id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
139k
cpes
sequencelengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
GHSA-pvjg-h4mg-c3q7
Denial of service in BIND named via consuming more than "fdmax" file descriptors.
[]
null
null
null
null
GHSA-j7jq-c44j-q74h
Integer overflow in the EVP_EncryptUpdate function in crypto/evp/evp_enc.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of data.
[]
null
null
7.5
null
GHSA-w567-qh79-jxqc
SQL injection vulnerability in the login form for LogiSense software including (1) Hawk-i Billing, (2) Hawk-i ASP and (3) DNS Manager allows remote attackers to bypass authentication via SQL code in the password field.
[]
null
null
null
null
GHSA-5x9h-p2gx-35mg
Incorrect Default Permissions in Liferay Portal
The Friendly Url module in Liferay Portal 7.4.3.5 through 7.4.3.36, and Liferay DXP 7.4 update 1 though 36 does not properly check user permissions, which allows remote attackers to obtain the history of all friendly URLs that was assigned to a page.
[]
null
5.3
null
null
CVE-2021-45227
An issue was discovered in COINS Construction Cloud 11.12. Due to an inappropriate use of HTML IFRAME elements, the file upload functionality is vulnerable to a persistent Cross-Site Scripting (XSS) attack.
[ "cpe:2.3:a:coins-global:coins_construction_cloud:11.12:*:*:*:*:*:*:*" ]
null
5.4
null
3.5
CVE-2003-1451
Buffer overflow in Symantec Norton AntiVirus 2002 allows remote attackers to execute arbitrary code via an e-mail attachment with a compressed ZIP file that contains a file with a long filename.
[ "cpe:2.3:a:symantec:norton_antivirus:2002:*:*:*:*:*:*:*" ]
null
null
null
6.4
GHSA-jpqj-f7g2-g86w
In IrfanView 4.53, Data from a Faulting Address controls a subsequent Write Address starting at image00400000+0x000000000001dcfc.
[]
null
7.8
null
null
RHSA-2002:164
Red Hat Security Advisory: openssl, mm, mod_ssl security update for Stronghold
security flaw security flaw security flaw security flaw security flaw
[ "cpe:/a:redhat:stronghold:3" ]
null
null
null
null
CVE-2017-8874
Multiple cross-site request forgery (CSRF) vulnerabilities in Mautic 1.4.1 allow remote attackers to hijack the authentication of users for requests that (1) delete email campaigns or (2) delete contacts.
[ "cpe:2.3:a:acquia:mautic:1.4.1:*:*:*:*:*:*:*" ]
null
null
8.8
6.8
CVE-2000-1129
McAfee WebShield SMTP 4.5 allows remote attackers to cause a denial of service via a malformed recipient field.
[ "cpe:2.3:a:network_associates:webshield_smtp:4.5:*:*:*:*:*:*:*" ]
null
null
null
5
RHSA-2008:0029
Red Hat Security Advisory: XFree86 security update
xfs integer overflow in the build_range function xfs heap overflow in the swap_char2b function Xorg / XFree86 file existence disclosure vulnerability xfree86: memory corruption via XInput extension xfree86: information disclosure via TOG-CUP extension xfree86: integer overflow in EVI extension Xorg / XFree86 PCF font parser buffer overflow
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws", "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
GHSA-4948-3w2r-3h9p
A remote code execution vulnerability exists in Microsoft Office when the software fails to properly handle objects in memory, aka "Office Remote Code Execution Vulnerability". This CVE ID is unique from CVE-2017-8509, CVE-2017-8510, CVE-2017-8511, CVE-2017-8512, and CVE-2017-8506.
[]
null
null
7.8
null
GHSA-5m84-3723-5524
The mintToken function of a smart contract implementation for MMCoin, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value.
[]
null
7.5
null
null
RHSA-2024:3561
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.17 Security update
datatables.net: contents of array not escaped by HTML escape entities function EAP: wildfly-elytron has a SSRF security issue cxf-core: Apache CXF SSRF Vulnerability using the Aegis databinding
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el9" ]
null
7.4
null
null
GHSA-qmfh-w398-4w9j
UltraVNC revision 1207 has out-of-bounds read vulnerability in VNC client code inside TextChat module, which results in a denial of service (DoS) condition. This attack appears to be exploitable via network connectivity. This vulnerability has been fixed in revision 1208.
[]
null
null
7.5
null
GHSA-gq4m-pjfx-4r44
Cisco IOS 12.2(58)SE, when a login banner is configured, allows remote attackers to cause a denial of service (device reload) by establishing two SSH2 sessions, aka Bug ID CSCto62631.
