. Affected by this vulnerability is an unknown functionality of the file /pincode-verification.php. The manipulation of the argument pincode leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-264925 was assigned to this vulnerability.
[ "cpe:2.3:a:phpgurukul:online_course_registration_system:3.1:*:*:*:*:*:*:*" ]
5.3
6.3
6.3
6.5
cisco-sa-20170726-anicrl
Cisco IOS XE Software Autonomic Networking Infrastructure Certificate Revocation Vulnerability
A vulnerability in the Autonomic Networking feature of Cisco IOS XE Software could allow an unauthenticated, remote, autonomic node to access the Autonomic Networking infrastructure of an affected system, after the certificate for the autonomic node has been revoked. The vulnerability exists because the affected software does not transfer certificate revocation lists (CRLs) across Autonomic Control Plane (ACP) channels. An attacker could exploit this vulnerability by connecting an autonomic node, which has a known and revoked certificate, to the autonomic domain of an affected system. A successful exploit could allow the attacker to insert a previously trusted autonomic node into the autonomic domain of an affected system after the certificate for the node has been revoked. There are no workarounds that address this vulnerability.
[]
null
null
6.5
null
CVE-2023-49773
WordPress BCorp Shortcodes Plugin <= 0.23 is vulnerable to PHP Object Injection
Deserialization of Untrusted Data vulnerability in Tim Brattberg BCorp Shortcodes.This issue affects BCorp Shortcodes: from n/a through 0.23.
[ "cpe:2.3:a:bcorp_shortcodes_project:bcorp_shortcodes:*:*:*:*:*:wordpress:*:*" ]
null
10
null
null
CVE-2014-2516
Open redirect vulnerability in EMC RSA Authentication Manager 8.x before 8.1 Patch 6 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors.
[ "cpe:2.3:a:emc:rsa_authentication_manager:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:emc:rsa_authentication_manager:8.1:*:*:*:*:*:*:*" ]
null
null
null
5.8
GHSA-fpxq-w7p9-r924
Arbitrary file read vulnerability in Jenkins kubernetes-cd Plugin
Jenkins Kubernetes Continuous Deploy Plugin 2.3.1 and earlier allows users with Credentials/Create permission to read arbitrary files on the Jenkins controller.
[]
null
6.5
null
null
ICSA-20-273-02
Yokogawa WideField3
A buffer overflow could be caused when a user loads a maliciously crafted project file.CVE-2020-16232 has been assigned to this vulnerability. A CVSS v3 base score of 2.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L).
[]
null
null
2.8
null
CVE-2018-1000556
WordPress version 4.8 + contains a Cross Site Scripting (XSS) vulnerability in plugins.php or core wordpress on delete function that can result in An attacker can perform client side attacks which could be from stealing a cookie to code injection. This attack appear to be exploitable via an attacker must craft an URL with payload and send to the user. Victim need to open the link to be affected by reflected XSS. .
[ "cpe:2.3:a:veronalabs:wp_statistics:*:*:*:*:*:wordpress:*:*" ]
null
null
6.1
4.3
CVE-2021-22243
Under specialized conditions, GitLab CE/EE versions starting 7.10 may allow existing GitLab users to use an invite URL meant for another email address to gain access into a group.
[ "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*" ]
null
5
null
null
CVE-2008-3401
PHP remote file inclusion vulnerability in hioxRandomAd.php in HIOX Random Ad (HRA) 1.3 allows remote attackers to execute arbitrary PHP code via a URL in the hm parameter.
[ "cpe:2.3:a:hscripts:hiox_random_ad:1.3:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2006-3325
client/cl_parse.c in the id3 Quake 3 Engine 1.32c and the Icculus Quake 3 Engine (ioquake3) revision 810 and earlier allows remote malicious servers to overwrite arbitrary write-protected cvars variables on the client, such as cl_allowdownload for Automatic Downloading and fs_homepath for the quake3 path, via a string of cvar names and values sent from the server. NOTE: this can be combined with another vulnerability to overwrite arbitrary files.
