id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
197k
cpes
listlengths
0
4.89k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
GHSA-xf82-53gc-8p9x
Multiple SQL injection vulnerabilities in akocomment.php in AkoComment 2.0 module for Mambo, with magic_quotes_gpc disabled, allow remote attackers to execute arbitrary SQL commands via the (1) acname or (2) contentid parameter.
[]
null
null
null
null
CVE-2025-7160
PHPGurukul Zoo Management System index.php sql injection
A vulnerability classified as critical has been found in PHPGurukul Zoo Management System 2.1. This affects an unknown part of the file /admin/index.php. The manipulation of the argument Username leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
[]
6.9
7.3
7.3
7.5
RHSA-2015:2083
Red Hat Security Advisory: postgresql92-postgresql security update
postgresql: limited memory disclosure flaw in crypt() postgresql: stack overflow DoS when parsing json or jsonb inputs
[ "cpe:/a:redhat:rhel_software_collections:2::el6", "cpe:/a:redhat:rhel_software_collections:2::el7" ]
null
null
null
null
RHSA-2005:785
Red Hat Security Advisory: firefox security update
security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
ICSA-22-195-16
Siemens EN100 Ethernet Module
Affected applications contains a memory corruption vulnerability while parsing specially crafted HTTP packets to /txtrace endpoint manupulating a specific argument. This could allow an attacker to crash the affected application leading to a denial of service condition
[]
null
8.6
null
null
RHSA-2009:0348
Red Hat Security Advisory: JBoss Enterprise Application Platform 4.2.0CP06 update
JBoss EAP unprivileged local xml file access
[ "cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0::el5" ]
null
null
null
null
CVE-2020-23249
GigaVUE-OS (GVOS) 5.4 - 5.9 stores a Redis database password in plaintext.
[ "cpe:2.3:o:gigamon:gigavue-os:*:*:*:*:*:*:*:*" ]
null
4.7
null
4
RHSA-2019:3883
Red Hat Security Advisory: kernel security update
hw: Intel GPU blitter manipulation can allow for arbitrary kernel memory write
[ "cpe:/o:redhat:rhel_aus:7.3::server", "cpe:/o:redhat:rhel_e4s:7.3::server", "cpe:/o:redhat:rhel_tus:7.3::server" ]
null
null
8.8
null
CVE-2015-4376
Cross-site scripting (XSS) vulnerability in the Profile2 Privacy module 7.x-1.x before 7.x-1.5 for Drupal allows remote authenticated users with the "Administer Profile2 Privacy Levels" permission to inject arbitrary web script or HTML via unspecified vectors.
[ "cpe:2.3:a:profile2_privacy_project:profile2_privacy:7.x-1.0:*:*:*:*:drupal:*:*", "cpe:2.3:a:profile2_privacy_project:profile2_privacy:7.x-1.1:*:*:*:*:drupal:*:*", "cpe:2.3:a:profile2_privacy_project:profile2_privacy:7.x-1.2:*:*:*:*:drupal:*:*", "cpe:2.3:a:profile2_privacy_project:profile2_privacy:7.x-1.3:*:*:*:*:drupal:*:*", "cpe:2.3:a:profile2_privacy_project:profile2_privacy:7.x-1.4:*:*:*:*:drupal:*:*", "cpe:2.3:a:profile2_privacy_project:profile2_privacy:7.x-1.x:dev:*:*:*:drupal:*:*" ]
null
null
null
3.5
CVE-2021-20711
Aterm WG2600HS firmware Ver1.5.1 and earlier allows an attacker to execute arbitrary OS commands via unspecified vectors.
[ "cpe:2.3:o:nec:aterm_wg2600hs_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:nec:aterm_wg2600hs:-:*:*:*:*:*:*:*" ]
null
9.8
null
10
CVE-2022-37084
TOTOLINK A7000R V9.1.0u.6115_B20201022 was discovered to contain a stack overflow via the sPort parameter at the addEffect function.
[ "cpe:2.3:o:totolink:a7000r_firmware:9.1.0u.6115_b20201022:*:*:*:*:*:*:*", "cpe:2.3:h:totolink:a7000r:-:*:*:*:*:*:*:*" ]
null
7.8
null
null
CVE-2021-31908
In JetBrains TeamCity before 2020.2.3, stored XSS was possible on several pages.
[ "cpe:2.3:a:jetbrains:teamcity:*:*:*:*:*:*:*:*" ]
null
5.4
null
3.5
CVE-2021-24657
Limit Login Attempts < 4.0.50 - Unauthenticated Stored Cross-Site Scripting
The Limit Login Attempts WordPress plugin before 4.0.50 does not escape the IP addresses (which can be controlled by attacker via headers such as X-Forwarded-For) of attempted logins before outputting them in the reports table, leading to an Unauthenticated Stored Cross-Site Scripting issue.
[ "cpe:2.3:a:limit_login_attempts_project:limit_login_attempts:*:*:*:*:*:wordpress:*:*" ]
null
6.1
null
4.3
CVE-2025-22454
Insufficiently restrictive permissions in Ivanti Secure Access Client before 22.7R4 allows a local authenticated attacker to escalate their privileges.
[]
null
7.8
null
null
GHSA-g6hx-mx2f-fvx9
Possible Command Injectionin iManager GET parameter has been discovered in OpenText™ iManager 3.2.6.0000.
[]
null
8.8
null
null
CVE-2012-2760
mod_auth_openid before 0.7 for Apache uses world-readable permissions for /tmp/mod_auth_openid.db, which allows local users to obtain session ids.
[ "cpe:2.3:a:findingscience:mod_auth_openid:*:*:*:*:*:apache:*:*", "cpe:2.3:a:findingscience:mod_auth_openid:0.1:*:*:*:*:apache:*:*", "cpe:2.3:a:findingscience:mod_auth_openid:0.2:*:*:*:*:apache:*:*", "cpe:2.3:a:findingscience:mod_auth_openid:0.2.1:*:*:*:*:apache:*:*", "cpe:2.3:a:findingscience:mod_auth_openid:0.3:*:*:*:*:apache:*:*", "cpe:2.3:a:findingscience:mod_auth_openid:0.4:*:*:*:*:apache:*:*", "cpe:2.3:a:findingscience:mod_auth_openid:0.5:*:*:*:*:apache:*:*" ]
null
null
null
2.1
GHSA-5fhm-3rf4-cfq4
Heap-based buffer overflow in SiteMinder Affiliate Agent 4.x allows remote attackers to execute arbitrary code via a large SMPROFILE cookie.