[]
null
null
null
null
CVE-2019-17385
The animate-it plugin before 2.3.5 for WordPress has XSS.
[ "cpe:2.3:a:eleopard:animate_it\\!:*:*:*:*:*:wordpress:*:*" ]
null
6.1
null
4.3
CVE-2001-0060
Format string vulnerability in stunnel 3.8 and earlier allows attackers to execute arbitrary commands via a malformed ident username.
[ "cpe:2.3:a:stunnel:stunnel:3.3:*:*:*:*:*:*:*", "cpe:2.3:a:stunnel:stunnel:3.4a:*:*:*:*:*:*:*", "cpe:2.3:a:stunnel:stunnel:3.7:*:*:*:*:*:*:*", "cpe:2.3:a:stunnel:stunnel:3.8:*:*:*:*:*:*:*" ]
null
null
null
10
CVE-2014-4291
Unspecified vulnerability in the JPublisher component in Oracle Database Server 11.1.0.7, 11.2.0.3, 11.2.0.4, 12.1.0.1, and 12.1.0.2 allows remote authenticated users to affect confidentiality via unknown vectors, a different vulnerability than CVE-2014-4290, CVE-2014-4292, CVE-2014-4293, CVE-2014-4296, CVE-2014-4297, CVE-2014-4310, CVE-2014-6547, and CVE-2014-6477.
[ "cpe:2.3:a:oracle:database_server:11.1.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:database_server:11.2.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:database_server:11.2.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:database_server:12.1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:database_server:12.1.0.2:*:*:*:*:*:*:*" ]
null
null
null
4
GHSA-xm67-p6rp-wvcr
X.org X server 1.13.3 and earlier, when not run as root, allows local users to cause a denial of service (crash) or possibly gain privileges via vectors involving cached xkb files.
[]
null
null
null
null
RHSA-2021:1063
Red Hat Security Advisory: openssl security update
openssl: NULL pointer dereference in signature_algorithms processing
[ "cpe:/o:redhat:rhel_eus:8.2::baseos" ]
null
5.9
null
null
GHSA-2r2c-prqv-cxp3
The WMITools ActiveX control in WBEMSingleView.ocx 1.50.1131.0 in Microsoft WMI Administrative Tools 1.1 and earlier in Microsoft Windows XP SP2 and SP3 allows remote attackers to execute arbitrary code via a crafted argument to the AddContextRef method, possibly an untrusted pointer dereference, aka "Microsoft WMITools ActiveX Control Vulnerability."
[]
null
null
null
null
GHSA-72hg-5wr5-rmfc
Statamic CMS remote code execution via front-end form uploads
ImpactOn front-end forms with an asset upload field, PHP files crafted to look like images may be uploaded regardless of mime validation rules. This only affects forms using the "Forms" feature and not just _any_ arbitrary form. This does not affect the control panel.PatchesIt has been patched in 3.4.13 and 4.33.0.
[]
null
8.3
null
null
CVE-2015-8003
MediaWiki before 1.23.11, 1.24.x before 1.24.4, and 1.25.x before 1.25.3 does not throttle file uploads, which allows remote authenticated users to have unspecified impact via multiple file uploads.
[ "cpe:2.3:a:mediawiki:mediawiki:*:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.24.0:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.24.1:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.24.2:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.24.3:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.25.0:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.25.1:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.25.2:*:*:*:*:*:*:*" ]
null
null
null
6.8
GHSA-hg2v-4w64-9f23
Italtel NetMatch-S CI 5.2.0-20211008 allows Multiple Reflected/Stored XSS issues under NMSCIWebGui/j_security_check via the j_username parameter, or NMSCIWebGui/actloglineview.jsp via the name or actLine parameter. An attacker leveraging this vulnerability could inject arbitrary JavaScript. The payload would then be triggered every time an authenticated user browses the page containing it.
[]
null
6.1
null
null
GHSA-f9cc-wx9r-r8gm
Nexus Concepts Dev Hound 2.24 and earlier allows remote attackers to obtain the installation path via a URL containing a non-existent .dll file.
[]
null
null
null
null
GHSA-3px5-wjh3-9x6r
Mautic stored Cross-site Scripting (XSS)
Mautic before 3.2.4 is affected by stored XSS. An attacker with access to Social Monitoring, an application feature, could attack other users, including administrators. For example, an attacker could load an externally drafted JavaScript file that would allow them to eventually perform actions on the target user’s behalf, including changing the user’s password or email address or changing the attacker’s user role from a low-privileged user to an administrator account.
