id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
139k
cpes
sequencelengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
GHSA-q4j5-jpvw-4ww8
BadBlue 2.5 allows remote attackers to cause a denial of service (refuse HTTP connections) via a large number of connections from the same IP address.
[]
null
null
null
null
GHSA-4g2c-8mg7-7g89
: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in uploaditem.asp of Telos Automated Message Handling System allows a remote attacker to inject arbitrary script into an AMHS session. This issue affects: Telos Automated Message Handling System versions prior to 4.1.5.5.
[]
null
null
null
null
CVE-2022-30257
An issue was discovered in Technitium DNS Server through 8.0.2 that allows variant V1 of unintended domain name resolution. A revoked domain name can still be resolvable for a long time, including expired domains and taken-down malicious domains. The effects of an exploit would be widespread and highly impactful, because the exploitation conforms to de facto DNS specifications and operational practices, and overcomes current mitigation patches for "Ghost" domain names.
[ "cpe:2.3:a:technitium:dns_server:*:*:*:*:*:*:*:*" ]
null
9.8
null
null
GHSA-4f2h-j443-g993
A lack of rate limiting in pjActionAjaxSend in Car Rental v3.0 allows attackers to cause resource exhaustion.
[]
null
7.5
null
null
CVE-2002-0802
The multibyte support in PostgreSQL 6.5.x with SQL_ASCII encoding consumes an extra character when processing a character that cannot be converted, which could remove an escape character from the query and make the application subject to SQL injection attacks.
[ "cpe:2.3:a:postgresql:postgresql:6.5.0:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2009-2500
Integer overflow in GDI+ in Microsoft Internet Explorer 6 SP1, Windows XP SP2 and SP3, Office XP SP3, Office 2003 SP3, 2007 Microsoft Office System SP1 and SP2, Office Project 2002 SP1, Visio 2002 SP2, Office Word Viewer, Word Viewer 2003 Gold and SP3, Office Excel Viewer 2003 Gold and SP3, Office Excel Viewer, Office PowerPoint Viewer 2007 Gold, SP1, and SP2, Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP1 and SP2, Expression Web, Expression Web 2, Groove 2007 Gold and SP1, Works 8.5, SQL Server 2000 Reporting Services SP2, SQL Server 2005 SP2 and SP3, Report Viewer 2005 SP1, Report Viewer 2008 Gold and SP1, and Forefront Client Security 1.0 allows remote attackers to execute arbitrary code via a crafted WMF image file, aka "GDI+ WMF Integer Overflow Vulnerability."
[ "cpe:2.3:o:microsoft:windows_2003_server:*:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2003_server:*:sp2:itanium:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2003_server:*:sp2:x64:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:*:itanium:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:*:x32:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:*:x64:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:*:*:x64:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:sp2:professional_x64:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*", "cpe:2.3:a:microsoft:.net_framework:1.1:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:.net_framework:2.0:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:.net_framework:2.0:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:6:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:report_viewer:2005:sp1:redistributable_package:*:*:*:*:*", "cpe:2.3:a:microsoft:report_viewer:2008:*:redistributable_package:*:*:*:*:*", "cpe:2.3:a:microsoft:report_viewer:2008:sp1:redistributable_package:*:*:*:*:*", "cpe:2.3:a:microsoft:sql_server:2005:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sql_server:2005:sp2:itanium:*:*:*:*:*", "cpe:2.3:a:microsoft:sql_server:2005:sp2:x64:*:*:*:*:*", "cpe:2.3:a:microsoft:sql_server:2005:sp3:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sql_server:2005:sp3:itanium:*:*:*:*:*", "cpe:2.3:a:microsoft:sql_server:2005:sp3:x64:*:*:*:*:*", "cpe:2.3:a:microsoft:sql_server_reporting_services:2000:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:excel_viewer:2003:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:excel_viewer:2003:sp3:*:*:*:*:*:*", "cpe:2.3:a:microsoft:expression_web:*:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:expression_web:2:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2003:sp3:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2007:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2007:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:xp:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office_compatibility_pack:2007:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office_compatibility_pack:2007:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office_excel_viewer:*:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office_groove:2007:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office_groove:2007:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office_powerpoint_viewer:*:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office_powerpoint_viewer:2007:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office_powerpoint_viewer:2007:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office_word_viewer:*:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:project:2002:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:visio:2002:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:word_viewer:2003:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:word_viewer:2003:sp3:*:*:*:*:*:*", "cpe:2.3:a:microsoft:works:8.5:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:platform_sdk:*:*:redistrutable_gdi\\+:*:*:*:*:*", "cpe:2.3:a:microsoft:visual_studio:2008:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:visual_studio:2008:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:visual_studio_.net:2003:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:visual_studio_.net:2005:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:forefront_client_security:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:visual_foxpro:8.0:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:visual_foxpro:9.0:sp2:*:*:*:*:*:*" ]
null
null
null
9.3
GHSA-2jqv-6gjj-98r2
Windows Telephony Service Remote Code Execution Vulnerability
[]
null
8.8
null
null
CVE-2017-1002002
Vulnerability in wordpress plugin webapp-builder v2.0, The plugin includes unlicensed vulnerable CMS software from http://www.invedion.com/
[ "cpe:2.3:a:webapp-builder_project:webapp-builder:2.0:*:*:*:*:wordpress:*:*" ]
null
null
9.8
7.5
GHSA-phg5-5p54-mrqm
Bandwebsite (aka Bandsite portal system) 1.5 allows remote attackers to create administrative accounts via a direct request to admin.php with the Login parameter set to 1.
[]
null
null
null
null
CVE-2013-1840
The v1 API in OpenStack Glance Essex (2012.1), Folsom (2012.2), and Grizzly, when using the single-tenant Swift or S3 store, reports the location field, which allows remote authenticated users to obtain the operator's backend credentials via a request for a cached image.
