id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
197k
cpes
listlengths
0
4.89k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
GHSA-wr46-prmv-f8jh
In app uninstallation, there is a possible set of permissions that may not be removed from a shared app ID. This could lead to a local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-10 Android ID: A-116608833
[]
null
null
null
null
GHSA-x34j-6mpj-mxmm
PHP remote file inclusion vulnerability in MOD_forum_fields_parse.php in the Forum picture and META tags 1.7 module for phpBB allows remote attackers to execute arbitrary PHP code via a URL in the phpbb_root_path parameter.
[]
null
null
null
null
CVE-2019-14257
pyraw in Zenoss 2.5.3 allows local privilege escalation by modifying environment variables to redirect execution before privileges are dropped, aka ZEN-31765.
[ "cpe:2.3:a:zenoss:zenoss:2.5.3:*:*:*:*:*:*:*" ]
null
null
7.8
7.2
CVE-2020-26297
XSS in mdBook's search page
mdBook is a utility to create modern online books from Markdown files and is written in Rust. In mdBook before version 0.4.5, there is a vulnerability affecting the search feature of mdBook, which could allow an attacker to execute arbitrary JavaScript code on the page. The search feature of mdBook (introduced in version 0.1.4) was affected by a cross site scripting vulnerability that allowed an attacker to execute arbitrary JavaScript code on an user's browser by tricking the user into typing a malicious search query, or tricking the user into clicking a link to the search page with the malicious search query prefilled. mdBook 0.4.5 fixes the vulnerability by properly escaping the search query. Owners of websites built with mdBook have to upgrade to mdBook 0.4.5 or greater and rebuild their website contents with it.
[ "cpe:2.3:a:rust-lang:mdbook:*:*:*:*:*:rust:*:*" ]
null
8.2
null
null
CVE-2006-7126
SQL injection vulnerability in Joomla BSQ Sitestats 1.8.0 and 2.2.1 allows remote attackers to execute arbitrary SQL commands via the query string, possibly PHP_SELF.
[ "cpe:2.3:a:joomla:bsq_sitestats:1.8.0:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:bsq_sitestats:2.1.1:*:*:*:*:*:*:*" ]
null
null
null
6.8
CVE-2014-5324
Unrestricted file upload vulnerability in the N-Media file uploader plugin before 3.4 for WordPress allows remote authenticated users to execute arbitrary PHP code by leveraging Author privileges to store a file.
[ "cpe:2.3:a:najeebmedia:n-media_file_uploader:*:*:*:*:*:wordpress:*:*", "cpe:2.3:a:najeebmedia:n-media_file_uploader:3.0:*:*:*:*:wordpress:*:*", "cpe:2.3:a:najeebmedia:n-media_file_uploader:3.1:*:*:*:*:wordpress:*:*", "cpe:2.3:a:najeebmedia:n-media_file_uploader:3.2:*:*:*:*:wordpress:*:*" ]
null
null
null
6.5
CVE-2020-25756
A buffer overflow vulnerability exists in the mg_get_http_header function in Cesanta Mongoose 6.18 due to a lack of bounds checking. A crafted HTTP header can exploit this bug. NOTE: a committer has stated "this will not happen in practice.
[ "cpe:2.3:a:cesanta:mongoose:6.18:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
CVE-2020-1289
A spoofing vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server, aka 'Microsoft SharePoint Spoofing Vulnerability'. This CVE ID is unique from CVE-2020-1148.
[ "cpe:2.3:a:microsoft:sharepoint_foundation:2010:sp2:*:*:*:*:*:*" ]
null
5.4
null
3.5
CVE-2012-5192
Directory traversal vulnerability in gmap/view_overlay.php in Bitweaver 2.8.1 and earlier allows remote attackers to read arbitrary files via "''%2F" (dot dot encoded slash) sequences in the overlay_type parameter.
[ "cpe:2.3:a:bitweaver:bitweaver:*:*:*:*:*:*:*:*", "cpe:2.3:a:bitweaver:bitweaver:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:bitweaver:bitweaver:1.1.1_beta:*:*:*:*:*:*:*", "cpe:2.3:a:bitweaver:bitweaver:1.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:bitweaver:bitweaver:1.3:*:*:*:*:*:*:*", "cpe:2.3:a:bitweaver:bitweaver:1.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:bitweaver:bitweaver:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:bitweaver:bitweaver:2.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:bitweaver:bitweaver:2.5:*:*:*:*:*:*:*", "cpe:2.3:a:bitweaver:bitweaver:2.6:*:*:*:*:*:*:*", "cpe:2.3:a:bitweaver:bitweaver:2.7:*:*:*:*:*:*:*" ]
null
null
null
5
CVE-2021-28950
An issue was discovered in fs/fuse/fuse_i.h in the Linux kernel before 5.11.8. A "stall on CPU" can occur because a retry loop continually finds the same bad inode, aka CID-775c5033a0d1.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" ]
null
5.5
null
2.1
CVE-2017-10355
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
[ "cpe:2.3:a:oracle:jdk:1.6.0:update161:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update151:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.9.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update161:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update151:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.9.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:jrockit:r28.3.15:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*", "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*", "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*", "cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*", "cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*", "cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*", "cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*", "cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*", "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*", "cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*", "cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*", "cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*", "cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*", "cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*", "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" ]
null
5.3
null
5
GHSA-4mxc-25gg-cmp8
IBM WebSphere Application Server 7.0, 8.0, 8.5, and 9.0 could allow remote attackers to execute arbitrary Java code through an administrative client class with a serialized object from untrusted sources. IBM X-Force ID: 152533.
[]
null
null
9.8
null
GHSA-qjrv-wmmp-jvg2
The ipxitf_ioctl function in net/ipx/af_ipx.c in the Linux kernel through 4.11.1 mishandles reference counts, which allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a failed SIOCGIFADDR ioctl call for an IPX interface.
