id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
197k
cpes
listlengths
0
4.89k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
GHSA-7fj2-qj5r-2prf
An exploitable command injection vulnerability exists in the way Netgate pfSense CE 2.4.4-RELEASE processes the parameters of a specific POST request. The attacker can exploit this and gain the ability to execute arbitrary commands on the system. An attacker needs to be able to send authenticated POST requests to the administration web interface. Command injection is possible in the `powerd_ac_mode` POST parameter parameter.
[]
null
null
7.2
null
RHSA-2019:3699
Red Hat Security Advisory: evolution security and bug fix update
evolution-ews: all certificate errors ignored if error is ignored during initial account setup in gnome-online-accounts
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
null
8.1
null
CVE-2002-0774
Hosting Controller creates a default user AdvWebadmin with a default password, which could allow remote attackers to gain privileges if the password is not changed.
[ "cpe:2.3:a:hosting_controller:hosting_controller:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:hosting_controller:hosting_controller:1.3:*:*:*:*:*:*:*", "cpe:2.3:a:hosting_controller:hosting_controller:1.4:*:*:*:*:*:*:*", "cpe:2.3:a:hosting_controller:hosting_controller:1.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:hosting_controller:hosting_controller:1.4b:*:*:*:*:*:*:*" ]
null
null
null
10
CVE-2011-1205
Multiple buffer overflows in unspecified COM objects in Rational Common Licensing 7.0 through 7.1.1.4 in IBM Rational ClearCase 7.0.0.4 through 7.1.1.4, ClearQuest 7.0.0.4 through 7.1.1.4, and other products allow local users to gain privileges via a Trojan horse HTML document in the My Computer zone.
[ "cpe:2.3:a:ibm:rational_clearcase:7.0.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_clearcase:7.0.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_clearcase:7.0.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_clearcase:7.0.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_clearcase:7.0.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_clearcase:7.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_clearcase:7.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_clearcase:7.0.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_clearcase:7.0.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_clearcase:7.0.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_clearcase:7.0.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_clearcase:7.0.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_clearcase:7.0.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_clearcase:7.0.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_clearcase:7.0.1.8:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_clearcase:7.0.1.9:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_clearcase:7.0.1.10:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_clearcase:7.0.1.11:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_clearcase:7.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_clearcase:7.1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_clearcase:7.1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_clearcase:7.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_clearcase:7.1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_clearcase:7.1.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_clearcase:7.1.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_clearcase:7.1.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_clearquest:7.0.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_clearquest:7.0.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_clearquest:7.0.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_clearquest:7.0.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_clearquest:7.0.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_clearquest:7.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_clearquest:7.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_clearquest:7.0.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_clearquest:7.0.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_clearquest:7.0.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_clearquest:7.0.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_clearquest:7.0.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_clearquest:7.0.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_clearquest:7.0.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_clearquest:7.0.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_clearquest:7.0.1.8:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_clearquest:7.0.1.9:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_clearquest:7.0.1.10:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_clearquest:7.0.1.11:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_clearquest:7.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_clearquest:7.1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_clearquest:7.1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_clearquest:7.1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_clearquest:7.1.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_clearquest:7.1.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_clearquest:7.1.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_common_licensing:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_common_licensing:7.0.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_common_licensing:7.0.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_common_licensing:7.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_common_licensing:7.0.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_common_licensing:7.0.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_common_licensing:7.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_common_licensing:7.1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_common_licensing:7.1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_common_licensing:7.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_common_licensing:7.1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_common_licensing:7.1.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_common_licensing:7.1.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_common_licensing:7.1.1.4:*:*:*:*:*:*:*" ]
null
null
null
6.9
CVE-2019-10591
Null pointer dereference can happen when parsing udta atom which is non-standard and having invalid depth in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in APQ8009, APQ8017, APQ8053, APQ8096AU, APQ8098, MDM9206, MDM9207C, MDM9607, MSM8905, MSM8909W, MSM8917, MSM8939, MSM8953, MSM8996, MSM8996AU, MSM8998, Nicobar, QCS405, QCS605, QM215, Rennell, SA6155P, Saipan, SDA660, SDA845, SDM429, SDM429W, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDX20, SM6150, SM7150, SM8150, SM8250, SXR1130, SXR2130
[ "cpe:2.3:o:qualcomm:apq8009_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:apq8009:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:apq8017_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:apq8017:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:apq8053_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:apq8053:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:apq8096au_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:apq8096au:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:apq8098_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:apq8098:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9206_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9206:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9207c_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9207c:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9607_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9607:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:msm8905_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:msm8905:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:msm8909w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:msm8909w:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:msm8917_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:msm8917:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:msm8939_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:msm8939:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:msm8953_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:msm8953:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:msm8996_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:msm8996:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:msm8996au:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:msm8998_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:msm8998:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:nicobar_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:nicobar:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcs405_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcs405:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcs605_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcs605:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qm215_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qm215:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:rennell_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:rennell:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa6155p:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:saipan_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:saipan:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sda660_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sda660:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sda845_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sda845:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdm429_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm429:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdm429w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm429w:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdm439_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm439:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdm450_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm450:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdm630_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm630:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdm632_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm632:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdm636_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm636:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdm660_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm660:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdm670_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm670:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdm710_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm710:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdm845_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm845:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdx20_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdx20:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm6150_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm6150:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm7150_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm7150:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm8150_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm8150:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm8250_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm8250:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sxr1130_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sxr1130:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sxr2130_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sxr2130:-:*:*:*:*:*:*:*" ]
null
7.5
null
7.8
CVE-2023-27195
Trimble TM4Web 22.2.0 allows unauthenticated attackers to access /inc/tm_ajax.msw?func=UserfromUUID&uuid= to retrieve the last registration access code and use this access code to register a valid account. via a PUT /inc/tm_ajax.msw request. If the access code was used to create an Administrator account, attackers are also able to register new Administrator accounts with full privileges.
[ "cpe:2.3:a:trimble:tm4web:*:*:*:*:*:*:*:*" ]
null
9.8
null
null
GHSA-xm92-v2mq-842q
Apache Struts improper action name cleanup
Apache Struts 2 before 2.3.29 and 2.5.x before 2.5.1 allow attackers to have unspecified impact via vectors related to improper action name clean up.