[ "cpe:2.3:a:openstack:glance:v1:*:*:*:*:*:*:*", "cpe:2.3:a:openstack:essex:2012.1:*:*:*:*:*:*:*", "cpe:2.3:a:openstack:folsom:2012.2:*:*:*:*:*:*:*", "cpe:2.3:a:amazon:s3_store:-:*:*:*:*:*:*:*", "cpe:2.3:a:openstack:swift:-:*:*:*:*:*:*:*" ]
null
null
null
3.5
CVE-2023-0604
WP Food Manager < 1.0.4 - Admin+ Stored XSS
The WP Food Manager WordPress plugin before 1.0.4 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
[ "cpe:2.3:a:wpfoodmanager:wp_food_manager:*:*:*:*:*:wordpress:*:*" ]
null
5.4
null
null
CVE-2023-25542
Dell Trusted Device Agent, versions prior to 5.3.0, contain(s) an improper installation permissions vulnerability. An unauthenticated local attacker could potentially exploit this vulnerability, leading to escalated privileges.
[ "cpe:2.3:a:dell:trusted_device_agent:*:*:*:*:*:*:*:*" ]
null
7
null
null
CVE-2019-10691
The JSON encoder in Dovecot before 2.3.5.2 allows attackers to repeatedly crash the authentication service by attempting to authenticate with an invalid UTF-8 sequence as the username.
[ "cpe:2.3:a:dovecot:dovecot:*:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*" ]
null
null
7.5
5
GHSA-c9c6-6qvf-4m65
netconsd prior to v0.2 was vulnerable to an integer overflow in its parse_packet function. A malicious individual could leverage this overflow to create heap memory corruption with attacker controlled data.
[]
null
9.8
null
null
RHSA-2018:2405
Red Hat Security Advisory: Red Hat FIS 2.0 on Fuse 6.3.0 R7 security and bug fix update
spring-boot: Malicious PATCH requests submitted to servers can use specially crafted JSON data to run arbitrary Java code undertow: Client can use bogus uri in Digest authentication spring-framework: Improper URL path validation allows for bypassing of security checks on static resources ignite: Possible Execution of Arbitrary Code Within Deserialization Endpoints spark: Absolute and relative pathnames allow for unintended static file disclosure
[ "cpe:/a:redhat:jboss_fuse:6.3" ]
null
null
5.3
null
CVE-2019-12323
The HC.Server service in Hosting Controller HC10 10.14 allows an Invalid Pointer Write DoS.
[ "cpe:2.3:a:hostingcontroller:hc10:10.14:*:*:*:*:*:*:*" ]
null
null
7.5
5
CVE-2015-6289
Cisco IOS 15.5(3)M on Integrated Services Router (ISR) 800, 819, and 829 devices allows remote attackers to cause a denial of service (memory consumption) via crafted TCP packets on the SSH port, aka Bug ID CSCuu13476.
[ "cpe:2.3:o:cisco:ios:15.5\\(3\\)m:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:800_integrated_services_router:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:819_integrated_services_router:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:829_integrated_services_router:*:*:*:*:*:*:*:*" ]
null
null
7.5
5
CVE-2017-18691
An issue was discovered on Samsung mobile devices with M(6.0) and N(7.0) (Exynos8890 chipsets) software. There are multiple Buffer Overflows in TSP sysfs cmd_store. The Samsung ID is SVE-2016-7500 (January 2017).
[ "cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*", "cpe:2.3:h:samsung:exynos_8890:-:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
CVE-2024-54105
Read/Write vulnerability in the image decoding module Impact: Successful exploitation of this vulnerability will affect availability.
[ "cpe:2.3:o:huawei:harmonyos:5.0.0:*:*:*:*:*:*:*" ]
null
5.1
null
null
CVE-2009-2872
Cisco IOS 12.0 through 12.4, when IP-based tunnels and the Cisco Express Forwarding feature are enabled, allows remote attackers to cause a denial of service (device reload) via a malformed packet that is not properly handled during switching from one tunnel to a second tunnel, aka Bug IDs CSCsh97579 and CSCsq31776.