[]
null
null
7.8
null
CVE-2020-7037
Avaya Equinox Conferencing XXE vulnerability
An XML External Entities (XXE) vulnerability in Media Server component of Avaya Equinox Conferencing could allow an authenticated, remote attacker to gain read access to information that is stored on an affected system or even potentially lead to a denial of service. The affected versions of Avaya Equinox Conferencing includes all 9.x versions before 9.1.11. Equinox Conferencing is now offered as Avaya Meetings Server.
[ "cpe:2.3:a:avaya:equinox_conferencing:*:*:*:*:*:*:*:*" ]
null
8.1
null
null
GHSA-89g3-3wcc-6vq4
The RSVP and Event Management plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on several AJAX functions like bulk_delete_attendees() and bulk_delete_questions() in all versions up to, and including, 2.7.13. This makes it possible for unauthenticated attackers to delete questions and attendees and for authenticated users to update question menu orders.
[]
null
5.3
null
null
GHSA-g872-jwwr-vggm
Admidio Vulnerable to RCE via Arbitrary File Upload in Message Attachment
Description:Remote Code Execution Vulnerability has been identified in the Message module of the Admidio Application, where it is possible to upload a PHP file in the attachment. The uploaded file can be accessed publicly through the URL `{admidio_base_url}/adm_my_files/messages_attachments/{file_name}`.The vulnerability is caused due to the lack of file extension verification, allowing malicious files to be uploaded to the server and public availability of the uploaded file.An attacker can upload a PHP web shell that executes OS commands on the server, compromising the application server.Note: I am using the docker-compose.yaml file from https://github.com/Admidio/admidio/blob/master/README-Docker.md#docker-compose-usage official documentation.Impact:An attacker can exploit this flaw to upload a PHP web shell, which can be used to execute arbitrary commands on the server. This can lead to a complete compromise of the application server, allowing the attacker to:Execute arbitrary code or commands.Access, modify, or delete sensitive data.Install malicious software or scripts.Gain further access to internal networks.Disrupt services and applications hosted on the server.Recommendation:Implement strict file extension verification to ensure that only allowed file types (e.g., images, documents) can be uploaded.Reject any file upload with disallowed or suspicious extensions such as .php, .phtml, .exe, etc.Steps to Reproduce:As a member user, go to write an email message.Upload a PHP file in the Attachment, containing the following content:Send the email.In the message history go to the sent message.Download the file, to get the uploaded file name.Go to the following URL: `{admidio_base_url}/adm_my_files/messages_attachments/{file_name}?command=cat+/etc/passwd`The server's passwd file would be returned in the response.Proof Of Concept:![image](https://github.com/Admidio/admidio/assets/59286712/51b524de-ec51-4875-80e9-e2037da9c573)_Figure 1: Code of messages_send.php, not having file extension verification._![image](https://github.com/Admidio/admidio/assets/59286712/74b47e6d-e2e9-4535-82e3-d6ad2f677361)_Figure 2: Uploading Webshell as attachment._![image](https://github.com/Admidio/admidio/assets/59286712/abea26eb-b36f-46db-9e3a-8a4ba82d9740)_Figure 3: Download the uploaded file to get the uploaded file name._![image](https://github.com/Admidio/admidio/assets/59286712/fbb14aae-d5c6-454b-bafa-8d03d6d8a208)_Figure 4: Uploaded File name._![image](https://github.com/Admidio/admidio/assets/59286712/f8436248-1768-4714-ad2d-87f157145c61)_Figure 5: RCE via web shell._![image](https://github.com/Admidio/admidio/assets/59286712/edc5b992-227f-43f9-bef9-87959766a63c)_Figure 6: RCE via Webshell._
[]
9.3
9
null
null
GHSA-47pj-q2vm-46xc
Collection.js vulnerable to Prototype Pollution
Versions of the package collection.js before 6.8.1 are vulnerable to Prototype Pollution via the `extend` function in `Collection.js/dist/node/iterators/extend.js`.
[]
null
7.5
null
null
CVE-2025-25125
WordPress Fyrebox Quizzes plugin <= 2.7 - CSRF to Stored XSS vulnerability
Cross-Site Request Forgery (CSRF) vulnerability in CyrilG Fyrebox Quizzes allows Stored XSS. This issue affects Fyrebox Quizzes: from n/a through 2.7.
[]
null
7.1
null
null
CVE-2023-1330
Redirection < 1.1.4 - Redirect Creation via CSRF
The Redirection WordPress plugin before 1.1.4 does not add nonce verification in place when adding the redirect, which could allow attackers to add redirects via a CSRF attack.
[ "cpe:2.3:a:inisev:redirection:*:*:*:*:*:wordpress:*:*" ]
null
6.5
null
null
CVE-2017-17480
In OpenJPEG 2.3.0, a stack-based buffer overflow was discovered in the pgxtovolume function in jp3d/convert.c. The vulnerability causes an out-of-bounds write, which may lead to remote denial of service or possibly remote code execution.
[ "cpe:2.3:a:uclouvain:openjpeg:2.3.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*" ]
null
9.8
null
7.5
GHSA-2c3g-5x92-qfrv
Local privilege escalation due to insecure folder permissions. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 39900.
[]
null
7.8
null
null
CVE-2022-38997
The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality.
[ "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:2.1:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*" ]
null
7.5
null
null
RHSA-2025:0063
Red Hat Security Advisory: kernel security update
kernel: i40e: Do not allow untrusted VF to remove administratively set MAC kernel: net/sched: Fix UAF when resolving a clash kernel: mptcp: cope racing subflow creation in mptcp_rcv_space_adjust
[ "cpe:/a:redhat:rhel_eus:9.2::appstream", "cpe:/a:redhat:rhel_eus:9.2::crb", "cpe:/o:redhat:rhel_eus:9.2::baseos" ]
null
5.9
null
null
CVE-2018-14773
An issue was discovered in Http Foundation in Symfony 2.7.0 through 2.7.48, 2.8.0 through 2.8.43, 3.3.0 through 3.3.17, 3.4.0 through 3.4.13, 4.0.0 through 4.0.13, and 4.1.0 through 4.1.2. It arises from support for a (legacy) IIS header that lets users override the path in the request URL via the X-Original-URL or X-Rewrite-URL HTTP request header. These headers are designed for IIS support, but it's not verified that the server is in fact running IIS, which means anybody who can send these requests to an application can trigger this. This affects \Symfony\Component\HttpFoundation\Request::prepareRequestUri() where X-Original-URL and X_REWRITE_URL are both used. The fix drops support for these methods so that they cannot be used as attack vectors such as web cache poisoning.
