id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
197k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
GHSA-ww8q-v9pv-4h4f
A vulnerability, which was classified as critical, has been found in Campcodes Beauty Salon Management System 1.0. Affected by this issue is some unknown functionality of the file /admin/edit-accepted-appointment.php. The manipulation of the argument contactno leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-235244.
[]
null
null
6.3
null
CVE-2008-3503
RSSFromParent in Plain Black WebGUI before 7.5.13 does not restrict view access to Collaboration System (CS) RSS feeds, which allows remote attackers to obtain sensitive information (CS data).
[ "cpe:2.3:a:webgui:plain_black_webgui:0.9.0:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:0.10.0:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:0.11.0:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:0.12.0:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:1.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:1.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:1.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:1.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:1.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:1.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:2.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:2.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:2.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:2.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:2.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:2.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:2.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:2.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:2.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:2.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:2.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:2.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:3.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:3.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:3.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:3.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:3.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:3.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:3.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:3.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:3.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:3.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:3.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:3.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:3.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:3.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:3.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:3.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:3.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:3.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:3.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:3.6.3:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:3.6.4:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:3.6.5:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:3.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:3.8.0:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:3.9.0:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:3.10.0:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:3.10.1:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:4.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:4.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:4.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:4.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:4.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:4.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:4.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:4.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:4.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:4.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:4.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:4.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:4.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:4.6.3:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:4.6.4:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:4.6.5:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:4.6.6:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:4.6.7:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:4.6.8:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:4.6.9:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:4.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:4.8.0:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:4.9.0:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:4.9.1:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:4.9.2:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:4.9.3:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:4.9.4:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:4.9.5:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:5.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:5.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:5.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:5.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:5.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:5.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:5.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:5.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:5.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:5.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:5.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:5.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:5.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:5.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:5.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:5.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:5.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:5.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:5.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:5.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:5.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:5.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:5.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:5.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:5.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:5.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:5.5.5:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:5.5.6:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:5.5.7:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:5.5.8:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:6.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:6.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:6.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:6.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:6.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:6.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:6.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:6.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:6.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:6.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:6.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:6.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:6.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:6.2.7:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:6.2.8:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:6.2.9:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:6.2.10:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:6.2.11:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:6.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:6.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:6.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:6.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:6.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:6.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:6.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:6.5.5:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:6.5.6:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:6.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:6.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:6.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:6.6.3:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:6.6.4:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:6.6.5:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:6.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:6.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:6.7.2:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:6.7.3:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:6.7.4:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:6.7.5:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:6.7.6:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:6.7.7:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:6.7.8:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:6.8.0:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:6.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:6.8.2:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:6.8.3:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:6.8.4:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:6.8.5:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:6.8.6:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:6.8.7:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:6.8.8:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:6.99.0:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:6.99.1:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:6.99.2:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:6.99.3:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:6.99.4:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:6.99.5:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:7.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:7.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:7.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:7.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:7.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:7.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:7.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:7.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:7.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:7.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:7.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:7.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:7.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:7.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:7.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:7.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:7.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:7.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:7.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:7.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:7.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:7.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:7.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:7.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:7.3.6:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:7.3.7:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:7.3.8:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:7.3.9:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:7.3.10:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:7.3.11:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:7.3.12:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:7.3.13:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:7.3.14:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:7.3.15:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:7.3.16:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:7.3.17:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:7.3.18:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:7.3.19:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:7.3.20:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:7.3.21:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:7.3.22:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:7.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:7.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:7.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:7.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:7.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:7.4.5:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:7.4.6:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:7.4.7:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:7.4.8:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:7.4.9:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:7.4.10:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:7.4.11:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:7.4.12:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:7.4.13:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:7.4.14:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:7.4.15:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:7.4.16:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:7.4.17:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:7.4.18:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:7.4.19:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:7.4.20:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:7.4.21:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:7.4.25:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:7.4.26:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:7.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:7.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:7.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:7.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:7.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:7.5.5:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:7.5.6:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:7.5.7:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:7.5.8:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:7.5.9:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:7.5.10:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:7.5.11:*:*:*:*:*:*:*", "cpe:2.3:a:webgui:plain_black_webgui:7.5.12:*:*:*:*:*:*:*" ]
null
null
null
5
GHSA-qgvf-5jhp-5rmx
The ADFO – Custom data in admin dashboard plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'dbp_id' parameter in all versions up to, and including, 1.9.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
[]
null
6.1
null
null
GHSA-rvm6-q4p6-g665
There is a use-after-free at asm/preproc.c (function pp_getline) in Netwide Assembler (NASM) 2.14rc16 that will cause a denial of service during a line-number increment attempt.
