id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
189k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
patch_commit_url
stringlengths
36
232
GHSA-f7mh-qr2g-w8j6
Osclass 5.1.2 is vulnerable to SQL Injection.
[]
null
7.2
null
null
null
GHSA-49qg-xp6c-mm46
The Content Security Policy (CSP) functionality in Mozilla Firefox 4.x through 13.0, Firefox ESR 10.x before 10.0.6, Thunderbird 5.0 through 13.0, Thunderbird ESR 10.x before 10.0.6, and SeaMonkey before 2.11 does not properly restrict the strings placed into the blocked-uri parameter of a violation report, which allows remote web servers to capture OpenID credentials and OAuth 2.0 access tokens by triggering a violation.
[]
null
null
null
null
null
GHSA-grqg-9g7g-p425
Multiple SQL injection vulnerabilities in login.asp in ASP-DEv Internal E-Mail System allow remote attackers to execute arbitrary SQL commands via the (1) login parameter (aka user field) or the (2) password parameter (aka pass field). NOTE: some of these details are obtained from third party information.
[]
null
null
null
null
null
CVE-2010-0479
Buffer overflow in Microsoft Office Publisher 2002 SP3, 2003 SP3, and 2007 SP1 and SP2 allows remote attackers to execute arbitrary code via a crafted Publisher file, aka "Microsoft Office Publisher File Conversion TextBox Processing Buffer Overflow Vulnerability."
[ "cpe:2.3:a:microsoft:publisher:2002:sp3:*:*:*:*:*:*", "cpe:2.3:a:microsoft:publisher:2003:sp3:*:*:*:*:*:*", "cpe:2.3:a:microsoft:publisher:2007:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:publisher:2007:sp2:*:*:*:*:*:*" ]
null
null
null
9.3
null
CVE-2009-1462
The Security Manager in razorCMS before 0.4 does not verify the permissions of every file owned by the apache user account, which is inconsistent with the documentation and allows local users to have an unspecified impact.
[ "cpe:2.3:a:razorcms:razorcms:*:*:*:*:*:*:*:*", "cpe:2.3:a:razorcms:razorcms:0.2:*:*:*:*:*:*:*", "cpe:2.3:a:razorcms:razorcms:0.3:rc2:*:*:*:*:*:*" ]
null
null
null
7.2
null
RHSA-2002:129
Red Hat Security Advisory: php security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as" ]
null
null
null
null
null
GHSA-f5vv-pq9r-8p2f
Media Encoder versions 24.5, 23.6.8 and earlier are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[]
null
5.5
null
null
null
CVE-2023-3707
ActivityPub for WordPress < 1.0.0 - Subscriber+ Arbitrary Post Content Disclosure
The ActivityPub WordPress plugin before 1.0.0 does not ensure that post contents to be displayed are public and belong to the plugin, allowing any authenticated user, such as subscriber to retrieve the content of arbitrary post (such as draft and private) via an IDOR vector. Password protected posts are not affected by this issue.
[ "cpe:2.3:a:automattic:activitypub:*:*:*:*:*:wordpress:*:*" ]
null
4.3
null
null
null
CVE-2023-39023
university compass v2.2.0 and below was discovered to contain a code injection vulnerability in the component org.compass.core.executor.DefaultExecutorManager.configure. This vulnerability is exploited via passing an unchecked argument.
[ "cpe:2.3:a:university_compass_project:university_compass:*:*:*:*:*:*:*:*" ]
null
9.8
null
null
null
CVE-2019-6295
Cleanto 5.0 has SQL Injection via the assets/lib/service_method_ajax.php service_id parameter.
[ "cpe:2.3:a:skymoonlabs:cleanto:5.0:*:*:*:*:*:*:*" ]
null
null
9.8
7.5
null
CVE-2021-29582
Heap OOB read in `tf.raw_ops.Dequantize`
TensorFlow is an end-to-end open source platform for machine learning. Due to lack of validation in `tf.raw_ops.Dequantize`, an attacker can trigger a read from outside of bounds of heap allocated data. The implementation(https://github.com/tensorflow/tensorflow/blob/26003593aa94b1742f34dc22ce88a1e17776a67d/tensorflow/core/kernels/dequantize_op.cc#L106-L131) accesses the `min_range` and `max_range` tensors in parallel but fails to check that they have the same shape. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
[ "cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*" ]
null
2.5
null
null
null
CVE-2011-3658
The SVG implementation in Mozilla Firefox 8.0, Thunderbird 8.0, and SeaMonkey 2.5 does not properly interact with DOMAttrModified event handlers, which allows remote attackers to cause a denial of service (out-of-bounds memory access) or possibly have unspecified other impact via vectors involving removal of SVG elements.
[ "cpe:2.3:a:mozilla:firefox:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:8.0:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
GHSA-v854-grhx-rm28
Multiple cross-site scripting (XSS) vulnerabilities in LimeSurvey 2.05+ Build 140618 allow remote attackers to inject arbitrary web script or HTML via (1) the pid attribute to the getAttribute_json function to application/controllers/admin/participantsaction.php in CPDB, (2) the sa parameter to application/views/admin/globalSettings_view.php, or (3) a crafted CSV file to the "Import CSV" functionality.