[ "cpe:2.3:a:sensiolabs:symfony:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*" ]
null
6.5
null
4
CVE-2018-20940
cPanel before 68.0.27 allows attackers to read root's crontab file during a short time interval upon the enabling of backups (SEC-342).
[ "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*" ]
null
null
3.3
2.1
GHSA-7g99-j2h6-cvr3
The Facetag extension 0.0.3 for Piwigo allows XSS via the name parameter to ws.php in a facetag.changeTag action.
[]
null
null
6.1
null
CVE-2009-2803
CarbonCore in Apple Mac OS X 10.4.11 and 10.5.8 allows attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a file with a crafted resource fork.
[ "cpe:2.3:o:apple:mac_os_x:10.4.11:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.5.8:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.4.11:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.5.8:*:*:*:*:*:*:*" ]
null
null
null
6.8
RHSA-2008:0825
Red Hat Security Advisory: JBoss Enterprise Application Platform 4.2.0.CP03 security update
Cross-site scripting (XSS) vulnerability in Sun Java Server Faces JBossEAP status servlet info leak
[ "cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0::el4" ]
null
null
null
null
RHSA-2024:1150
Red Hat Security Advisory: buildah security update
ssh: Prefix truncation attack on Binary Packet Protocol (BPP)
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
5.9
null
null
CVE-2020-1827
Huawei NIP6800 versions V500R001C30, V500R001C60SPC500, and V500R005C00SPC100; and Secospace USG6600 and USG9500 versions V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, and V500R005C00SPC100 have an information leakage vulnerability. An attacker can exploit this vulnerability by sending specific request packets to affected devices. Successful exploit may lead to information leakage.
[ "cpe:2.3:o:huawei:nip6800_firmware:v500r001c30:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:nip6800_firmware:v500r001c60spc500:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:nip6800_firmware:v500r005c00spc100:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc200:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc600:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60spc500:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r005c00spc100:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc200:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc600:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:usg9500_firmware:v500r001c60spc500:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:usg9500_firmware:v500r005c00spc100:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*" ]
null
7.5
null
5
CVE-2004-0417
Integer overflow in the "Max-dotdot" CVS protocol command (serve_max_dotdot) for CVS 1.12.x through 1.12.8, and 1.11.x through 1.11.16, may allow remote attackers to cause a server crash, which could cause temporary data to remain undeleted and consume disk space.
[ "cpe:2.3:a:cvs:cvs:1.10.7:*:*:*:*:*:*:*", "cpe:2.3:a:cvs:cvs:1.10.8:*:*:*:*:*:*:*", "cpe:2.3:a:cvs:cvs:1.11:*:*:*:*:*:*:*", "cpe:2.3:a:cvs:cvs:1.11.1:*:*:*:*:*:*:*", "cpe:2.3:a:cvs:cvs:1.11.1_p1:*:*:*:*:*:*:*", "cpe:2.3:a:cvs:cvs:1.11.2:*:*:*:*:*:*:*", "cpe:2.3:a:cvs:cvs:1.11.3:*:*:*:*:*:*:*", "cpe:2.3:a:cvs:cvs:1.11.4:*:*:*:*:*:*:*", "cpe:2.3:a:cvs:cvs:1.11.5:*:*:*:*:*:*:*", "cpe:2.3:a:cvs:cvs:1.11.6:*:*:*:*:*:*:*", "cpe:2.3:a:cvs:cvs:1.11.10:*:*:*:*:*:*:*", "cpe:2.3:a:cvs:cvs:1.11.11:*:*:*:*:*:*:*", "cpe:2.3:a:cvs:cvs:1.11.14:*:*:*:*:*:*:*", "cpe:2.3:a:cvs:cvs:1.11.15:*:*:*:*:*:*:*", "cpe:2.3:a:cvs:cvs:1.11.16:*:*:*:*:*:*:*", "cpe:2.3:a:cvs:cvs:1.12.1:*:*:*:*:*:*:*", "cpe:2.3:a:cvs:cvs:1.12.2:*:*:*:*:*:*:*", "cpe:2.3:a:cvs:cvs:1.12.5:*:*:*:*:*:*:*", "cpe:2.3:a:cvs:cvs:1.12.7:*:*:*:*:*:*:*", "cpe:2.3:a:cvs:cvs:1.12.8:*:*:*:*:*:*:*", "cpe:2.3:a:openpkg:openpkg:*:*:*:*:*:*:*:*", "cpe:2.3:a:openpkg:openpkg:1.3:*:*:*:*:*:*:*", "cpe:2.3:a:openpkg:openpkg:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:sgi:propack:2.4:*:*:*:*:*:*:*", "cpe:2.3:a:sgi:propack:3.0:*:*:*:*:*:*:*", "cpe:2.3:o:gentoo:linux:1.4:*:*:*:*:*:*:*", "cpe:2.3:o:openbsd:openbsd:*:*:*:*:*:*:*:*", "cpe:2.3:o:openbsd:openbsd:3.4:*:*:*:*:*:*:*", "cpe:2.3:o:openbsd:openbsd:3.5:*:*:*:*:*:*:*" ]
null
null
null
5
RHSA-2022:2196
Red Hat Security Advisory: .NET 5.0 on RHEL 7 security and bugfix update
dotnet: excess memory allocation via HttpClient causes DoS dotnet: malicious content causes high CPU and memory usage dotnet: parsing HTML causes Denial of Service
[ "cpe:/a:redhat:rhel_dotnet:5.0::el7" ]
null
7.5
null
null
CVE-2020-26897
Certain NETGEAR devices are affected by disclosure of administrative credentials. This affects CBR40 before 2.5.0.10, RBK752 before 3.2.15.25, RBR750 before 3.2.15.25, RBS750 before 3.2.15.25, RBK852 before 3.2.10.11, RBR850 before 3.2.10.11, and RBS850 before 3.2.10.11.