[]
null
null
null
null
GHSA-4r9w-r4jc-fqgq
The Theater for WordPress plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 0.18.6.2. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
[]
null
6.1
null
null
CVE-2019-8589
This issue was addressed with improved checks. This issue is fixed in macOS Mojave 10.14.5. A malicious application may bypass Gatekeeper checks.
[ "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*" ]
null
5.5
null
4.3
RHSA-2020:1317
Red Hat Security Advisory: nodejs:10 security update
ICU: Integer overflow in UnicodeString::doAppend()
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8.8
null
null
CVE-2024-43387
Phoenix Contact: Access files due to improper neutralization of special elements in MGUARD devices
A low privileged remote attacker can read and write files as root due to improper neutralization of special elements in the variable EMAIL_RELAY_PASSWORD in mGuard devices.
[ "cpe:2.3:o:phoenixcontact:fl_mguard_centerport_vpn-1000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_core_tx_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_core_tx_vpn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_delta_tx\\/tx_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_delta_tx\\/tx_vpn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_gt\\/gt_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_gt\\/gt_vpn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_pci4000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_pci4000_vpn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_pcie4000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_pcie4000_vpn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_rs2000_tx\\/tx-b_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_rs2000_tx\\/tx_vpn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_rs2005_tx_vpn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_rs4000_tx\\/tx_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_rs4000_tx\\/tx-m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_rs4000_tx\\/tx-p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_rs4000_tx\\/tx_vpn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_rs4004_tx\\/dtx_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_rs4004_tx\\/dtx_vpn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_smart2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_smart2_vpn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_2102_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_2105_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_4102_pcie_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_4102_pci_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_4302_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_4305_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:tc_mguard_rs2000_3g_vpn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:tc_mguard_rs2000_4g_att_vpn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:tc_mguard_rs2000_4g_vpn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:tc_mguard_rs2000_4g_vzw_vpn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:tc_mguard_rs4000_3g_vpn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:tc_mguard_rs4000_4g_att_vpn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:tc_mguard_rs4000_4g_vpn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:tc_mguard_rs4000_4g_vzw_vpn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:tc_mguard_rs4000_4g_vzw_vpn:-:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:tc_mguard_rs4000_4g_vpn:-:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:tc_mguard_rs4000_4g_att_vpn:-:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:tc_mguard_rs4000_3g_vpn:-:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:tc_mguard_rs2000_4g_vzw_vpn:-:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:tc_mguard_rs2000_4g_vpn:-:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:tc_mguard_rs2000_4g_att_vpn:-:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:tc_mguard_rs2000_3g_vpn:-:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_mguard_smart2_vpn:-:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_mguard_smart2:-:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_mguard_rs4004_tx\\/dtx_vpn:-:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_mguard_rs4004_tx\\/dtx:-:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_mguard_rs4000_tx\\/tx_vpn:-:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_mguard_rs4000_tx\\/tx-p:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_rs4000_tx\\/tx-m_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_mguard_rs4000_tx\\/tx-m:-:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_mguard_rs4000_tx\\/tx:-:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_mguard_rs2005_tx_vpn:-:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_mguard_rs2000_tx\\/tx_vpn:-:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_mguard_rs2000_tx\\/tx-b:-:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_mguard_pcie4000_vpn:-:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_mguard_pcie4000:-:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_mguard_pci4000_vpn:-:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_mguard_pci4000:-:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_mguard_gt\\/gt_vpn:-:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_mguard_gt\\/gt:-:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_mguard_delta_tx\\/tx_vpn:-:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_mguard_delta_tx\\/tx:-:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_mguard_core_tx_vpn:-:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_mguard_core_tx:-:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_mguard_centerport_vpn-1000:-:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_mguard_4305:-:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_mguard_4302:-:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_mguard_4102_pcie:-:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_mguard_4102_pci:-:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_mguard_2105:-:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_mguard_2102:-:*:*:*:*:*:*:*" ]
null
8.8
null
null
CVE-2021-43398
Crypto++ (aka Cryptopp) 8.6.0 and earlier contains a timing leakage in MakePublicKey(). There is a clear correlation between execution time and private key length, which may cause disclosure of the length information of the private key. This might allow attackers to conduct timing attacks. NOTE: this report is disputed by the vendor and multiple third parties. The execution-time differences are intentional. A user may make a choice of a longer key as a tradeoff between strength and performance. In making this choice, the amount of information leaked to an adversary is of infinitesimal value
[ "cpe:2.3:a:cryptopp:crypto\\+\\+:*:*:*:*:*:*:*:*" ]
null
5.3
null
5
CVE-2022-43969
Ricoh mp_c4504ex devices with firmware 1.06 mishandle credentials.