[]
null
null
5.5
null
CVE-2021-36006
Adobe Photoshop MP4 File Parsing Uninitialized Variable Information Disclosure Vulnerability
Adobe Photoshop versions 21.2.9 (and earlier) and 22.4.2 (and earlier) are affected by an Improper input validation vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to disclose arbitrary memory information in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[ "cpe:2.3:a:adobe:photoshop:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
3.3
null
null
GHSA-x443-5gjr-4gr5
In the Linux kernel, the following vulnerability has been resolved:eventfs: Use list_del_rcu() for SRCU protected list variableChi Zhiling reported:We found a null pointer accessing in tracefs[1], the reason is that the variable 'ei_child' is set to LIST_POISON1, that means the list was removed in eventfs_remove_rec. so when access the ei_child->is_freed, the panic triggered.by the way, the following script can reproduce this panicloop1 (){ while true do echo "p:kp submit_bio" > /sys/kernel/debug/tracing/kprobe_events echo "" > /sys/kernel/debug/tracing/kprobe_events done } loop2 (){ while true do tree /sys/kernel/debug/tracing/events/kprobes/ done } loop1 & loop2[1]: [ 1147.959632][T17331] Unable to handle kernel paging request at virtual address dead000000000150 [ 1147.968239][T17331] Mem abort info: [ 1147.971739][T17331] ESR = 0x0000000096000004 [ 1147.976172][T17331] EC = 0x25: DABT (current EL), IL = 32 bits [ 1147.982171][T17331] SET = 0, FnV = 0 [ 1147.985906][T17331] EA = 0, S1PTW = 0 [ 1147.989734][T17331] FSC = 0x04: level 0 translation fault [ 1147.995292][T17331] Data abort info: [ 1147.998858][T17331] ISV = 0, ISS = 0x00000004, ISS2 = 0x00000000 [ 1148.005023][T17331] CM = 0, WnR = 0, TnD = 0, TagAccess = 0 [ 1148.010759][T17331] GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0 [ 1148.016752][T17331] [dead000000000150] address between user and kernel address ranges [ 1148.024571][T17331] Internal error: Oops: 0000000096000004 [#1] SMP [ 1148.030825][T17331] Modules linked in: team_mode_loadbalance team nlmon act_gact cls_flower sch_ingress bonding tls macvlan dummy ib_core bridge stp llc veth amdgpu amdxcp mfd_core gpu_sched drm_exec drm_buddy radeon crct10dif_ce video drm_suballoc_helper ghash_ce drm_ttm_helper sha2_ce ttm sha256_arm64 i2c_algo_bit sha1_ce sbsa_gwdt cp210x drm_display_helper cec sr_mod cdrom drm_kms_helper binfmt_misc sg loop fuse drm dm_mod nfnetlink ip_tables autofs4 [last unloaded: tls] [ 1148.072808][T17331] CPU: 3 PID: 17331 Comm: ls Tainted: G W ------- ---- 6.6.43 #2 [ 1148.081751][T17331] Source Version: 21b3b386e948bedd29369af66f3e98ab01b1c650 [ 1148.088783][T17331] Hardware name: Greatwall GW-001M1A-FTF/GW-001M1A-FTF, BIOS KunLun BIOS V4.0 07/16/2020 [ 1148.098419][T17331] pstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 1148.106060][T17331] pc : eventfs_iterate+0x2c0/0x398 [ 1148.111017][T17331] lr : eventfs_iterate+0x2fc/0x398 [ 1148.115969][T17331] sp : ffff80008d56bbd0 [ 1148.119964][T17331] x29: ffff80008d56bbf0 x28: ffff001ff5be2600 x27: 0000000000000000 [ 1148.127781][T17331] x26: ffff001ff52ca4e0 x25: 0000000000009977 x24: dead000000000100 [ 1148.135598][T17331] x23: 0000000000000000 x22: 000000000000000b x21: ffff800082645f10 [ 1148.143415][T17331] x20: ffff001fddf87c70 x19: ffff80008d56bc90 x18: 0000000000000000 [ 1148.151231][T17331] x17: 0000000000000000 x16: 0000000000000000 x15: ffff001ff52ca4e0 [ 1148.159048][T17331] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000 [ 1148.166864][T17331] x11: 0000000000000000 x10: 0000000000000000 x9 : ffff8000804391d0 [ 1148.174680][T17331] x8 : 0000000180000000 x7 : 0000000000000018 x6 : 0000aaab04b92862 [ 1148.182498][T17331] x5 : 0000aaab04b92862 x4 : 0000000080000000 x3 : 0000000000000068 [ 1148.190314][T17331] x2 : 000000000000000f x1 : 0000000000007ea8 x0 : 0000000000000001 [ 1148.198131][T17331] Call trace: [ 1148.201259][T17331] eventfs_iterate+0x2c0/0x398 [ 1148.205864][T17331] iterate_dir+0x98/0x188 [ 1148.210036][T17331] __arm64_sys_getdents64+0x78/0x160 [ 1148.215161][T17331] invoke_syscall+0x78/0x108 [ 1148.219593][T17331] el0_svc_common.constprop.0+0x48/0xf0 [ 1148.224977][T17331] do_el0_svc+0x24/0x38 [ 1148.228974][T17331] el0_svc+0x40/0x168 [ 1148.232798][T17 ---truncated---
[]
null
5.5
null
null
CVE-2019-4112
IBM WebSphere eXtreme Scale 8.6 Admin Console allows web pages to be stored locally which can be read by another user on the system. IBM X-Force ID: 158105.
[ "cpe:2.3:a:ibm:websphere_extreme_scale:*:*:*:*:*:*:*:*" ]
null
null
4
null
GHSA-96x7-cmg8-h727
Mozilla Firefox 1.0.1 and possibly other versions, including Mozilla and Thunderbird, allows remote attackers to spoof the URL in the Status Bar via an A HREF tag that contains a TABLE tag that contains another A tag.
[]
null
null
null
null
GHSA-87hc-3ff5-jjvh
Cross-site scripting (XSS) vulnerability in the backend in Kajona before 4.6.3 allows remote attackers to inject arbitrary web script or HTML via the action parameter to index.php.
[]
null
null
null
null
CVE-2024-4606
WordPress Ultimate Store Kit Elementor Addons, Woocommerce Builder, EDD Builder plugin <= 2.0.3 - PHP Object Injection vulnerability
Deserialization of Untrusted Data vulnerability in BdThemes Ultimate Store Kit Elementor Addons.This issue affects Ultimate Store Kit Elementor Addons: from n/a through 2.0.3.
[ "cpe:2.3:a:bdthemes:utlimate_store_kit_elementor_addons:*:*:*:*:*:*:*:*" ]
null
5.4
null
null
CVE-2023-4637
The WPvivid plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the restore() and get_restore_progress() function in versions up to, and including, 0.9.94. This makes it possible for unauthenticated attackers to invoke these functions and obtain full file paths if they have access to a back-up ID.
[ "cpe:2.3:a:wpvivid:migration\\,_backup\\,_staging:*:*:*:*:*:wordpress:*:*" ]
null
4.3
null
null
GHSA-cvqv-p8vx-m5h8
Heap-based buffer overflow in lmadmin in Flexera FlexNet Publisher 11.10 (aka FlexNet License Server Manager) allows remote attackers to execute arbitrary code via a crafted 0x2f packet.
[]
null
null
null
null
cisco-sa-ccc-authz-bypass-5EKchJRb
Cisco Catalyst Center Authorization Bypass Vulnerability
A vulnerability in the web-based management interface of Cisco Catalyst Center, formerly Cisco DNA Center, could allow an authenticated, remote attacker to change specific data within the interface on an affected device. This vulnerability is due to insufficient authorization enforcement. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to change a specific field within the web-based management interface, even though they should not have access to change that field. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
[]
null
4.3
null
null
GHSA-p26j-hx3p-vjcf
Cross Site Scripting (XSS) vulnerability in configMap parameters in Yellowfin Business Intelligence 7.3 allows remote attackers to run arbitrary code via MIAdminStyles.i4 Admin UI.