[]
null
null
9.8
null
GHSA-84wp-p749-mr24
File Upload Manager allows remote attackers to upload arbitrary files by modifying the test variable to contain a value of '~~~~~~' (six tildes), which bypasses the file extension checks.
[]
null
null
null
null
CVE-2024-5123
SourceCodester Event Registration System cross site scripting
A vulnerability classified as problematic has been found in SourceCodester Event Registration System 1.0. This affects an unknown part of the file /registrar/. The manipulation of the argument searchbar leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-265203.
[ "cpe:2.3:a:event_registration_system_project:event_registration_system:1.0:*:*:*:*:*:*:*" ]
6.9
4.3
4.3
5
CVE-2015-7072
dyld in Apple iOS before 9.2, tvOS before 9.1, and watchOS before 2.1 mishandles segment validation, which allows attackers to execute arbitrary code in a privileged context via a crafted app.
[ "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*" ]
null
null
null
9.3
GHSA-pp3v-3h95-wqgh
The mdp_lut_hw_update function in drivers/video/msm/mdp.c in the MDP display driver for the Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, does not validate certain start and length values within an ioctl call, which allows attackers to gain privileges via a crafted application.
[]
null
null
null
null
GHSA-rwjp-w35q-8m5p
An information disclosure vulnerability in the MediaTek driver could enable a local malicious application to access data outside of its permission levels. This issue is rated as Moderate because it first requires compromising a privileged process. Product: Android. Versions: N/A. Android ID: A-31528889. References: MT-ALPS02961395.
[]
null
null
4.7
null
GHSA-rwch-g2hc-94xv
A vulnerability in the malware detection functionality within Advanced Malware Protection (AMP) of Cisco AsyncOS Software for Cisco Email Security Appliances (ESAs) could allow an unauthenticated, remote attacker to cause an email attachment containing malware to be delivered to the end user. The vulnerability is due to the failure of AMP to scan certain EML attachments that could contain malware. An attacker could exploit this vulnerability by sending an email with a crafted EML attachment through the targeted device. A successful exploit could allow the attacker to bypass the configured ESA email message and content filtering and allow the malware to be delivered to the end user. Vulnerable Products: This vulnerability affects Cisco AsyncOS Software for Cisco ESA, both virtual and hardware appliances, that are configured with message or content filters to scan incoming email attachments on the ESA. Cisco Bug IDs: CSCuz81533.
[]
null
null
5.8
null
CVE-2024-9921
TEAMPLUS TECHNOLOGY Team+ - SQL Injection
The Team+ from TEAMPLUS TECHNOLOGY does not properly validate specific page parameter, allowing unauthenticated remote attackers to inject arbitrary SQL commands to read, modify and delete database contents.
[ "cpe:2.3:a:teamplus:team\\+:*:*:*:*:*:*:*:*", "cpe:2.3:a:teamplus:team\\+_pro:*:*:*:*:private_cloud:android:*:*" ]
null
9.8
null
null
GHSA-qjw4-q3qv-cc24
Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to a buffer overflow. An attacker can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the firewall_handler_set function with the old_ip and old_mac variables.
[]
null
7.2
null
null
GHSA-4w4c-cf9c-3rj3
An issue was discovered in Tcpreplay 4.3.1. A NULL pointer dereference occurred in the function get_ipv6_l4proto() located at get.c. This can be triggered by sending a crafted pcap file to the tcpreplay-edit binary. It allows an attacker to cause a Denial of Service (Segmentation fault) or possibly have unspecified other impact.
[]
null
7.8
null
null
CVE-2013-4038
The Intelligent Platform Management Interface (IPMI) implementation in Integrated Management Module (IMM) on IBM BladeCenter, Flex System, System x iDataPlex, and System x3### servers uses cleartext for password storage, which allows context-dependent attackers to obtain sensitive information by reading a file.
[ "cpe:2.3:h:ibm:bladecenter:hs22:*:*:*:*:*:*:*", "cpe:2.3:h:ibm:bladecenter:hs22v:*:*:*:*:*:*:*", "cpe:2.3:h:ibm:bladecenter:hs23:*:*:*:*:*:*:*", "cpe:2.3:h:ibm:bladecenter:hs23e:*:*:*:*:*:*:*", "cpe:2.3:h:ibm:bladecenter:hx5:*:*:*:*:*:*:*", "cpe:2.3:h:ibm:flex_system_x220_compute_node:-:*:*:*:*:*:*:*", "cpe:2.3:h:ibm:flex_system_x240_compute_node:-:*:*:*:*:*:*:*", "cpe:2.3:h:ibm:flex_system_x440_compute_node:-:*:*:*:*:*:*:*", "cpe:2.3:h:ibm:system_x_idataplex_dx360_m2_server:-:*:*:*:*:*:*:*", "cpe:2.3:h:ibm:system_x_idataplex_dx360_m3_server:-:*:*:*:*:*:*:*", "cpe:2.3:h:ibm:system_x_idataplex_dx360_m4_server:-:*:*:*:*:*:*:*", "cpe:2.3:h:ibm:system_x3100_m4:-:*:*:*:*:*:*:*", "cpe:2.3:h:ibm:system_x3200_m3:-:*:*:*:*:*:*:*", "cpe:2.3:h:ibm:system_x3250_m3:-:*:*:*:*:*:*:*", "cpe:2.3:h:ibm:system_x3250_m4:-:*:*:*:*:*:*:*", "cpe:2.3:h:ibm:system_x3400_m2:-:*:*:*:*:*:*:*", "cpe:2.3:h:ibm:system_x3400_m3:-:*:*:*:*:*:*:*", "cpe:2.3:h:ibm:system_x3500_m2:-:*:*:*:*:*:*:*", "cpe:2.3:h:ibm:system_x3500_m3:-:*:*:*:*:*:*:*", "cpe:2.3:h:ibm:system_x3500_m4:-:*:*:*:*:*:*:*", "cpe:2.3:h:ibm:system_x3530_m4:-:*:*:*:*:*:*:*", "cpe:2.3:h:ibm:system_x3550_m2:-:*:*:*:*:*:*:*", "cpe:2.3:h:ibm:system_x3550_m3:-:*:*:*:*:*:*:*", "cpe:2.3:h:ibm:system_x3550_m4:-:*:*:*:*:*:*:*", "cpe:2.3:h:ibm:system_x3620_m3:-:*:*:*:*:*:*:*", "cpe:2.3:h:ibm:system_x3630_m3:-:*:*:*:*:*:*:*", "cpe:2.3:h:ibm:system_x3630_m4:-:*:*:*:*:*:*:*", "cpe:2.3:h:ibm:system_x3650_m2:-:*:*:*:*:*:*:*", "cpe:2.3:h:ibm:system_x3650_m3:-:*:*:*:*:*:*:*", "cpe:2.3:h:ibm:system_x3650_m4:-:*:*:*:*:*:*:*", "cpe:2.3:h:ibm:system_x3690_x5:-:*:*:*:*:*:*:*", "cpe:2.3:h:ibm:system_x3750_m4:-:*:*:*:*:*:*:*", "cpe:2.3:h:ibm:system_x3850_x5:-:*:*:*:*:*:*:*", "cpe:2.3:h:ibm:system_x3950_x5:-:*:*:*:*:*:*:*" ]
null
null
null
4
GHSA-6pvj-2c9w-wwrp
SQL injection vulnerability in index.php in phpComasy 0.7.5 and earlier allows remote attackers to execute arbitrary SQL commands via the id parameter. NOTE: an examination of the 0.7.5 source code suggests that there is no id parameter being handled directly by index.php.