[ "cpe:2.3:o:ricoh:mp_c307_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:mp_c307:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:mp_c407_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:mp_c407:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:mp_c406_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:mp_c406:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:mp_c306_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:mp_c306:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:im_cw2200_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:im_cw2200:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:im_cw2201_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:im_cw2201:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:mp_402spf_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:mp_402spf:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:mp_c2003_smart_operation_panel_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:mp_c2003_smart_operation_panel:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:mp_c2503_smart_operation_panel_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:mp_c2503_smart_operation_panel:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:mp_c2003_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:mp_c2003:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:mp_c2503_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:mp_c2503:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:mp_c4503_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:mp_c4503:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:mp_c5503_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:mp_c5503:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:mp_c6003_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:mp_c6003:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:mp_c3003_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:mp_c3003:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:mp_c3503_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:mp_c3503:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:mp_c4503_smart_operation_panel_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:mp_c4503_smart_operation_panel:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:mp_c5503_smart_operation_panel_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:mp_c5503_smart_operation_panel:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:mp_c6003_smart_operation_panel_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:mp_c6003_smart_operation_panel:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:mp_c3003_smart_operation_panel_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:mp_c3003_smart_operation_panel:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:mp_c3503_smart_operation_panel_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:mp_c3503_smart_operation_panel:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:mp_c2004ex_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:mp_c2004ex:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:mp_c2504ex_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:mp_c2504ex:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:mp_c4504ex_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:mp_c4504ex:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:mp_c5504ex_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:mp_c5504ex:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:mp_c6004ex_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:mp_c6004ex:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:mp_c3004ex_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:mp_c3004ex:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:mp_c3504ex_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:mp_c3504ex:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:pro_c5300s_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:pro_c5300s:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:pro_c5310s_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:pro_c5310s:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:m_c2001_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:m_c2001:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:im_c530f_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:im_c530f:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:im_c530fb_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:im_c530fb:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:im_350f_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:im_350f:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:im_350_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:im_350:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:im_430f_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:im_430f:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:im_430fb_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:im_430fb:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:mp_305\\+_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:mp_305\\+:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:im_550f_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:im_550f:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:im_600f_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:im_600f:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:im_600srf_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:im_600srf:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:im_7000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:im_7000:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:im_8000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:im_8000:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:im_9000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:im_9000:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:mp_2555_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:mp_2555:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:mp_3055_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:mp_3055:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:mp_3555_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:mp_3555:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:mp_4055_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:mp_4055:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:mp_5055_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:mp_5055:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:mp_6055_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:mp_6055:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:im_2500_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:im_2500:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:im_3000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:im_3000:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:im_3500_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:im_3500:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:im_4000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:im_4000:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:im_5000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:im_5000:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:im_6000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:im_6000:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:im_2702_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:im_2702:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:im_c400f_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:im_c400f:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:im_c300f_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:im_c300f:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:im_c300_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:im_c300:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:im_c400srf_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:im_c400srf:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:im_c2000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:im_c2000:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:im_c2500_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:im_c2500:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:im_c6000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:im_c6000:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:im_c5500_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:im_c5500:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:im_c3000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:im_c3000:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:im_c3500_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:im_c3500:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:im_c4500_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:im_c4500:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:mp_c2504_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:mp_c2504:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:mp_c2004_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:mp_c2004:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:mp_c4504_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:mp_c4504:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:mp_c5504_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:mp_c5504:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:mp_c6004_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:mp_c6004:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:mp_c3504_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:mp_c3504:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:mp_c3004_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:mp_c3004:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:im_c6500_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:im_c6500:-:*:*:*:*:*:*:*", "cpe:2.3:o:ricoh:im_c8000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ricoh:im_c8000:-:*:*:*:*:*:*:*" ]
null
9.1
null
null
CVE-2000-1042
Buffer overflow in ypserv in Mandrake Linux 7.1 and earlier, and possibly other Linux operating systems, allows an attacker to gain root privileges when ypserv is built without a vsyslog() function.
[ "cpe:2.3:o:mandrakesoft:mandrake_linux:6.1:*:*:*:*:*:*:*", "cpe:2.3:o:mandrakesoft:mandrake_linux:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:mandrakesoft:mandrake_linux:7.1:*:*:*:*:*:*:*" ]
null
null
null
10
CVE-2022-36913
Jenkins Openstack Heat Plugin 1.5 and earlier does not perform permission checks in methods implementing form validation, allowing attackers with Overall/Read permission to check for the existence of an attacker-specified file path on the Jenkins controller file system.
[ "cpe:2.3:a:jenkins:openstack_heat:*:*:*:*:*:jenkins:*:*" ]
null
4.3
null
null
RHSA-2023:0932
Red Hat Security Advisory: Logging Subsystem 5.6.3 - Red Hat OpenShift
express: "qs" prototype poisoning causes the hang of the node process golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests
[ "cpe:/a:redhat:logging:5.6::el8" ]
null
5.3
null
null
GHSA-537v-pf35-xw47
The multisite-post-duplicator plugin before 1.1.3 for WordPress has wp-admin/tools.php?page=mpd CSRF.
[]
null
null
null
null
GHSA-8m6g-gw2g-4vv5
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in piotnetdotcom Piotnet Forms allows Stored XSS. This issue affects Piotnet Forms: from n/a through 1.0.30.
[]
null
5.9
null
null
CVE-2025-23176
Tecnick – CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
[]
null
8.8
null
null
GHSA-q89f-q98p-7vmj
MSA FieldServer Gateway 5.0.0 through 6.5.2 allows cross-origin WebSocket hijacking.
[]
null
4.3
null
null
GHSA-hgwh-rmqp-9hq9
The cmd_boot function in app/aboot/aboot.c in the Little Kernel (LK) bootloader, as distributed with Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, allows attackers to bypass intended device-lock and kernel-signature restrictions by using fastboot mode in a boot command for an arbitrary kernel image.
[]
null
null
null
null
GHSA-jcrx-xhx2-r8m2
A privacy issue was addressed with improved private data redaction for log entries. This issue is fixed in macOS Sequoia 15.1. An app may be able to access information about a user's contacts.
[]
null
5.5
null
null
CVE-2017-11686
Zoho ManageEngine Event Log Analyzer 11.4 and 11.5 allows remote attackers to obtain an authenticated user's password via XSS vulnerabilities or sniffing non-SSL traffic on the network, because the password is represented in a cookie with a reversible encoding method.
[ "cpe:2.3:a:zohocorp:manageengine_eventlog_analyzer:11.4:*:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_eventlog_analyzer:11.5:*:*:*:*:*:*:*" ]
null
null
6.1
4.3
CVE-2011-5318
Multiple cross-site request forgery (CSRF) vulnerabilities in diafan.CMS before 5.1 allow remote attackers to hijack the authentication of administrators for requests that (1) modify articles via a save_post action to admin/news/saveNEWS_ID/, (2) modify settings via a save_post action to admin/site/save2/, or (3) modify credentials via a save_post action to admin/usersite/save2/.