[]
null
null
null
null
null
GHSA-m76f-5v6g-6jmr
inventory in Atos Unify OpenScape 4000 Platform and OpenScape 4000 Manager Platform 10 R1 before 10 R1.34.4 allows an unauthenticated attacker to run arbitrary commands on the platform operating system and achieve administrative access, aka OSFOURK-23552.
[]
null
9.8
null
null
null
CVE-2020-2617
Vulnerability in the Enterprise Manager Base Platform product of Oracle Enterprise Manager (component: Discovery Framework). Supported versions that are affected are 12.1.0.5, 13.2.0.0 and 13.3.0.0. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Enterprise Manager Base Platform. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Enterprise Manager Base Platform accessible data as well as unauthorized update, insert or delete access to some of Enterprise Manager Base Platform accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Enterprise Manager Base Platform. CVSS 3.0 Base Score 6.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:L).
[ "cpe:2.3:a:oracle:enterprise_manager_base_platform:12.1.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:enterprise_manager_base_platform:13.2.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:enterprise_manager_base_platform:13.3.0.0:*:*:*:*:*:*:*" ]
null
null
6
null
null
GHSA-9r76-wvrx-5wcj
IBM Security Identity Governance and Intelligence 5.2 through 5.2.4.1 Virtual Appliance could allow a remote attacker to hijack the clicking action of the victim. By persuading a victim to visit a malicious Web site, a remote attacker could exploit this vulnerability to hijack the victim's click actions and possibly launch further attacks against the victim. IBM X-Force ID: 153387.
[]
null
null
6.1
null
null
GHSA-h34m-m7hc-cp2h
In AdvanceCOMP 2.1, png_compress in pngex.cc in advpng has an integer overflow upon encountering an invalid PNG size, which results in an attempted memcpy to write into a buffer that is too small. (There is also a heap-based buffer over-read.)
[]
null
7.8
null
null
null
GHSA-xqh4-qfj5-gwhr
Cross-site scripting (XSS) vulnerability in WordPress 2.5 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
[]
null
null
null
null
null
GHSA-wq23-xq9q-wf8w
In parseUriInternal of Intent.java, there is a possible infinite loop due to improper input validation. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.
[]
null
7.5
null
null
null
GHSA-65vw-3j28-v49q
ftpd before "NetBSD-ftpd 20230930" can leak information about the host filesystem before authentication via an MLSD or MLST command. tnftpd (the portable version of NetBSD ftpd) before 20231001 is also vulnerable.
[]
null
7.5
null
null
null
GHSA-8657-m3mp-8v63
Directory traversal vulnerability in index.php in txtCMS 0.3, when register_globals is enabled and magic_quotes_gpc is disabled, allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the id parameter.
[]
null
null
null
null
null
GHSA-fgjq-fq6w-4j3h
Gila CMS before 1.11.6 has reflected XSS via the admin/content/postcategory id parameter, which is mishandled for g_preview_theme.
[]
null
6.1
null
null
null
GHSA-fpc3-3fx6-hvph
In many functions of AutomaticZenRule.java, there is a possible failure to persist permissions settings due to resource exhaustion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-242704043
[]
null
7.8
null
null
null
CVE-2021-21650
Jenkins S3 publisher Plugin 0.11.6 and earlier does not perform Run/Artifacts permission checks in various HTTP endpoints and API models, allowing attackers with Item/Read permission to obtain information about artifacts uploaded to S3, if the optional Run/Artifacts permission is enabled.
[ "cpe:2.3:a:jenkins:s3_publisher:*:*:*:*:*:jenkins:*:*" ]
null
4.3
null
3.5
null
GHSA-wx72-xp52-v927
A Local Code Injection Vulnerability exists in the product and version listed above. The vulnerability is due to incorrect default permissions and allows for DLLs to be executed with higher level permissions.
[]
7
null
null
null
null
GHSA-896r-j9rp-2fjq
Multiple cross-site scripting (XSS) vulnerabilities in the DragonByte Technologies vbActivity module before 3.0.1 for vBulletin allow remote attackers to inject arbitrary web script or HTML via the reason parameter in (1) actions/nominatemedal.php or (2) actions/requestmedal.php.
[]
null
null
6.1
null
null
CVE-2022-42711
In Progress WhatsUp Gold before 22.1.0, an SNMP MIB Walker application endpoint failed to adequately sanitize malicious input. This could allow an unauthenticated attacker to execute arbitrary code in a victim's browser.
[ "cpe:2.3:a:progress:whatsup_gold:*:*:*:*:*:*:*:*" ]
null
9.6
null
null
null
GHSA-95cx-92pf-pxrr
The txXPathNodeUtils::getBaseURI function in the XSLT processor in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 does not properly initialize data, which allows remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow and application crash) via crafted documents.
[]
null
null
null
null
null
CVE-2011-3406
Buffer overflow in Active Directory, Active Directory Application Mode (ADAM), and Active Directory Lightweight Directory Service (AD LDS) in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows remote authenticated users to execute arbitrary code via a crafted query that leverages incorrect memory initialization, aka "Active Directory Buffer Overflow Vulnerability."
[ "cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:x64:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:x86:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x32:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:*:x64:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:*" ]
null
8.8
null
9
null
CVE-2023-22048
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Pluggable Auth). Supported versions that are affected are 8.0.33 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.1 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N).