[]
null
null
null
null
CVE-2021-40924
Cross-site scripting (XSS) vulnerability in install/index.php in bugs 1.8 and below version allows remote attackers to inject arbitrary web script or HTML via the first_name parameter.
[ "cpe:2.3:a:pixeline:bugs:*:*:*:*:*:*:*:*" ]
null
6.1
null
4.3
RHSA-2018:2837
Red Hat Security Advisory: ceph-iscsi-cli security update
ceph-iscsi-cli: rbd-target-api service runs in debug mode allowing for remote command execution
[ "cpe:/a:redhat:ceph_storage:2::el7" ]
null
null
9.8
null
GHSA-h58x-cvf6-hg3f
PhotoRange Photo Vault 1.2 appends the password to the URI for authorization, which makes it easier for remote attackers to bypass intended GET restrictions via a brute-force approach, as demonstrated by "GET /login.html__passwd1" and "GET /login.html__passwd2" and so on.
[]
null
null
9.8
null
GHSA-7fcw-5hqr-7p5h
Stack-based buffer overflow in the VideoCD (VCD) code in xine-lib 1-rc2 through 1-rc5, as derived from libcdio, allows attackers to execute arbitrary code via a VideoCD with an unterminated disk label.
[]
null
null
null
null
GHSA-ph52-fx5w-3g2w
A Stored XSS issue in Student Clearance System v.1.0 allows the injection of arbitrary JavaScript in the Student registration form.
[]
null
5.4
null
null
RHSA-2022:0323
Red Hat Security Advisory: nginx:1.20 security update
nginx: Off-by-one in ngx_resolver_copy() when labels are followed by a pointer to a root domain name
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8.1
null
null
GHSA-5x95-66xj-7chm
An issue was discovered in the server in OpenLDAP before 2.4.48. When the server administrator delegates rootDN (database admin) privileges for certain databases but wants to maintain isolation (e.g., for multi-tenant deployments), slapd does not properly stop a rootDN from requesting authorization as an identity from another database during a SASL bind or with a proxyAuthz (RFC 4370) control. (It is not a common configuration to deploy a system where the server administrator and a DB administrator enjoy different levels of trust.)
[]
null
null
4.9
null
CVE-2019-15645
The zoho-salesiq plugin before 1.0.9 for WordPress has CSRF.
[ "cpe:2.3:a:zoho:salesiq:*:*:*:*:*:wordpress:*:*" ]
null
null
8.8
6.8
CVE-2022-23303
The implementations of SAE in hostapd before 2.10 and wpa_supplicant before 2.10 are vulnerable to side channel attacks as a result of cache access patterns. NOTE: this issue exists because of an incomplete fix for CVE-2019-9494.
[ "cpe:2.3:a:w1.fi:hostapd:*:*:*:*:*:*:*:*", "cpe:2.3:a:w1.fi:wpa_supplicant:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*" ]
null
9.8
null
6.8
CVE-2023-39916
Possible path traversal when storing RRDP responses
NLnet Labs’ Routinator 0.9.0 up to and including 0.12.1 contains a possible path traversal vulnerability in the optional, off-by-default keep-rrdp-responses feature that allows users to store the content of responses received for RRDP requests. The location of these stored responses is constructed from the URL of the request. Due to insufficient sanitation of the URL, it is possible for an attacker to craft a URL that results in the response being stored outside of the directory specified for it.
[ "cpe:2.3:a:nlnetlabs:routinator:*:*:*:*:*:*:*:*" ]
null
9.3
null
null
GHSA-fgh9-wfj4-j5gv
Nginx NJS v0.7.4 was discovered to contain a segmentation violation in njs_promise_reaction_job.
[]
null
7.5
null
null
GHSA-999g-vph2-wr2c
An issue was discovered in Arm Mbed TLS before 2.24.0. An attacker can recover a private key (for RSA or static Diffie-Hellman) via a side-channel attack against generation of base blinding/unblinding values.
[]
null
4.7
null
null
GHSA-3536-4v83-8gqw
The Admin CP in vBulletin 5.6.3 allows XSS via the admincp/search.php?do=dosearch URI.
[]
null
null
null
null
CVE-2022-28737
There's a possible overflow in handle_image() when shim tries to load and execute crafted EFI executables
There's a possible overflow in handle_image() when shim tries to load and execute crafted EFI executables; The handle_image() function takes into account the SizeOfRawData field from each section to be loaded. An attacker can leverage this to perform out-of-bound writes into memory. Arbitrary code execution is not discarded in such scenario.
[ "cpe:2.3:a:redhat:shim:*:*:*:*:*:*:*:*" ]
null
6.5
null
null
GHSA-p9j3-jrc9-jv9h
An issue was discovered in Couchbase Server before 7.2.4. An attacker can bypass SQL++ N1QL cURL host restrictions.