[ "cpe:2.3:a:diafan:diafan.cms:*:*:*:*:*:*:*:*" ]
null
null
null
6.8
GHSA-79q2-v554-rhr4
The KiviCare WordPress plugin before 2.3.9 does not sanitise and escape some parameters before using them in SQL statements via the ajax_post AJAX action with the get_doctor_details route, leading to SQL Injections exploitable by unauthenticated users
[]
null
9.8
null
null
GHSA-x2qg-388q-986c
A vulnerability has been identified in SIMATIC S7-PLCSIM V17 (All versions), SIMATIC S7-PLCSIM V18 (All versions), SIMATIC STEP 7 Safety V17 (All versions), SIMATIC STEP 7 Safety V18 (All versions), SIMATIC STEP 7 Safety V19 (All versions), SIMATIC STEP 7 V17 (All versions), SIMATIC STEP 7 V18 (All versions), SIMATIC STEP 7 V19 (All versions), SIMATIC WinCC Unified PC Runtime V18 (All versions), SIMATIC WinCC Unified PC Runtime V19 (All versions), SIMATIC WinCC Unified V17 (All versions), SIMATIC WinCC Unified V18 (All versions), SIMATIC WinCC Unified V19 (All versions), SIMATIC WinCC V17 (All versions), SIMATIC WinCC V18 (All versions), SIMATIC WinCC V19 (All versions), SIMOCODE ES V17 (All versions), SIMOCODE ES V18 (All versions), SIMOCODE ES V19 (All versions), SIMOTION SCOUT TIA V5.4 SP3 (All versions), SIMOTION SCOUT TIA V5.5 SP1 (All versions), SIMOTION SCOUT TIA V5.6 SP1 (All versions), SINAMICS Startdrive V17 (All versions), SINAMICS Startdrive V18 (All versions), SINAMICS Startdrive V19 (All versions), SIRIUS Safety ES V17 (TIA Portal) (All versions), SIRIUS Safety ES V18 (TIA Portal) (All versions), SIRIUS Safety ES V19 (TIA Portal) (All versions), SIRIUS Soft Starter ES V17 (TIA Portal) (All versions), SIRIUS Soft Starter ES V18 (TIA Portal) (All versions), SIRIUS Soft Starter ES V19 (TIA Portal) (All versions), TIA Portal Cloud V17 (All versions), TIA Portal Cloud V18 (All versions), TIA Portal Cloud V19 (All versions). The affected devices do not properly sanitize user-controllable input when parsing user settings. This could allow an attacker to locally execute arbitrary commands in the host operating system with the privileges of the user.
[]
7
7.3
null
null
GHSA-hrx3-8v75-xqrh
A vulnerability in the CLI of Cisco NX-OS Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system of an affected device. The vulnerability is due to insufficient validation of arguments passed to certain CLI commands. An attacker could exploit this vulnerability by including malicious input as the argument of an affected command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with elevated privileges. An attacker would need valid administrator credentials to exploit this vulnerability. MDS 9000 Series Multilayer Switches are affected running software versions prior to 6.2(27) and 8.2(3). Nexus 3000 Series Switches are affected running software versions prior to 7.0(3)I4(9) and 7.0(3)I7(6). Nexus 3500 Platform Switches are affected running software versions prior to 6.0(2)A8(11) and 7.0(3)I7(6). Nexus 3600 Platform Switches are affected running software versions prior to 7.0(3)F3(5). Nexus 9000 Series Switches in Standalone NX-OS Mode are affected running software versions prior to 7.0(3)I4(9), 7.0(3)I7(6). Nexus 9500 R-Series Line Cards and Fabric Modules are affected running software versions prior to 7.0(3)F3(5). Nexus 7000 and 7700 Series Switches are affected running software versions prior to 6.2(22) and 8.2(3).
[]
null
6.7
null
null
CVE-2025-27591
A privilege escalation vulnerability existed in the Below service prior to v0.9.0 due to the creation of a world-writable directory at /var/log/below. This could have allowed local unprivileged users to escalate to root privileges through symlink attacks that manipulate files such as /etc/shadow.
[]
null
6.8
null
null
GHSA-47hc-24v5-rj9r
X-Man 1.0 has a SQL injection vulnerability, which can cause data leakage.
[]
null
7.5
null
null
CVE-2017-10061
Vulnerability in the PeopleSoft Enterprise PeopleTools component of Oracle PeopleSoft Products (subcomponent: Integration Broker). Supported versions that are affected are 8.54 and 8.55. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. While the vulnerability is in PeopleSoft Enterprise PeopleTools, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise PeopleTools accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise PeopleTools accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of PeopleSoft Enterprise PeopleTools. CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L).
[ "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.54:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.55:*:*:*:*:*:*:*" ]
null
null
8.3
7.5
CVE-2023-33860
IBM Security ReaQta information disclosure
IBM Security QRadar EDR 3.12 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the insecure link and the attacker can then obtain the cookie value by snooping the traffic.
[ "cpe:2.3:a:ibm:security_qradar_edr:3.12:*:*:*:*:*:*:*" ]
null
5.3
null
null
GHSA-8hc5-v62f-53vj
WampServer before 3.1.9 has CSRF in add_vhost.php because the synchronizer pattern implemented as remediation of CVE-2018-8817 was incomplete. An attacker could add/delete any vhosts without the consent of the owner.
[]
null
null
6.5
null
GHSA-8gcx-vcr8-7vhv
Dell EMC CloudLink 7.1 and all prior versions contain an Improper Input Validation Vulnerability. A remote low privileged attacker, may potentially exploit this vulnerability, leading to execution of arbitrary files on the server
[]
null
null
null
null
CVE-2022-29433
https://patchstack.com/database/vulnerability/nd-donations/wordpress-donations-plugin-1-8-authenticated-stored-cross-site-scripting-xss-vulnerability
Authenticated (contributor or higher role) Cross-Site Scripting (XSS) vulnerability in Donations plugin <= 1.8 on WordPress.