[ "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*", "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*", "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*" ]
null
3.1
null
null
null
CVE-2016-6448
A vulnerability in the Session Description Protocol (SDP) parser of Cisco Meeting Server could allow an unauthenticated, remote attacker to execute arbitrary code on an affected system. This vulnerability affects the following products: Cisco Meeting Server releases prior to Release 2.0.3, Acano Server releases 1.9.x prior to Release 1.9.5, Acano Server releases 1.8.x prior to Release 1.8.17. More Information: CSCva76004. Known Affected Releases: 1.8.x 1.92.0.
[ "cpe:2.3:a:cisco:meeting_server:1.8.15:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:meeting_server:1.8_base:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:meeting_server:1.9.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:meeting_server:1.9.2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:meeting_server:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:meeting_server:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:meeting_server:2.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:meeting_server:2.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:meeting_server:2.0.5:*:*:*:*:*:*:*" ]
null
null
9.8
7.5
null
GHSA-w36f-4w8p-r5j5
Use After Free vulnerability in Arm Ltd Valhall GPU Kernel Driver, Arm Ltd Arm 5th Gen GPU Architecture Kernel Driver allows a local non-privileged user process to perform improper GPU memory processing operations to gain access to already freed memory.This issue affects Valhall GPU Kernel Driver: from r53p0 before r54p0; Arm 5th Gen GPU Architecture Kernel Driver: from r53p0 before r54p0.
[]
null
7.8
null
null
null
GHSA-gj3c-w556-7qwm
Cross-Site Request Forgery (CSRF) vulnerability in x000x occupancyplan allows SQL Injection. This issue affects occupancyplan: from n/a through 1.0.3.0.
[]
null
8.2
null
null
null
PYSEC-2021-551
null
TensorFlow is an end-to-end open source platform for machine learning. Sending invalid argument for `row_partition_types` of `tf.raw_ops.RaggedTensorToTensor` API results in a null pointer dereference and undefined behavior. The [implementation](https://github.com/tensorflow/tensorflow/blob/47a06f40411a69c99f381495f490536972152ac0/tensorflow/core/kernels/ragged_tensor_to_tensor_op.cc#L328) accesses the first element of a user supplied list of values without validating that the provided list is not empty. We have patched the issue in GitHub commit 301ae88b331d37a2a16159b65b255f4f9eb39314. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
[]
null
null
null
null
null
GHSA-gcxc-jhjw-r2q3
Insufficient encryption vulnerability in the mobile application (com.transsion.aivoiceassistant) may lead to the risk of sensitive information leakage.
[]
null
6.2
null
null
null
CVE-2025-20170
A vulnerability in the SNMP subsystem of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, remote attacker to cause a DoS condition on an affected device. This vulnerability is due to improper error handling when parsing SNMP requests. An attacker could exploit this vulnerability by sending a crafted SNMP request to an affected device. A successful exploit could allow the attacker to cause the device to reload unexpectedly, resulting in a DoS condition.&nbsp; This vulnerability affects SNMP versions 1, 2c, and 3. To exploit this vulnerability through SNMP v2c or earlier, the attacker must know a valid read-write or read-only SNMP community string for the affected system. To exploit this vulnerability through SNMP v3, the attacker must have valid SNMP user credentials for the affected system.
[]
null
7.7
null
null
null
CVE-2022-0430
Exposure of Sensitive Information to an Unauthorized Actor in httpie/httpie
Exposure of Sensitive Information to an Unauthorized Actor in GitHub repository httpie/httpie prior to 3.1.0.
[ "cpe:2.3:a:httpie:httpie:*:*:*:*:*:*:*:*" ]
null
null
2.4
null
null
GHSA-c7qr-mgc8-q54r
A Improper Input Validation issue affecting the v2_sdk_service running on a set of DJI drone devices on the port 10000 could allow an attacker to cause a crash of the service through a crafted payload triggering a missing input size check in the pull_file_v2_proc function implemented in the libv2_sdk.so library used by the dji_vtwo_sdk binary implementing the service, compromising it in a term of availability and producing a denial-of-service attack. Affected models are Mavic 3 Pro until v01.01.0300, Mavic 3 until v01.00.1200, Mavic 3 Classic until v01.00.0500, Mavic 3 Enterprise until v07.01.10.03, Matrice 300 until v57.00.01.00, Matrice M30 until v07.01.0022 and Mini 3 Pro until v01.00.0620.
[]
null
3
null
null
null
GHSA-mgwg-cvvj-v9gq
SQL injection vulnerability in the topic deletion functionality (post_delete function in func_mod.php) for Invision Power Board 2.1.5 allows remote authenticated moderators to execute arbitrary SQL commands via the selectedpids parameter, which bypasses an integer value check when the $id variable is an array.
[]
null
null
null
null
null
GHSA-4ffw-j96c-68cv
Unspecified vulnerability in the filter driver (savonaccessfilter.sys) in Sophos Anti-Virus before 7.6.20 allows local users to gain privileges via crafted arguments to the NtQueryAttributesFile function.
[]
null
null
null
null
null
GHSA-gqwf-4frr-g8c6
there is a possible cellular denial of service due to a logic error in the code. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.
[]
null
4
null
null
null
CVE-2002-0004
Heap corruption vulnerability in the "at" program allows local users to execute arbitrary code via a malformed execution time, which causes at to free the same memory twice.