[ "cpe:2.3:a:id_software:quake_3_engine:*:*:*:*:*:*:*:*", "cpe:2.3:a:id_software:quake_3_engine:1.32b:*:*:*:*:*:*:*", "cpe:2.3:a:id_software:quake_3_engine:1.32c:*:*:*:*:*:*:*", "cpe:2.3:a:id_software:quake_3_engine:icculus_803:*:*:*:*:*:*:*", "cpe:2.3:a:id_software:quake_3_engine:icculus_804:*:*:*:*:*:*:*", "cpe:2.3:a:id_software:quake_3_engine:icculus_805:*:*:*:*:*:*:*", "cpe:2.3:a:id_software:quake_3_engine:icculus_806:*:*:*:*:*:*:*", "cpe:2.3:a:id_software:quake_3_engine:icculus_807:*:*:*:*:*:*:*", "cpe:2.3:a:id_software:quake_3_engine:icculus_808:*:*:*:*:*:*:*", "cpe:2.3:a:id_software:quake_3_engine:icculus_809:*:*:*:*:*:*:*", "cpe:2.3:a:id_software:quake_3_engine:icculus_810:*:*:*:*:*:*:*" ]
null
null
null
5
GHSA-7qxp-rcgw-7whv
The NVIDIA driver in the Graphics Drivers subsystem in Apple OS X before 10.11.4 allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app.
[]
null
null
9.8
null
GHSA-j2cc-c3x7-54xh
In NGINX Controller 3.3.0-3.4.0, undisclosed API endpoints may allow for a reflected Cross Site Scripting (XSS) attack. If the victim user is logged in as admin this could result in a complete compromise of the system.
[]
null
null
null
null
CVE-2024-26120
Adobe Experience Manager | Cross-site Scripting (Stored XSS) (CWE-79)
Adobe Experience Manager versions 6.5.19 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
[ "cpe:2.3:a:adobe:experience_manager:-:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:experience_manager_cloud_service:-:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*", "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*" ]
null
5.4
null
null
CVE-2016-2232
Asterisk Open Source 1.8.x, 11.x before 11.21.1, 12.x, and 13.x before 13.7.1 and Certified Asterisk 1.8.28, 11.6 before 11.6-cert12, and 13.1 before 13.1-cert3 allow remote authenticated users to cause a denial of service (uninitialized pointer dereference and crash) via a zero length error correcting redundancy packet for a UDPTL FAX packet that is lost.
[ "cpe:2.3:a:digium:asterisk:1.8.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.0:beta4:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.0:beta5:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.0:rc4:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.0:rc5:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.1:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.2:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.3:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.3:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.3:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.3:rc3:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.4:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.4:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.4:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.4:rc3:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.5:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.5:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.6.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.6.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.6.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.7.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.7.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.8.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.8.0:-:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.8.0:patch:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.8.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.8.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.8.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.8.0:rc4:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.8.0:rc5:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.8.2:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.9.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.9.0:-:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.9.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.9.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.9.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.9.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.9.2:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.9.3:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.10.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.10.0:-:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.10.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.10.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.10.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.10.0:rc4:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.10.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.11.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.11.0:-:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.11.0:patch:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.11.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.11.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.11.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.11.1:-:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.11.1:patch:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.12:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.12.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.12.0:-:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.12.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.12.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.12.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.12.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.12.2:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.13.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.13.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.13.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.13.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.14.0:-:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.14.0:patch:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.14.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.14.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.14.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.14.1:-:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.14.1:patch:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.15.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.15.0:-:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.15.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.15.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.16.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.16.0:-:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.16.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.16.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.17.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.17.0:-:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.17.0:patch:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.17.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.17.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.17.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.18.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.18.0:-:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.18.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.18.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.19.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.19.0:-:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.19.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.19.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.19.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.20.0:-:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.20.0:patch:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.20.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.20.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.20.1:-:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.20.1:patch:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.20.2:-:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.20.2:patch:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.21.0:-:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.21.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.21.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.22.0:-:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.22.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.22.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.23.0:-:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.23.0:patch:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.23.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.23.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.23.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.24.0:-:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.24.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.24.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.24.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.25.0:-:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.25.