[ "cpe:2.3:a:donations_project:donations:*:*:*:*:*:wordpress:*:*" ]
null
4.1
null
null
GHSA-mp92-8wvj-jphh
An issue was discovered on Mitel 6869i through 4.5.0.41 and 5.x through 5.0.0.1018 devices. A command injection vulnerability exists in the hostname parameter taken in by the provis.html endpoint. The provis.html endpoint performs no sanitization on the hostname parameter (sent by an authenticated user), which is subsequently written to disk. During boot, the hostname parameter is executed as part of a series of shell commands. Attackers can achieve remote code execution in the root context by placing shell metacharacters in the hostname parameter.
[]
null
8.8
null
null
GHSA-5qhm-mrwg-x22r
Integer overflow in Adobe Acrobat 9.x before 9.2, 8.x before 8.1.7, and possibly 7.x through 7.1.4 might allow attackers to execute arbitrary code via unspecified vectors.
[]
null
null
null
null
CVE-2013-3961
SQL injection vulnerability in edit_event.php in Simple PHP Agenda before 2.2.9 allows remote authenticated users to execute arbitrary SQL commands via the eventid parameter.
[ "cpe:2.3:a:abeel:simple_php_agenda:*:*:*:*:*:*:*:*", "cpe:2.3:a:abeel:simple_php_agenda:0.1:*:*:*:*:*:*:*", "cpe:2.3:a:abeel:simple_php_agenda:0.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:abeel:simple_php_agenda:0.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:abeel:simple_php_agenda:0.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:abeel:simple_php_agenda:0.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:abeel:simple_php_agenda:0.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:abeel:simple_php_agenda:0.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:abeel:simple_php_agenda:0.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:abeel:simple_php_agenda:0.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:abeel:simple_php_agenda:0.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:abeel:simple_php_agenda:0.2.7:*:*:*:*:*:*:*", "cpe:2.3:a:abeel:simple_php_agenda:0.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:abeel:simple_php_agenda:0.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:abeel:simple_php_agenda:0.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:abeel:simple_php_agenda:0.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:abeel:simple_php_agenda:1.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:abeel:simple_php_agenda:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:abeel:simple_php_agenda:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:abeel:simple_php_agenda:2.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:abeel:simple_php_agenda:2.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:abeel:simple_php_agenda:2.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:abeel:simple_php_agenda:2.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:abeel:simple_php_agenda:2.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:abeel:simple_php_agenda:2.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:abeel:simple_php_agenda:2.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:abeel:simple_php_agenda:2.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:abeel:simple_php_agenda:2.2.7:*:*:*:*:*:*:*" ]
null
null
null
6.5
GHSA-rgm2-hxqf-7hh2
A perfaddormoddevicemonitor expression language injection remote code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07).
[]
null
null
null
null
PYSEC-2011-15
null
Cross-site scripting (XSS) vulnerability in the safe_html filter in Products.PortalTransforms in Plone 2.1 through 4.1 allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2010-2422.
[]
null
null
null
null
CVE-2016-6634
Cross-site scripting (XSS) vulnerability in the network settings page in WordPress before 4.5 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
[ "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*" ]
null
null
6.1
4.3
CVE-2006-3570
Cross-site scripting (XSS) vulnerability in the webform module in Drupal 4.6 before July 8, 2006 and 4.7 before July 8, 2006 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
[ "cpe:2.3:a:drupal:drupal:4.6:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:4.7:*:*:*:*:*:*:*" ]
null
null
null
4.3
CVE-2020-8940
Unchecked buffer overrun in enc_untrusted_recvmsg
An arbitrary memory read vulnerability in Asylo versions up to 0.6.0 allows an untrusted attacker to make a call to enc_untrusted_recvmsg using an attacker controlled result parameter. The parameter size is unchecked allowing the attacker to read memory locations outside of the intended buffer size including memory addresses within the secure enclave. We recommend upgrading or past commit fa6485c5d16a7355eab047d4a44345a73bc9131e
[ "cpe:2.3:a:google:asylo:*:*:*:*:*:*:*:*" ]
null
5.3
null
null
CVE-2025-25944
Buffer Overflow vulnerability in Bento4 v.1.6.0-641 allows a local attacker to execute arbitrary code via the Ap4RtpAtom.cpp, specifically in AP4_RtpAtom::AP4_RtpAtom, during the execution of mp4fragment with a crafted MP4 input file.
[]
null
7.3
null
null
CVE-2012-6059
The dissect_isakmp function in epan/dissectors/packet-isakmp.c in the ISAKMP dissector in Wireshark 1.6.x before 1.6.12 and 1.8.x before 1.8.4 uses an incorrect data structure to determine IKEv2 decryption parameters, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.
[ "cpe:2.3:a:wireshark:wireshark:1.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.6.3:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.6.4:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.6.5:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.6.6:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.6.7:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.6.8:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.6.9:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.6.10:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.6.11:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.8.0:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.8.2:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.8.3:*:*:*:*:*:*:*" ]
null
null
null
5
RHSA-2016:2614
Red Hat Security Advisory: pacemaker security and bug fix update
pacemaker: Privilege escalation due to improper guarding of IPC communication
[ "cpe:/o:redhat:enterprise_linux:7::server" ]
null
null
8.8
null
GHSA-v6hg-x8c9-r375
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.0.19, 3.5.x before 3.5.9, and 3.6.x before 3.6.2; Thunderbird before 3.0.4; and SeaMonkey before 2.0.4 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
[]
null
null
null
null
CVE-2020-27261
Omron CX-One
The Omron CX-One Version 4.60 and prior is vulnerable to a stack-based buffer overflow, which may allow an attacker to remotely execute arbitrary code.