[ "cpe:2.3:o:cisco:ios:12.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0da:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0db:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0dc:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0sc:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0sl:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0sp:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0st:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0sx:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0sy:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0sz:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0t:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0w:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0wc:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0xa:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0xb:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0xc:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0xd:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0xe:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0xg:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0xh:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0xi:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0xj:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0xk:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0xl:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0xm:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0xn:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0xq:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0xr:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0xt:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0xv:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1aa:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1ax:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1ay:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1cx:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1da:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1db:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1dc:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1e:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1ea:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1eb:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1ec:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1eo:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1eu:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1ew:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1ex:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1ey:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1ez:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1ga:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1gb:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1t:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1xa:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1xb:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1xc:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1xd:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1xe:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1xf:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1xg:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1xh:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1xi:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1xj:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1xl:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1xm:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1xp:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1xq:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1xr:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1xs:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1xt:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1xu:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1xv:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1xw:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1xx:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1xy:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1xz:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1ya:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1yb:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1yc:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1yd:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1ye:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1yf:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1yh:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.1yi:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2b:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2bc:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2bw:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2bx:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2by:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2bz:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2cx:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2cy:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2cz:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2da:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2dd:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2dx:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2ew:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2ewa:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2ex:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2ez:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2fz:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2ira:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2irb:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2irc:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2ixa:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2ixb:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2ixc:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2ixd:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2ixe:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2ixf:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2ixg:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2ixh:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2ja:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2jk:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2mb:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2mc:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2sb:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2sbc:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2sca:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2scb:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2se:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2sea:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2seb:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2sec:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2sed:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2see:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2sef:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2seg:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2sg:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2sga:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2sm:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2so:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2sq:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2sra:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2srb:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2src:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2srd:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2ste:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2su:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2sv:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2sva:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2svd:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2sve:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2sx:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2sxa:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2sxb:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2sxd:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2sxe:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2sxf:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2sxh:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2sxi:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2sy:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2sz:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2t:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2tpc:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xa:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xb:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xc:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xd:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xf:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xg:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xh:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xi:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xj:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xk:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xl:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xm:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xo:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xq:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xr:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xs:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xt:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xu:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xv:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2ya:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2yb:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2yc:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2yd:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2ye:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2yg:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2yj:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2yk:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2yl:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2ym:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2yn:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2yo:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2yq:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2yr:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2yt:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2yu:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2yv:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2yw:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2yx:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2yy:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2za:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2zb:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2zc:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2zd:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2zf:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2zg:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2zh:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2zj:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2zl:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2zp:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2zu:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2zx:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2zya:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3b:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3bc:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3bw:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3ja:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3jea:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3jeb:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3jec:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3jk:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3jl:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3t:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3tpc:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3va:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3xa:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3xb:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3xc:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3xd:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3xf:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3xg:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3xi:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3xj:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3xk:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3xl:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3xq:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3xr:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3xu:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3xx:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3xy:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3xz:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3yd:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3yf:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3yg:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3yi:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3yj:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3yk:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3ym:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3yq:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3ys:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3yt:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3yu:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3yx:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3yz:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4ja:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4jda:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4jdc:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4jdd:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4jk:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4jl:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4jma:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4jx:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4md:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4mda:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4sw:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4t:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xa:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xb:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xc:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xd:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xe:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xf:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xg:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xj:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xk:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xl:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xm:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xn:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xp:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xq:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xr:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xt:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xv:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xw:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xy:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xz:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4ya:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4yb:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4yd:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4ye:*:*:*:*:*:*:*" ]
null
null
null
6.8
CVE-2020-20740
PDFResurrect before 0.20 lack of header validation checks causes heap-buffer-overflow in pdf_get_version().
[ "cpe:2.3:a:pdfresurrect_project:pdfresurrect:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*" ]
null
7.8
null
6.8
CVE-2009-4821
The D-Link DIR-615 with firmware 3.10NA does not require administrative authentication for apply.cgi, which allows remote attackers to (1) change the admin password via the admin_password parameter, (2) disable the security requirement for the Wi-Fi network via unspecified vectors, or (3) modify DNS settings via unspecified vectors.
[ "cpe:2.3:h:dlink:dir-615:3.10na:*:*:*:*:*:*:*" ]
null
null
null
5
GHSA-7crh-9v7x-2x2r
The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.3, macOS Monterey 12.6.4, macOS Big Sur 11.7.5, iOS 16.4 and iPadOS 16.4. An app may be able to read arbitrary files
[]
null
5.5
null
null
CVE-2019-1010245
The Linux Foundation ONOS SDN Controller 1.15 and earlier versions is affected by: Improper Input Validation. The impact is: A remote attacker can execute arbitrary commands on the controller. The component is: apps/yang/src/main/java/org/onosproject/yang/impl/YangLiveCompilerManager.java. The attack vector is: network connectivity. The fixed version is: 1.15.
[ "cpe:2.3:o:linuxfoundation:open_network_operating_system:*:*:*:*:*:*:*:*" ]
null
null
9.8
7.5
GHSA-h94c-v9h6-hf45
The Kredeum NFTs, the easiest way to sell your NFTs directly on your WordPress site plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'kredeum_opensky' shortcode in all versions up to, and including, 1.6.9 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
6.4
null
null
CVE-2020-29487
An issue was discovered in Xen XAPI before 2020-12-15. Certain xenstore keys provide feedback from the guest, and are therefore watched by toolstack. Specifically, keys are watched by xenopsd, and data are forwarded via RPC through message-switch to xapi. The watching logic in xenopsd sends one RPC update containing all data, any time any single xenstore key is updated, and therefore has O(N^2) time complexity. Furthermore, message-switch retains recent (currently 128) RPC messages for diagnostic purposes, yielding O(M*N) space complexity. The quantity of memory a single guest can monopolise is bounded by xenstored quota, but the quota is fairly large. It is believed to be in excess of 1G per malicious guest. In practice, this manifests as a host denial of service, either through message-switch thrashing against swap, or OOMing entirely, depending on dom0's configuration. (There are no quotas in xenopsd to limit the quantity of keys that result in RPC traffic.) A buggy or malicious guest can cause unreasonable memory usage in dom0, resulting in a host denial of service. All versions of XAPI are vulnerable. Systems that are not using the XAPI toolstack are not vulnerable.
[ "cpe:2.3:o:xen:xapi:*:*:*:*:*:*:*:*" ]
null
7.5
null
7.8
GHSA-qc5p-mrgm-82mp
Microsoft Local Security Authority Subsystem Service Information Disclosure Vulnerability
[]
null
5.5
null
null
CVE-2024-11605
WP Publications <= 1.2 - Admin+ Stored XSS
The wp-publications WordPress plugin through 1.2 does not escape filenames before outputting them back in the page, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
[]
null
4.8
null
null
CVE-2011-2792
Use-after-free vulnerability in Google Chrome before 13.0.782.107 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to float removal.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" ]
null
null
null
6.8
GHSA-6m23-76r2-6p43
The Apport hook (DistUpgradeApport.py) in Update Manager, as used by Ubuntu 12.04 LTS, 11.10, and 11.04, uploads the /var/log/dist-upgrade directory when reporting bugs to Launchpad, which allows remote attackers to read repository credentials by viewing a public bug report. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-0949.