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.25.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.26.0:-:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.26.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.26.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.27.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.27.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.27.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.28.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.28.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.28.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.28.2:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.8.32.0:*:*:*:lts:*:*:*", "cpe:2.3:a:digium:asterisk:11.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:11.0.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:11.0.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:11.0.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:11.0.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:11.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:11.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:11.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:11.1.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:11.1.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:11.1.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:11.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:11.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:11.2.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:11.4.0:rc4:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:11.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:11.6.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:11.6.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:11.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:11.7.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:11.7.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:11.8.0:-:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:11.8.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:11.8.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:11.8.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:11.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:11.9.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:11.9.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:11.9.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:11.9.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:11.10.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:11.10.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:11.10.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:11.10.1:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:11.11.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:11.11.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:11.12.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:11.12.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:11.13.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:11.13.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:11.14.0:*:*:*:lts:*:*:*", "cpe:2.3:a:digium:asterisk:11.14.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:11.14.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:11.15.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:11.15.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:11.15.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:11.16.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:11.16.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:11.17.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:11.18.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:11.18.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:11.19.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:11.20.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:11.21.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:11.21.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:11.21.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:11.21.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:12.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:12.1.0:-:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:12.1.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:12.1.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:12.1.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:12.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:12.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:12.2.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:12.2.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:12.2.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:12.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:12.3.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:12.3.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:12.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:12.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:12.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:12.4.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:12.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:12.5.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:12.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:12.6.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:12.7.0:*:*:*:lts:*:*:*", "cpe:2.3:a:digium:asterisk:12.7.0:*:*:*:standard:*:*:*", "cpe:2.3:a:digium:asterisk:12.7.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:12.7.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:12.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:12.8.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:12.8.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:12.8.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:12.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:12.8.2:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:13.0.0:*:*:*:lts:*:*:*", "cpe:2.3:a:digium:asterisk:13.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:13.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:13.1.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:13.1.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:13.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:13.2.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:13.3.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:13.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:13.4.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:13.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:13.5.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:13.6.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:13.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:13.7.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:13.7.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:13.7.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:digium:certified_asterisk:1.8.28:*:*:*:*:*:*:*", "cpe:2.3:a:digium:certified_asterisk:11.6:cert1:*:*:*:*:*:*", "cpe:2.3:a:digium:certified_asterisk:11.6:cert1:*:*:lts:*:*:*", "cpe:2.3:a:digium:certified_asterisk:11.6:cert1_rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:certified_asterisk:11.6:cert10:*:*:lts:*:*:*", "cpe:2.3:a:digium:certified_asterisk:11.6:cert11:*:*:lts:*:*:*", "cpe:2.3:a:digium:certified_asterisk:11.6:cert2:*:*:*:*:*:*", "cpe:2.3:a:digium:certified_asterisk:11.6:cert2:*:*:lts:*:*:*", "cpe:2.3:a:digium:certified_asterisk:11.6:cert3:*:*:*:*:*:*", "cpe:2.3:a:digium:certified_asterisk:11.6:cert3:*:*:lts:*:*:*", "cpe:2.3:a:digium:certified_asterisk:11.6:cert4:*:*:lts:*:*:*", "cpe:2.3:a:digium:certified_asterisk:11.6:cert5:*:*:lts:*:*:*", "cpe:2.3:a:digium:certified_asterisk:11.6:cert6:*:*:lts:*:*:*", "cpe:2.3:a:digium:certified_asterisk:11.6:cert7:*:*:lts:*:*:*", "cpe:2.3:a:digium:certified_asterisk:11.6:cert8:*:*:lts:*:*:*", "cpe:2.3:a:digium:certified_asterisk:11.6:cert9:*:*:lts:*:*:*", "cpe:2.3:a:digium:certified_asterisk:11.6.0:*:*:*:lts:*:*:*", "cpe:2.3:a:digium:certified_asterisk:11.6.0:-:*:*:*:*:*:*", "cpe:2.3:a:digium:certified_asterisk:11.6.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:certified_asterisk:11.6.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:certified_asterisk:13.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:certified_asterisk:13.1:cert1:*:*:*:*:*:*", "cpe:2.3:a:digium:certified_asterisk:13.1:cert2:*:*:*:*:*:*", "cpe:2.3:a:digium:certified_asterisk:13.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:certified_asterisk:13.1.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:certified_asterisk:13.1.0:rc2:*:*:*:*:*:*" ]
null
null
6.5
4
CVE-2013-5096
Juniper Junos Space before 13.1R1.6, as used on the JA1500 appliance and in other contexts, does not properly implement role-based access control, which allows remote authenticated users to modify the configuration by leveraging the read-only privilege, aka PR 863804.