[]
null
9
null
null
CVE-2018-18705
PhpTpoint hospital management system suffers from multiple SQL injection vulnerabilities via the index.php user parameter associated with LOGIN.php, or the rno parameter to ALIST.php, DUNDEL.php, PDEL.php, or PUNDEL.php.
[ "cpe:2.3:a:phptpoint:hospital_management_system:1.0:*:*:*:*:*:*:*" ]
null
null
9.8
7.5
GHSA-9pxw-85r8-pc8f
Transient DOS in WLAN Host while doing channel switch announcement (CSA), when a mobile station receives invalid channel in CSA IE.
[]
null
7.5
null
null
GHSA-qg6p-6xqq-gh7c
Integer overflow in Firebird SQL 1.0.3 and earlier, 1.5.x before 1.5.6, 2.0.x before 2.0.4, and 2.1.x before 2.1.0 RC1 might allow remote attackers to execute arbitrary code via crafted (1) op_receive, (2) op_start, (3) op_start_and_receive, (4) op_send, (5) op_start_and_send, and (6) op_start_send_and_receive XDR requests, which triggers memory corruption.
[]
null
null
null
null
CVE-2022-2491
SourceCodester Library Management System lab.php sql injection
A vulnerability has been found in SourceCodester Library Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file lab.php. The manipulation of the argument Section with the input 1' UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,CONCAT(0x71716b7171,0x546e4444736b7743575a666d4873746a6450616261527a67627944426946507245664143694c6a4c,0x7162706b71),NULL,NULL,NULL,NULL# leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
[ "cpe:2.3:a:library_management_system_project:library_management_system:1.0:*:*:*:*:*:*:*" ]
null
6.3
null
null
GHSA-pf94-f2pc-384h
The Slotti Ajanvaraus plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'slotti-embed-ga' shortcode in all versions up to, and including, 1.3.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
6.4
null
null
CVE-2021-27573
An issue was discovered in Emote Remote Mouse through 4.0.0.0. Remote unauthenticated users can execute arbitrary code via crafted UDP packets with no prior authorization or authentication.
[ "cpe:2.3:a:remotemouse:emote_remote_mouse:*:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
GHSA-3cqh-6mr9-vqm5
The GD Rating System plugin 2.3 for WordPress has XSS via the wp-admin/admin.php panel parameter for the gd-rating-system-transfer page.
[]
null
null
6.1
null
GHSA-43r8-23m5-329f
Microsoft Outlook Remote Code Execution Vulnerability
[]
null
8.8
null
null
GHSA-gw79-rp24-2pgc
A carefully crafted invalid TLS handshake can cause Apache Traffic Server (ATS) to segfault. This affects version 6.2.2. To resolve this issue users running 6.2.2 should upgrade to 6.2.3 or later versions.
[]
null
null
7.5
null
GHSA-c6g8-r8m6-hpwp
A command injection vulnerability in Juniper Networks NorthStar Controller Application prior to version 2.1.0 Service Pack 1 may allow a network-based malicious attacker to cause a denial of service condition.
[]
null
null
5.3
null
CVE-2020-18771
Exiv2 0.27.99.0 has a global buffer over-read in Exiv2::Internal::Nikon1MakerNote::print0x0088 in nikonmn_int.cpp which can result in an information leak.
[ "cpe:2.3:a:exiv2:exiv2:0.27.99.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*" ]
null
8.1
null
5.8
GHSA-w3fr-wwfg-6332
IBM Data Risk Manager 2.0.6 stores user credentials in plain clear text which can be read by an authenticated user. IBM X-Force ID: 209947.
[]
null
null
null
null
CVE-2014-0249
The System Security Services Daemon (SSSD) 1.11.6 does not properly identify group membership when a non-POSIX group is in a group membership chain, which allows local users to bypass access restrictions via unspecified vectors.
[ "cpe:2.3:a:fedoraproject:sssd:1.11.6:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:5:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*" ]
null
null
null
3.3
CVE-2018-15684
An issue was discovered in BTITeam XBTIT. PHP error logs are stored in an open directory (/include/logs) using predictable file names, which can lead to full path disclosure and leakage of sensitive data.
[ "cpe:2.3:a:btiteam:xbtit:*:*:*:*:*:*:*:*" ]
null
null
5.3
5
CVE-2020-12278
An issue was discovered in libgit2 before 0.28.4 and 0.9x before 0.99.0. path.c mishandles equivalent filenames that exist because of NTFS Alternate Data Streams. This may allow remote code execution when cloning a repository. This issue is similar to CVE-2019-1352.