[ "cpe:2.3:a:caldera:openlinux_server:3.1:*:*:*:*:*:*:*", "cpe:2.3:a:caldera:openlinux_workstation:3.1:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:2.2:*:68k:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:2.2:*:alpha:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:2.2:*:arm:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:2.2:*:ia-32:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:2.2:*:powerpc:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:2.2:*:sparc:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:4.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:4.2:*:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:4.3:*:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:4.4:*:*:*:*:*:*:*", "cpe:2.3:o:mandrakesoft:mandrake_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:mandrakesoft:mandrake_linux:8.0:*:ppc:*:*:*:*:*", "cpe:2.3:o:mandrakesoft:mandrake_linux:8.1:*:*:*:*:*:*:*", "cpe:2.3:o:mandrakesoft:mandrake_linux:8.1:*:ia64:*:*:*:*:*", "cpe:2.3:o:netbsd:netbsd:1.5.2:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:linux:6.2:*:alpha:*:*:*:*:*", "cpe:2.3:o:redhat:linux:6.2:*:i386:*:*:*:*:*", "cpe:2.3:o:redhat:linux:6.2:*:sparc:*:*:*:*:*", "cpe:2.3:o:redhat:linux:7.0:*:alpha:*:*:*:*:*", "cpe:2.3:o:redhat:linux:7.0:*:i386:*:*:*:*:*", "cpe:2.3:o:redhat:linux:7.1:*:alpha:*:*:*:*:*", "cpe:2.3:o:redhat:linux:7.1:*:i386:*:*:*:*:*", "cpe:2.3:o:redhat:linux:7.1:*:ia64:*:*:*:*:*", "cpe:2.3:o:redhat:linux:7.2:*:alpha:*:*:*:*:*", "cpe:2.3:o:redhat:linux:7.2:*:i386:*:*:*:*:*", "cpe:2.3:o:redhat:linux:7.2:*:ia64:*:*:*:*:*", "cpe:2.3:o:slackware:slackware_linux:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:slackware:slackware_linux:7.1:*:*:*:*:*:*:*", "cpe:2.3:o:slackware:slackware_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux:6.4:*:i386:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux:6.4:*:ppc:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux:6.4:alpha:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux:7.0:*:i386:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux:7.0:*:ppc:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux:7.0:*:sparc:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux:7.0:alpha:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux:7.1:*:ppc:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux:7.1:*:sparc:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux:7.1:*:x86:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux:7.1:alpha:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux:7.2:*:i386:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux:7.3:*:i386:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux:7.3:*:ppc:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux:7.3:*:sparc:*:*:*:*:*" ]
null
null
null
7.2
null
CVE-2025-4363
itsourcecode Gym Management System ajax.php sql injection
A vulnerability, which was classified as critical, has been found in itsourcecode Gym Management System 1.0. This issue affects some unknown processing of the file /ajax.php?action=end_membership. The manipulation of the argument rid leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
[]
6.9
7.3
7.3
7.5
null
GHSA-26wg-qj4f-57xc
SQL injection vulnerability in index.php in the sondages module in KwsPHP 1.0 allows remote attackers to execute arbitrary SQL commands via the id parameter in a results action, a different module than CVE-2007-4956.2.
[]
null
null
null
null
null
CVE-2005-0460
index.php in MercuryBoard 1.0.x and 1.1.x allows remote attackers to obtain sensitive information by setting the debug parameter.
[ "cpe:2.3:a:mercuryboard:mercuryboard:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:mercuryboard:mercuryboard:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:mercuryboard:mercuryboard:1.1.1:*:*:*:*:*:*:*" ]
null
null
null
5
null
GHSA-m7m4-jx8j-9m3c
PHP remote file inclusion vulnerability in payment.php in BosDev BosDates allows remote attackers to execute arbitrary PHP code via a URL in the insPath parameter.
[]
null
null
null
null
null
CVE-2024-33545
WordPress WZone plugin <= 14.0.10 - Unauthenticated Broken Access Control vulnerability
Missing Authorization vulnerability in AA-Team WZone.This issue affects WZone: from n/a through 14.0.10.
[ "cpe:2.3:a:aa-team:wzone:*:*:*:*:*:wordpress:*:*" ]
null
5.3
null
null
null
CVE-2021-36801
Akaunting Authentication Bypass in Company Selection
Akaunting version 2.1.12 and earlier suffers from an authentication bypass issue in the user-controllable field, companies[0]. This issue was fixed in version 2.1.13 of the product.
[ "cpe:2.3:a:akaunting:akaunting:*:*:*:*:*:*:*:*" ]
null
8.1
null
null
null
GHSA-fvr4-jwxm-x6h6
An of bound write / memory corruption vulnerability exists in the GIF parsing functionality of Core PHOTO-PAINT X8 18.1.0.661. A specially crafted GIF file can cause a vulnerability resulting in potential memory corruption resulting in code execution. An attacker can send the victim a specific GIF file to trigger this vulnerability.
[]
null
null
7.8
null
null
GHSA-rc4w-p9f6-7c7q
Microsoft .NET Framework 2.0, 3.5, 3.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2 and 4.7 allow an attacker to execute code remotely via a malicious document or application, aka ".NET Framework Remote Code Execution Vulnerability."
[]
null
null
7.8
null
null
CVE-2024-56440
Permission control vulnerability in the Connectivity module Impact: Successful exploitation of this vulnerability may cause features to perform abnormally.