[ "cpe:2.3:a:juniper:junos_space:11.1:*:*:*:*:*:*:*", "cpe:2.3:a:juniper:junos_space:11.2:*:*:*:*:*:*:*", "cpe:2.3:a:juniper:junos_space:11.3:*:*:*:*:*:*:*", "cpe:2.3:a:juniper:junos_space:11.4:*:*:*:*:*:*:*", "cpe:2.3:a:juniper:junos_space:12.1:*:*:*:*:*:*:*", "cpe:2.3:a:juniper:junos_space:12.2:*:*:*:*:*:*:*", "cpe:2.3:a:juniper:junos_space:12.3:*:*:*:*:*:*:*", "cpe:2.3:a:juniper:junos_space_virtual_appliance:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:junos_space_ja1500_appliance:-:*:*:*:*:*:*:*" ]
null
null
null
4
GHSA-3cf2-6pj6-x5w3
Watchguard Firebox II allows remote attackers to cause a denial of service by sending a malformed URL to the authentication service on port 4100.
[]
null
null
null
null
GHSA-6g7j-q2fm-9g6r
Windows MSHTML Platform Elevation of Privilege Vulnerability
[]
null
7.8
null
null
CVE-2023-0044
If the Quarkus Form Authentication session cookie Path attribute is set to `/` then a cross-site attack may be initiated which might lead to the Information Disclosure. This attack can be prevented with the Quarkus CSRF Prevention feature.
[ "cpe:2.3:a:quarkus:quarkus:*:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*" ]
null
6.1
null
null
GHSA-r7r2-m3vr-c8qc
Mattermost Fails to Validate Team Invite Permissions
Mattermost versions 10.6.x <= 10.6.1, 10.5.x <= 10.5.2, 10.4.x <= 10.4.4, 9.11.x <= 9.11.11 fail to check the correct permissions which allows authenticated users who only have permission to invite non-guest users to a team to add guest users to that team via the API to add a single user to a team.
[]
null
4.3
null
null
GHSA-4jr8-gq3p-6jg6
Directory traversal vulnerability in thumb.php in Clear Content 1.1 allows remote attackers to read arbitrary files via a .. (dot dot) in the url parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
[]
null
null
null
null
CVE-2007-6465
Multiple cross-site scripting (XSS) vulnerabilities in ganglia-web in Ganglia before 3.0.6 allow remote attackers to inject arbitrary web script or HTML via the (1) c and (2) h parameters to (a) web/host_gmetrics.php; the (3) G, (4) me, (5) x, (6) n, (7) v, (8) l, (9) vl, and (10) st parameters to (b) web/graph.php; and the (11) c, (12) G, (13) h, (14) r, (15) m, (16) s, (17) cr, (18) hc, (19) sh, (20) p, (21) t, (22) jr, (23) js, (24) gw, (25) z, and (26) gs parameters to (c) web/get_context.php. NOTE: some of these details are obtained from third party information.
[ "cpe:2.3:a:ganglia:ganglia:*:*:*:*:*:*:*:*" ]
null
null
null
4.3
CVE-2021-46981
nbd: Fix NULL pointer in flush_workqueue
In the Linux kernel, the following vulnerability has been resolved: nbd: Fix NULL pointer in flush_workqueue Open /dev/nbdX first, the config_refs will be 1 and the pointers in nbd_device are still null. Disconnect /dev/nbdX, then reference a null recv_workq. The protection by config_refs in nbd_genl_disconnect is useless. [ 656.366194] BUG: kernel NULL pointer dereference, address: 0000000000000020 [ 656.368943] #PF: supervisor write access in kernel mode [ 656.369844] #PF: error_code(0x0002) - not-present page [ 656.370717] PGD 10cc87067 P4D 10cc87067 PUD 1074b4067 PMD 0 [ 656.371693] Oops: 0002 [#1] SMP [ 656.372242] CPU: 5 PID: 7977 Comm: nbd-client Not tainted 5.11.0-rc5-00040-g76c057c84d28 #1 [ 656.373661] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS ?-20190727_073836-buildvm-ppc64le-16.ppc.fedoraproject.org-3.fc31 04/01/2014 [ 656.375904] RIP: 0010:mutex_lock+0x29/0x60 [ 656.376627] Code: 00 0f 1f 44 00 00 55 48 89 fd 48 83 05 6f d7 fe 08 01 e8 7a c3 ff ff 48 83 05 6a d7 fe 08 01 31 c0 65 48 8b 14 25 00 6d 01 00 <f0> 48 0f b1 55 d [ 656.378934] RSP: 0018:ffffc900005eb9b0 EFLAGS: 00010246 [ 656.379350] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 656.379915] RDX: ffff888104cf2600 RSI: ffffffffaae8f452 RDI: 0000000000000020 [ 656.380473] RBP: 0000000000000020 R08: 0000000000000000 R09: ffff88813bd6b318 [ 656.381039] R10: 00000000000000c7 R11: fefefefefefefeff R12: ffff888102710b40 [ 656.381599] R13: ffffc900005eb9e0 R14: ffffffffb2930680 R15: ffff88810770ef00 [ 656.382166] FS: 00007fdf117ebb40(0000) GS:ffff88813bd40000(0000) knlGS:0000000000000000 [ 656.382806] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 656.383261] CR2: 0000000000000020 CR3: 0000000100c84000 CR4: 00000000000006e0 [ 656.383819] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 656.384370] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 656.384927] Call Trace: [ 656.385111] flush_workqueue+0x92/0x6c0 [ 656.385395] nbd_disconnect_and_put+0x81/0xd0 [ 656.385716] nbd_genl_disconnect+0x125/0x2a0 [ 656.386034] genl_family_rcv_msg_doit.isra.0+0x102/0x1b0 [ 656.386422] genl_rcv_msg+0xfc/0x2b0 [ 656.386685] ? nbd_ioctl+0x490/0x490 [ 656.386954] ? genl_family_rcv_msg_doit.isra.0+0x1b0/0x1b0 [ 656.387354] netlink_rcv_skb+0x62/0x180 [ 656.387638] genl_rcv+0x34/0x60 [ 656.387874] netlink_unicast+0x26d/0x590 [ 656.388162] netlink_sendmsg+0x398/0x6c0 [ 656.388451] ? netlink_rcv_skb+0x180/0x180 [ 656.388750] ____sys_sendmsg+0x1da/0x320 [ 656.389038] ? ____sys_recvmsg+0x130/0x220 [ 656.389334] ___sys_sendmsg+0x8e/0xf0 [ 656.389605] ? ___sys_recvmsg+0xa2/0xf0 [ 656.389889] ? handle_mm_fault+0x1671/0x21d0 [ 656.390201] __sys_sendmsg+0x6d/0xe0 [ 656.390464] __x64_sys_sendmsg+0x23/0x30 [ 656.390751] do_syscall_64+0x45/0x70 [ 656.391017] entry_SYSCALL_64_after_hwframe+0x44/0xa9 To fix it, just add if (nbd->recv_workq) to nbd_disconnect_and_put().
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*" ]
null
5.5
null
null
GHSA-2mcc-4f9v-m34r
Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-44670.
[]
null
8.1
null
null
GHSA-7ch2-9f26-cf3p
Profile Manager in Apple OS X Server before 4.0 allows local users to discover cleartext passwords by reading a file after a (1) profile setup or (2) profile edit occurs.
[]
null
null
null
null
CVE-2024-34149
In Bitcoin Core through 27.0 and Bitcoin Knots before 25.1.knots20231115, tapscript lacks a policy size limit check, a different issue than CVE-2023-50428. NOTE: some parties oppose this new limit check (for example, because they agree with the objective but disagree with the technical mechanism, or because they have a different objective).
[ "cpe:2.3:a:bitcoincore:bitcoin_core:0.10.0:*:*:*:*:*:*:*" ]
null
6.3
null
null
GHSA-4whm-cvqv-v84q
Multiple vulnerabilities in Cisco Network Convergence System (NCS) 540 Series Routers, only when running Cisco IOS XR NCS540L software images, and Cisco IOS XR Software for the Cisco 8000 Series Routers could allow an authenticated, local attacker to execute unsigned code during the boot process on an affected device. For more information about these vulnerabilities, see the Details section of this advisory.
[]
null
null
null
null
CVE-2024-39000
adolph_dudu ratio-swiper v0.0.2 was discovered to contain a prototype pollution via the function parse. This vulnerability allows attackers to execute arbitrary code or cause a Denial of Service (DoS) via injecting arbitrary properties.