[]
null
5.4
null
null
GHSA-vgjp-vh3c-32v3
Directory Traversal in mockserve
Affected versions of `mockserve` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.**Example request:**RecommendationNo patch is available for this vulnerability.It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
[]
null
null
7.5
null
GHSA-prfm-28jw-x9h8
Unspecified vulnerability in lpadmin in Sun Solaris 10 and OpenSolaris snv_61 through snv_106 allows local users to cause a denial of service via unspecified vectors, related to enumeration of "wrong printers," aka a "Temporary file vulnerability."
[]
null
null
null
null
GHSA-7mh4-c5mx-6jq7
OCaml 3.12.1 and earlier computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.
[]
null
null
null
null
GHSA-9p62-qh48-3frr
Ruckus Wireless Zone Director Controller firmware releases ZD9.9.x, ZD9.10.x, ZD9.13.0.x less than 9.13.0.0.232 contain OS Command Injection vulnerabilities in the ping functionality that could allow local authenticated users to execute arbitrary privileged commands on the underlying operating system.
[]
null
null
8.8
null
ICSA-18-051-01
ABB netCADOPS Web Application
A vulnerability exists in the password entry section of netCADOPS Web Application that may expose critical database information. CVE-2018-5477 has been assigned to this vulnerability. A CVSS v3 base score of 5.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N).
[]
null
null
5.8
null
CVE-2022-28382
An issue was discovered in certain Verbatim drives through 2022-03-31. Due to the use of an insecure encryption AES mode (Electronic Codebook, aka ECB), an attacker may be able to extract information even from encrypted data, for example by observing repeating byte patterns. The firmware of the USB-to-SATA bridge controller INIC-3637EN uses AES-256 with the ECB mode. This operation mode of block ciphers (e.g., AES) always encrypts identical plaintext data, in this case blocks of 16 bytes, to identical ciphertext data. For some data, for instance bitmap images, the lack of the cryptographic property called diffusion, within ECB, can leak sensitive information even in encrypted data. Thus, the use of the ECB operation mode can put the confidentiality of specific information at risk, even in an encrypted form. This affects Keypad Secure USB 3.2 Gen 1 Drive Part Number #49428, Store 'n' Go Secure Portable HDD GD25LK01-3637-C VER4.0, Executive Fingerprint Secure SSD GDMSFE01-INI3637-C VER1.1, and Fingerprint Secure Portable Hard Drive Part Number #53650.
[ "cpe:2.3:o:verbatim:keypad_secure_usb_3.2_gen_1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:verbatim:keypad_secure_usb_3.2_gen_1:-:*:*:*:*:*:*:*", "cpe:2.3:o:verbatim:store_\\'n\\'_go_secure_portable_hdd_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:verbatim:store_\\'n\\'_go_secure_portable_hdd:-:*:*:*:*:*:*:*", "cpe:2.3:o:verbatim:executive_fingerprint_secure_ssd_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:verbatim:executive_fingerprint_secure_ssd:-:*:*:*:*:*:*:*", "cpe:2.3:o:verbatim:fingerprint_secure_portable_hard_drive_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:verbatim:fingerprint_secure_portable_hard_drive:-:*:*:*:*:*:*:*" ]
null
7.5
null
5
GHSA-6phg-4wmq-h5h3
Frappe has possibility of SQL injection due to improper validations
ImpactSQL injection could be achieved via a specially crafted request, which could allow malicious person to gain access to sensitive information.WorkaroundsUpgrading is required, no other workaround is present.
[]
6.6
null
null
null
GHSA-wrmr-hgjg-7q2j
An issue was discovered in gpac 0.8.0. An invalid memory dereference exists in the function FixTrackID located in isom_intern.c, which allows attackers to cause a denial of service (DoS) via a crafted input.
[]
null
null
null
null
CVE-2019-19334
In all versions of libyang before 1.0-r5, a stack-based buffer overflow was discovered in the way libyang parses YANG files with a leaf of type "identityref". An application that uses libyang to parse untrusted YANG files may be vulnerable to this flaw, which would allow an attacker to cause a denial of service or possibly gain code execution.
[ "cpe:2.3:a:cesnet:libyang:0.11:r1:*:*:*:*:*:*", "cpe:2.3:a:cesnet:libyang:0.11:r2:*:*:*:*:*:*", "cpe:2.3:a:cesnet:libyang:0.12:r1:*:*:*:*:*:*", "cpe:2.3:a:cesnet:libyang:0.12:r2:*:*:*:*:*:*", "cpe:2.3:a:cesnet:libyang:0.13:r1:*:*:*:*:*:*", "cpe:2.3:a:cesnet:libyang:0.13:r2:*:*:*:*:*:*", "cpe:2.3:a:cesnet:libyang:0.14:r1:*:*:*:*:*:*", "cpe:2.3:a:cesnet:libyang:0.15:r1:*:*:*:*:*:*", "cpe:2.3:a:cesnet:libyang:0.16:r1:*:*:*:*:*:*", "cpe:2.3:a:cesnet:libyang:0.16:r2:*:*:*:*:*:*", "cpe:2.3:a:cesnet:libyang:0.16:r3:*:*:*:*:*:*", "cpe:2.3:a:cesnet:libyang:1.0:r1:*:*:*:*:*:*", "cpe:2.3:a:cesnet:libyang:1.0:r2:*:*:*:*:*:*", "cpe:2.3:a:cesnet:libyang:1.0:r3:*:*:*:*:*:*", "cpe:2.3:a:cesnet:libyang:1.0:r4:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*" ]
null
null
8.1
null
CVE-2019-7880
A stored cross-site scripting vulnerability exists in the admin panel of Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2. This could be exploited by an authenticated user with privileges to marketing email templates to inject malicious javascript.
[ "cpe:2.3:a:magento:magento:*:*:*:*:open_source:*:*:*" ]
null
null
4.8
3.5
CVE-2024-37007
Multiple ZDI Vulnerabilities in Autodesk AutoCAD and certain AutoCAD-based products
A maliciously crafted X_B and X_T file, when parsed in pskernel.DLL through Autodesk applications, can cause a use-after-free vulnerability. This vulnerability, along with other vulnerabilities, could lead to code execution in the current process.
[ "cpe:2.3:a:autodesk:autocad:-:*:*:*:*:*:*:*", "cpe:2.3:a:autodesk:autocad_advance_steel:-:*:*:*:*:*:*:*", "cpe:2.3:a:autodesk:autocad_architecture:-:*:*:*:*:*:*:*", "cpe:2.3:a:autodesk:autocad_civil_3d:-:*:*:*:*:*:*:*", "cpe:2.3:a:autodesk:autocad_electrical:-:*:*:*:*:*:*:*", "cpe:2.3:a:autodesk:autocad_map_3d:-:*:*:*:*:*:*:*", "cpe:2.3:a:autodesk:autocad_mechanical:-:*:*:*:*:*:*:*", "cpe:2.3:a:autodesk:autocad_mep:-:*:*:*:*:*:*:*", "cpe:2.3:a:autodesk:autocad_plant_3d:-:*:*:*:*:*:*:*" ]
null
7.8
null
null
GHSA-r8qr-w292-387j
Billing System Project v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /phpinventory/editbrand.php.