[ "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:emui:14.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:4.2.0:*:*:*:*:*:*:*" ]
null
6.2
null
null
null
GHSA-m22p-g8pc-2fw4
The Contact page in Monica 2.19.1 allows stored XSS via the First Name field.
[]
null
null
null
null
null
GHSA-39p4-8vxf-w6mq
Cross-site scripting (XSS) vulnerability in account-closed.tcl in ]project-open[ (aka ]po[) 3.4.x, 3.5.0.1-2, and possibly other versions allows remote attackers to inject arbitrary web script or HTML via the message parameter to register/account-closed.
[]
null
null
null
null
null
GHSA-xh3j-9hv7-3jxm
The 3Com 3CRWER100-75 router with 1.2.10ww software, when enabling an optional virtual server, configures this server to accept all source IP addresses on the external (Internet) interface unless the user selects other options, which might expose the router to unintended incoming traffic from remote attackers, as demonstrated by setting up a virtual server on port 80, which allows remote attackers to access the web management interface.
[]
null
null
null
null
null
RHSA-2018:2428
Red Hat Security Advisory: Red Hat Single Sign-On 7.2.4 security update
cxf: Improper size validation in message attachment header for JAX-WS and JAX-RS services apache-cxf: TLS hostname verification does not work correctly with com.sun.net.ssl.* guava: Unbounded memory allocation in AtomicDoubleArray and CompoundOrdering classes allow remote attackers to cause a denial of service wildfly-core: Path traversal can allow the extraction of .war archives to write arbitrary files (Zip Slip) keycloak: infinite loop in session replacement leading to denial of service bouncycastle: flaw in the low-level interface to RSA key pair generator
[ "cpe:/a:redhat:jboss_single_sign_on:7.2" ]
null
null
4.8
null
null
GHSA-4gpq-qp4m-5pqr
cdrecord before 4:2.0, when DEBUG is enabled, allows local users to overwrite arbitrary files via a symlink attack on temporary files.
[]
null
null
null
null
null
CVE-2022-36681
Simple Task Scheduling System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /classes/Master.php?f=delete_account.
[ "cpe:2.3:a:simple_task_scheduling_system_project:simple_task_scheduling_system:1.0:*:*:*:*:*:*:*" ]
null
9.8
null
null
null
GHSA-2q7v-78g9-472m
Unspecified vulnerability in the Oracle WebLogic Server component in Oracle Fusion Middleware 10.3.6, 12.1.2, and 12.1.3 allows remote attackers to affect integrity via vectors related to Core Components.
[]
null
null
3.7
null
null
GHSA-8pvw-fcjr-8g6p
The WP User Manager – User Profile Builder & Membership plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'add_sidebar' and 'remove_sidebar' functions in all versions up to, and including, 2.9.11. This makes it possible for authenticated attackers, with Subscriber-level access and above, to add or remove a Carbon Fields custom sidebar if the Carbon Fields (carbon-fields) plugin is installed.
[]
null
4.3
null
null
null
CVE-2011-3174
Buffer overflow in the DoFindReplace function in the ISGrid.Grid2.1 ActiveX control in InstallShield/ISGrid2.dll in AdminStudio in Novell ZENworks Configuration Management (ZCM) 10.2, 10.3, and 11 SP1 allows remote attackers to execute arbitrary code via a long bstrReplaceText parameter.
[ "cpe:2.3:a:novell:zenworks_configuration_management:10.2:*:*:*:*:*:*:*", "cpe:2.3:a:novell:zenworks_configuration_management:10.3:*:*:*:*:*:*:*", "cpe:2.3:a:novell:zenworks_configuration_management:11:sp1:*:*:*:*:*:*" ]
null
null
null
6.8
null
GHSA-mrv6-5rxr-645f
The Media Server’s authorization tokens have a poor quality of randomness. An attacker may be able to guess the token of an active user by computing plausible tokens.
[]
null
3.1
null
null
null
GHSA-5chj-rpxx-3q92
IBM WebSphere Portal 8.0.0.1 before CF09 does not properly handle references in compute="always" Web Content Manager (WCM) navigator components, which allows remote attackers to obtain sensitive component information via unspecified vectors.
[]
null
null
null
null
null
GHSA-26gp-9jcj-gh27
When a user opens manipulated Jupiter Tessellation (.jt) file received from untrusted sources in SAP 3D Visual Enterprise Viewer - version 9.0, the application crashes and becomes temporarily unavailable to the user until restart of the application
[]
null
null
null
null
null
GHSA-9pfr-f5q4-v4v8
The Puppet Communications Protocol (PCP) Broker incorrectly validates message header sizes. An attacker could use this to crash the PCP Broker, preventing commands from being sent to agents. This is resolved in Puppet Enterprise 2016.4.3 and 2016.5.2.
[]
null
null
5.3
null
null
GHSA-g24c-88qg-x3xp
Adobe Acrobat and Reader versions , 2019.021.20056 and earlier, 2017.011.30152 and earlier, 2017.011.30155 and earlier version, 2017.011.30152 and earlier, and 2015.006.30505 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution .
[]
null
null
null
null
null
CVE-2025-52726
WordPress CouponXxL Custom Post Types plugin <= 3.0 - Privilege Escalation Vulnerability
Incorrect Privilege Assignment vulnerability in pebas CouponXxL Custom Post Types allows Privilege Escalation. This issue affects CouponXxL Custom Post Types: from n/a through 3.0.