[ "cpe:2.3:a:adolphdudu:ratio-swiper:0.0.2:*:*:*:*:*:*:*" ]
null
6.5
null
null
CVE-2017-8129
The UMA product with software V200R001 and V300R001 has a privilege elevation vulnerability due to insufficient validation or improper processing of parameters. An attacker could craft specific packets to exploit these vulnerabilities to gain elevated privileges.
[ "cpe:2.3:a:huawei:uma:v200r001:*:*:*:*:*:*:*", "cpe:2.3:a:huawei:uma:v300r001:*:*:*:*:*:*:*" ]
null
null
9.8
7.5
GHSA-mm44-wc5p-wqhq
Denial of service due to reference expansion in versions earlier than 4.0
ImpactThe CBOR library supports optional tags that enable CBOR objects to contain references to objects within them. Versions earlier than 4.0 resolved those references automatically. While this by itself doesn't cause much of a security problem, a denial of service can happen if those references are deeply nested and used multiple times (so that the same reference to the same object occurs multiple times), and if the decoded CBOR object is sent to a serialization method such as EncodeToBytes, ToString, or ToJSONString, since the objects referred to are expanded in the process and take up orders of magnitude more memory than if the references weren't resolved.The impact of this problem on any particular system varies. In general, the risk is higher if the system allows users to send arbitrary CBOR objects without authentication, or exposes a remote endpoint in which arbitrary CBOR objects can be sent without authentication.PatchesThis problem is addressed in version 4.0 by disabling reference resolution by default. Users should use the latest version of this library.WorkaroundsSince version 3.6, an encoding option (`resolvereferences=true` or `resolvereferences=false`) in CBOREncodeOptions sets whether the CBOR processor will resolve these kinds of references when decoding a CBOR object. Set `resolvereferences=false` to disable reference resolution.In version 3.6, if the method used CBORObject.Read() or CBORObject.DecodeFromBytes() to decode a serialized CBOR object, call the overload that takes CBOREncodeOptions as follows:In versions 3.5 and earlier, this issue is present only if the CBOR object is an array or a map. If the application does not expect a decoded CBOR object to be an array or a map, it should check the CBOR object's type before encoding that object, as follows:Alternatively, for such versions, the application can use WriteTo to decode the CBOR object to a so-called "limited memory stream", that is, a Stream that throws an exception if too many bytes would be written. How to write such a limited-memory stream is nontrivial and beyond the scope of this advisory.To check whether a byte array representing a CBOR object might exhibit this problem, check whether the array contains the byte 0xd8 followed immediately by either 0x19 or 0x1d. This check catches all affected CBOR objects but may catch some non-affected CBOR objects (notably integers and byte strings).ReferencesSee the Wikipedia article [Billion laughs attack](https://en.wikipedia.org/wiki/Billion_laughs_attack) and the related issue in [Kubernetes](https://github.com/kubernetes/kubernetes/issues/83253).For more informationIf you have any questions or comments about this advisory, open an issue in [the CBOR repository](https://github.com/peteroupc/cbor-java).
[]
null
null
null
null
GHSA-p34p-28jp-wfv2
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, and 6 Update 35 and earlier, allows remote attackers to affect confidentiality via unknown vectors related to Security.
[]
null
null
null
null
GHSA-4jw2-24wg-vcf7
In Talkyard, regular versions v0.2021.20 through v0.2021.33 and dev versions v0.2021.20 through v0.2021.34, are vulnerable to Insufficient Session Expiration. This may allow an attacker to reuse the admin’s still-valid session token even when logged-out, to gain admin privileges, given the attacker is able to obtain that token (via other, hypothetical attacks)
[]
null
null
null
null
CVE-2022-22503
IBM Robotic Process Automation 21.0.0 could allow a remote attacker to hijack the clicking action of the victim. By persuading a victim to visit a malicious Web site, a remote attacker could exploit this vulnerability to hijack the victim's click actions and possibly launch further attacks against the victim. IBM X-Force ID: 227125.