[]
null
7.2
null
null
GHSA-2qjj-4522-pjgp
The SMS Alert Order Notifications – WooCommerce plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 3.7.9. This is due to the plugin using the Host header to determine if the plugin is in a playground environment. This makes it possible for unauthenticated attackers to spoof the Host header to make the OTP code "1234" and authenticate as any user, including administrators.
[]
null
9.8
null
null
GHSA-47gf-mp33-83pp
In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Automobile, Snapdragon Mobile, and Snapdragon Wear MDM9206, MDM9650, MSM8909W, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 430, SD 450, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 808, SD 810, SD 820, SD 820A, SD 835, SD 845, and SD 850, while processing the content headers in the Playready module, a buffer overread may occur if the header count exceeds the expected value.
[]
null
null
9.8
null
CVE-2022-4357
LetsRecover < 1.2.0 - Unauthenticated SQLi
The LetsRecover WordPress plugin before 1.2.0 does not properly sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection.
[ "cpe:2.3:a:letsrecover_project:letsrecover:*:*:*:*:*:wordpress:*:*" ]
null
9.8
null
null
ICSA-21-131-13
Siemens SINAMICS Medium Voltage Products Telnet (Update A)
The Telnet service of the HMI Comfort Panels system component in affected SINAMICS products does not require authentication, which may allow a remote attacker to gain access to the device if the service is enabled. Telnet is disabled by default. CVE-2020-15798 has been assigned to this vulnerability. A CVSS v3 base score of 8.1 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).. --------- End Update A Part 2 of 3 ---------CVE-2020-15798 has been assigned to this vulnerability. A CVSS v3 base score of 8.1 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).
[]
null
null
8.1
null
GHSA-9468-6vrh-r29c
Adobe RoboHelp versions 2020.0.7 (and earlier) is affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
[]
null
6.1
null
null
GHSA-6mvm-83wh-44gh
Use-after-free vulnerability in Adobe Reader and Acrobat before 11.0.18, Acrobat and Acrobat Reader DC Classic before 15.006.30243, and Acrobat and Acrobat Reader DC Continuous before 15.020.20039 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-1089, CVE-2016-1091, CVE-2016-6944, CVE-2016-6945, CVE-2016-6946, CVE-2016-6949, CVE-2016-6952, CVE-2016-6953, CVE-2016-6961, CVE-2016-6962, CVE-2016-6963, CVE-2016-6964, CVE-2016-6965, CVE-2016-6967, CVE-2016-6969, CVE-2016-6971, CVE-2016-6979, CVE-2016-6988, and CVE-2016-6993.
[]
null
null
9.8
null
CVE-2005-2855
Cross-site scripting (XSS) vulnerability in Unclassified NewsBoard 1.5.3 allows remote attackers to inject arbitrary web script or HTML via the description field.
[ "cpe:2.3:a:unclassified_newsboard:unclassified_newsboard:1.5.3:*:*:*:*:*:*:*" ]
null
null
null
4.3
CVE-2009-0590
The ASN1_STRING_print_ex function in OpenSSL before 0.9.8k allows remote attackers to cause a denial of service (invalid memory access and application crash) via vectors that trigger printing of a (1) BMPString or (2) UniversalString with an invalid encoded length.
[ "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*" ]
null
null
null
5
PYSEC-2021-550
null
TensorFlow is an end-to-end open source platform for machine learning. It is possible to trigger a null pointer dereference in TensorFlow by passing an invalid input to `tf.raw_ops.CompressElement`. The [implementation](https://github.com/tensorflow/tensorflow/blob/47a06f40411a69c99f381495f490536972152ac0/tensorflow/core/data/compression_utils.cc#L34) was accessing the size of a buffer obtained from the return of a separate function call before validating that said buffer is valid. We have patched the issue in GitHub commit 5dc7f6981fdaf74c8c5be41f393df705841fb7c5. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
[]
null
null
null
null
GHSA-9p5v-74f3-3rq6
IBM QRadar Suite 1.10.12.0 through 1.10.17.0 and IBM Cloud Pak for Security 1.10.0.0 through 1.10.11.0 stores potentially sensitive information in log files that could be read by a local user. IBM X-Force ID: 279975.
[]
null
5.1
null
null
GHSA-mf53-vhfr-cjjw
The WP MultiTasking WordPress plugin through 0.1.12 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks
[]
null
5.4
null
null
GHSA-c6q5-rrw7-p494
Missing Authorization vulnerability in Pixelite Meta Tag Manager. This issue affects Meta Tag Manager: from n/a through 3.1.
[]
null
4.3
null
null
CVE-2019-1481
An information disclosure vulnerability exists in Windows Media Player when it fails to properly handle objects in memory, aka 'Windows Media Player Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2019-1480.
[ "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*" ]
null
4.3
null
4.3
RHSA-2019:3968
Red Hat Security Advisory: qemu-kvm-ma security update
QEMU: slirp: heap buffer overflow during packet reassembly
[ "cpe:/o:redhat:enterprise_linux:7::server" ]
null
null
7
null
CVE-2021-31257
The HintFile function in GPAC 1.0.1 allows attackers to cause a denial of service (NULL pointer dereference) via a crafted file in the MP4Box command.
[ "cpe:2.3:a:gpac:gpac:1.0.1:*:*:*:*:*:*:*" ]
null
5.5
null
4.3
RHSA-2005:267
Red Hat Security Advisory: Evolution security update
security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
CVE-2006-6674
Ozeki HTTP-SMS Gateway 1.0, and possibly earlier, stores usernames and passwords in plaintext in the HKLM\Software\Ozeki\SMSServer\CurrentVersion\Plugins\httpsmsgate registry key, which allows local users to obtain sensitive information.
[ "cpe:2.3:a:ozeki:http-sms_gateway:*:*:*:*:*:*:*:*" ]
null
null
null
2.1
GHSA-6c8p-qphv-668v
Denial of service in ruby-openid
The ruby-openid gem before 2.2.2 for Ruby allows remote OpenID providers to cause a denial of service (CPU consumption) via (1) a large XRDS document or (2) an XML Entity Expansion (XEE) attack.