[]
null
8.6
null
null
null
GHSA-6j35-xv72-gppj
IBM Sterling Connect:Express for UNIX 1.5 is vulnerable to server-side request forgery (SSRF). This may allow an authenticated attacker to send unauthorized requests from the system, potentially leading to network enumeration or facilitating other attacks. IBM X-Force ID: 252135.
[]
null
6.5
null
null
null
GHSA-4r67-552x-9f24
Multiple unspecified vulnerabilities in Mambo LaiThai 4.5.5 have unknown impact and attack vectors related to (1) mod_login and (2) mod_template_chooser.
[]
null
null
null
null
null
CVE-2024-4726
Campcodes Legal Case Management System clients cross site scripting
A vulnerability was found in Campcodes Legal Case Management System 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file /admin/clients. The manipulation of the argument f_name leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-263804.
[ "cpe:2.3:a:campcodes:legal_case_management_system:1.0:*:*:*:*:*:*:*" ]
5.3
3.5
3.5
4
null
CVE-2022-22166
Junos OS: An rpd core will occur if BGP update tracing is configured and an update containing a malformed BGP SR-TE policy tunnel attribute is received
An Improper Validation of Specified Quantity in Input vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS allows an unauthenticated networked attacker to cause an rdp crash and thereby a Denial of Service (DoS). If a BGP update message is received over an established BGP session where a BGP SR-TE policy tunnel attribute is malformed and BGP update tracing flag is enabled, the rpd will core. This issue can happen with any BGP session as long as the previous conditions are met. This issue can not propagate as the crash occurs as soon as the malformed update is received. This issue affects Juniper Networks Junos OS: 20.4 versions prior to 20.4R3-S1; 21.1 versions prior to 21.1R2-S2, 21.1R3. This issue does not affect Juniper Networks Junos OS versions prior to 20.4R1.
[ "cpe:2.3:o:juniper:junos:20.4:-:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.4:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.4:r2-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.4:r2-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.4:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.1:-:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.1:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.1:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.1:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.1:r2-s1:*:*:*:*:*:*" ]
null
6.5
null
null
null
CVE-2003-0116
Microsoft Internet Explorer 5.01, 5.5 and 6.0 does not properly check the Cascading Style Sheet input parameter for Modal dialogs, which allows remote attackers to read files on the local system via a web page containing script that creates a dialog and then accesses the target files, aka "Modal Dialog script execution."
[ "cpe:2.3:a:microsoft:ie:6.0:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:5.0.1:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:5.0.1:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:5.0.1:sp3:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:5.5:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:5.5:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:5.5:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:6.0:*:*:*:*:*:*:*" ]
null
null
null
5
null
GHSA-r642-gv9p-2wjj
Argo CD will blindly trust JWT claims if anonymous access is enabled
ImpactA critical vulnerability has been discovered in Argo CD which would allow unauthenticated users to impersonate as any Argo CD user or role, including the `admin` user, by sending a specifically crafted JSON Web Token (JWT) along with the request. In order for this vulnerability to be exploited, [anonymous access](https://argo-cd.readthedocs.io/en/stable/operator-manual/rbac/#anonymous-access) to the Argo CD instance must have been enabled.In a default Argo CD installation, anonymous access is disabled. To find out if anonymous access is enabled in your instance, please see the *Workarounds* section of this advisory below.The vulnerability can be exploited to impersonate as any user or role, including the built-in `admin` account regardless of whether that account is enabled or disabled. Also, the attacker does not need an account on the Argo CD instance in order to exploit this.If anonymous access to the instance is enabled, an attacker can:Escalate their privileges, effectively allowing them to gain the same privileges on the cluster as the Argo CD instance, which is cluster admin in a default installation. This will allow the attacker to create, manipulate and delete any resource on the cluster.Exfiltrate data by deploying malicious workloads with elevated privileges, thus bypassing any redaction of sensitive data otherwise enforced by the Argo CD APIWe **strongly recommend** that all users of Argo CD update to a version containing this patch as soon as possible, regardless of whether or not anonymous access is enabled in your instance.Please see below for a list of versions containing a fix for this vulnerability and any possible workarounds existing for this issue.PatchesA patch for this vulnerability has been released in the following Argo CD versions:v2.3.4v2.2.9v2.1.15WorkaroundsDisable anonymous accessIf you are not able to upgrade to a patched version quickly, we highly suggest disabling anonymous access if it is enabled.To find out whether anonymous access is enabled for your Argo CD instance, you can query the `argocd-cm` ConfigMap in the Argo CD's installation namespace. The below example assumes you have installed Argo CD to the `argocd` namespace:If the result of this command is either empty or `"false"`, anonymous access to that instance is not enabled. If the result is `"true"`, your instance is vulnerable.To disable anonymous access, patch the `argocd-cm` ConfigMap to either remove the `users.anonymous.enabled` field or set this field to `"false"`.To set the field to `"false"`:Or you can remove the field completely, thus disabling anonymous access because the default is `false`:CreditsThe Argo CD team would like to thank Mark Pim and Andrzej Hajto, who discovered this vulnerability and reported it in a responsible way to us.For more informationOpen an issue in [the Argo CD issue tracker](https://github.com/argoproj/argo-cd/issues) or [discussions](https://github.com/argoproj/argo-cd/discussions)Join us on [Slack](https://argoproj.github.io/community/join-slack) in channel #argo-cd
[]
null
10
null
null
null
CVE-2024-26280
Apache Airflow: Overly broad default permissions for Viewer/Ops (audit logs)
Apache Airflow, versions before 2.8.2, has a vulnerability that allows authenticated Ops and Viewers users to view all information on audit logs, including dag names and usernames they were not permitted to view. With 2.8.2 and newer, Ops and Viewer users do not have audit log permission by default, they need to be explicitly granted permissions to see the logs. Only admin users have audit log permission by default. Users of Apache Airflow are recommended to upgrade to version 2.8.2 or newer to mitigate the risk associated with this vulnerability
[]
null
4.7
null
null
https://github.com/apache/airflow/pull/37501
CVE-2024-36779
Sourcecodester Stock Management System v1.0 is vulnerable to SQL Injection via editCategories.php.