[ "cpe:2.3:a:omron:cx-one:*:*:*:*:*:*:*:*", "cpe:2.3:a:omron:cx-position:*:*:*:*:*:*:*:*", "cpe:2.3:a:omron:cx-protocol:*:*:*:*:*:*:*:*", "cpe:2.3:a:omron:cx-server:*:*:*:*:*:*:*:*" ]
null
8.8
null
6.8
CVE-2020-14536
Vulnerability in the Oracle Commerce Guided Search / Oracle Commerce Experience Manager product of Oracle Commerce (component: Workbench). Supported versions that are affected are 11.0, 11.1, 11.2 and prior to 11.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Commerce Guided Search / Oracle Commerce Experience Manager. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Commerce Guided Search / Oracle Commerce Experience Manager accessible data as well as unauthorized access to critical data or complete access to all Oracle Commerce Guided Search / Oracle Commerce Experience Manager accessible data. CVSS 3.1 Base Score 7.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N).
[ "cpe:2.3:a:oracle:commerce_experience_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:commerce_guided_search:*:*:*:*:*:*:*:*" ]
null
7.4
null
null
GHSA-9pwg-j47x-j9gj
In the Linux kernel before 4.20.5, attackers can trigger a drivers/char/ipmi/ipmi_msghandler.c use-after-free and OOPS by arranging for certain simultaneous execution of the code, as demonstrated by a "service ipmievd restart" loop.
[]
null
7.5
null
null
CVE-2022-36558
Seiko SkyBridge MB-A100/A110 v4.2.0 and below implements a hard-coded passcode for the root account. Attackers are able to access the passcord via the file /etc/ciel.cfg.
[ "cpe:2.3:o:seiko-sol:skybridge_mb-a100_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:seiko-sol:skybridge_mb-a100:-:*:*:*:*:*:*:*", "cpe:2.3:o:seiko-sol:skybridge_mb-a110_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:seiko-sol:skybridge_mb-a110:-:*:*:*:*:*:*:*" ]
null
9.8
null
null
CVE-2025-21132
Substance3D - Stager | Out-of-bounds Write (CWE-787)
Substance3D - Stager versions 3.0.4 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[]
null
7.8
null
null
GHSA-x5rq-j2xg-h7qm
Regular Expression Denial of Service (ReDoS) in lodash
lodash prior to 4.7.11 is affected by: CWE-400: Uncontrolled Resource Consumption. The impact is: Denial of service. The component is: Date handler. The attack vector is: Attacker provides very long strings, which the library attempts to match using a regular expression. The fixed version is: 4.7.11.
[]
null
null
null
null
GHSA-h976-8v6c-8j56
In the Linux kernel, the following vulnerability has been resolved:net: dsa: bcm_sf2: don't use devres for mdiobusAs explained in commits: 74b6d7d13307 ("net: dsa: realtek: register the MDIO bus under devres") 5135e96a3dd2 ("net: dsa: don't allocate the slave_mii_bus using devres")mdiobus_free() will panic when called from devm_mdiobus_free() <- devres_release_all() <- __device_release_driver(), and that mdiobus was not previously unregistered.The Starfighter 2 is a platform device, so the initial set of constraints that I thought would cause this (I2C or SPI buses which call ->remove on ->shutdown) do not apply. But there is one more which applies here.If the DSA master itself is on a bus that calls ->remove from ->shutdown (like dpaa2-eth, which is on the fsl-mc bus), there is a device link between the switch and the DSA master, and device_links_unbind_consumers() will unbind the bcm_sf2 switch driver on shutdown.So the same treatment must be applied to all DSA switch drivers, which is: either use devres for both the mdiobus allocation and registration, or don't use devres at all.The bcm_sf2 driver has the code structure in place for orderly mdiobus removal, so just replace devm_mdiobus_alloc() with the non-devres variant, and add manual free where necessary, to ensure that we don't let devres free a still-registered bus.
[]
null
null
null
null
CVE-2019-13563
D-Link DIR-655 C devices before 3.02B05 BETA03 allow CSRF for the entire management console.
[ "cpe:2.3:o:dlink:dir-655_firmware:3.02b05:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:dir-655:c1:*:*:*:*:*:*:*" ]
null
8.8
null
6.8
GHSA-ppf4-9j93-82w7
A vulnerability has been identified in Solid Edge (All versions < V224.0 Update 2). The affected application is vulnerable to heap-based buffer overflow while parsing specially crafted PAR files. This could allow an attacker to execute code in the context of the current process.
[]
null
7.8
null
null
GHSA-vwpm-799j-8hxq
IBM Control Center 6.2.1 and 6.3.1could allow an authenticated user to obtain sensitive information exposed through a directory listing.
[]
null
4.3
null
null
CVE-2008-1351
SQL injection vulnerability in the Tutorials 2.1b module for XOOPS allows remote attackers to execute arbitrary SQL commands via the tid parameter to printpage.php, which is accessible directly or through a printpage action to index.php.
[ "cpe:2.3:a:xoops:tutoriais_module:2.1b:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2018-7631
Buffer Overflow in httpd in EpiCentro E_7.3.2+ allows attackers to execute code remotely via a specially crafted GET request without a leading "/" and without authentication.
[ "cpe:2.3:o:adbglobal:epicentro:7.3.2:*:*:*:*:*:*:*" ]
null
null
9.8
7.5
GHSA-8rrh-9958-v272
In validationtools, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed
[]
null
5.5
null
null
GHSA-23j3-qh8r-rpx6
Cross-site scripting vulnerability in L-Forum 2.40 and earlier, when the "Enable HTML in messages" option is off, allows remote attackers to insert arbitrary script or HTML via message fields including (1) From, (2) E-Mail, and (3) Subject.
[]
null
null
null
null
CVE-2007-3695
Buffer overflow in LICRCMD.EXE in CA ERwin Process Modeler (formerly AllFusion Process Modeler) 7.1 allows attackers to execute arbitrary code via a long filename. NOTE: the researcher does not suggest any circumstances in which the filename would come from an untrusted source, and therefore perhaps the issue does not cross privilege boundaries and should not be included in CVE.
[ "cpe:2.3:a:broadcom:erwin_process_modeler:7.1:*:*:*:*:*:*:*" ]
null
null
null
10
GHSA-425g-3v2m-rf2q
dingfanzu CMS V1.0 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /admin/doAdminAction.php?act=addAdmin.