[]
null
null
null
null
CVE-2007-2322
NMMediaServer.exe in Nero MediaHome 2.5.5.0 and CE 1.3.0.4 allows remote attackers to cause a denial of service (NULL dereference and application crash) via a crafted packet that contains two CRLF sequences. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
[ "cpe:2.3:a:nero:mediahome:2.5.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:nero:mediahome_ce:1.3.0.4:*:*:*:*:*:*:*" ]
null
null
null
7.8
CVE-2006-1223
Cross-site scripting (XSS) vulnerability in Jupiter Content Manager 1.1.5 and earlier allows remote attackers to inject arbitrary web script or HTML via a Javascript URI in the image BBcode tag.
[ "cpe:2.3:a:jupiter_cms:jupiter_cms:*:*:*:*:*:*:*:*", "cpe:2.3:a:jupiter_cms:jupiter_cms:1.1.4:*:*:*:*:*:*:*" ]
null
null
null
4.3
GHSA-v864-fp9f-3qv4
Vulnerability in the Oracle One-to-One Fulfillment component of Oracle E-Business Suite (subcomponent: User Interface). Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5 and 12.2.6. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle One-to-One Fulfillment. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle One-to-One Fulfillment, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle One-to-One Fulfillment accessible data as well as unauthorized update, insert or delete access to some of Oracle One-to-One Fulfillment accessible data. CVSS v3.0 Base Score 8.2 (Confidentiality and Integrity impacts).
[]
null
null
8.2
null
GHSA-wppf-7c2c-mmm7
EMC Smarts Network Configuration Manager (NCM) before 9.2 does not require authentication for all Java RMI method calls, which allows remote attackers to execute arbitrary code via unspecified vectors.
[]
null
null
null
null
CVE-2011-4118
Mahara before 1.4.1, when MNet (aka the Moodle network feature) is used, allows remote authenticated users to gain privileges via a jump to an XMLRPC target.
[ "cpe:2.3:a:mahara:mahara:*:*:*:*:*:*:*:*", "cpe:2.3:a:mahara:mahara:0.9.0:*:*:*:*:*:*:*", "cpe:2.3:a:mahara:mahara:0.9.1:*:*:*:*:*:*:*", "cpe:2.3:a:mahara:mahara:0.9.2:*:*:*:*:*:*:*", "cpe:2.3:a:mahara:mahara:1.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:mahara:mahara:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mahara:mahara:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mahara:mahara:1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mahara:mahara:1.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mahara:mahara:1.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mahara:mahara:1.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mahara:mahara:1.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mahara:mahara:1.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mahara:mahara:1.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:mahara:mahara:1.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:mahara:mahara:1.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:mahara:mahara:1.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:mahara:mahara:1.0.13:*:*:*:*:*:*:*", "cpe:2.3:a:mahara:mahara:1.0.14:*:*:*:*:*:*:*", "cpe:2.3:a:mahara:mahara:1.0.15:*:*:*:*:*:*:*", "cpe:2.3:a:mahara:mahara:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:mahara:mahara:1.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:mahara:mahara:1.1.0:alpha1:*:*:*:*:*:*", "cpe:2.3:a:mahara:mahara:1.1.0:alpha2:*:*:*:*:*:*", "cpe:2.3:a:mahara:mahara:1.1.0:alpha3:*:*:*:*:*:*", "cpe:2.3:a:mahara:mahara:1.1.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:mahara:mahara:1.1.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:mahara:mahara:1.1.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:mahara:mahara:1.1.0:beta4:*:*:*:*:*:*", "cpe:2.3:a:mahara:mahara:1.1.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:mahara:mahara:1.1.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:mahara:mahara:1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:mahara:mahara:1.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:mahara:mahara:1.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:mahara:mahara:1.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:mahara:mahara:1.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:mahara:mahara:1.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:mahara:mahara:1.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:mahara:mahara:1.1.8:*:*:*:*:*:*:*", "cpe:2.3:a:mahara:mahara:1.1.9:*:*:*:*:*:*:*", "cpe:2.3:a:mahara:mahara:1.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:mahara:mahara:1.2.0:alpha1:*:*:*:*:*:*", "cpe:2.3:a:mahara:mahara:1.2.0:alpha2:*:*:*:*:*:*", "cpe:2.3:a:mahara:mahara:1.2.0:alpha3:*:*:*:*:*:*", "cpe:2.3:a:mahara:mahara:1.2.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:mahara:mahara:1.2.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:mahara:mahara:1.2.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:mahara:mahara:1.2.0:beta4:*:*:*:*:*:*", "cpe:2.3:a:mahara:mahara:1.2.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:mahara:mahara:1.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:mahara:mahara:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:mahara:mahara:1.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:mahara:mahara:1.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:mahara:mahara:1.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:mahara:mahara:1.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:mahara:mahara:1.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:mahara:mahara:1.3.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:mahara:mahara:1.3.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:mahara:mahara:1.3.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:mahara:mahara:1.3.0:beta4:*:*:*:*:*:*", "cpe:2.3:a:mahara:mahara:1.3.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:mahara:mahara:1.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:mahara:mahara:1.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:mahara:mahara:1.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:mahara:mahara:1.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:mahara:mahara:1.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:mahara:mahara:1.3.6:*:*:*:*:*:*:*", "cpe:2.3:a:mahara:mahara:1.3.7:*:*:*:*:*:*:*", "cpe:2.3:a:mahara:mahara:1.4:rc1:*:*:*:*:*:*", "cpe:2.3:a:mahara:mahara:1.4:rc2:*:*:*:*:*:*", "cpe:2.3:a:mahara:mahara:1.4:rc3:*:*:*:*:*:*", "cpe:2.3:a:mahara:mahara:1.4:rc4:*:*:*:*:*:*" ]
null
null
null
6
GHSA-q5wp-qj6q-q9jm
A vulnerability classified as critical was found in TOTOLINK AC1200 T8 4.1.5cu.861_B20230220. This vulnerability affects unknown code of the file /etc/shadow.sample. The manipulation leads to use of hard-coded password. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
[]
9.2
8.1
null
null
ICSA-25-162-10
PTZOptics and Other Pan-Tilt-Zoom Cameras
PTZOptics PT30X-SDI/NDI-xx before firmware 6.3.40 is vulnerable to an insufficient authentication issue. The camera does not properly enforce authentication to /cgi-bin/param.cgi when requests are sent without an HTTP Authorization header. The result is a remote and unauthenticated attacker can leak sensitive data such as usernames, password hashes, and configurations details. Additionally, the attacker can update individual configuration values or overwrite the whole file. PTZOptics PT30X-SDI/NDI-xx before firmware 6.3.40 is vulnerable to an OS command injection issue. The camera does not sufficiently validate the ntp_addr configuration value which may lead to arbitrary command execution when ntp_client is started. When chained with CVE-2024-8956, a remote and unauthenticated attacker can execute arbitrary OS commands on affected devices. Certain PTZOptics and possibly other ValueHD-based cameras have SSH or telnet or both enabled by default. Operating system users with administrative privileges (including the root user) have default passwords that are trivial to crack. The passwords cannot be changed by the user, nor can the SSH or telnet service be disabled by the user. PTZOptics and possibly other ValueHD-based cameras use a default, shared password for the administrative web interface. The table below shows the affected firmware. This has been patched on production firmware for the current generation of devices.