[ "cpe:2.3:a:libgit2:libgit2:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
GHSA-88gp-q3v3-9qmm
A vulnerability was found in mirweiye Seven Bears Library CMS 2023. It has been classified as problematic. Affected is an unknown function of the component Add Link Handler. The manipulation leads to server-side request forgery. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
[]
5.1
2.7
null
null
CVE-2025-37758
ata: pata_pxa: Fix potential NULL pointer dereference in pxa_ata_probe()
In the Linux kernel, the following vulnerability has been resolved: ata: pata_pxa: Fix potential NULL pointer dereference in pxa_ata_probe() devm_ioremap() returns NULL on error. Currently, pxa_ata_probe() does not check for this case, which can result in a NULL pointer dereference. Add NULL check after devm_ioremap() to prevent this issue.
[]
null
null
null
null
CVE-2024-2391
EVE-NG Lab cross site scripting
A vulnerability was found in EVE-NG 5.0.1-13 and classified as problematic. Affected by this issue is some unknown functionality of the component Lab Handler. The manipulation leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-256442 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
[]
null
2.4
2.4
3.3
GHSA-497q-xhqw-fw3m
A vulnerability has been identified in Mendix Applications using Mendix 10 (All versions < V10.11.0), Mendix Applications using Mendix 10 (V10.6) (All versions < V10.6.9), Mendix Applications using Mendix 9 (All versions >= V9.3.0 < V9.24.22). Affected applications could allow users with the capability to manage a role to elevate the access rights of users with that role. Successful exploitation requires to guess the id of a target role which contains the elevated access rights.
[]
null
5.9
null
null
CVE-2014-7593
The Mr Whippet - Yorkshire Ice (aka com.appytimes.ice) application 1.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[ "cpe:2.3:a:appytimes:mr_whippet_-_yorkshire_ice:1.1:*:*:*:*:android:*:*" ]
null
null
null
5.4
CVE-2021-35577
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via MySQL Protcol to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
[ "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*" ]
null
4.9
null
null
GHSA-mfvg-qwcw-qvc8
baserCMS allows any file to be uploaded
There is a vulnerability that allows uploading any files to baserCMS.This is a vulnerability that needs to be addressed when the management system is used by an unspecified number of users. If you are eligible, please update to the new version as soon as possible.TargetbaserCMS 4.7.3 and earlier versionsVulnerabilityMalicious files may be uploaded in Upload File Management.CountermeasuresUpdate to the latest version of baserCMSPlease refer to the following page to reference for more information. https://basercms.net/security/JVN_61105618CreditsTaisei Inoue@GMO Cybersecurity by Ierae, Inc.Yusuke Akagi@Mitsui Bussan Secure Directions, Inc.
[]
null
9.8
null
null
CVE-2012-5477
The smart proxy in Foreman before 1.1 uses a umask set to 0, which allows local users to modify files created by the daemon via unspecified vectors.
[ "cpe:2.3:a:theforeman:foreman:*:*:*:*:*:*:*:*" ]
null
null
null
3.6
CVE-2016-1950
Heap-based buffer overflow in Mozilla Network Security Services (NSS) before 3.19.2.3 and 3.20.x and 3.21.x before 3.21.1, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to execute arbitrary code via crafted ASN.1 data in an X.509 certificate.
[ "cpe:2.3:a:mozilla:network_security_services:3.19.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:network_security_services:3.20:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:network_security_services:3.20.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:network_security_services:3.21:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:38.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:38.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:38.6.1:*:*:*:*:*:*:*", "cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*", "cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*", "cpe:2.3:o:oracle:vm_server:3.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:glassfish_server:2.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:iplanet_web_proxy_server:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:iplanet_web_server:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*" ]
null
null
8.8
6.8
CVE-2017-7387
TheFirstQuestion/HelpMeWatchWho before 2017-03-28 is vulnerable to a reflected XSS in HelpMeWatchWho-master/unaired.php (episodeID parameter).
[ "cpe:2.3:a:helpmewatchwho_project:helpmewatchwho:*:*:*:*:*:*:*:*" ]
null
null
6.1
4.3
CVE-2024-53429
Open62541 v1.4.6 is has an assertion failure in fuzz_binary_decode, which leads to a crash.