[]
null
9.3
null
null
CVE-2019-4701
IBM Security Guardium Data Encryption (GDE) 3.0.0.2 is deployed with active debugging code that can create unintended entry points. IBM X-Force ID: 171936.
[ "cpe:2.3:a:ibm:guardium_data_encryption:3.0.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:guardium_for_cloud_key_management:*:*:*:*:*:*:*:*" ]
null
null
5.3
null
ICSA-21-056-04
ProSoft Technology ICX35
Changing the password on the module webpage does not require the user to type in the current password first. Thus, the password could be changed by a user or external process without knowledge of the current password.CVE-2021-22661 has been assigned to this vulnerability. A CVSS v3 base score of 8.2 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L).
[]
null
null
8.2
null
CVE-2017-17472
TG Soft Vir.IT eXplorer Lite 8.5.42 allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact via a \\.\Viragtlt DeviceIoControl request of 0x82730030.
[ "cpe:2.3:a:tgsoft:vir.it_explorer:8.5.42:*:*:*:lite:*:*:*" ]
null
null
7.8
6.1
CVE-2022-24082
If an on-premise installation of the Pega Platform is configured with the port for the JMX interface exposed to the Internet and port filtering is not properly configured, then it may be possible to upload serialized payloads to attack the underlying system. This does not affect systems running on PegaCloud due to its design and architecture.
[ "cpe:2.3:a:pega:infinity:*:*:*:*:*:*:*:*" ]
null
null
9.8
null
GHSA-8ph9-x262-cchw
The _gnutls_x509_verify_certificate function in lib/x509/verify.c in libgnutls in GnuTLS before 2.6.1 trusts certificate chains in which the last certificate is an arbitrary trusted, self-signed certificate, which allows man-in-the-middle attackers to insert a spoofed certificate for any Distinguished Name (DN).
[]
null
5.9
null
null
GHSA-j939-hwr4-9qqc
The hso_get_count function in drivers/net/usb/hso.c in the Linux kernel before 2.6.36-rc5 does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via a TIOCGICOUNT ioctl call.
[]
null
null
null
null
GHSA-v4j6-g54m-mcxj
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Console). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle WebLogic Server. CVSS 3.0 Base Score 4.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L).
[]
null
4.3
null
null
GHSA-pvvp-x5gj-xmcr
libxcrypt in SUSE openSUSE 11.0 uses the DES algorithm when the configuration specifies the MD5 algorithm, which makes it easier for attackers to conduct brute-force attacks against hashed passwords.
[]
null
7.5
null
null
RHSA-2012:1593
Red Hat Security Advisory: JBoss Enterprise SOA Platform 5.3.0 update
apache-cxf: Apache CXF does not verify that elements were signed / encrypted by a particular Supporting Token
[ "cpe:/a:redhat:jboss_enterprise_soa_platform:5.3" ]
null
null
null
null
GHSA-89gq-fxm9-f6xg
An issue was discovered in AUO Solar Data Recorder before 1.3.0. The web portal uses HTTP Basic Authentication and provides the account and password in the WWW-Authenticate attribute. By using this account and password, anyone can login successfully.
[]
null
null
9.8
null
GHSA-54vm-jhgv-phv5
In the Linux kernel, the following vulnerability has been resolved:drivers: staging: rtl8192bs: Fix deadlock in rtw_joinbss_event_prehandle()There is a deadlock in rtw_joinbss_event_prehandle(), which is shown below:(Thread 1) | (Thread 2) | _set_timer() rtw_joinbss_event_prehandle()| mod_timer() spin_lock_bh() //(1) | (wait a time) ... | _rtw_join_timeout_handler() del_timer_sync() | spin_lock_bh() //(2) (wait timer to stop) | ...We hold pmlmepriv->lock in position (1) of thread 1 and use del_timer_sync() to wait timer to stop, but timer handler also need pmlmepriv->lock in position (2) of thread 2. As a result, rtw_joinbss_event_prehandle() will block forever.This patch extracts del_timer_sync() from the protection of spin_lock_bh(), which could let timer handler to obtain the needed lock. What`s more, we change spin_lock_bh() to spin_lock_irq() in _rtw_join_timeout_handler() in order to prevent deadlock.
[]
null
5.5
null
null
GHSA-gfxg-882h-6vf5
The integrity check feature in OpenPGP, when handling a message that was encrypted using cipher feedback (CFB) mode, allows remote attackers to recover part of the plaintext via a chosen-ciphertext attack when the first 2 bytes of a message block are known, and an oracle or other mechanism is available to determine whether an integrity check failed.
[]
null
null
null
null
CVE-2020-10289
RVD#2401: Use of unsafe yaml load, ./src/actionlib/tools/library.py:132
Use of unsafe yaml load. Allows instantiation of arbitrary objects. The flaw itself is caused by an unsafe parsing of YAML values which happens whenever an action message is processed to be sent, and allows for the creation of Python objects. Through this flaw in the ROS core package of actionlib, an attacker with local or remote access can make the ROS Master, execute arbitrary code in Python form. Consider yaml.safe_load() instead. Located first in actionlib/tools/library.py:132. See links for more info on the bug.
[ "cpe:2.3:o:openrobotics:robot_operating_system:-:*:*:*:*:*:*:*" ]
null
null
8
null
GHSA-j8pm-8jqg-vg5f
cmds/servicemanager/service_manager.c in Android before commit 7d42a3c31ba78a418f9bdde0e0ab951469f321b5 allows attackers to cause a denial of service (NULL pointer dereference, or out-of-bounds write) via vectors related to binder passed lengths.
[]
null
null
7.5
null
CVE-2020-20125
EARCLINK ESPCMS-P8 contains a cross-site scripting (XSS) vulnerability in espcms_web\espcms_load.php.
[ "cpe:2.3:a:earclink:espcms-p8:-:*:*:*:*:*:*:*" ]
null
6.1
null
4.3
GHSA-jpw9-fm6r-w3ph
Inappropriate implementation in WebAuthentication in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
[]
null
null
null
null
CVE-2021-22775
A CWE-427: Uncontrolled Search Path Element vulnerability exists in GP-Pro EX,V4.09.250 and prior, that could cause local code execution with elevated privileges when installing the software.