[ "cpe:2.3:a:ibm:robotic_process_automation:*:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:robotic_process_automation_as_a_service:*:*:*:*:*:*:*:*" ]
null
null
6.1
null
CVE-2024-45120
Adobe Commerce | Time-of-check Time-of-use (TOCTOU) Race Condition (CWE-367)
Adobe Commerce versions 2.4.7-p2, 2.4.6-p7, 2.4.5-p9, 2.4.4-p10 and earlier are affected by a Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability that could lead to a security feature bypass. An attacker could exploit this vulnerability to alter a condition between the check and the use of a resource, having a low impact on integrity. Exploitation of this issue requires user interaction.
[ "cpe:2.3:a:adobe:commerce:2.4.4:-:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.4:p1:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.4:p10:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.4:p2:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.4:p3:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.4:p4:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.4:p5:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.4:p6:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.4:p7:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.4:p8:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.4:p9:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.5:-:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.5:p1:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.5:p2:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.5:p3:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.5:p4:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.5:p5:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.5:p6:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.5:p7:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.5:p8:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.5:p9:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.6:-:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.6:p1:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.6:p2:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.6:p3:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.6:p4:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.6:p5:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.6:p6:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.6:p7:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.7:-:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.7:b1:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.7:b2:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.7:p1:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.7:p2:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce_b2b:1.3.3:-:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p10:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce_b2b:1.3.4:-:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p9:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce_b2b:1.3.5:-:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p7:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce_b2b:1.4.2:-:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p1:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p2:*:*:*:*:*:*", "cpe:2.3:a:adobe:magento:2.4.4:-:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.4:p1:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.4:p10:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.4:p2:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.4:p3:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.4:p4:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.4:p5:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.4:p6:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.4:p7:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.4:p8:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.4:p9:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.5:-:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.5:p1:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.5:p2:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.5:p3:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.5:p4:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.5:p5:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.5:p6:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.5:p7:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.5:p8:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.5:p9:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.6:-:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.6:p1:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.6:p2:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.6:p3:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.6:p4:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.6:p5:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.6:p6:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.6:p7:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.7:-:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.7:b1:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.7:p1:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.7:p2:*:*:open_source:*:*:*" ]
null
3.1
null
null
CVE-2025-7530
Tenda FH1202 PPTPDClient fromPptpUserAdd stack-based overflow
A vulnerability, which was classified as critical, has been found in Tenda FH1202 1.2.0.14(408). Affected by this issue is the function fromPptpUserAdd of the file /goform/PPTPDClient. The manipulation of the argument Username leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
[]
8.7
8.8
8.8
9
GHSA-c3f5-rvxj-625x
Insertion of Sensitive Information into Externally-Accessible File or Directory vulnerability in codection Import and export users and customers allows Retrieve Embedded Sensitive Data. This issue affects Import and export users and customers: from n/a through 1.27.12.
[]
null
5.9
null
null
CVE-2018-5021
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
[ "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
null
9.8
10
GHSA-jv8c-8hrc-9f7m
Dovecot before 2.3.13 has Improper Input Validation in lda, lmtp, and imap, leading to an application crash via a crafted email message with certain choices for ten thousand MIME parts.
[]
null
7.5
null
null
CVE-2007-4196
icat in Brian Carrier The Sleuth Kit (TSK) before 2.09 misinterprets a certain memory location as the holder of a loop iteration count, which allows user-assisted remote attackers to cause a denial of service (long loop) and prevent examination of certain NTFS files via a malformed NTFS image.
[ "cpe:2.3:a:brian_carrier:the_slueth_kit:*:*:*:*:*:*:*:*" ]
null
null
null
4.3
CVE-2025-23080
XSSes in Special:BadgeView
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Wikimedia Foundation Mediawiki - OpenBadges Extension allows Cross-Site Scripting (XSS).This issue affects Mediawiki - OpenBadges Extension: from 1.39.X before 1.39.11, from 1.41.X before 1.41.3, from 1.42.X before 1.42.2.
[]
null
5.3
null
null
GHSA-rqp2-j5g9-2583
In Libav 12.3, there is an infinite loop in the function wv_read_block_header() in the file wvdec.c.
[]
null
6.5
null
null
CVE-2024-12893
Portabilis i-Educar Tipo de Usuário Page 2 cross site scripting
A vulnerability, which was classified as problematic, has been found in Portabilis i-Educar up to 2.9. Affected by this issue is some unknown functionality of the file /usuarios/tipos/2 of the component Tipo de Usuário Page. The manipulation of the argument name leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
[]
5.1
2.4
2.4
3.3
GHSA-q38r-hcf4-gx69
ecryptfs-setup-swap in eCryptfs does not prevent the unencrypted swap partition from activating during boot when using GPT partitioning on a (1) NVMe or (2) MMC drive, which allows local users to obtain sensitive information via unspecified vectors. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-8946.