[ "cpe:2.3:o:netgear:cbr40_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:cbr40:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:rbk752_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:rbk752:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:rbr750_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:rbr750:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:rbs750_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:rbs750:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:rbk852_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:rbk852:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:rbr850_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:rbr850:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:rbs850_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:rbs850:-:*:*:*:*:*:*:*" ]
null
9.6
null
null
GHSA-cg82-hjjv-j6cv
Information disclosure due to lack of address range check done on the SysDBG buffers in SDI code. in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking in APQ8009, APQ8017, APQ8053, MDM9205, MSM8905, MSM8909, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8998, Nicobar, QCS404, QCS405, QCS605, QM215, SDA660, SDA845, SDM429, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, Snapdragon_High_Med_2016, SXR1130
[]
null
null
null
null
GHSA-wrv9-wmj5-v6r7
Hospital Management System v4.0 was discovered to contain a blind SQL injection vulnerability via the register function in func2.php.
[]
null
7.5
null
null
GHSA-46fc-9xfj-r45q
member2.php in vBulletin 2.2.9 and earlier does not properly restrict the $perpage variable to be an integer, which causes an error message to be reflected back to the user without quoting, which facilitates cross-site scripting (XSS) and possibly other attacks.
[]
null
null
null
null
GHSA-7g9c-8m96-pfwh
PHP remote file inclusion vulnerability in article.php in ACGV News 0.9.1 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the PathNews parameter.
[]
null
null
null
null
GHSA-jvjg-hq5c-v4vm
The start function in class.t3lib_formmail.php in TYPO3 before 4.0.5, 4.1beta, and 4.1RC1 allows attackers to inject arbitrary email headers via unknown vectors. NOTE: some details were obtained from third party information.
[]
null
null
null
null
CVE-2024-45271
MB connect line/Helmholz: Remote code execution due to improper input validation
An unauthenticated local attacker can gain admin privileges by deploying a config file due to improper input validation.
[ "cpe:2.3:a:mb_connect_line:mbnet.mini:*:*:*:*:*:*:*:*", "cpe:2.3:a:rex100:helmholz:*:*:*:*:*:*:*:*", "cpe:2.3:o:mbconnectline:mbnet.mini_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:mbconnectline:mbnet.mini:-:*:*:*:*:*:*:*", "cpe:2.3:o:helmholz:rex_100_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:helmholz:rex_100:-:*:*:*:*:*:*:*" ]
null
8.4
null
null
GHSA-9xvg-x75r-p5hp
A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 12.1.3, tvOS 12.1.2, Safari 12.0.3, iTunes 12.9.3 for Windows, iCloud for Windows 7.10. Processing maliciously crafted web content may lead to arbitrary code execution.
[]
null
null
8.8
null
CVE-2001-0556
The Nirvana Editor (NEdit) 5.1.1 and earlier allows a local attacker to overwrite other users' files via a symlink attack on (1) backup files or (2) temporary files used when nedit prints a file or portions of a file.
[ "cpe:2.3:a:nedit:nedit:*:*:*:*:*:*:*:*" ]
null
null
null
7.2
CVE-2009-1861
Multiple heap-based buffer overflows in Adobe Reader 7 and Acrobat 7 before 7.1.3, Adobe Reader 8 and Acrobat 8 before 8.1.6, and Adobe Reader 9 and Acrobat 9 before 9.1.2 might allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted PDF file with a JPX (aka JPEG2000) stream that triggers heap memory corruption.
[ "cpe:2.3:a:adobe:acrobat:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0:*:professional:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0:*:standard:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.1:*:professional:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.1:*:standard:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.2:*:professional:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.2:*:standard:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.3:*:professional:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.3:*:standard:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.4:*:professional:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.4:*:standard:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.5:*:professional:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.5:*:standard:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.6:*:professional:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.6:*:standard:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.7:*:professional:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.7:*:standard:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.8:*:elements:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.8:*:professional:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.8:*:standard:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.0.9:*:professional:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.1:*:professional:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.1:*:standard:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:7.1.1:*:standard:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.0:*:professional:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.0:*:standard:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1:*:standard:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1.1:*:professional:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1.1:*:standard:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1.2:*:professional:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1.2:*:standard:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1.2:security_update:professional:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1.3:*:professional:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1.3:*:standard:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1.4:*:professional:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1.4:*:standard:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.0:*:standard:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.1:*:standard:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:7.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:7.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:7.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:7.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:7.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:7.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:7.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:7.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:7.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:7.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:7.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:8.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:8.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:8.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:8.1.2:security_update:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:8.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:8.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:8.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:9:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:9.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:9.1.1:*:*:*:*:*:*:*" ]
null
null
null
9.3
CVE-2009-2051
Cisco IOS 12.2 through 12.4 and 15.0 through 15.1, Cisco IOS XE 2.5.x and 2.6.x before 2.6.1, and Cisco Unified Communications Manager (aka CUCM, formerly CallManager) 4.x, 5.x before 5.1(3g), 6.x before 6.1(4), and 7.x before 7.1(2) allow remote attackers to cause a denial of service (device reload or voice-services outage) via a malformed SIP INVITE message that triggers an improper call to the sipSafeStrlen function, aka Bug IDs CSCsz40392 and CSCsz43987.
[ "cpe:2.3:a:cisco:unified_communications_manager:*:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*" ]
null
null
null
7.8
GHSA-xxh7-3px8-x367
A vulnerability, which was classified as critical, has been found in SourceCodester AC Repair and Services System 1.0. Affected by this issue is some unknown functionality of the file services/view.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-227702 is the identifier assigned to this vulnerability.
[]
null
null
6.3
null
GHSA-27hw-76jw-48hx
The default configuration of Adobe Reader and Acrobat 9.x before 9.3, and 8.x before 8.2 on Windows and Mac OS X, does not enable the Enhanced Security feature, which has unspecified impact and attack vectors, related to a "script injection vulnerability," as demonstrated by Acrobat Forms Data Format (FDF) behavior that allows cross-site scripting (XSS) by user-assisted remote attackers.