[]
null
null
null
null
CVE-2023-39915
Crashes on parsing certain invalid RPKI objects
NLnet Labs' Routinator up to and including version 0.12.1 may crash when trying to parse certain malformed RPKI objects. This is due to insufficient input checking in the bcder library covered by CVE-2023-39914.
[ "cpe:2.3:a:nlnetlabs:routinator:*:*:*:*:*:*:*:*" ]
null
7.5
null
null
CVE-2024-10550
Denial of Service by ReDOS in h2oai/h2o-3
A vulnerability in the `/3/ParseSetup` endpoint of h2oai/h2o-3 version 3.46.0.1 allows for a denial of service (DoS) attack. The endpoint applies a user-specified regular expression to a user-controllable string. This can be exploited by an attacker to cause inefficient regular expression complexity, leading to the exhaustion of server resources and making the server unresponsive.
[]
null
null
7.5
null
GHSA-979f-qh32-f5vr
A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory, aka 'Windows VBScript Engine Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-0665, CVE-2019-0666, CVE-2019-0667.
[]
null
null
8.8
null
GHSA-r64x-jr44-wh33
Certain NETGEAR devices are affected by stored XSS. This affects D7800 before 1.0.1.34, DM200 before 1.0.0.52, R6100 before 1.0.1.22, R7500 before 1.0.0.122, R7500v2 before 1.0.3.26, R7800 before 1.0.2.42, R8900 before 1.0.4.2, R9000 before 1.0.3.16, WNDR4300 before 1.0.2.98, WNDR4300v2 before 1.0.0.54, WNDR4500v3 before 1.0.0.54, and WNR2000v5 before 1.0.0.64.
[]
null
null
null
null
GHSA-7529-g7rg-78rw
Missing Authorization vulnerability in Quý Lê 91 Administrator Z allows Privilege Escalation. This issue affects Administrator Z: from n/a through 2025.03.24.
[]
null
8.8
null
null
GHSA-qmq6-jpvg-j547
Magento Commerce versions 2.4.2 (and earlier), 2.4.2-p1 (and earlier) and 2.3.7 (and earlier) are affected by an Improper Neutralization of Special Elements Used In A Command via the Data collection endpoint. An attacker with admin privileges can upload a specially crafted file to achieve remote code execution.
[]
null
7.2
null
null
CVE-2014-4481
Integer overflow in CoreGraphics in Apple iOS before 8.1.3, Apple OS X before 10.10.2, and Apple TV before 7.0.3 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted PDF document.
[ "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*" ]
null
null
null
6.8
GHSA-5fj4-9h5f-w6xg
IBM InfoSphere Information Server 9.1, 11.3, 11.5, and 11.7 is vulnerable to a XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 147630.
[]
null
null
9.1
null
RHSA-2017:2760
Red Hat Security Advisory: kernel security and bug fix update
kernel: Stack overflow via ecryptfs and /proc/$pid/environ
[ "cpe:/o:redhat:rhel_eus:6.7::computenode", "cpe:/o:redhat:rhel_eus:6.7::server" ]
null
null
8.1
null
RHSA-2012:1461
Red Hat Security Advisory: libproxy security update
libproxy: PAC handling insufficient content length check leading to buffer overflow
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
GHSA-84fr-qhp6-c3xx
Buffer overflow in AnalogX SimpleServer:Shout 1.0 allows remote attackers to cause a denial of service and execute arbitrary code via a long request to TCP port 8001.
[]
null
null
null
null
GHSA-6hc8-c5v3-f5m5
Cross-site scripting in Control Panel in TerraMaster TOS version 3.1.03 allows attackers to execute JavaScript when viewing shared folders via their descriptions.
[]
null
null
5.4
null
RHSA-2022:0841
Red Hat Security Advisory: Red Hat Virtualization Host security and bug fix update [ovirt-4.4.10] Async #1
kernel: Use After Free in unix_gc() which could result in a local privilege escalation kernel: local privilege escalation by exploiting the fsconfig syscall parameter leads to container breakout kernel: possible privileges escalation due to missing TLB flush kernel: remote stack overflow via kernel panic on systems using TIPC may lead to DoS kernel: improper initialization of the "flags" member of the new pipe_buffer kernel: failing usercopy allows for use-after-free exploitation cyrus-sasl: failure to properly escape SQL input allows an attacker to execute arbitrary SQL commands
[ "cpe:/o:redhat:rhev_hypervisor:4.4::el8" ]
null
8.8
null
null
GHSA-4w7g-22mj-6g5c
In ProtocolUnsolOnSSAdapter::GetServiceClass() of protocolcalladapter.cpp, there is a possible out-of-bounds read due to a missing bounds check. This could lead to local information disclosure with baseband firmware compromise required. User Interaction is not needed for exploitation.
[]
null
5.1
null
null
GHSA-p2c8-q49f-8f5v
Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability
[]
null
7.5
null
null
CVE-2010-3232
Microsoft Excel 2003 SP3 and 2007 SP2; Office 2004 and 2008 for Mac; Open XML File Format Converter for Mac; Excel Viewer SP2; and Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP2 do not properly validate record information, which allows remote attackers to execute arbitrary code via a crafted Excel document, aka "Excel File Format Parsing Vulnerability."
[ "cpe:2.3:a:microsoft:excel:2003:sp3:*:*:*:*:*:*", "cpe:2.3:a:microsoft:excel:2007:sp3:*:*:*:*:*:*", "cpe:2.3:a:microsoft:excel_viewer:*:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2004:*:mac:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2008:*:mac:*:*:*:*:*", "cpe:2.3:a:microsoft:office_compatibility_pack:2007:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:open_xml_file_format_converter:*:*:mac:*:*:*:*:*" ]
null
null
null
9.3
CVE-2025-25361
An arbitrary file upload vulnerability in the component /cms/CmsWebFileAdminController.java of PublicCMS v4.0.202406 allows attackers to execute arbitrary code via uploading a crafted svg or xml file.