[]
null
null
3.3
null
CVE-2021-0901
In apusys, there is a possible memory corruption due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05672107; Issue ID: ALPS05664618.
[ "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*" ]
null
6.7
null
4.6
GHSA-hrp6-qx55-57p4
Absolute path traversal vulnerability in sendfile.php in web-cp 0.5.7, when register_globals is enabled, allows remote attackers to read arbitrary files via a full pathname in the filelocation parameter.
[]
null
null
null
null
GHSA-7cwp-w3cq-m996
PHP 5.2.5 and earlier allows context-dependent attackers to cause a denial of service (application crash) via a long string in (1) the domain parameter to the dgettext function, the message parameter to the (2) dcgettext or (3) gettext function, the msgid1 parameter to the (4) dngettext or (5) ngettext function, or (6) the classname parameter to the stream_wrapper_register function. NOTE: this might not be a vulnerability in most web server environments that support multiple threads, unless this issue can be demonstrated for code execution.
[]
null
null
null
null
CVE-2024-3907
Tenda AC500 setcfm formSetCfm stack-based overflow
A vulnerability was found in Tenda AC500 2.0.1.9(1307). It has been rated as critical. This issue affects the function formSetCfm of the file /goform/setcfm. The manipulation of the argument funcpara1 leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-261143. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
[ "cpe:2.3:h:tenda:ac500:-:*:*:*:*:*:*:*" ]
null
8.8
8.8
9
CVE-2024-53966
Adobe Experience Manager | Cross-site Scripting (Stored XSS) (CWE-79)
Adobe Experience Manager versions 6.5.21 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
[]
null
5.4
null
null
RHSA-2025:9462
Red Hat Security Advisory: qt5-qtbase security update
qt5: qt6: QtCore Assertion Failure Denial of Service
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
5.3
null
null
CVE-2010-3875
The ax25_getname function in net/ax25/af_ax25.c in the Linux kernel before 2.6.37-rc2 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory by reading a copy of this structure.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.37:-:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.37:rc1:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*" ]
null
null
null
2.1
CVE-2023-34148
An exposed dangerous function vulnerability in the Trend Micro Apex One and Apex One as a Service security agent could allow a local attacker to escalate privileges and write an arbitrary value to specific Trend Micro agent subkeys on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This is a similar, but not identical vulnerability as CVE-2023-34146 and CVE-2023-34147.
[ "cpe:2.3:a:trend_micro_inc:trend_micro_apex_one:*:*:*:*:*:*:*:*", "cpe:2.3:a:trendmicro:apex_one:*:*:*:*:saas:*:*:*", "cpe:2.3:a:trendmicro:apex_one:2019:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
7.8
null
null
GHSA-54wx-2j59-x6gm
The eCommerce Product Catalog Plugin for WordPress plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.3.43. This is due to missing or incorrect nonce validation on the 'customer_panel_password_reset' function. This makes it possible for unauthenticated attackers to reset the password of any administrator or customer account via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
[]
null
8.8
null
null
CVE-2022-26701
A race condition was addressed with improved locking. This issue is fixed in tvOS 15.5, macOS Monterey 12.4, iOS 15.5 and iPadOS 15.5. An application may be able to execute arbitrary code with kernel privileges.
[ "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*" ]
null
7.5
null
7.6
CVE-2024-51545
Username Enumeration
Username Enumeration vulnerabilities allow access to application level username add, delete, modify and list functions.  Affected products: ABB ASPECT - Enterprise v3.08.02; NEXUS Series v3.08.02; MATRIX Series v3.08.02
[ "cpe:2.3:a:abb:aspect_enterprise:*:*:*:*:*:*:*:*", "cpe:2.3:a:abb:nexus_series:*:*:*:*:*:*:*:*", "cpe:2.3:a:abb:matrix_series:*:*:*:*:*:*:*:*" ]
9.3
10
null
null
CVE-2025-25517
Seacms <=13.3 is vulnerable to SQL Injection in admin_reslib.php.
[]
null
9.8
null
null