[]
null
null
null
null
CVE-2015-9350
The feed-them-social plugin before 1.7.0 for WordPress has reflected XSS in the Facebook Feeds load more button.
[ "cpe:2.3:a:slickremix:feed_them_social:*:*:*:*:*:wordpress:*:*" ]
null
null
6.1
4.3
CVE-2024-2774
Campcodes Online Marriage Registration System search.php sql injection
A vulnerability classified as critical was found in Campcodes Online Marriage Registration System 1.0. This vulnerability affects unknown code of the file /user/search.php. The manipulation of the argument searchdata leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-257608.
[ "cpe:2.3:a:campcodes:online_marriage_registration_system:1.0:*:*:*:*:*:*:*" ]
null
6.3
6.3
6.5
CVE-2023-29505
An issue was discovered in Zoho ManageEngine Network Configuration Manager 12.6.165. The WebSocket endpoint allows Cross-site WebSocket hijacking.
[ "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.6:build126165:*:*:*:*:*:*" ]
null
4.3
null
null
CVE-2022-34727
Microsoft ODBC Driver Remote Code Execution Vulnerability
Microsoft ODBC Driver Remote Code Execution Vulnerability
[ "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:azure:*:*" ]
null
8.8
null
null
CVE-2018-11228
Crestron TSW-1060, TSW-760, TSW-560, TSW-1060-NC, TSW-760-NC, and TSW-560-NC devices before 2.001.0037.001 allow unauthenticated remote code execution via a Bash shell service in Crestron Toolbox Protocol (CTP).
[ "cpe:2.3:o:crestron:crestron_toolbox_protocol_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:crestron:dmc-str:-:*:*:*:*:*:*:*", "cpe:2.3:h:crestron:tsw-1060:-:*:*:*:*:*:*:*", "cpe:2.3:h:crestron:tsw-1060-nc:-:*:*:*:*:*:*:*", "cpe:2.3:h:crestron:tsw-560:-:*:*:*:*:*:*:*", "cpe:2.3:h:crestron:tsw-560-nc:-:*:*:*:*:*:*:*", "cpe:2.3:h:crestron:tsw-760:-:*:*:*:*:*:*:*", "cpe:2.3:h:crestron:tsw-760-nc:-:*:*:*:*:*:*:*" ]
null
null
9.8
10
CVE-2018-4157
An issue was discovered in certain Apple products. iOS before 11.3 is affected. macOS before 10.13.4 is affected. tvOS before 11.3 is affected. watchOS before 4.3 is affected. The issue involves the "Quick Look" component. A race condition allows attackers to execute arbitrary code in a privileged context via a crafted app.
[ "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*" ]
null
null
7
7.6
CVE-2025-31381
WordPress Booking Calendar and Notification plugin <= 4.0.3 - Broken Authentication vulnerability
Missing Authorization vulnerability in shiptrack Booking Calendar and Notification allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Booking Calendar and Notification: from n/a through 4.0.3.
[]
null
6.5
null
null
GHSA-6cf3-hrc5-w9g6
IBM Rational Collaborative Lifecycle Management 6.0 through 6.0.6.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 152157.
[]
null
5.4
null
null
GHSA-8rp4-gqh3-jpxm
Cleartext transmission of sensitive information vulnerability in synorelayd in Synology DiskStation Manager (DSM) before 6.2.3-25426-3 allows man-in-the-middle attackers to obtain sensitive information via an HTTP session.
[]
null
5.9
null
null
GHSA-8c5h-pgpw-2c92
CSCMS Music Portal System v4.2 was discovered to contain a blind SQL injection vulnerability via the id parameter at /admin.php/User/level_sort.
[]
null
8.8
null
null
GHSA-m6vg-4fc5-7hch
Blind SQL injection in contactus.php in Doctor Appointment System 1.0 allows an unauthenticated attacker to insert malicious SQL queries via the comment parameter.
[]
null
null
null
null
GHSA-gh8j-c69q-gf38
The Squid Software Foundation Squid HTTP Caching Proxy version 3.0 to 3.5.27, 4.0 to 4.0.22 contains a Incorrect Pointer Handling vulnerability in ESI Response Processing that can result in Denial of Service for all clients using the proxy.. This attack appear to be exploitable via Remote server delivers an HTTP response payload containing valid but unusual ESI syntax.. This vulnerability appears to have been fixed in 4.0.23 and later.
[]
null
null
7.5
null
GHSA-pgm8-68cp-c7h6
SQL injection vulnerability in shipup before v.3.3.0 allows a remote attacker to escalate privileges via the getShopID function.
[]
null
null
null
null
CVE-2014-0181
The Netlink implementation in the Linux kernel through 3.14.1 does not provide a mechanism for authorizing socket operations based on the opener of a socket, which allows local users to bypass intended access restrictions and modify network configurations by using a Netlink socket for the (1) stdout or (2) stderr of a setuid program.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:evergreen:11.4:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:5:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp3:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*", "cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:ltss:*:*:*", "cpe:2.3:o:suse:suse_linux_enterprise_server:11:*:*:*:*:*:*:*" ]
null
null
null
2.1
CVE-2008-6483
PHP remote file inclusion vulnerability in admin.googlebase.php in the Ecom Solutions VirtueMart Google Base (aka com_googlebase or Froogle) component 1.1 for Joomla! allows remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter.
[ "cpe:2.3:a:virtuemart-solutions:com_googlebase:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2020-7064
Use-of-uninitialized-value in exif
In PHP versions 7.2.x below 7.2.9, 7.3.x below 7.3.16 and 7.4.x below 7.4.4, while parsing EXIF data with exif_read_data() function, it is possible for malicious data to cause PHP to read one byte of uninitialized memory. This could potentially lead to information disclosure or crash.