[ "cpe:2.3:a:schneider-electric:gp-pro_ex:*:*:*:*:*:*:*:*" ]
null
7.8
null
4.4
GHSA-9p7x-652m-pw9q
The Web Application Firewall plugin for WordPress is vulnerable to IP Address Spoofing in versions up to, and including, 2.1.2. This is due to insufficient restrictions on where the IP Address information is being retrieved for request logging and login restrictions. Attackers can supply the X-Forwarded-For header with with a different IP Address that will be logged and can be used to bypass settings that may have blocked out an IP address or country from logging in.
[]
null
5.3
null
null
CVE-2022-43563
Risky command safeguards bypass via rex search command field names in Splunk Enterprise
In Splunk Enterprise versions below 8.2.9 and 8.1.12, the way that the rex search command handles field names lets an attacker bypass SPL safeguards for risky commands https://docs.splunk.com/Documentation/SplunkCloud/latest/Security/SPLsafeguards . The vulnerability requires the attacker to phish the victim by tricking them into initiating a request within their browser. The attacker cannot exploit the vulnerability at will.
[ "cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*", "cpe:2.3:a:splunk:splunk_cloud_platform:*:*:*:*:*:*:*:*" ]
null
8.1
null
null
CVE-2018-0900
The Windows kernel in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and 1709, Windows Server 2016 and Windows Server, version 1709 allows an information disclosure vulnerability due to the way memory addresses are handled, aka "Windows Kernel Information Disclosure Vulnerability". This CVE is unique from CVE-2018-0811, CVE-2018-0813, CVE-2018-0814, CVE-2018-0894, CVE-2018-0895, CVE-2018-0896, CVE-2018-0897, CVE-2018-0898, CVE-2018-0899, CVE-2018-0901 and CVE-2018-0926.
[ "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*" ]
null
null
4.7
1.9
GHSA-pxmf-hj8c-p8f5
A Reflected Cross Site Scripting (XSS) vulnerability exists in the authorization function exposed by RESTful Web Api of IBM Worklight Framework 6.1, 6.2, 6.3, 7.0, 7.1, and 8.0. The vulnerable parameter is "scope"; if you set as its value a "realm" not defined in authenticationConfig.xml, you get an HTTP 403 Forbidden response and the value will be reflected in the body of the HTTP response. By setting it to arbitrary JavaScript code it is possible to modify the flow of the authorization function, potentially leading to credential disclosure within a trusted session.
[]
null
null
6.1
null
CVE-2024-31395
Cross-site scripting vulnerability exists in a-blog cms Ver.3.1.x series versions prior to Ver.3.1.12, Ver.3.0.x series versions prior to Ver.3.0.32, Ver.2.11.x series versions prior to Ver.2.11.61, Ver.2.10.x series versions prior to Ver.2.10.53, and Ver.2.9 and earlier versions. If this vulnerability is exploited, a user with an editor or higher privilege who can log in to the product may execute an arbitrary script on the web browser of the user who accessed the schedule management page.
[]
null
6.1
null
null
ICSA-21-061-01
Hitachi ABB Power Grids Ellipse EAM
An attacker could exploit this vulnerability by tricking a user to click on a link containing malicious code that would then be run by the web browser. This can result in the compromise of confidential information, or even the takeover of the user 's session.CVE-2021-27416 has been assigned to this vulnerability. A CVSS v3 base score of 5.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L). An attacker could trick a user into visiting a malicious website posing as a login page for the Ellipse application and gather authentication credentials.CVE-2021-27414 has been assigned to this vulnerability. A CVSS v3 base score of 5.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L).
[]
null
null
5.5
null
GHSA-mh8r-x9cq-9xpw
Cross-site scripting (XSS) vulnerability in register.html in PHPShop 2.1 EE and earlier allows remote attackers to inject arbitrary web script or HTML via the name_new parameter.
[]
null
null
null
null
GHSA-pp59-86jf-38h5
CVA6 commit 909d85a accesses invalid memory when reading the value of MHPMCOUNTER30.
[]
null
7.5
null
null
CVE-2021-45079
In strongSwan before 5.9.5, a malicious responder can send an EAP-Success message too early without actually authenticating the client and (in the case of EAP methods with mutual authentication and EAP-only authentication for IKEv2) even without server authentication.
[ "cpe:2.3:a:strongswan:strongswan:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", "cpe:2.3:a:fedoraproject:extra_packages_for_enterprise_linux:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:fedoraproject:extra_packages_for_enterprise_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:fedoraproject:extra_packages_for_enterprise_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:21.10:*:*:*:*:*:*:*" ]
null
9.1
null
5.8
RHSA-2021:3873
Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.2.9 security, bug, and container updates
semver-regex: inefficient regular expression complexity nginx: Off-by-one in ngx_resolver_copy() when labels are followed by a pointer to a root domain name object-path: Type confusion vulnerability can lead to a bypass of CVE-2020-15256 nodejs-set-value: type confusion allows bypass of CVE-2019-10747 redis: Lua scripts can overflow the heap-based Lua stack redis: Integer overflow issue with Streams redis: Integer overflow bug in the ziplist data structure redis: Out of bounds read in lua debugger protocol parser redis: Denial of service via Redis Standard Protocol (RESP) request redis: Integer overflow issue with intsets redis: Integer overflow issue with strings
[ "cpe:/a:redhat:acm:2.2::el7", "cpe:/a:redhat:acm:2.2::el8" ]
null
7.5
null
null
CVE-2020-25278
An issue was discovered on Samsung mobile devices with O(8.x), P(9.0), and Q(10.0) software. The Quram image codec library allows attackers to overwrite memory and execute arbitrary code via crafted JPEG data that is mishandled during decoding. The Samsung IDs are SVE-2020-18088, SVE-2020-18225, SVE-2020-18301 (September 2020).
[ "cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*" ]
null
9.8
null
7.5