[]
null
5.4
null
null
RHSA-2025:3854
Red Hat Security Advisory: OpenJDK 17.0.15 Security Update for Windows Builds
openjdk: Better TLS connection support (Oracle CPU 2025-04) openjdk: Improve compiler transformations (Oracle CPU 2025-04) openjdk: Enhance Buffered Image handling (Oracle CPU 2025-04)
[ "cpe:/a:redhat:openjdk:17::windows" ]
null
5.6
null
null
CVE-2005-3978
Multiple SQL injection vulnerabilities in NetClassifieds Premium Edition 1.0.1, Professional Edition 1.5.1, Standard Edition 1.9.6.3, and Free Edition 1.0.1 allow remote attackers to execute arbitrary SQL commands via the (1) CatID parameter in (a) ViewCat.php and (b) gallery.php, and the (2) ItemNum parameter in (c) ViewItem.php.
[ "cpe:2.3:a:scriptdevelopers.net:netclassifieds:1.0.1:*:free:*:*:*:*:*", "cpe:2.3:a:scriptdevelopers.net:netclassifieds:1.0.1:*:premium:*:*:*:*:*", "cpe:2.3:a:scriptdevelopers.net:netclassifieds:1.5.1:*:professional:*:*:*:*:*", "cpe:2.3:a:scriptdevelopers.net:netclassifieds:1.9.6.3:*:standard:*:*:*:*:*" ]
null
null
null
7.5
RHSA-2021:4848
Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.5.2 security update and bugfix advisory
nodejs-immer: prototype pollution may lead to DoS or remote code execution mig-controller: incorrect namespaces handling may lead to not authorized usage of Migration Toolkit for Containers (MTC)
[ "cpe:/a:redhat:rhmt:1.5::el7", "cpe:/a:redhat:rhmt:1.5::el8" ]
null
6.3
null
null
RHSA-2023:5788
Red Hat Security Advisory: python-reportlab security update
python-reportlab: code injection in paraparser.py allows code execution
[ "cpe:/a:redhat:rhel_aus:8.2::appstream", "cpe:/a:redhat:rhel_e4s:8.2::appstream", "cpe:/a:redhat:rhel_tus:8.2::appstream" ]
null
9.8
null
null
CVE-2023-7111
code-projects Library Management System index.php sql injection
A vulnerability, which was classified as critical, was found in code-projects Library Management System 2.0. Affected is an unknown function of the file index.php. The manipulation of the argument category leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-249006 is the identifier assigned to this vulnerability.
[ "cpe:2.3:a:fabianros:library_management_system:2.0:*:*:*:*:*:*:*" ]
null
6.3
6.3
6.5
GHSA-m9x3-4xc7-wxxp
foomatic-rip filter, all versions, used insecurely creates temporary files for storage of PostScript data by rendering the data when the debug mode was enabled. This flaw may be exploited by a local attacker to conduct symlink attacks by overwriting arbitrary files accessible with the privileges of the user running the foomatic-rip universal print filter.
[]
null
5.5
null
null
CVE-2022-44429
In wlan driver, there is a possible missing bounds check. This could lead to local denial of service in wlan services.
[ "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:sc7731e:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:sc9832e:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t310:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*" ]
null
5.5
null
null
GHSA-7hxc-hm2f-r4g3
Opera 8.01 allows remote attackers to cause a denial of service (CPU consumption) via a crafted JPEG image, as demonstrated using random.jpg.
[]
null
null
null
null
GHSA-f33h-gm37-5r83
The Wordpress Plugin Smart Product Review plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in all versions up to, and including, 1.0.4. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
[]
null
9.8
null
null
GHSA-j2wh-mvqj-rmvp
In JetBrains TeamCity before 2025.03.2 stored XSS via GitHub Checks Webhook was possible
[]
null
4.8
null
null
GHSA-2788-7prj-r2qv
In the Linux kernel, the following vulnerability has been resolved:PCI/bwctrl: Fix NULL pointer dereference on bus number exhaustionWhen BIOS neglects to assign bus numbers to PCI bridges, the kernel attempts to correct that during PCI device enumeration. If it runs out of bus numbers, no pci_bus is allocated and the "subordinate" pointer in the bridge's pci_dev remains NULL.The PCIe bandwidth controller erroneously does not check for a NULL subordinate pointer and dereferences it on probe.Bandwidth control of unusable devices below the bridge is of questionable utility, so simply error out instead. This mirrors what PCIe hotplug does since commit 62e4492c3063 ("PCI: Prevent NULL dereference during pciehp probe").The PCI core emits a message with KERN_INFO severity if it has run out of bus numbers. PCIe hotplug emits an additional message with KERN_ERR severity to inform the user that hotplug functionality is disabled at the bridge. A similar message for bandwidth control does not seem merited, given that its only purpose so far is to expose an up-to-date link speed in sysfs and throttle the link speed on certain laptops with limited Thermal Design Power. So error out silently.User-visible messages:pci 0000:16:02.0: bridge configuration invalid ([bus 00-00]), reconfiguring [...] pci_bus 0000:45: busn_res: [bus 45-74] end is updated to 74 pci 0000:16:02.0: devices behind bridge are unusable because [bus 45-74] cannot be assigned for them [...] pcieport 0000:16:02.0: pciehp: Hotplug bridge without secondary bus, ignoring [...] BUG: kernel NULL pointer dereference RIP: pcie_update_link_speed pcie_bwnotif_enable pcie_bwnotif_probe pcie_port_probe_service really_probe
[]
null
5.5
null
null
GHSA-pwjr-xrcx-fg7p
OpenSource Moddable v10.5.0 was discovered to contain a stack overflow in the fxBinaryExpressionNodeDistribute function at /moddable/xs/sources/xsTree.c.
[]
null
7.8
null
null
CVE-2008-5124
JSCAPE Secure FTP Applet 4.8.0 and earlier does not ask the user to verify a new or mismatched SSH host key, which makes it easier for remote attackers to perform man-in-the-middle attacks.