[ "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*", "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "cpe:2.3:a:tenable:tenable.sc:*:*:*:*:*:*:*:*" ]
null
6.5
null
null
CVE-2021-22548
Arbitrary enclave memory overread vulnerability in Asylo TrustedPrimitives::UntrustedCall
An attacker can change the pointer to untrusted memory to point to trusted memory region which causes copying trusted memory to trusted memory, if the latter is later copied out, it allows for reading of memory regions from the trusted region. It is recommended to update past 0.6.2 or git commit https://github.com/google/asylo/commit/53ed5d8fd8118ced1466e509606dd2f473707a5c
[ "cpe:2.3:a:google:asylo:*:*:*:*:*:*:*:*" ]
null
6.5
null
null
CVE-2024-39631
WordPress Contest Gallery plugin <= 23.1.2 - Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Contest Gallery allows Stored XSS.This issue affects Contest Gallery: from n/a through 23.1.2.
[ "cpe:2.3:a:contest_gallery:contest_gallery:*:*:*:*:*:wordpress:*:*", "cpe:2.3:a:contest-gallery:contest_gallery:*:*:*:*:*:wordpress:*:*" ]
null
7.1
null
null
GHSA-x3fr-wvmg-75f4
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View 10.15.0.75. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of JT files. Crafted data in a JT file can trigger a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14898.
[]
null
null
null
null
CVE-2021-43712
Stored XSS in Add New Employee Form in Sourcecodester Employee Daily Task Management System 1.0 Allows Remote Attacker to Inject/Store Arbitrary Code via the Name Field.
[ "cpe:2.3:a:employee_daily_task_management_system_project:employee_daily_task_management_system:1.0:*:*:*:*:*:*:*" ]
null
5.4
null
3.5
CVE-1999-1070
Buffer overflow in ping CGI program in Xylogics Annex terminal service allows remote attackers to cause a denial of service via a long query parameter.
[ "cpe:2.3:a:xylogics:annex:*:*:*:*:*:*:*:*" ]
null
null
null
5
CVE-2020-24842
PNPSCADA 2.200816204020 allows cross-site scripting (XSS), which can execute arbitrary JavaScript in the victim's browser.
[ "cpe:2.3:a:sdgc:pnpscada:2.200816204020:*:*:*:*:*:*:*" ]
null
6.1
null
4.3
GHSA-578q-5cjf-hf99
platform/msm_shared/mmc.c in the Qualcomm components in Android before 2016-07-05 on Nexus 7 (2013) devices mishandles the power-on write-protect feature, which allows attackers to gain privileges via a crafted application, aka Android internal bug 28821253 and Qualcomm internal bug CR580567.
[]
null
null
7.8
null
CVE-2024-37439
WordPress Uncanny Toolkit Pro for LearnDash plugin < 4.1.4.1 - Subscriber+ Arbitrary Post/Page Duplication vulnerability
Missing Authorization vulnerability in Uncanny Owl Uncanny Toolkit Pro for LearnDash allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Uncanny Toolkit Pro for LearnDash: from n/a through 4.1.4.0
[ "cpe:2.3:a:uncannyowl:uncanny_toolkit_pro_for_learndash:*:*:*:*:*:*:*:*" ]
null
5.4
null
null
GHSA-jj2v-2j63-rcwf
In the Linux kernel, the following vulnerability has been resolved:netfilter: nf_tables: set dormant flag on hook register failureWe need to set the dormant flag again if we fail to register the hooks.During memory pressure hook registration can fail and we end up with a table marked as active but no registered hooks.On table/base chain deletion, nf_tables will attempt to unregister the hook again which yields a warn splat from the nftables core.
[]
null
5.5
null
null
CVE-2019-3640
Data Loss Prevention - Unprotected Transport of Credentials
Unprotected Transport of Credentials in ePO extension in McAfee Data Loss Prevention 11.x prior to 11.4.0 allows remote attackers with access to the network to collect login details to the LDAP server via the ePO extension not using a secure connection when testing LDAP connectivity.
[ "cpe:2.3:a:mcafee:data_loss_prevention:*:*:*:*:*:*:*:*" ]
null
4.8
null
null
GHSA-pj47-cjfq-jwp4
A validation issue was addressed with improved logic. This issue is fixed in macOS Big Sur 11.4, Security Update 2021-003 Catalina. A malicious application may be able to send unauthorized Apple events to Finder.
[]
null
null
null
null
CVE-2023-39670
Tenda AC6 _US_AC6V1.0BR_V15.03.05.16 was discovered to contain a buffer overflow via the function fgets.
[ "cpe:2.3:h:tenda:ac6:1.0:*:*:*:*:*:*:*", "cpe:2.3:o:tenda:ac6_firmware:15.03.05.16:*:*:*:*:*:*:*" ]
null
9.8
null
null
GHSA-wxfm-v7w9-3w7w
Cross Site Scripting vulnerability found in Rail Pass Management System v.1.0 allows a remote attacker to obtain sensitive information via the adminname parameter of admin-profile.php.
[]
null
4.8
null
null
CVE-2024-0448
The Elementor Addons by Livemesh plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's widget URL parameters in all versions up to, and including, 8.3.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with contributor access or higher to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[ "cpe:2.3:a:livemesh:elementor_addons:*:*:*:*:*:wordpress:*:*" ]
null
6.4
null
null
GHSA-h3wp-82m4-rpj4
SQL injection vulnerability in gallery.asp in Absolute Image Gallery 2.0 allows remote attackers to execute arbitrary SQL commands via the categoryid parameter in a viewimage action.
[]
null
null
null
null
CVE-2023-32231
An issue was discovered in Vasion PrinterLogic Client for Windows before 25.0.0.818. During installation, binaries gets executed out of a subfolder in C:\Windows\Temp. A standard user can create the folder and path file ahead of time and obtain elevated code execution.
[ "cpe:2.3:a:vasion:printerlogic_client:*:*:*:*:*:windows:*:*" ]
null
9.9
null
null
GHSA-fv9m-f7w4-889c
discordi.js is malware
The `discordi.js` package is malware that attempts to discover and exfiltrate a user's [Discord](https://discordapp.com/) credentials, sending them to pastebin.All versions have been unpublished from the npm registry.RecommendationDo not install / use this module. It has been unpublished from the npm registry but may exist in some caches. Any users that logged into Discord using this library will need to change their credentials.