[]
null
9.8
null
null
GHSA-mq4h-3x66-jfc7
Some Samsung devices include the SIMalliance Toolbox Browser (aka S@T Browser) on the UICC, which might allow remote attackers to retrieve location and IMEI information, or retrieve other data or execute certain commands, via SIM Toolkit (STK) instructions in an SMS message, aka Simjacker.
[]
null
9.8
null
null
GHSA-v2p4-5xw6-2p26
PHP remote file inclusion vulnerability in includes/functions_admin.php in PNphpBB 1.2g allows remote attackers to execute arbitrary PHP code via a URL in the phpbb_root_path parameter.
[]
null
null
null
null
CVE-2002-0778
The default configuration of the proxy for Cisco Cache Engine and Content Engine allows remote attackers to use HTTPS to make TCP connections to allowed IP addresses while hiding the actual source IP.
[ "cpe:2.3:a:cisco:content_distribution_manager_4630:*:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:content_distribution_manager_4630:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:content_distribution_manager_4630:4.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:content_distribution_manager_4650:*:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:content_distribution_manager_4650:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:content_distribution_manager_4650:4.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:content_engine:507:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:content_engine:507_2.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:content_engine:507_3.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:content_engine:507_4.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:content_engine:507_4.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:content_engine:560:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:content_engine:560_2.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:content_engine:560_3.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:content_engine:560_4.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:content_engine:560_4.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:content_engine:590:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:content_engine:590_2.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:content_engine:590_3.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:content_engine:590_4.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:content_engine:590_4.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:content_engine:7320:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:content_engine:7320_2.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:content_engine:7320_3.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:content_engine:7320_4.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:content_engine:7320_4.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:enterprise_content_delivery_network_software:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:enterprise_content_delivery_network_software:4.1:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:cache_engine_505:2.4.0:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:cache_engine_505:3.0:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:cache_engine_550:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:cache_engine_550:2.2.0:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:cache_engine_550:2.4.0:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:cache_engine_550:3.0:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:cache_engine_570:2.2.0:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:cache_engine_570:2.4.0:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:cache_engine_570:3.0:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:cache_engine_570:570:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:content_router_4430:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-g5ww-5jh7-63cx
Protobuf Java vulnerable to Uncontrolled Resource Consumption
A parsing issue similar to CVE-2022-3171, but with textformat in protobuf-java core and lite versions prior to 3.21.7, 3.20.3, 3.19.6 and 3.16.3 can lead to a denial of service attack. Inputs containing multiple instances of non-repeated embedded messages with repeated or unknown fields causes objects to be converted back-n-forth between mutable and immutable forms, resulting in potentially long garbage collection pauses. We recommend updating to the versions mentioned above.
[]
null
7.5
null
null
GHSA-j5r3-qrhr-2674
A vulnerability was found in lmxcms up to 1.41. It has been rated as critical. Affected by this issue is some unknown functionality of the file admin.php. The manipulation of the argument lid leads to sql injection. VDB-239858 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
[]
null
null
5.5
null
GHSA-7342-qgvc-m343
Possible buffer overflow in trust zone access control API. Buffer overflow may occur due to lack of buffer size checking. Product: Android. Versions: Kernel 3.18. Android ID: A-31625204. References: QC-CR#1027804.
[]
null
null
9.8
null
CVE-2017-2100
Hands-on Vulnerability Learning Tool "AppGoat" for Web Application V3.0.1 and earlier allows remote attackers to conduct DNS rebinding attacks via unspecified vectors.
[ "cpe:2.3:a:ipa:appgoat:*:*:*:*:*:*:*:*" ]
null
null
6.3
6.8
CVE-2020-3332
Cisco Small Business RV110W, RV130, RV130W, and RV215W Series Routers Command Shell Injection Vulnerability
A vulnerability in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Series Routers could allow an authenticated, remote attacker to inject arbitrary shell commands that are executed by an affected device. The vulnerability is due to insufficient input validation of user-supplied data. An attacker could exploit this vulnerability by sending a crafted request to the web-based management interface of an affected device. A successful exploit could allow the attacker to execute arbitrary shell commands or scripts with root privileges on the affected device.
[ "cpe:2.3:o:cisco:rv110w_wireless-n_vpn_firewall_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:rv110w_wireless-n_vpn_firewall:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv130_vpn_router_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:rv130_vpn_router:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv130w_wireless-n_multifunction_vpn_router_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:rv130w_wireless-n_multifunction_vpn_router:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv215w_wireless-n_vpn_router_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:rv215w_wireless-n_vpn_router:-:*:*:*:*:*:*:*" ]
null
null
8.1
null
GHSA-2v2g-rr8c-cpwh
NCP Secure Enterprise Client before 10.15 r47589 allows a symbolic link attack on enumusb.reg via Support Assistant.
[]
null
null
null
null
CVE-2024-4422
Comparison Slider <= 1.0.5 - Authenticated (Subscriber+) Stored Cross-Site Scripting
The Comparison Slider plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the slider title parameter in all versions up to, and including, 1.0.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with subscriber access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
6.4
null
null
GHSA-2v77-g93r-76vh
A vulnerability, which was classified as critical, has been found in SourceCodester Best Employee Management System 1.0. Affected by this issue is some unknown functionality of the file /admin/fetch_product_details.php. The manipulation of the argument barcode leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
[]
5.3
6.3
null
null
CVE-2021-26558
Deserialization of Untrusted Data
Deserialization of Untrusted Data vulnerability of Apache ShardingSphere-UI allows an attacker to inject outer link resources. This issue affects Apache ShardingSphere-UI Apache ShardingSphere-UI version 4.1.1 and later versions; Apache ShardingSphere-UI versions prior to 5.0.0.