[ "cpe:2.3:a:jscape:secure_ftp_applet:*:*:*:*:*:*:*:*", "cpe:2.3:a:jscape:secure_ftp_applet:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:jscape:secure_ftp_applet:1.2:*:*:*:*:*:*:*", "cpe:2.3:a:jscape:secure_ftp_applet:1.3:*:*:*:*:*:*:*", "cpe:2.3:a:jscape:secure_ftp_applet:1.4:*:*:*:*:*:*:*", "cpe:2.3:a:jscape:secure_ftp_applet:1.5:*:*:*:*:*:*:*", "cpe:2.3:a:jscape:secure_ftp_applet:1.6:*:*:*:*:*:*:*", "cpe:2.3:a:jscape:secure_ftp_applet:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:jscape:secure_ftp_applet:2.1:*:*:*:*:*:*:*", "cpe:2.3:a:jscape:secure_ftp_applet:2.5:*:*:*:*:*:*:*", "cpe:2.3:a:jscape:secure_ftp_applet:2.6:*:*:*:*:*:*:*", "cpe:2.3:a:jscape:secure_ftp_applet:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:jscape:secure_ftp_applet:3.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:jscape:secure_ftp_applet:3.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:jscape:secure_ftp_applet:3.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:jscape:secure_ftp_applet:3.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:jscape:secure_ftp_applet:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:jscape:secure_ftp_applet:4.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:jscape:secure_ftp_applet:4.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:jscape:secure_ftp_applet:4.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:jscape:secure_ftp_applet:4.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:jscape:secure_ftp_applet:4.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:jscape:secure_ftp_applet:4.7:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-w545-288r-rf3p
** UNSUPPPORTED WHEN ASSIGNED **Sending some requests in the web application of the vulnerable device allows information to be obtained due to the lack of security in the authentication process.
[]
null
7.5
null
null
GHSA-5m46-qxvp-2456
The CoreGraphics Window Server in Mac OS X 10.4.1 allows local users with console access to gain privileges by "launching commands into root sessions."
[]
null
null
null
null
CVE-2017-7038
A DOMParser XSS issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. tvOS before 10.2.2 is affected. The issue involves the "WebKit" component.
[ "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "cpe:2.3:a:apple:webkit:-:*:*:*:*:*:*:*" ]
null
null
6.1
4.3
GHSA-6cp6-j5p5-x552
NetBSD 1.6 up to 3.0, when a user has "set record" in .mailrc with the default umask set, creates the record file with 0644 permissions, which allows local users to read the record file.
[]
null
null
null
null
GHSA-6gx3-9944-xmmr
In the Linux kernel, the following vulnerability has been resolved:ASoC: soc-pcm: Add NULL check in BE reparentingAdd NULL check in dpcm_be_reparent API, to handle kernel NULL pointer dereference error. The issue occurred in fuzzing test.
[]
null
5.5
null
null
GHSA-g48x-6c94-mxpc
Cross-site request forgery (CSRF) vulnerability in Test/WorkArea/DmsMenu/menuActions/MenuActions.aspx in Ektron Content Management System (CMS) before 9.10 SP1 (Build 9.1.0.184.1.120) allows remote attackers to hijack the authentication of content administrators for requests that delete content via a delete action.
[]
null
null
null
null
GHSA-6vvf-9qj9-6mw8
WEPA Print Away does not verify that a user has authorization to access documents before generating print orders and associated release codes. This could allow an attacker to generate print orders and release codes for documents they don´t own and print hem without authorization. In order to exploit this vulnerability, the user must have an account with wepanow.com or any of the institutions they serve, and be logged in.
[]
null
5.4
null
null
GHSA-7rfw-27hp-w56j
OS command injection in the AP mode settings feature in /cgi-bin/luci /api/misystem/set_router_wifiap on Xiaomi R3D before 2.26.4 devices allows an attacker to execute any command via crafted JSON data.
[]
null
null
9.8
null
CVE-2004-2391
Jabber Gadu-Gadu Transport (a.k.a. jabber-gg-transport) 2.0.x before 2.0.8 allows remote attackers to cause a denial of service a message with an empty <priority/> tag.
[ "cpe:2.3:a:jabberstudio:jabber_gadu-gadu_transport:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:jabberstudio:jabber_gadu-gadu_transport:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:jabberstudio:jabber_gadu-gadu_transport:2.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:jabberstudio:jabber_gadu-gadu_transport:2.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:jabberstudio:jabber_gadu-gadu_transport:2.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:jabberstudio:jabber_gadu-gadu_transport:2.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:jabberstudio:jabber_gadu-gadu_transport:2.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:jabberstudio:jabber_gadu-gadu_transport:2.0.7:*:*:*:*:*:*:*" ]
null
null
null
5
CVE-2013-0829
Google Chrome before 24.0.1312.52 does not properly maintain database metadata, which allows remote attackers to bypass intended file-access restrictions via unspecified vectors.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1272.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1272.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1273.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1274.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1275.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1276.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1276.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1277.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1278.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1279.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1280.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1281.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1281.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1281.2:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1281.3:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1282.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1283.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1284.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1284.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1284.2:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1285.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1285.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1285.2:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1286.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1286.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1287.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1287.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1288.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1288.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1289.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1289.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1290.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1291.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1292.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1293.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1294.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1295.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1296.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1297.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1298.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1299.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1300.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1301.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1301.2:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1302.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1303.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1304.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1304.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1305.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1305.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1305.2:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1305.3:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1305.4:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1306.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1306.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1307.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1307.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1308.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1309.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1310.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1311.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1311.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.4:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.5:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.6:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.7:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.8:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.9:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.10:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.11:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.12:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.13:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.14:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.15:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.16:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.17:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.18:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.19:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.20:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.21:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.22:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.23:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.24:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.25:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.26:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.27:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.28:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.29:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.30:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.31:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.32:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.33:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.34:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.35:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.36:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.37:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.38:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.39:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.40:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.41:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.42:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.43:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.44:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.45:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.46:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.47:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.48:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.49:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.50:*:*:*:*:*:*:*" ]
null
null
null
6.4
GHSA-3gv3-3m2j-wpx7
A cross-site request forgery (CSRF) vulnerability in Zucchetti InfoBusiness before and including 4.4.1 allows arbitrary file upload.