[]
null
null
7.3
null
GHSA-mj94-22c5-c665
Sample Internet Data Query (IDQ) scripts in IIS 3 and 4 allow remote attackers to read files via a .. (dot dot) attack.
[]
null
null
null
null
CVE-2019-19250
OpenTrade before 2019-11-23 allows SQL injection, related to server/modules/api/v1.js and server/utils.js.
[ "cpe:2.3:a:opentrade_project:opentrade:*:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
GHSA-2m33-fq4w-f79p
Unspecified vulnerability in the Sun Java System Communications Express component in Oracle Sun Product Suite 6 2005Q4 (6.2) and and 6.3 allows remote authenticated users to affect confidentiality via unknown vectors related to Address Book.
[]
null
null
null
null
CVE-2014-3157
Heap-based buffer overflow in the FFmpegVideoDecoder::GetVideoBuffer function in media/filters/ffmpeg_video_decoder.cc in Google Chrome before 35.0.1916.153 allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging VideoFrame data structures that are too small for proper interaction with an underlying FFmpeg library.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.2:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.3:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.4:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.5:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.6:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.7:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.8:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.9:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.10:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.11:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.13:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.14:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.15:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.17:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.18:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.19:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.20:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.21:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.22:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.23:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.27:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.31:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.32:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.33:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.34:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.35:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.36:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.37:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.38:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.39:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.40:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.41:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.42:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.43:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.44:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.45:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.46:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.47:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.48:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.49:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.51:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.52:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.54:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.56:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.57:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.59:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.61:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.68:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.69:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.71:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.72:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.74:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.77:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.80:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.82:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.84:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.85:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.86:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.88:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.90:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.92:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.93:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.95:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.96:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.98:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.99:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.101:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.103:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.104:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.105:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.106:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.107:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.108:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.109:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.110:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.111:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.112:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.113:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.114:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.115:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.116:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.117:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.118:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.119:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.120:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.121:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.122:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.123:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.124:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.125:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.126:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.127:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.128:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.137:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.138:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.140:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.141:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.142:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.149:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.150:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:35.0.1916.151:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2017-2610
jenkins before versions 2.44, 2.32.2 is vulnerable to a persisted cross-site scripting in search suggestions due to improperly escaping users with less-than and greater-than characters in their names (SECURITY-388).
[ "cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*", "cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*" ]
null
null
5.4
null
GHSA-w6fr-625j-hv8m
Unspecified vulnerability in the PeopleSoft PeopleTools component in Oracle PeopleSoft Products 8.51 and 8.52 allows remote authenticated users to affect confidentiality and integrity via unknown vectors related to PeopleCode.
[]
null
null
null
null
CVE-2022-46348
A vulnerability has been identified in Parasolid V33.1 (All versions < V33.1.264), Parasolid V34.0 (All versions < V34.0.252), Parasolid V34.1 (All versions < V34.1.242), Parasolid V35.0 (All versions < V35.0.170), Solid Edge SE2022 (All versions < V222.0MP12), Solid Edge SE2022 (All versions), Solid Edge SE2023 (All versions < V223.0Update2). The affected applications contain an out of bounds write past the end of an allocated structure while parsing specially crafted X_B files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-19383)
[ "cpe:2.3:a:siemens:parasolid:*:*:*:*:*:*:*:*" ]
null
7.8
null
null
CVE-2013-5553
Multiple memory leaks in Cisco IOS 15.1 before 15.1(4)M7 allow remote attackers to cause a denial of service (memory consumption or device reload) by sending a crafted SIP message over (1) IPv4 or (2) IPv6, aka Bug IDs CSCuc42558 and CSCug25383.
[ "cpe:2.3:o:cisco:ios:15.1:*:*:*:*:*:*:*" ]
null
null
null
7.8
CVE-2010-4054
The gs_type2_interpret function in Ghostscript allows remote attackers to cause a denial of service (incorrect pointer dereference and application crash) via crafted font data in a compressed data stream, aka bug 691043.
[ "cpe:2.3:a:artifex:afpl_ghostscript:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:artifex:afpl_ghostscript:6.01:*:*:*:*:*:*:*", "cpe:2.3:a:artifex:afpl_ghostscript:6.50:*:*:*:*:*:*:*", "cpe:2.3:a:artifex:afpl_ghostscript:7.00:*:*:*:*:*:*:*", "cpe:2.3:a:artifex:afpl_ghostscript:7.03:*:*:*:*:*:*:*", "cpe:2.3:a:artifex:afpl_ghostscript:7.04:*:*:*:*:*:*:*", "cpe:2.3:a:artifex:afpl_ghostscript:8.00:*:*:*:*:*:*:*", "cpe:2.3:a:artifex:afpl_ghostscript:8.11:*:*:*:*:*:*:*", "cpe:2.3:a:artifex:afpl_ghostscript:8.12:*:*:*:*:*:*:*", "cpe:2.3:a:artifex:afpl_ghostscript:8.13:*:*:*:*:*:*:*", "cpe:2.3:a:artifex:afpl_ghostscript:8.14:*:*:*:*:*:*:*", "cpe:2.3:a:artifex:afpl_ghostscript:8.50:*:*:*:*:*:*:*", "cpe:2.3:a:artifex:afpl_ghostscript:8.51:*:*:*:*:*:*:*", "cpe:2.3:a:artifex:afpl_ghostscript:8.52:*:*:*:*:*:*:*", "cpe:2.3:a:artifex:afpl_ghostscript:8.53:*:*:*:*:*:*:*", "cpe:2.3:a:artifex:afpl_ghostscript:8.54:*:*:*:*:*:*:*", "cpe:2.3:a:artifex:afpl_ghostscript:9.0:*:*:*:*:*:*:*", "cpe:2.3:a:artifex:ghostscript_fonts:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:artifex:ghostscript_fonts:8.11:*:*:*:*:*:*:*", "cpe:2.3:a:artifex:gpl_ghostscript:8.01:*:*:*:*:*:*:*", "cpe:2.3:a:artifex:gpl_ghostscript:8.15:*:*:*:*:*:*:*", "cpe:2.3:a:artifex:gpl_ghostscript:8.50:*:*:*:*:*:*:*", "cpe:2.3:a:artifex:gpl_ghostscript:8.51:*:*:*:*:*:*:*", "cpe:2.3:a:artifex:gpl_ghostscript:8.54:*:*:*:*:*:*:*", "cpe:2.3:a:artifex:gpl_ghostscript:8.56:*:*:*:*:*:*:*", "cpe:2.3:a:artifex:gpl_ghostscript:8.57:*:*:*:*:*:*:*", "cpe:2.3:a:artifex:gpl_ghostscript:8.60:*:*:*:*:*:*:*", "cpe:2.3:a:artifex:gpl_ghostscript:8.61:*:*:*:*:*:*:*", "cpe:2.3:a:artifex:gpl_ghostscript:8.62:*:*:*:*:*:*:*", "cpe:2.3:a:artifex:gpl_ghostscript:8.63:*:*:*:*:*:*:*", "cpe:2.3:a:artifex:gpl_ghostscript:8.64:*:*:*:*:*:*:*", "cpe:2.3:a:artifex:gpl_ghostscript:8.70:*:*:*:*:*:*:*", "cpe:2.3:a:artifex:gpl_ghostscript:8.71:*:*:*:*:*:*:*" ]
null
null
null
4.3
CVE-2021-25485
Path traversal vulnerability in FactoryAirCommnadManger prior to SMR Oct-2021 Release 1 allows attackers to write file as system UID via BT remote socket.