[ "cpe:2.3:a:open62541:open62541:*:*:*:*:*:*:*:*" ]
null
7.5
null
null
RHSA-2014:0798
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.2.4 update
CXF: The SecurityTokenService accepts certain invalid SAML Tokens as valid CXF: UsernameTokens are sent in plaintext with a Symmetric EncryptBeforeSigning policy CXF: HTML content posted to SOAP endpoint could cause OOM errors CXF: Large invalid content could cause temporary space to fill JAX-RS: Information disclosure via XML eXternal Entity (XXE)
[ "cpe:/a:redhat:jboss_enterprise_application_platform:6::el5" ]
null
null
null
null
CVE-2006-1984
Unspecified vulnerability in the _cg_TIFFSetField function in Mac OS X 10.4.6 and earlier, as used in applications that use ImageIO or AppKit, allows remote attackers to cause a denial of service (application crash) via a crafted TIFF image that triggers a null dereference.
[ "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.3.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.3.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.3.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.3.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.3.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.3.6:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.3.7:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.3.8:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.3.9:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.4.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.4.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.4.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.4.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.3.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.3.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.3.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.3.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.3.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.3.6:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.3.7:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.3.8:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.3.9:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.4.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.4.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.4.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.4.4:*:*:*:*:*:*:*" ]
null
null
null
5
CVE-2023-23888
WordPress Rank Math SEO plugin <= 1.0.107.2 - Local File Inclusion vulnerability
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Rank Math Rank Math SEO allows Path Traversal.This issue affects Rank Math SEO: from n/a through 1.0.107.2.
[]
null
7.6
null
null
CVE-2017-1530
IBM Business Process Manager 7.5, 8.0, and 8.5 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 130409.
[ "cpe:2.3:a:ibm:business_process_manager:7.5.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:business_process_manager:7.5.0.0:*:*:*:advanced:*:*:*", "cpe:2.3:a:ibm:business_process_manager:7.5.0.0:*:*:*:express:*:*:*", "cpe:2.3:a:ibm:business_process_manager:7.5.0.0:*:*:*:standard:*:*:*", "cpe:2.3:a:ibm:business_process_manager:7.5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:business_process_manager:7.5.0.1:*:*:*:advanced:*:*:*", "cpe:2.3:a:ibm:business_process_manager:7.5.0.1:*:*:*:express:*:*:*", "cpe:2.3:a:ibm:business_process_manager:7.5.0.1:*:*:*:standard:*:*:*", "cpe:2.3:a:ibm:business_process_manager:7.5.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:business_process_manager:7.5.1.0:*:*:*:advanced:*:*:*", "cpe:2.3:a:ibm:business_process_manager:7.5.1.0:*:*:*:express:*:*:*", "cpe:2.3:a:ibm:business_process_manager:7.5.1.0:*:*:*:standard:*:*:*", "cpe:2.3:a:ibm:business_process_manager:7.5.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:business_process_manager:7.5.1.1:*:*:*:advanced:*:*:*", "cpe:2.3:a:ibm:business_process_manager:7.5.1.1:*:*:*:express:*:*:*", "cpe:2.3:a:ibm:business_process_manager:7.5.1.1:*:*:*:standard:*:*:*", "cpe:2.3:a:ibm:business_process_manager:7.5.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:business_process_manager:7.5.1.2:*:*:*:advanced:*:*:*", "cpe:2.3:a:ibm:business_process_manager:7.5.1.2:*:*:*:express:*:*:*", "cpe:2.3:a:ibm:business_process_manager:7.5.1.2:*:*:*:standard:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.0.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.0.0.0:*:*:*:advanced:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.0.0.0:*:*:*:express:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.0.0.0:*:*:*:standard:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.0.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.0.1.0:*:*:*:advanced:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.0.1.0:*:*:*:express:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.0.1.0:*:*:*:standard:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.0.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.0.1.1:*:*:*:advanced:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.0.1.1:*:*:*:express:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.0.1.1:*:*:*:standard:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.0.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.0.1.2:*:*:*:advanced:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.0.1.2:*:*:*:express:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.0.1.2:*:*:*:standard:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.0.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.0.1.3:*:*:*:advanced:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.0.1.3:*:*:*:express:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.0.1.3:*:*:*:standard:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.5.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.5.0.0:*:*:*:advanced:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.5.0.0:*:*:*:express:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.5.0.0:*:*:*:standard:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.5.0.1:*:*:*:advanced:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.5.0.1:*:*:*:express:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.5.0.1:*:*:*:standard:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.5.0.2:*:*:*:advanced:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.5.0.2:*:*:*:express:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.5.0.2:*:*:*:standard:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.5.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.5.5.0:*:*:*:advanced:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.5.5.0:*:*:*:express:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.5.5.0:*:*:*:standard:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.5.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.5.6.0:*:*:*:advanced:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.5.6.0:*:*:*:express:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.5.6.0:*:*:*:standard:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.5.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.5.6.1:*:*:*:advanced:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.5.6.1:*:*:*:express:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.5.6.1:*:*:*:standard:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.5.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.5.6.2:*:*:*:advanced:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.5.6.2:*:*:*:express:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.5.6.2:*:*:*:standard:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.5.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.5.7.0:*:*:*:advanced:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.5.7.0:*:*:*:express:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.5.7.0:*:*:*:standard:*:*:*" ]
null
null
5.4
3.5
CVE-2025-22285
WordPress Pallet Packaging for WooCommerce Plugin <= 1.1.15 - Broken Access Control vulnerability
Missing Authorization vulnerability in Eniture Technology Pallet Packaging for WooCommerce allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Pallet Packaging for WooCommerce: from n/a through 1.1.15.