[ "cpe:2.3:a:apache:shardingsphere-ui:*:*:*:*:*:*:*:*" ]
null
7.5
null
5
RHSA-2016:1944
Red Hat Security Advisory: bind security update
bind: assertion failure in buffer.c while building responses to a specifically constructed request
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation", "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
7.5
null
CVE-2008-4593
Apple iPhone 2.1 with firmware 5F136, when Require Passcode is enabled and Show SMS Preview is disabled, allows physically proximate attackers to obtain sensitive information by performing an Emergency Call tap and then reading SMS messages on the device screen, aka Apple bug number 6267416.
[ "cpe:2.3:h:apple:iphone:2.1:*:*:*:*:*:*:*" ]
null
null
null
1.2
GHSA-3p43-73rv-cj74
A component of the HarmonyOS has a Improper Input Validation vulnerability. Local attackers may exploit this vulnerability to read at any address.
[]
null
null
null
null
GHSA-mh5r-cxjx-37mf
A stack-based buffer overflow vulnerability exists in the Web Manager SslGenerateCSR functionality of Lantronix PremierWave 2050 8.9.0.0R4 (in QEMU). A specially crafted HTTP request can lead to remote code execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.
[]
null
9.1
null
null
CVE-2011-3427
The Data Security component in Apple iOS before 5 and Apple TV before 4.4 does not properly restrict use of the MD5 hash algorithm within X.509 certificates, which makes it easier for man-in-the-middle attackers to spoof servers or obtain sensitive information via a crafted certificate.
[ "cpe:2.3:a:apple:apple_tv:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:apple_tv:4.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:apple_tv:4.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:apple_tv:4.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.0:-:iphone:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.1:-:iphone:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.1:-:ipodtouch:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.1.2:-:iphone:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.1.3:-:iphone:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.2:-:iphone:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.2:-:ipodtouch:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.2.1:-:ipad:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.0:-:iphone:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.0:-:ipodtouch:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.0.1:-:iphone:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.0.1:-:ipodtouch:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.2.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.2.8:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.3.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.3.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.3.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.3.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.3.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.3.5:-:ipad:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.3.5:-:ipodtouch:*:*:*:*:*" ]
null
null
null
2.6
GHSA-xww9-82cx-c8c3
Use-after-free vulnerability in Adobe Flash Player before 13.0.0.269 and 14.x through 16.x before 16.0.0.305 on Windows and OS X and before 11.2.202.442 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-0313, CVE-2015-0320, and CVE-2015-0322.
[]
null
null
null
null
GHSA-45gh-j7vr-755q
Valid Host header field can cause Apache Traffic Server to crash on some platforms.This issue affects Apache Traffic Server: from 9.2.0 through 9.2.5.Users are recommended to upgrade to version 9.2.6, which fixes the issue, or 10.0.2, which does not have the issue.
[]
null
7.5
null
null
CVE-2025-22702
WordPress Photography theme <= 7.5.2 - Broken Access Control vulnerability
Missing Authorization vulnerability in EPC Photography. This issue affects Photography: from n/a through 7.5.2.
[]
null
6.3
null
null
CVE-2022-48301
The bundle management module lacks permission verification in some APIs. Successful exploitation of this vulnerability may restore the pre-installed apps that have been uninstalled.
[ "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:emui:12.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:2.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*" ]
null
7.5
null
null
GHSA-q9wq-fgjg-qwhp
NVIDIA drivers (nvidia-drivers) before 1.0.7185, 1.0.9639, and 100.14.11, as used in Gentoo Linux and possibly other distributions, creates /dev/nvidia* device files with insecure permissions, which allows local users to modify video card settings, cause a denial of service (crash or physical video card damage), and obtain sensitive information.
[]
null
null
null
null
CVE-2018-19918
CuppaCMS has XSS via an SVG document uploaded to the administrator/#/component/table_manager/view/cu_views URI.
[ "cpe:2.3:a:cuppacms:cuppacms:-:*:*:*:*:*:*:*" ]
null
5.4
5.4
3.5
GHSA-jjpj-fj74-73gv
CRLF injection vulnerability in the Digest Authentication support for Mozilla Firefox before 2.0.0.8 and SeaMonkey before 1.1.5 allows remote attackers to conduct HTTP request splitting attacks via LF (%0a) bytes in the username attribute.
[]
null
null
null
null
GHSA-7c9r-v4q2-x3rh
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in cmsmasters CMSMasters Content Composer allows PHP Local File Inclusion. This issue affects CMSMasters Content Composer: from n/a through n/a.
[]
null
8.1
null
null
GHSA-22h8-5mmq-pgx3
Citrix StoreFront Server before 1903, 7.15 LTSR before CU4 (3.12.4000), and 7.6 LTSR before CU8 (3.0.8000) allows XXE attacks.
[]
null
null
7.5
null
CVE-2019-0135
Improper permissions in the installer for Intel(R) Accelerated Storage Manager in Intel(R) RSTe before version 5.5.0.2015 may allow an authenticated user to potentially enable escalation of privilege via local access. L-SA-00206
[ "cpe:2.3:a:intel:rapid_storage_technology_enterprise:*:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkstation_p520_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkstation_p520:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkstation_p520c_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkstation_p520c:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkstation_p720_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkstation_p720:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkstation_p920_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkstation_p920:-:*:*:*:*:*:*:*" ]
null
7.8
null
4.6
CVE-2007-0489
PHP remote file inclusion vulnerability in includes/functions.visohotlink.php in VisoHotlink 1.01 and possibly earlier allows remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter.
[ "cpe:2.3:a:visohotlink:visohotlink:*:*:*:*:*:*:*:*" ]
null
null
null
6.8
CVE-2024-46553
Draytek Vigor 3910 v4.3.2.6 was discovered to contain a buffer overflow in the ipaddrmsk%d parameter at v2x00.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.
[ "cpe:2.3:o:draytek:vigor3910_firmware:4.3.2.6:*:*:*:*:*:*:*", "cpe:2.3:h:draytek:vigor3910:-:*:*:*:*:*:*:*" ]
null
7.5
null
null
GHSA-wrr5-p265-7252
Jenkins Warnings NG Plugin Cross-site scripting vulnerability
A cross-site scripting vulnerability in Jenkins Warnings NG Plugin 5.0.0 and earlier allowed attacker with Job/Configure permission to inject arbitrary JavaScript in build overview pages.