[ "cpe:2.3:a:stock_management_system_project:stock_management_system:1.0:*:*:*:*:*:*:*" ]
null
9.8
null
null
null
GHSA-cxvr-r92m-q9hw
XSS in Dolibarr
Dolibarr before 11.0.4 allows XSS.
[]
null
5.4
null
null
null
GHSA-qwxj-4879-p647
Interface exposure vulnerability in the mobile application (com.transsion.carlcare) may lead to information leakage risk.
[]
null
7.5
null
null
null
CVE-2023-37271
RestrictedPython vulnerable to arbitrary code execution via stack frame sandbox escape
RestrictedPython is a tool that helps to define a subset of the Python language which allows users to provide a program input into a trusted environment. RestrictedPython does not check access to stack frames and their attributes. Stack frames are accessible within at least generators and generator expressions, which are allowed inside RestrictedPython. Prior to versions 6.1 and 5.3, an attacker with access to a RestrictedPython environment can write code that gets the current stack frame in a generator and then walk the stack all the way beyond the RestrictedPython invocation boundary, thus breaking out of the restricted sandbox and potentially allowing arbitrary code execution in the Python interpreter. All RestrictedPython deployments that allow untrusted users to write Python code in the RestrictedPython environment are at risk. In terms of Zope and Plone, this would mean deployments where the administrator allows untrusted users to create and/or edit objects of type `Script (Python)`, `DTML Method`, `DTML Document` or `Zope Page Template`. This is a non-default configuration and likely to be extremely rare. The problem has been fixed in versions 6.1 and 5.3.
[ "cpe:2.3:a:zope:restrictedpython:*:*:*:*:*:*:*:*", "cpe:2.3:a:zope:restrictedpython:6.0:-:*:*:*:*:*:*", "cpe:2.3:a:zope:restrictedpython:6.0:a1.dev0:*:*:*:*:*:*" ]
null
8.4
null
null
null
GHSA-7vcp-35cw-vjp4
An attacker who could have convinced a user to drag and drop an image to a filesystem could have manipulated the resulting filename to contain an executable extension, and by extension potentially tricked the user into executing malicious code. While very similar, this is a separate issue from CVE-2022-34483. This vulnerability affects Firefox < 102.
[]
null
8.8
null
null
null
RHSA-2016:2057
Red Hat Security Advisory: flash-plugin security update
flash-plugin: multiple code execution issues fixed in APSB16-32 flash-plugin: multiple code execution issues fixed in APSB16-32 flash-plugin: multiple code execution issues fixed in APSB16-32 flash-plugin: multiple code execution issues fixed in APSB16-32 flash-plugin: multiple code execution issues fixed in APSB16-32 flash-plugin: multiple code execution issues fixed in APSB16-32 flash-plugin: multiple code execution issues fixed in APSB16-32 flash-plugin: multiple code execution issues fixed in APSB16-32 flash-plugin: multiple code execution issues fixed in APSB16-32 flash-plugin: multiple code execution issues fixed in APSB16-32 flash-plugin: multiple code execution issues fixed in APSB16-32 flash-plugin: multiple code execution issues fixed in APSB16-32
[ "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server", "cpe:/a:redhat:rhel_extras:6" ]
null
null
8.8
null
null
CVE-2021-20501
IBM i 7.1, 7.2, 7.3, and 7.4 SMTP allows a network attacker to send emails to non-existent local-domain recipients to the SMTP server, caused by using a non-default configuration. An attacker could exploit this vulnerability to consume unnecessary network bandwidth and disk space, and allow remote attackers to send spam email. IBM X-Force ID: 198056.
[ "cpe:2.3:o:ibm:i:7.1:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:i:7.2:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:i:7.3:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:i:7.4:*:*:*:*:*:*:*" ]
null
null
5.9
null
null
GHSA-8q3m-w24v-2c2q
A vulnerability, which was classified as critical, has been found in PHPGurukul BP Monitoring Management System 1.0. This issue affects some unknown processing of the file /edit-family-member.php. The manipulation of the argument memberage leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
[]
2.1
6.3
null
null
null
GHSA-5g62-9q93-xrv9
MSI Afterburner v4.6.5.16370 is vulnerable to a Kernel Memory Leak vulnerability by triggering the 0x80002040 IOCTL code of the RTCore64.sys driver. The handle to the driver can only be obtained from a high integrity process.