[]
null
6.5
null
null
GHSA-qjv6-vxmp-4m8g
Unrestricted file upload vulnerability in lib/image_upload.php in KafooeyBlog 1.55b allows remote attackers to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file.
[]
null
null
null
null
CVE-2023-2807
Authentication bypass in password reset process
Authentication Bypass by Spoofing vulnerability in the password reset process of Pandora FMS allows an unauthenticated attacker to initiate a password reset process for any user account without proper authentication. This issue affects PandoraFMS v771 and prior versions on all platforms.
[ "cpe:2.3:a:pandorafms:pandora_fms:*:*:*:*:*:*:*:*" ]
null
6.4
null
null
GHSA-36w8-h6xw-wxr6
An issue was discovered in QPDF before 7.0.0. There is a large heap-based out-of-bounds read in the Pl_Buffer::write function in Pl_Buffer.cc. It is caused by an integer overflow in the PNG filter.
[]
null
null
5.5
null
CVE-2008-0068
Directory traversal vulnerability in OpenView5.exe in HP OpenView Network Node Manager (OV NNM) 7.01, 7.51, and 7.53 allows remote attackers to read arbitrary files via directory traversal sequences in the Action parameter.
[ "cpe:2.3:a:hp:openview_network_node_manager:7.51:*:*:*:*:*:*:*", "cpe:2.3:a:hp:openview_network_node_manager:7.53:*:*:*:*:*:*:*" ]
null
null
null
5
RHSA-2023:2582
Red Hat Security Advisory: lua security update
lua: heap buffer overread
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
6.2
null
null
CVE-2023-33143
Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability
Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability
[ "cpe:2.3:a:microsoft:edge_chromium:*:*:*:*:*:*:*:*" ]
null
7.5
null
null
CVE-2008-4595
Multiple unspecified vulnerabilities in Slaytanic Scripts Content Plus 2.1.1 have unknown impact and remote attack vectors.
[ "cpe:2.3:a:slaytanic_scripts:content_plus:2.1.1:*:*:*:*:*:*:*" ]
null
null
null
10
GHSA-mg4p-rw57-c4hp
An issue discovered in src/wallet/wallet.cpp in Ravencoin Core 4.3.2.1 and earlier allows attackers to view sensitive information via CWallet::CreateTransactionAll() function.
[]
null
7.5
null
null
CVE-2023-32079
Netmaker Privilige Escalation Vulnerability
Netmaker makes networks with WireGuard. A Mass assignment vulnerability was found in versions prior to 0.17.1 and 0.18.6 that allows a non-admin user to escalate privileges to those of an admin user. The issue is patched in 0.17.1 and fixed in 0.18.6. If Users are using 0.17.1, they should run `docker pull gravitl/netmaker:v0.17.1` and `docker-compose up -d`. This will switch them to the patched users If users are using v0.18.0-0.18.5, they should upgrade to v0.18.6 or later. As a workaround, someone using version 0.17.1 can pull the latest docker image of the backend and restart the server.
[ "cpe:2.3:a:gravitl:netmaker:*:*:*:*:*:*:*:*" ]
null
8.8
null
null
RHSA-2025:2474
Red Hat Security Advisory: kernel-rt security update
kernel: HID: core: zero-initialize the report buffer kernel: ALSA: usb-audio: Fix potential out-of-bound accesses for Extigy and Mbox devices kernel: scsi: megaraid_sas: Fix for a potential deadlock kernel: pps: Fix a use-after-free
[ "cpe:/a:redhat:enterprise_linux:8::nfv", "cpe:/a:redhat:enterprise_linux:8::realtime" ]
null
6.4
null
null
GHSA-pxh7-rqm4-2h48
A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V3.1). The affected application contains a file upload server that is vulnerable to command injection. An attacker could use this to achieve arbitrary code execution.