[]
null
9.8
null
null
GHSA-59w2-7pc8-55mg
An issue was discovered in CommScope Arris DG3450 Cable Gateway AR01.02.056.18_041520_711.NCS.10. A reflected XSS vulnerability was discovered in the https_redirect.php web page via the page parameter.
[]
null
6.1
null
null
GHSA-94p5-m4w6-h846
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Haris Zulfiqar Tooltip allows DOM-Based XSS. This issue affects Tooltip: from n/a through 1.0.1.
[]
null
6.5
null
null
CVE-2020-6356
SAP 3D Visual Enterprise Viewer, version - 9, allows a user to open manipulated BMP file received from untrusted sources which results in crashing of the application and becoming temporarily unavailable until the user restarts the application, this is caused due to Improper Input Validation.
[ "cpe:2.3:a:sap:3d_visual_enterprise_viewer:9:*:*:*:*:*:*:*" ]
null
null
4.3
null
GHSA-ccpv-hwx8-pxh2
Buffer copy without checking size of input for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an authenticated user to potentially enable escalation of privilege via local access.
[]
null
null
null
null
CVE-2023-51741
Cleartext Submission of Password vulnerability in Skyworth Router
This vulnerability exist in Skyworth Router CM5100, version 4.1.1.24, due to transmission of authentication credentials in plaintext over the network. A remote attacker could exploit this vulnerability by eavesdropping on the victim’s network traffic to extract username and password from the web interface (Password Reset Page) of the vulnerable targeted system.
[ "cpe:2.3:o:skyworthdigital:cm5100_firmware:4.1.1.24:*:*:*:*:*:*:*", "cpe:2.3:h:skyworthdigital:cm5100:-:*:*:*:*:*:*:*" ]
null
7.5
null
null
GHSA-qxr9-324x-2r4p
Cross-Site Request Forgery (CSRF) vulnerability in XYDAC Ultimate Taxonomy Manager plugin <= 2.0 versions.
[]
null
4.3
null
null
GHSA-h2r2-3pcg-323x
Unrestricted file upload vulnerability in the Blog appearance in the "Install or upgrade manually" module in Dotclear through 2.10.4 allows remote authenticated super-administrators to execute arbitrary code by uploading a theme file with an zip extension, and then accessing it via unspecified vectors.
[]
null
null
7.2
null
RHSA-2021:2760
Red Hat Security Advisory: nettle security update
nettle: Out of bounds memory access in signature verification
[ "cpe:/o:redhat:rhel_aus:7.3::server" ]
null
8.1
null
null
GHSA-32gm-gr8r-8r4x
Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
[]
null
5.4
null
null
GHSA-gfx6-fv9x-fgpc
An issue in SMART TYRE CAR & BIKE v4.2.0 allows attackers to perform a man-in-the-middle attack via Bluetooth communications.
[]
null
4.2
null
null
GHSA-cprr-rh4x-6x3j
In telecom service, there is a missing permission check. This could lead to local denial of service in telecom service.
[]
null
5.5
null
null
CVE-2017-6396
An issue was discovered in WPO-Foundation WebPageTest 3.0. The vulnerability exists due to insufficient filtration of user-supplied data passed to the "webpagetest-master/www/compare-cf.php" URL. An attacker could execute arbitrary HTML and script code in a browser in the context of the vulnerable website.
[ "cpe:2.3:a:webpagetest_project:webpagetest:3.0:*:*:*:*:*:*:*" ]
null
null
6.1
4.3
GHSA-9cq9-hv38-7h7q
iCon administrative web server for Critical Path inJoin Directory Server 4.0 allows authenticated inJoin administrators to read arbitrary files by specifying the target file in the LOG parameter.
[]
null
null
null
null
CVE-2019-20542
An issue was discovered on Samsung mobile devices with N(7.1), O(8.x), and P(9.0) (Exynos chipsets) software. There is a stack overflow in the kernel driver. The Samsung ID is SVE-2019-15034 (November 2019).
[ "cpe:2.3:o:google:android:7.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*" ]
null
7.8
null
4.6
CVE-2019-15740
An issue was discovered in GitLab Community and Enterprise Edition 7.9 through 12.2.1. EXIF Geolocation data was not being removed from certain image uploads.
[ "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*" ]
null
5.3
null
5
CVE-2021-21854
Multiple exploitable integer overflow vulnerabilities exist within the MPEG-4 decoding functionality of the GPAC Project on Advanced Content library v1.0.1. A specially crafted MPEG-4 input can cause an integer overflow due to unchecked addition arithmetic resulting in a heap-based buffer overflow that causes memory corruption. An attacker can convince a user to open a video to trigger this vulnerability.
[ "cpe:2.3:a:gpac:gpac:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*" ]
null
null
8.8
null
CVE-2020-9365
An issue was discovered in Pure-FTPd 1.0.49. An out-of-bounds (OOB) read has been detected in the pure_strcmp function in utils.c.
[ "cpe:2.3:a:pureftpd:pure-ftpd:1.0.49:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*" ]
null
7.5
null
5
CVE-2016-7988
On Samsung Galaxy S4 through S7 devices, absence of permissions on the BroadcastReceiver responsible for handling the com.[Samsung].android.intent.action.SET_WIFI intent leads to unsolicited configuration messages being handled by wifi-service.jar within the Android Framework, a subset of SVE-2016-6542.