[]
null
8.8
null
null
CVE-2023-22323
BIG-IP SSL OCSP Authentication profile vulnerability
In BIP-IP versions 17.0.x before 17.0.0.2, 16.1.x before 16.1.3.3, 15.1.x before 15.1.8.1, 14.1.x before 14.1.5.3, and all versions of 13.1.x, when OCSP authentication profile is configured on a virtual server, undisclosed requests can cause an increase in CPU resource utilization. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
[ "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*" ]
null
7.5
null
null
GHSA-j7m5-9hhg-47p4
In createOrUpdate of Permission.java and related code, there is possible permission escalation due to a logic error. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android; Versions: Android-10, Android-11, Android-8.0, Android-8.1, Android-9; Android ID: A-168319670.
[]
null
7.8
null
null
GHSA-4vq7-8699-4xgc
WMAgent arbitrary code execution via a crafted dbs-client package
WMAgent v1.3.3rc2 and 1.3.3rc1, reqmgr2 1.4.1rc5 and 1.4.0rc2, reqmon 1.4.1rc5, and global-workqueue 1.4.1rc5 allows attackers to execute arbitrary code via a crafted dbs-client package.
[]
9.3
9.8
null
null
GHSA-f9xx-q64p-q4f5
The MasterStudy LMS WordPress Plugin – for Online Courses and Education plugin for WordPress is vulnerable to unauthorized access, modification, and loss of data due to a missing capability check on several functions in versions up to, and including, 3.3.8. This makes it possible for authenticated attackers, with subscriber level permissions and above, to read and modify content such as course questions, post titles, and taxonomies.
[]
null
6.3
null
null
GHSA-8r33-7h89-2vmx
ASP.NET Core 1.0. 1.1, and 2.0 allow a cross site request forgery vulnerability due to the ASP.NET Core project templates, aka "ASP.NET Core Cross Site Request Forgery Vulnerability".
[]
null
null
6.5
null
GHSA-w88v-pjr8-cmv2
Mattermost viewing archived public channels permissions vulnerability
Mattermost fails to properly verify the permissions needed for viewing archived public channels,  allowing a member of one team to get details about the archived public channels of another team via the GET /api/v4/teams/<team-id>/channels/deleted endpoint.
[]
5.3
4.3
null
null
CVE-2019-4165
IBM StoreIQ 7.6.0.0. through 7.6.0.18 could allow a remote attacker to cause a denial of service attack using repeated requests to the server. IBM X-Force ID: 158698.
[ "cpe:2.3:a:ibm:storediq:*:*:*:*:*:*:*:*" ]
null
null
5.3
null
CVE-2014-3587
Integer overflow in the cdf_read_property_info function in cdf.c in file through 5.19, as used in the Fileinfo component in PHP before 5.4.32 and 5.5.x before 5.5.16, allows remote attackers to cause a denial of service (application crash) via a crafted CDF file. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-1571.
[ "cpe:2.3:a:christos_zoulas:file:*:*:*:*:*:*:*:*", "cpe:2.3:a:christos_zoulas:file:5.00:*:*:*:*:*:*:*", "cpe:2.3:a:christos_zoulas:file:5.01:*:*:*:*:*:*:*", "cpe:2.3:a:christos_zoulas:file:5.02:*:*:*:*:*:*:*", "cpe:2.3:a:christos_zoulas:file:5.03:*:*:*:*:*:*:*", "cpe:2.3:a:christos_zoulas:file:5.04:*:*:*:*:*:*:*", "cpe:2.3:a:christos_zoulas:file:5.05:*:*:*:*:*:*:*", "cpe:2.3:a:christos_zoulas:file:5.06:*:*:*:*:*:*:*", "cpe:2.3:a:christos_zoulas:file:5.07:*:*:*:*:*:*:*", "cpe:2.3:a:christos_zoulas:file:5.08:*:*:*:*:*:*:*", "cpe:2.3:a:christos_zoulas:file:5.09:*:*:*:*:*:*:*", "cpe:2.3:a:christos_zoulas:file:5.10:*:*:*:*:*:*:*", "cpe:2.3:a:christos_zoulas:file:5.11:*:*:*:*:*:*:*", "cpe:2.3:a:christos_zoulas:file:5.12:*:*:*:*:*:*:*", "cpe:2.3:a:christos_zoulas:file:5.13:*:*:*:*:*:*:*", "cpe:2.3:a:christos_zoulas:file:5.14:*:*:*:*:*:*:*", "cpe:2.3:a:christos_zoulas:file:5.15:*:*:*:*:*:*:*", "cpe:2.3:a:christos_zoulas:file:5.16:*:*:*:*:*:*:*", "cpe:2.3:a:christos_zoulas:file:5.17:*:*:*:*:*:*:*", "cpe:2.3:a:christos_zoulas:file:5.18:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.4.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.4.0:beta2:32-bit:*:*:*:*:*", "cpe:2.3:a:php:php:5.4.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.4.5:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.4.6:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.4.7:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.4.8:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.4.9:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.4.10:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.4.11:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.4.12:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.4.12:rc1:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.4.12:rc2:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.4.13:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.4.13:rc1:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.4.14:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.4.14:rc1:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.4.15:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.4.15:rc1:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.4.16:rc1:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.4.17:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.4.18:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.4.19:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.4.20:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.4.21:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.4.22:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.4.23:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.4.24:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.4.25:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.4.26:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.4.27:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.4.28:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.4.29:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.4.30:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.5.0:alpha1:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.5.0:alpha2:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.5.0:alpha3:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.5.0:alpha4:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.5.0:alpha5:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.5.0:alpha6:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.5.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.5.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.5.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.5.0:beta4:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.5.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.5.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.5.5:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.5.6:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.5.7:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.5.8:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.5.9:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.5.10:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.5.11:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.5.12:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.5.13:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.5.14:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.5.15:*:*:*:*:*:*:*" ]
null
null
null
4.3
GHSA-q82g-jxf6-8qm5
openITCOCKPIT before 3.7.1 allows code injection, aka RVID 1-445b21.