[]
null
9.8
null
null
GHSA-r5vq-7p9j-gq2m
Badminton Center Management System v1.0 is vulnerable to SQL Injection via /bcms/admin/services/view_service.php?id=.
[]
null
7.2
null
null
CVE-2008-3309
SQL injection vulnerability in info_book.asp in DigiLeave 1.2 and earlier allows remote attackers to execute arbitrary SQL commands via the book_id parameter.
[ "cpe:2.3:a:digiappz:digileave:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2019-15572
Gesior-AAC before 2019-05-01 allows ServiceCategoryID SQL injection in shop.php.
[ "cpe:2.3:a:cipsoft:gesior-aac:*:*:*:*:*:*:*:*" ]
null
null
9.8
7.5
CVE-2016-3464
Unspecified vulnerability in the Oracle FLEXCUBE Direct Banking component in Oracle Financial Services Software 12.0.3 allows remote authenticated users to affect confidentiality via vectors related to Accounts.
[ "cpe:2.3:a:oracle:flexcube_direct_banking:12.0.3:*:*:*:*:*:*:*" ]
null
null
5.7
4
CVE-2018-16875
The crypto/x509 package of Go before 1.10.6 and 1.11.x before 1.11.3 does not limit the amount of work performed for each chain verification, which might allow attackers to craft pathological inputs leading to a CPU denial of service. Go TLS servers accepting client certificates and TLS clients are affected.
[ "cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*" ]
null
null
5.9
null
GHSA-q43v-p4wq-wmhv
In XIQ-SE before 24.2.11, a server misconfiguration may allow user enumeration when specific conditions are met.
[]
null
5.3
null
null
CVE-2024-0712
Byzoro Smart S150 Management Platform userattea.php access control
A vulnerability was found in Byzoro Smart S150 Management Platform V31R02B15. It has been classified as critical. Affected is an unknown function of the file /useratte/inc/userattea.php. The manipulation leads to improper access controls. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-251538 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
[ "cpe:2.3:o:byzoro:smart_s150_firmware:31r02b15:*:*:*:*:*:*:*", "cpe:2.3:h:byzoro:smart_s150:-:*:*:*:*:*:*:*" ]
null
7.3
7.3
7.5
GHSA-52wc-7q4c-93v7
Cross-site scripting (XSS) vulnerability in Queue Watcher in IBM Sterling B2B Integrator 5.2 allows remote attackers to inject arbitrary web script or HTML via a crafted URL.
[]
null
null
6.1
null
CVE-2006-3149
Cross-site scripting (XSS) vulnerability in topic.php in phpMyForum 4.1.3 and earlier allows remote attackers to inject arbitrary web script or HTML via the highlight parameter.
[ "cpe:2.3:a:phpmyforum:phpmyforum:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyforum:phpmyforum:4.1:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyforum:phpmyforum:4.1.3:*:*:*:*:*:*:*" ]
null
null
null
4.3
CVE-2007-6083
SQL injection vulnerability in admin/index.php in IceBB 1.0-rc6 allows remote attackers to execute arbitrary SQL commands via the X-Forwarded-For HTTP header.
[ "cpe:2.3:a:icebb:icebb:1.0-rc6:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2004-0232
Multiple format string vulnerabilities in Midnight Commander (mc) before 4.6.0 may allow attackers to cause a denial of service or execute arbitrary code.