[ "cpe:2.3:o:google:android:4.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.3:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.3.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.4:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.4.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.4.2:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.4.3:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.4.4:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:5.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:5.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:5.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:5.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*", "cpe:2.3:h:samsung:galaxy_s4:-:*:*:*:*:*:*:*", "cpe:2.3:h:samsung:galaxy_s4_mini:-:*:*:*:*:*:*:*", "cpe:2.3:h:samsung:galaxy_s5:-:*:*:*:*:*:*:*", "cpe:2.3:h:samsung:galaxy_s6:-:*:*:*:*:*:*:*", "cpe:2.3:h:samsung:galaxy_s7:-:*:*:*:*:*:*:*" ]
null
null
7.5
7.8
GHSA-f78m-qr4v-qgmc
Cross-site scripting (XSS) vulnerability in index.php in iBoutique 4.0 allows remote attackers to inject arbitrary web script or HTML via the key parameter in a products action.
[]
null
null
null
null
GHSA-c5cp-r25h-5r37
An elevation of privilege vulnerability in Package Manager could enable a local malicious application to prevent users from uninstalling applications or removing permissions from applications. This issue is rated as Moderate because it is a local bypass of user interaction requirements. Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1. Android ID: A-32553261.
[]
null
null
5.5
null
CVE-2023-33243
RedTeam Pentesting discovered that the web interface of STARFACE as well as its REST API allows authentication using the SHA512 hash of the password instead of the cleartext password. While storing password hashes instead of cleartext passwords in an application's database generally has become best practice to protect users' passwords in case of a database compromise, this is rendered ineffective when allowing to authenticate using the password hash.
[ "cpe:2.3:a:starface:starface:*:*:*:*:*:*:*:*" ]
null
8.1
null
null
CVE-2013-3879
Use-after-free vulnerability in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT allows local users to gain privileges via a crafted application, aka "Win32k Use After Free Vulnerability."
[ "cpe:2.3:o:microsoft:windows_7:*:sp1:x64:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:*:sp1:x86:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8:-:-:x64:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8:-:-:x86:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:itanium:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x86:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:*" ]
null
null
null
7.2
CVE-1999-1463
Windows NT 4.0 before SP3 allows remote attackers to bypass firewall restrictions or cause a denial of service (crash) by sending improperly fragmented IP packets without the first fragment, which the TCP/IP stack incorrectly reassembles into a valid session.
[ "cpe:2.3:o:microsoft:windows_nt:*:sp3:*:*:*:*:*:*" ]
null
null
null
5
ICSA-20-105-01
Eaton HMiSoft VU3
A specially crafted input file could cause a buffer overflow when loaded by the affected product.CVE-2020-10639 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). A specially crafted input file could trigger an out-of-bounds read when loaded by the affected product.CVE-2020-10637 has been assigned to this vulnerability. A CVSS v3 base score of 3.3 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N).
[]
null
null
3.3
null
GHSA-5mh3-rhm7-jxx3
A Server-Side Request Forgery (SSRF) vulnerability exists in binary-husky/gpt_academic version git 310122f. The application has a functionality to download papers from arxiv.org, but the URL validation is incomplete. An attacker can exploit this vulnerability to make the application access any URL, including internal services, and read the response. This can be used to access data that are only accessible from the server, such as AWS metadata credentials, and can escalate local exploits to network-based attacks.
[]
null
null
6.5
null
CVE-2024-43048
Stack-based Buffer Overflow in Performance
Memory corruption when invalid input is passed to invoke GPU Headroom API call.
[ "cpe:2.3:o:qualcomm:fastconnect_6200_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcm4325_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcm8550_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdm429w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sg4150p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm4635_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm8550p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm8635_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm8750_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm8750p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_4_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_429_mobile_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_460_mobile_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_480_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_662_mobile_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_680_4g_mobile_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_695_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_8_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_8_gen_3_mobile_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:vision_intelligence_400_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9335_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9341_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9378_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9390_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9395_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn3620_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn3660b_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn3990_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn6755_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn7860_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn7861_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn7880_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn7881_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wsa8832_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wsa8840_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wsa8845_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wsa8845h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:fastconnect_6200:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:fastconnect_6900:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:fastconnect_7800:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcm4325:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcm8550:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm429w:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sg4150p:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm4635:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm8550p:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm8635:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm8750:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm8750p:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_4_gen_1_mobile_platform:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_429_mobile_platform:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_460_mobile_platform:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_480_5g_mobile_platform:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_480\\+_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_480\\+_5g_mobile_platform:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_662_mobile_platform:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_680_4g_mobile_platform:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_685_4g_mobile_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_685_4g_mobile_platform:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_695_5g_mobile_platform:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_8_gen_2_mobile_platform:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_8_gen_3_mobile_platform:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_8\\+_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_8\\+_gen_2_mobile_platform:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:vision_intelligence_400_platform:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9335:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9341:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9375:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9378:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9390:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9395:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn3620:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn3660b:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn3950:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn3988:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn3990:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn6755:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn7860:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn7861:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn7880:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn7881:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wsa8810:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wsa8815:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wsa8832:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wsa8840:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wsa8845:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wsa8845h:-:*:*:*:*:*:*:*" ]
null
7.8
null
null
RHSA-2023:3556
Red Hat Security Advisory: python3 security update
python: urllib.parse url blocklisting bypass
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
7.5
null
null
CVE-2003-1184
Multiple cross-site scripting (XSS) vulnerabilities in ThWboard Beta 2.8 and 2.81 allow remote attackers to inject arbitrary web script or HTML via (1) time in board.php, (2) the profile Homepage-Feld, (3) pictures, and (4) other "Diverse XSS Bugs."