[]
null
null
null
null
GHSA-xrvc-5f74-4x4x
The CLUEVO LMS, E-Learning Platform WordPress plugin before 1.8.1 does not sanitise and escape Course's module, which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed
[]
null
null
null
null
GHSA-w49g-9f3f-c384
An Incorrect Authorization vulnerability was identified in GitHub Enterprise Server, allowing an attacker to update the title, assignees, and labels of any issue inside a public repository. This was only exploitable inside a public repository. This vulnerability affected GitHub Enterprise Server versions before 3.14 and was fixed in versions 3.13.3, 3.12.8, and 3.11.14. Versions 3.10 of GitHub Enterprise Server are not affected. This vulnerability was reported via the GitHub Bug Bounty program.
[]
5.3
4.3
null
null
GHSA-cvpp-fv5f-8hch
event.c in acpid (aka acpid2) before 2.0.11 does not have an appropriate umask setting during execution of event-handler scripts, which might allow local users to (1) perform write operations within directories created by a script, or (2) read files created by a script, via standard filesystem system calls.
[]
null
null
null
null
GHSA-66w4-34qw-x386
ext/imap/php_imap.c in PHP 5.x and 7.x before 7.3.0 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an empty string in the message argument to the imap_mail function.
[]
null
null
7.5
null
GHSA-2rmq-m43q-chm7
The Visualizer: Tables and Charts Manager for WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Import Data From File feature in all versions up to, and including, 3.11.8 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
6.4
null
null
CVE-2017-14330
Extreme EXOS 16.x, 21.x, and 22.x allows administrators to obtain a root shell via vectors involving a privileged process.
[ "cpe:2.3:o:extremenetworks:extremexos:15.7:*:*:*:*:*:*:*", "cpe:2.3:o:extremenetworks:extremexos:16.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:extremenetworks:extremexos:16.1.3:*:*:*:*:*:*:*", "cpe:2.3:o:extremenetworks:extremexos:16.1.4:*:*:*:*:*:*:*", "cpe:2.3:o:extremenetworks:extremexos:16.2:*:*:*:*:*:*:*", "cpe:2.3:o:extremenetworks:extremexos:16.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:extremenetworks:extremexos:16.2.3:*:*:*:*:*:*:*", "cpe:2.3:o:extremenetworks:extremexos:16.2.4:*:*:*:*:*:*:*", "cpe:2.3:o:extremenetworks:extremexos:21.1:*:*:*:*:*:*:*", "cpe:2.3:o:extremenetworks:extremexos:21.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:extremenetworks:extremexos:21.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:extremenetworks:extremexos:21.1.3:*:*:*:*:*:*:*", "cpe:2.3:o:extremenetworks:extremexos:21.1.4:*:*:*:*:*:*:*", "cpe:2.3:o:extremenetworks:extremexos:22.1:*:*:*:*:*:*:*", "cpe:2.3:o:extremenetworks:extremexos:22.2:*:*:*:*:*:*:*", "cpe:2.3:o:extremenetworks:extremexos:22.3:*:*:*:*:*:*:*", "cpe:2.3:o:extremenetworks:extremexos:22.4:*:*:*:*:*:*:*" ]
null
null
6.7
7.2
GHSA-p9r2-gghq-hc57
Jenkins Multijob plugin did not check permissions in the Resume Build action
Jenkins Multijob plugin version 1.25 and earlier did not check permissions in the Resume Build action, allowing anyone with Job/Read permission to resume the build. Multijob plugin 1.26 introduced a permission check requiring Overall/Administer. This was lowered to Job/Build in version 1.27.
[]
null
null
4.3
null
CVE-2014-0647
The Starbucks 2.6.1 application for iOS stores sensitive information in plaintext in the Crashlytics log file (/Library/Caches/com.crashlytics.data/com.starbucks.mystarbucks/session.clslog), which allows attackers to discover usernames, passwords, and e-mail addresses via an application that reads session.clslog.
[ "cpe:2.3:a:starbucks:starbucks:2.6.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" ]
null
null
null
2.1
RHSA-2020:4163
Red Hat Security Advisory: thunderbird security update
Mozilla: Memory safety bugs fixed in Firefox 81 and Firefox ESR 78.3 Mozilla: XSS when pasting attacker-controlled data into a contenteditable element Mozilla: Download origin spoofing via redirect Mozilla: When recursing through layers while scrolling, an iterator may have become invalid, resulting in a potential use-after-free scenario
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
8.8
6.1
null
CVE-2023-45705
HCL BigFix Platform is susceptible to Server Side Request Forgery (SSRF)
An administrative user of WebReports may perform a Server Side Request Forgery (SSRF) exploit through SMTP configuration options.
[]
null
3.5
null
null
GHSA-wfhw-vq46-fmpc
The mintToken function of a smart contract implementation for sexhdsolo, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value.
[]
null
null
7.5
null
CVE-2021-23364
Regular Expression Denial of Service (ReDoS)
The package browserslist from 4.0.0 and before 4.16.5 are vulnerable to Regular Expression Denial of Service (ReDoS) during parsing of queries.
[ "cpe:2.3:a:browserslist_project:browserslist:*:*:*:*:*:node.js:*:*" ]
null
5.3
null
null
GHSA-wx7r-grcc-7rrf
The ContentProvider in the EPSON iPrint application 6.6.3 for Android does not properly restrict data access. This allows an attacker's application to read scanned documents.
[]
null
null
7.5
null
CVE-2010-2220
Adobe Flash Media Server (FMS) before 3.0.6, and 3.5.x before 3.5.4, allows attackers to cause a denial of service via unspecified vectors, related to an "input validation issue."
[ "cpe:2.3:a:adobe:flash_media_server:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_media_server:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_media_server:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_media_server:2.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_media_server:2.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_media_server:2.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_media_server:2.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_media_server:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_media_server:3.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_media_server:3.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_media_server:3.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_media_server:3.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_media_server:3.5:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_media_server:3.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_media_server:3.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_media_server:3.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_media_server_2:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_media_server_2:2.0.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*" ]
null
null
null
5
CVE-2015-3906
The logcat_dump_text function in wiretap/logcat.c in the Android Logcat file parser in Wireshark 1.12.x before 1.12.5 does not properly handle a lack of \0 termination, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted message in a packet, a different vulnerability than CVE-2015-3815.