[ "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*" ]
null
7.5
null
null
CVE-2009-0378
Cross-site scripting (XSS) vulnerability in index.php in the beamospetition (com_beamospetition) 1.0.12 component for Joomla! allows remote attackers to inject arbitrary web script or HTML via the pet parameter in a sign action.
[ "cpe:2.3:a:joomla:com_beamospetition:1.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*" ]
null
null
null
4.3
CVE-2021-44217
In Ericsson CodeChecker through 6.18.0, a Stored Cross-site scripting (XSS) vulnerability in the comments component of the reports viewer allows remote attackers to inject arbitrary web script or HTML via the POST JSON data of the /CodeCheckerService API.
[ "cpe:2.3:a:ericsson:codechecker:*:*:*:*:*:*:*:*" ]
null
6.1
null
4.3
GHSA-v9q8-4j3p-xvw9
Cross-site scripting (XSS) vulnerability in webadmin/policy/group_table_ajax.php/ in Netsweeper before 3.1.10, 4.0.x before 4.0.9, and 4.1.x before 4.1.2 allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO.
[]
null
null
null
null
GHSA-mr7q-8c5m-vw8x
A vulnerability in the Multipurpose Internet Mail Extensions (MIME) scanner of Cisco AsyncOS Software for Cisco Email Security Appliances (ESA) and Web Security Appliances (WSA) could allow an unauthenticated, remote attacker to bypass configured user filters on the device. Affected Products: This vulnerability affects all releases prior to the first fixed release of Cisco AsyncOS Software for Cisco ESA and Cisco WSA, both virtual and hardware appliances, that are configured with message or content filters to scan incoming email attachments on the ESA or services scanning content of web access on the WSA. More Information: SCvb91473, CSCvc76500. Known Affected Releases: 10.0.0-203 9.9.9-894 WSA10.0.0-233.
[]
null
null
5.8
null
GHSA-mfgm-v8rv-75rw
Array index error in win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2008 R2 and R2 SP1 and Windows 7 Gold and SP1 allows remote attackers to cause a denial of service (reboot) via a crafted TrueType font file, aka "TrueType Font Parsing Vulnerability," a different vulnerability than CVE-2011-3402.
[]
null
null
null
null
GHSA-93vr-9q9m-pj8p
TensorFlow vulnerable to Out-of-Bounds Read in DynamicStitch
ImpactIf the parameter `indices` for `DynamicStitch` does not match the shape of the parameter `data`, it can trigger an stack OOB read.PatchesWe have patched the issue in GitHub commit [ee004b18b976eeb5a758020af8880236cd707d05](https://github.com/tensorflow/tensorflow/commit/ee004b18b976eeb5a758020af8880236cd707d05).The fix will be included in TensorFlow 2.12. We will also cherrypick this commit on TensorFlow 2.11.1.For more informationPlease consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.AttributionThis has been reported via Google OSS VRP.
[]
null
7.5
null
null
CVE-2020-9007
Codoforum 4.8.8 allows self-XSS via the title of a new topic.
[ "cpe:2.3:a:codologic:codoforum:4.8.8:*:*:*:*:*:*:*" ]
null
5.4
null
3.5
GHSA-8rgp-h8v7-xr48
Cross-Site Request Forgery (CSRF) vulnerability in Dave Kiss Vimeography: Vimeo Video Gallery WordPress Plugin.This issue affects Vimeography: Vimeo Video Gallery WordPress Plugin: from n/a through 2.4.1.
[]
null
4.3
null
null
GHSA-wg4g-mgmc-88mm
In Auto-Maskin RP210E Versions 3.7 and prior, DCU210E Versions 3.7 and prior and Marine Observer Pro (Android App), the software contains a mechanism for users to recover or change their passwords without knowing the original password, but the mechanism is weak.
[]
null
null
null
null
GHSA-4422-2p52-phgf
Apple Mac OS X 10.3.4, 10.4, 10.5, and possibly other versions does not properly clear memory for login (aka Loginwindow.app), Keychain, or FileVault passwords, which could allow the root user or an attacker with physical access to obtain sensitive information by reading memory.
[]
null
null
null
null
GHSA-jgh4-jhhw-f27m
Cross-site scripting (XSS) vulnerability in the Web UI in IBM Spectrum Control (formerly Tivoli Storage Productivity Center) 5.2.x before 5.2.11 allows remote authenticated users to inject arbitrary web script or HTML via an embedded string.
[]
null
null
5.4
null
CVE-2023-49375
JFinalCMS v5.0.0 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/friend_link/update.
[ "cpe:2.3:a:jfinalcms_project:jfinalcms:5.0.0:*:*:*:*:*:*:*" ]
null
8.8
null
null