[ "cpe:2.3:a:thwboard:thwboard:2.8_beta:*:*:*:*:*:*:*", "cpe:2.3:a:thwboard:thwboard:2.81_beta:*:*:*:*:*:*:*" ]
null
null
null
4.3
CVE-2017-8209
The driver of honor 5C,honor 6x Huawei smart phones with software of versions earlier than NEM-AL10C00B356, versions earlier than Berlin-L21HNC432B360 have a buffer overflow vulnerability due to the lack of parameter validation. An attacker tricks a user into installing a malicious APP which has the root privilege of the Android system, the APP can send a specific parameter to the driver of the smart phone, causing a system reboot or arbitrary code execution.
[ "cpe:2.3:o:huawei:honor_5c_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:honor_5c:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:honor_6x_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:honor_6x:-:*:*:*:*:*:*:*" ]
null
null
7.8
9.3
CVE-2025-1187
code-projects Police FIR Record Management System Delete Record stack-based overflow
A vulnerability classified as critical was found in code-projects Police FIR Record Management System 1.0. Affected by this vulnerability is an unknown functionality of the component Delete Record Handler. The manipulation leads to stack-based buffer overflow. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used.
[]
4.8
5.3
5.3
4.3
GHSA-2fq8-qg89-5r59
Tabit - giftcard stealth. Several APIs on the web system display, without authorization, sensitive information such as health statements, previous bills in a specific restaurant, alcohol consumption and smoking habits. Each of the described APIs, has in its URL one or more MongoDB ID which is not so simple to enumerate. However, they each receive a 'tiny URL' in tabits domain, in the form of https://tbit.be/{suffix} with suffix being a 5 character long string containing numbers, lower and upper case letters. It is not so simple to enumerate them all, but really easy to find some that work and lead to a personal endpoint. Furthermore, the redirect URL disclosed the MongoDB IDs discussed above, and we could use them to query other endpoints disclosing more personal information.
[]
null
7.5
null
null
CVE-2018-16795
OpenEMR 5.0.1.3 allows Cross-Site Request Forgery (CSRF) via library/ajax and interface/super, as demonstrated by use of interface/super/manage_site_files.php to upload a .php file.
[ "cpe:2.3:a:open-emr:openemr:5.0.1.3:*:*:*:*:*:*:*" ]
null
8.8
null
6.8
GHSA-q5j9-f95w-f4pr
TERASOLUNA Server Framework vulnerable to ClassLoader manipulation
TERASOLUNA Global Framework 1.0.0 (Public review version) and TERASOLUNA Server Framework for Java (Rich) 2.0.0.2 to 2.0.5.1 are vulnerable to ClassLoader manipulation due to using the old version of Spring Framework which contains the vulnerability. The vulnerability is caused by an improper input validation issue in the binding mechanism of Spring MVC. By the application processing a specially crafted file, arbitrary code may be executed with the privileges of the application.When using TERASOLUNA Global Framework 1.0.0 (Public review version), update to TERASOLUNA Server Framework for Java 5.7.1.SP1 (using Spring Framework 5.3.18). This vulnerability alone can be addressed by updating to TERASOLUNA Global Framework 1.0.1 (using Spring Framework 3.2.10) or later.
[]
null
7.8
null
null
CVE-2023-32461
Dell PowerEdge BIOS and Dell Precision BIOS contain a buffer overflow vulnerability. A local malicious user with high privileges could potentially exploit this vulnerability, leading to corrupt memory and potentially escalate privileges.  
[ "cpe:2.3:o:dell:poweredge_r660_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_r660:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_r760_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_r760:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_c6620_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_c6620:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_mx760c_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_mx760c:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_r860_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_r860:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_r960_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_r960:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_hs5610_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_hs5610:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_hs5620_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_hs5620:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_r660xs_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_r660xs:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_r760xs_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_r760xs:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_r760xd2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_r760xd2:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_t560_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_t560:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_r760xa_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_r760xa:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_xe9680_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_xe9680:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_xr5610_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_xr5610:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_xr8620t_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_xr8620t:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_xr7620_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_xr7620:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_xe8640_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_xe8640:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_r6615_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_r6615:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_r7615_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_r7615:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_r6625_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_r6625:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_r7625_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_r7625:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_r650_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_r650:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_r750_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_r750:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_r750xa_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_r750xa:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_c6520_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_c6520:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_mx750c_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_mx750c:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_r550_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_r550:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_r450_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_r450:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_r650xs_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_r650xs:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_r750xs_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_r750xs:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_t550_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_t550:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_xr11_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_xr11:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_xr12_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_xr12:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_t150_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_t150:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_t350_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_t350:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_r250_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_r250:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_r350_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_r350:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_xr4510c_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_xr4510c:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_xr4520c_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_xr4520c_firmware:1.10.4:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_xr4520c:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_r6515_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_r6515:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_r6525_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_r6525:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_r7515_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_r7515:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_r7525_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_r7525:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_c6525_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_c6525:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:poweredge_xe8545_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:poweredge_xe8545:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:emc_xc_core_xc450_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:emc_xc_core_xc450:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:emc_xc_core_xc650_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:emc_xc_core_xc650:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:emc_xc_core_xc750_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:emc_xc_core_xc750:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:emc_xc_core_xc750xa_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:emc_xc_core_xc750xa:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:emc_xc_core_xc6520_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:emc_xc_core_xc6520:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:emc_xc_core_xc7525_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:emc_xc_core_xc7525:-:*:*:*:*:*:*:*" ]
null
5
null
null
CVE-2024-28575
Buffer Overflow vulnerability in open source FreeImage v.3.19.0 [r1909] allows a local attacker to cause a denial of service (DoS) via the opj_j2k_read_mct() function when reading images in J2K format.