[ "cpe:2.3:a:wireshark:wireshark:1.12.0:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.12.1:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.12.2:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.12.3:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.12.4:*:*:*:*:*:*:*" ]
null
null
null
5
RHSA-2024:9122
Red Hat Security Advisory: xorg-x11-server security update
xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice xorg-x11-server: Use-after-free in ProcRenderAddGlyphs
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
7.8
null
null
GHSA-9955-4w5r-942h
A vulnerability was found in WP White Security WP Activity Log Plugin. It has been classified as problematic. This affects an unknown part of the component HTTP Header Handler. The manipulation of the argument X-Forwarded-For leads to improper output neutralization for logs. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-214053 was assigned to this vulnerability.
[]
null
null
null
null
GHSA-xgv7-wccx-23jh
A vulnerability was found in SourceCodester Simple Payroll System 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file admin/?page=admin of the component POST Parameter Handler. The manipulation of the argument fullname leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-222073 was assigned to this vulnerability.
[]
null
4.8
null
null
GHSA-8x7r-vpqh-4jm4
A maliciously crafted X_B file when parsed through Autodesk® AutoCAD® 2023 can be used to cause an Integer Overflow. A malicious actor can leverage this vulnerability to cause a crash or read sensitive data, or execute arbitrary code in the context of the current process.
[]
null
7.8
null
null
GHSA-vhxc-xrx4-c2rp
SmarterTools SmarterMail 16.x before build 6985 has hardcoded secret keys. An unauthenticated attacker could access other users? emails and file attachments. It was also possible to interact with mailing lists.
[]
null
null
null
null
cisco-sa-ise-file-upload-P4M8vwXY
Cisco Identity Services Engine Arbitrary File Upload Vulnerability
A vulnerability in the API of Cisco Identity Services Engine (ISE) and Cisco ISE Passive Identity Connector (ISE-PIC) could allow an authenticated, remote attacker with administrative privileges to upload files to an affected device. This vulnerability is due to improper validation of the file copy function. An attacker could exploit this vulnerability by sending a crafted file upload request to a specific API endpoint. A successful exploit could allow the attacker to upload arbitrary files to an affected system. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
[]
null
4.9
null
null
CVE-2012-4250
Stack-based buffer overflow in the RequestScreenOptimization function in the XProcessControl.ocx ActiveX control in msls31.dll in Samsung NET-i viewer 1.37 allows remote attackers to execute arbitrary code via a long string in the first argument.
[ "cpe:2.3:a:samsung:net-i_viewer:1.37:*:*:*:*:*:*:*" ]
null
null
null
9.3
CVE-2016-9012
CloudVision Portal (CVP) before 2016.1.2.1 allows remote authenticated users to gain access to the internal configuration mechanisms via the management plane, related to a request to /web/system/console/bundle.
[ "cpe:2.3:a:arista:cloudvision_portal:*:*:*:*:*:*:*:*" ]
null
null
8.8
6.5
CVE-2023-6748
Custom Field Template <= 2.6.1 - Authenticated(Contributor+) Information Exposure
The Custom Field Template plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.6.1 via the 'cft' shortcode. This makes it possible for authenticated attackers with contributor access and above, to extract sensitive data including arbitrary post metadata.
[]
null
4.3
null
null
GHSA-c7jj-cg79-r337
Buffer overflow in VideoSpirit Pro 1.6.8.1, 1.68, and earlier; and VideoSpirit Lite 1.4.0.1 and possibly other versions; allows user-assisted remote attackers to execute arbitrary code via a VideoSpirit project (.visprj) file containing a valitem element with a long "value" attribute, as demonstrated using a valitem with the mp3 name.
[]
null
null
null
null
GHSA-vf63-29qv-79ch
Missing Authorization vulnerability in ShapedPlugin LLC Category Slider for WooCommerce allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Category Slider for WooCommerce: from n/a through 1.4.15.
[]
null
4.3
null
null
GHSA-cwxx-gwwj-pqjq
Jenkins Perforce Plugin uses ineffective credentials encryption
An exposure of sensitive information vulnerability exists in Jenkins Perforce Plugin version 1.3.36 and older in PerforcePasswordEncryptor.java that allows attackers with local file system access to obtain encrypted Perforce passwords and decrypt them.
[]
null
null
6.5
null
GHSA-fr4g-hmc7-w66h
A potential DOS vulnerability was discovered in GitLab CE/EE affecting all versions from 13.1 prior to 14.7.7, 14.8.0 prior to 14.8.5, and 14.9.0 prior to 14.9.2. The api to update an asset as a link from a release had a regex check which caused exponential number of backtracks for certain user supplied values resulting in high CPU usage.
[]
null
4.3
null
null
GHSA-p8w6-cvmc-rg5g
A improper limitation of a pathname to a restricted directory ('path traversal') in Fortinet FortiSandbox version 4.4.0 through 4.4.3 and 4.2.0 through 4.2.6 and 4.0.0 through 4.0.4 allows attacker to execute unauthorized code or commands via crafted HTTP requests.
[]
null
8.1
null
null
GHSA-729c-c748-4933
The Frankly Chat (aka com.chatfrankly.android) application 3.0.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[]
null
null
null
null
GHSA-gw9q-37r7-h423
Raw Image Extension Remote Code Execution Vulnerability.
[]
null
7.3
null
null
CVE-2011-1068
Microsoft Windows Azure Software Development Kit (SDK) 1.3.x before 1.3.20121.1237, when Full IIS and a Web Role are used with an ASP.NET application, does not properly support the use of cookies for maintaining state, which allows remote attackers to obtain potentially sensitive information by reading an encrypted cookie and performing unspecified other steps.
[ "cpe:2.3:a:microsoft:windows_azure_sdk:1.3:*:*:*:*:*:*:*" ]
null
null
null
2.6
GHSA-vqvc-vrx3-5hgj
Stack-based buffer overflow in pop3d in Cyrus IMAPD (cyrus-imapd) 2.3.2, when the popsubfolders option is enabled, allows remote attackers to execute arbitrary code via a long USER command.
[]
null
null
null
null
CVE-2001-1429
Buffer overflow in mcedit in Midnight Commander 4.5.1 allows local users to cause a denial of service (segmentation fault) and possibly execute arbitrary code via a crafted text file.
[ "cpe:2.3:a:midnight_commander:midnight_commander:4.5.1:*:*:*:*:*:*:*" ]
null
null
null
4.6