[]
null
5.6
null
null
null
CVE-2021-23386
Remote Memory Exposure
This affects the package dns-packet before 5.2.2. It creates buffers with allocUnsafe and does not always fill them before forming network packets. This can expose internal application memory over unencrypted network when querying crafted invalid domain names.
[ "cpe:2.3:a:dns-packet_project:dns-packet:*:*:*:*:*:node.js:*:*" ]
null
7.7
null
null
null
CVE-2004-1428
ArGoSoft FTP before 1.4.2.1 generates an error message if the user name does not exist instead of prompting for a password, which allows remote attackers to determine valid usernames.
[ "cpe:2.3:a:argosoft:ftp_server:*:*:*:*:*:*:*:*" ]
null
null
null
5
null
CVE-2025-4917
PHPGurukul Auto Taxi Stand Management System new-autoortaxi-entry-form.php sql injection
A vulnerability classified as critical has been found in PHPGurukul Auto Taxi Stand Management System 1.0. Affected is an unknown function of the file /admin/new-autoortaxi-entry-form.php. The manipulation of the argument drivername leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.
[]
6.9
7.3
7.3
7.5
null
CVE-2024-13382
Calculated Fields Form < 5.2.64 - Admin+ Stored XSS
The Calculated Fields Form WordPress plugin before 5.2.64 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
[]
null
4.8
null
null
null
GHSA-hp6w-h6gw-qjwm
Multiple cross-site request forgery (CSRF) vulnerabilities in DotClear 1.2.6 allow remote attackers to perform actions as arbitrary users via the (1) tool_url parameter to ecrire/tools.php and multiple fields on the (2) blogconf, (3) blogroll, (4) ecrire/redacteur.php, and (5) ecrire/user_prefs.php pages.
[]
null
null
null
null
null
GHSA-xpwh-g564-whc7
Affected versions of Jira Server allow remote unauthenticated attackers to enumerate issue keys via a missing permissions check in the ActionsAndOperations resource. The affected versions are before 7.13.18, from version 8.0.0 before 8.5.9, and from version 8.6.0 before version 8.12.2.
[]
null
5.3
null
null
null
GHSA-xh3h-35f7-mgq7
Directory traversal vulnerability in the file download functionality in ZOHO WebNMS Framework 5.2 and 5.2 SP1 allows remote attackers to read arbitrary files via a .. (dot dot) in the fileName parameter to servlets/FetchFile.
[]
null
null
7.5
null
null
CVE-2018-8882
Netwide Assembler (NASM) 2.13.02rc2 has a stack-based buffer under-read in the function ieee_shr in asm/float.c via a large shift value.
[ "cpe:2.3:a:nasm:netwide_assembler:2.13.02:rc2:*:*:*:*:*:*" ]
null
null
7.8
4.6
null
GHSA-q7vg-5vwj-j32j
?The affected product does not perform an authentication check and performs some dangerous functionality, which could result in unauthenticated remote code execution.0
[]
null
9.8
null
null
null
GHSA-xvpq-v2cq-9v92
Buffer overflow vulnerability in Core FTP Server v2 Build 697, via a crafted username.
[]
null
null
null
null
null
CVE-2014-8026
Cross-site scripting (XSS) vulnerability in the Guest Server in Cisco Jabber allows remote attackers to inject arbitrary web script or HTML via a (1) GET or (2) POST parameter, aka Bug ID CSCus08074.
[ "cpe:2.3:a:cisco:jabber_guest:*:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
PYSEC-2015-41
null
providers/saml2/admin.py in the Identity Provider (IdP) server in Ipsilon 0.1.0 before 1.0.1 does not properly check permissions to update the SAML2 Service Provider (SP) owner, which allows remote authenticated users to cause a denial of service via a duplicate SP name.
[]
null
null
null
null
null
GHSA-jh8v-3fp9-w3r3
Buffer overflow in the XUpload.ocx ActiveX control in Persits Software XUpload 2.1.0.1, and probably other versions before 3.0, as used by HP Mercury LoadRunner and Groove Virtual Office, allows remote attackers to execute arbitrary code via a long argument to the AddFolder function.
[]
null
null
null
null
null
CVE-2019-5893
Nelson Open Source ERP v6.3.1 allows SQL Injection via the db/utils/query/data.xml query parameter.
[ "cpe:2.3:a:nelson-it:open_source_erp:6.3.1:*:*:*:*:*:*:*" ]
null
null
9.8
7.5
null
CVE-2025-1677
Allocation of Resources Without Limits or Throttling in GitLab
A Denial of Service (DoS) issue has been discovered in GitLab CE/EE affecting all up to 17.8.7, 17.9 prior to 17.9.6 and 17.10 prior to 17.10.4 A denial of service could occur upon injecting oversized payloads into CI pipeline exports.
[ "cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*" ]
null
6.5
null
null
null
CVE-2013-3139
Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3112, CVE-2013-3113, CVE-2013-3121, and CVE-2013-3142.
[ "cpe:2.3:a:microsoft:internet_explorer:6:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*" ]
null
null
null
9.3
null
GHSA-8wcf-q4vh-rh5h
A cross-site scripting vulnerability exists in the admin console OIDC Policy Management Editor. The impact is contained to admin console users only.
[]
null
1.8
null
null
null
GHSA-2788-q3c5-xfcj
The login page in the MCUsystem does not filter with special characters, which allows remote attackers can inject JavaScript without privilege and thus perform reflected XSS attacks.
[]
null
null
null
null
null