[ "cpe:2.3:a:freeimage_project:freeimage:3.19.0:*:*:*:*:*:*:*" ]
null
6.2
null
null
CVE-2004-1227
Directory traversal vulnerability in SugarCRM Sugar Sales 2.0.1c and earlier allows remote attackers to read arbitrary files and possibly execute arbitrary PHP code via .. (dot dot) sequences in the (1) module, (2) action, or (3) theme parameters to index.php, (4) the theme parameter to Login.php, and possibly other parameters or scripts.
[ "cpe:2.3:a:sugarcrm:sugar_sales:*:*:*:*:*:*:*:*" ]
null
null
null
10
RHSA-2021:3446
Red Hat Security Advisory: kernel security and bug fix update
kernel: out-of-bounds write due to a heap buffer overflow in __hidinput_change_resolution_multipliers() of hid-input.c kernel: use-after-free in route4_change() in net/sched/cls_route.c kernel: powerpc: KVM guest OS users can cause host OS memory corruption
[ "cpe:/a:redhat:rhel_eus:8.2::crb", "cpe:/o:redhat:rhel_eus:8.2::baseos" ]
null
7.8
null
null
CVE-2010-0903
Unspecified vulnerability in the Net Foundation Layer component in Oracle Database Server 9.2.0.8, 10.1.0.5, 10.2.0.4, 11.1.0.7, and 11.2.0.1, when running on Windows, allows remote attackers to affect availability via unknown vectors.
[ "cpe:2.3:a:oracle:database_server:9.2.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:database_server:10.1.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:database_server:10.2.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:database_server:11.1.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:database_server:11.2.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*" ]
null
null
null
7.8
RHSA-2022:7283
Red Hat Security Advisory: libksba security update
libksba: integer overflow may lead to remote code execution
[ "cpe:/o:redhat:rhel_aus:8.2::baseos", "cpe:/o:redhat:rhel_e4s:8.2::baseos", "cpe:/o:redhat:rhel_tus:8.2::baseos" ]
null
8.6
null
null
RHSA-2020:3343
Red Hat Security Advisory: thunderbird security update
chromium-browser: Use after free in ANGLE chromium-browser: Inappropriate implementation in WebRTC Mozilla: Potential leak of redirect targets when loading scripts in a worker Mozilla: Memory safety bugs fixed in Firefox 79 and Firefox ESR 68.11
[ "cpe:/a:redhat:rhel_e4s:8.0::appstream" ]
null
8.8
8.8
null
CVE-2024-52050
A LogServer arbitrary file creation vulnerability in Trend Micro Apex One could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
[ "cpe:2.3:a:trendmicro:apexone_op:14.0.0.13121:p3:*:*:*:*:*:*", "cpe:2.3:a:trendmicro:apexone_saas:14.0.0.14026:ga:*:*:*:*:*:*" ]
null
7.8
null
null
GHSA-gf82-9fq8-333q
An issue was discovered in MB connect line mymbCONNECT24 and mbCONNECT24 software in all versions through V2.6.2. Improper use of access validation allows a logged in user to kill web2go sessions in the account he should not have access to.
[]
null
null
null
null
CVE-2023-39317
Multiple integer overflow vulnerabilities exist in the LXT2 num_dict_entries functionality of GTKWave 3.3.115. A specially crafted .lxt2 file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the integer overflow when allocating the `string_lens` array.
[ "cpe:2.3:a:tonybybell:gtkwave:3.3.115:*:*:*:*:*:*:*" ]
null
7.8
null
null
GHSA-4j5w-hmf4-595g
In decode_Huffman of JBig2_SddProc.cpp, there is a possible out of bounds write due to an integer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-155473137
[]
null
null
null
null
CVE-2016-3656
The GlobalProtect Portal in Palo Alto Networks PAN-OS before 5.0.18, 6.0.x before 6.0.13, 6.1.x before 6.1.10, and 7.0.x before 7.0.5H2 allows remote attackers to cause a denial of service (service crash) via a crafted request.
[ "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*" ]
null
null
7.5
5
CVE-2018-3560
In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, a Double Free vulnerability exists in Audio Driver while opening a sound compression device.
[ "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*" ]
null
null
7.8
4.6
CVE-2020-14656
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Locking). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
[ "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*", "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*", "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*", "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*" ]
null
4.9
null
null
GHSA-xm93-cr5j-3294
PHP remote file inclusion vulnerability in index.php in Knusperleicht Guestbook 3.5 allows remote attackers to execute arbitrary PHP code via a URL in the GB_PATH parameter.
[]
null
null
null
null
CVE-2025-2819
Unrestricted Fileupload
There is a risk of unauthorized file uploads in GT-SoftControl and potential file overwrites due to insufficient validation in the file selection process. This could lead to data integrity issues and unauthorized access by an authenticated privileged user.
[]
null
6.6
null
null
GHSA-vvw2-xf8w-86mr
Adobe Substance 3D Stager versions 2.0.0 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[]
null
5.5
null
null
GHSA-9693-h7pg-637x
Web Viewer for Hanwha DVR 2.17 and Smart Viewer in Samsung Web Viewer for Samsung DVR are vulnerable to XSS via the /cgi-bin/webviewer_login_page data3 parameter. (The same Web Viewer codebase was transitioned from Samsung to Hanwha.)
[]
null
6.1
null
null
GHSA-3fjx-35vx-pq97
An out of bounds read flaw was discovered in libssh2 before 1.8.1 in the _libssh2_packet_require and _libssh2_packet_requirev functions. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.
[]
null
null
9.1
null
GHSA-qg8p-32gr-gh6x
MLflow Local File Disclosure Vulnerability
This vulnerability enables malicious users to read sensitive files on the server.
[]
null
7.5
null
null