[]
null
null
5.4
null
CVE-2018-11230
jbig2_add_page in jbig2enc.cc in libjbig2enc.a in jbig2enc 0.29 allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted file.
[ "cpe:2.3:a:jbig2enc_project:jbig2enc:0.29:*:*:*:*:*:*:*" ]
null
null
8.8
6.8
CVE-2023-4003
One Identity Password Manager version 5.9.7.1 - Unauthenticated physical access privilege escalation
One Identity Password Manager version 5.9.7.1 - An unauthenticated attacker with physical access to a workstation may upgrade privileges to SYSTEM through an unspecified method. CWE-250: Execution with Unnecessary Privileges.
[ "cpe:2.3:a:oneidentity:password_manager:*:*:*:*:*:*:*:*" ]
null
7.6
null
null
RHSA-2011:1536
Red Hat Security Advisory: sos security, bug fix, and enhancement update
sos: sosreport is gathering certificate-based RHN entitlement private keys
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
GHSA-wmwf-43vq-qhq2
In FFmpeg before 4.2, avcodec_open2 in libavcodec/utils.c allows a NULL pointer dereference and possibly unspecified other impact when there is no valid close function pointer.
[]
null
null
null
null
CVE-2020-0362
In libstagefright, there is a possible resource exhaustion due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-123237930
[ "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*" ]
null
6.5
null
4.3
CVE-2024-45806
Potential manipulate `x-envoy` headers from external sources in envoy
Envoy is a cloud-native high-performance edge/middle/service proxy. A security vulnerability in Envoy allows external clients to manipulate Envoy headers, potentially leading to unauthorized access or other malicious actions within the mesh. This issue arises due to Envoy's default configuration of internal trust boundaries, which considers all RFC1918 private address ranges as internal. The default behavior for handling internal addresses in Envoy has been changed. Previously, RFC1918 IP addresses were automatically considered internal, even if the internal_address_config was empty. The default configuration of Envoy will continue to trust internal addresses while in this release and it will not trust them by default in next release. If you have tooling such as probes on your private network which need to be treated as trusted (e.g. changing arbitrary x-envoy headers) please explicitly include those addresses or CIDR ranges into `internal_address_config`. Successful exploitation could allow attackers to bypass security controls, access sensitive data, or disrupt services within the mesh, like Istio. This issue has been addressed in versions 1.31.2, 1.30.6, 1.29.9, and 1.28.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.
[ "cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*" ]
null
6.5
null
null
GHSA-qhx6-j2hf-9j4g
Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.70 and earlier, 5.5.32 and earlier, and 5.6.12 and earlier allows remote authenticated users to affect availability via unknown vectors related to Optimizer.
[]
null
null
null
null
CVE-2024-5193
Ritlabs TinyWeb Server Request crlf injection
A vulnerability was found in Ritlabs TinyWeb Server 1.94. It has been classified as problematic. Affected is an unknown function of the component Request Handler. The manipulation with the input %0D%0A leads to crlf injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-265830 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
[ "cpe:2.3:a:ritlabs:tinyweb:*:*:*:*:*:*:*:*" ]
6.9
5.3
5.3
5
GHSA-q4cq-539c-3mmm
Directory Traversal in serveryztyzt
Affected versions of `serveryztyzt` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.**Example request:**RecommendationNo patch is available for this vulnerability.It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
[]
null
null
7.5
null
CVE-2024-10093
VSO ConvertXtoDvd ConvertXtoDvd.exe uncontrolled search path
A vulnerability, which was classified as critical, was found in VSO ConvertXtoDvd 7.0.0.83. Affected is an unknown function in the library avcodec.dll of the file ConvertXtoDvd.exe. The manipulation leads to uncontrolled search path. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
[ "cpe:2.3:a:vso:convertxtodvd:*:*:*:*:*:*:*:*", "cpe:2.3:a:vso-software:convertxtodvd:7.0.0.83:*:*:*:*:*:*:*" ]
8.5
7.8
7.8
6.8
GHSA-5cjw-xf6c-qrgq
A vulnerability classified as critical was found in itsourcecode Ticket Reservation System 1.0. Affected by this vulnerability is an unknown functionality of the file login.php of the component Login Page. The manipulation of the argument username leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-273529 was assigned to this vulnerability.
[]
6.9
7.3
null
null
GHSA-xr25-82p4-842w
It is possible to inject HTML and/or JavaScript in the HTML to PDF conversion in Gotenberg through 6.2.1 via the /convert/html endpoint.
[]
null
null
null
null
GHSA-vf6h-p6gg-4q67
Adobe Acrobat Reader versions 22.001.20142 (and earlier), 20.005.30334 (and earlier) and 17.012.30229 (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[]
null
7.8
null
null
GHSA-459h-qwrj-j9gc
The allows any authenticated user to join a private group due to a missing authorization check on a function
[]
null
6.5
null
null
GHSA-cvj7-3x62-49h3
Multiple cross-site scripting (XSS) vulnerabilities in Mahara before 1.0.15, 1.1.x before 1.1.9, and 1.2.x before 1.2.5 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.
[]
null
null
null
null
CVE-2010-2192
The make_lockdir_name function in policy.c in pmount 0.9.18 allow local users to overwrite arbitrary files via a symlink attack on a file in /var/lock/.
[ "cpe:2.3:a:vincent_fourmond:pmount:0.9.18:*:*:*:*:*:*:*" ]
null
null
null
1.9
CVE-2021-44837
An issue was discovered in Delta RM 1.2. It is possible for an unprivileged user to access the same information as an admin user regarding the risk creation information in the /risque/administration/referentiel/json/create/categorie endpoint, using the id_cat1 query parameter to indicate the risk.
[ "cpe:2.3:a:deltarm:delta_rm:1.2:*:*:*:*:*:*:*" ]
null
4.3
null
4
CVE-2022-35703
Adobe Bridge SVG File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability
Adobe Bridge version 12.0.2 (and earlier) and 11.1.3 (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[ "cpe:2.3:a:adobe:bridge:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
null
7.8
null
CVE-2023-34540
Langchain before v0.0.225 was discovered to contain a remote code execution (RCE) vulnerability in the component JiraAPIWrapper (aka the JIRA API wrapper). This vulnerability allows attackers to execute arbitrary code via crafted input. As noted in the "releases/tag" reference, a fix is available.
[ "cpe:2.3:a:langchain:langchain:0.0.171:*:*:*:*:*:*:*" ]
null
9.8
null
null