[ "cpe:2.3:a:midnight_commander:midnight_commander:4.5.40:*:*:*:*:*:*:*", "cpe:2.3:a:midnight_commander:midnight_commander:4.5.41:*:*:*:*:*:*:*", "cpe:2.3:a:midnight_commander:midnight_commander:4.5.42:*:*:*:*:*:*:*", "cpe:2.3:a:midnight_commander:midnight_commander:4.5.43:*:*:*:*:*:*:*", "cpe:2.3:a:midnight_commander:midnight_commander:4.5.44:*:*:*:*:*:*:*", "cpe:2.3:a:midnight_commander:midnight_commander:4.5.45:*:*:*:*:*:*:*", "cpe:2.3:a:midnight_commander:midnight_commander:4.5.46:*:*:*:*:*:*:*", "cpe:2.3:a:midnight_commander:midnight_commander:4.5.47:*:*:*:*:*:*:*", "cpe:2.3:a:midnight_commander:midnight_commander:4.5.48:*:*:*:*:*:*:*", "cpe:2.3:a:midnight_commander:midnight_commander:4.5.49:*:*:*:*:*:*:*", "cpe:2.3:a:midnight_commander:midnight_commander:4.5.50:*:*:*:*:*:*:*", "cpe:2.3:a:midnight_commander:midnight_commander:4.5.51:*:*:*:*:*:*:*", "cpe:2.3:a:midnight_commander:midnight_commander:4.5.52:*:*:*:*:*:*:*", "cpe:2.3:a:midnight_commander:midnight_commander:4.5.55:*:*:*:*:*:*:*", "cpe:2.3:a:midnight_commander:midnight_commander:4.6:*:*:*:*:*:*:*", "cpe:2.3:a:sgi:propack:2.3:*:*:*:*:*:*:*", "cpe:2.3:a:sgi:propack:2.4:*:*:*:*:*:*:*", "cpe:2.3:o:gentoo:linux:0.5:*:*:*:*:*:*:*", "cpe:2.3:o:gentoo:linux:0.7:*:*:*:*:*:*:*", "cpe:2.3:o:gentoo:linux:1.1a:*:*:*:*:*:*:*", "cpe:2.3:o:gentoo:linux:1.2:*:*:*:*:*:*:*", "cpe:2.3:o:gentoo:linux:1.4:*:*:*:*:*:*:*", "cpe:2.3:o:gentoo:linux:1.4:rc1:*:*:*:*:*:*", "cpe:2.3:o:gentoo:linux:1.4:rc2:*:*:*:*:*:*", "cpe:2.3:o:gentoo:linux:1.4:rc3:*:*:*:*:*:*", "cpe:2.3:o:slackware:slackware_linux:*:*:*:*:*:*:*:*", "cpe:2.3:o:slackware:slackware_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:slackware:slackware_linux:9.1:*:*:*:*:*:*:*" ]
null
null
null
5
GHSA-p8ww-vv84-c2rm
OrientDB-Server vulnerable to Cross-Site Request Forgery
The JSONP endpoint in the Studio component in OrientDB Server Community Edition before 2.0.15 and 2.1.x before 2.1.1 does not properly restrict callback values, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks, and obtain sensitive information, via a crafted HTTP request.
[]
null
null
8.8
null
CVE-2014-5606
The Where's My Perry? Free (aka com.disney.WMPLite) application 1.5.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[ "cpe:2.3:a:disney:where\\'s_my_perry\\?_free:1.5.1:*:*:*:*:android:*:*" ]
null
null
null
5.4
GHSA-vv6m-9gcj-8cf5
A use of externally-controlled format string in Fortinet FortiOS version 7.2.0 through 7.2.4, FortiOS all versions 7.0, FortiOS all versions 6.4, FortiOS all versions 6.2, FortiProxy version 7.2.0 through 7.2.1, FortiProxy version 7.0.0 through 7.0.7 allows attacker to execute unauthorized code or commands via specially crafted commands.
[]
null
6.7
null
null
CVE-2019-10052
An issue was discovered in Suricata 4.1.3. If the network packet does not have the right length, the parser tries to access a part of a DHCP packet. At this point, the Rust environment runs into a panic in parse_clientid_option in the dhcp/parser.rs file.
[ "cpe:2.3:a:suricata-ids:suricata:4.1.3:*:*:*:*:*:*:*" ]
null
null
7.5
5
GHSA-gv2x-f8q9-774h
Due to insufficient input validation, SAP NetWeaver Development Infrastructure (Design Time Repository) - versions 7.30, 7.31, 7.40, 7.50, allows an unauthenticated attacker to inject script into the URL and execute code in the user’s browser. On successful exploitation, an attacker can view or modify information causing a limited impact on confidentiality and integrity of the application.
[]
null
6.1
null
null
CVE-2024-36598
An arbitrary file upload vulnerability in Aegon Life v1.0 allows attackers to execute arbitrary code via uploading a crafted image file.
[ "cpe:2.3:a:projectworlds:life_insurance_management_system:1.0:*:*:*:*:*:*:*" ]
null
8.1
null
null
GHSA-7633-2p6v-h7c8
The Microsoft Java implementation, as used in Internet Explorer, allows remote attackers to steal cookies and execute script in a different security context via a URL that contains a colon in the domain portion, which is not properly parsed and loads an applet from a malicious site within the security context of the site that is being visited by the user.
[]
null
null
null
null
ICSA-23-353-04
Open Design Alliance Drawing SDK
Open Design Alliance's Drawing SDK prior to Version 2024.1 is vulnerable to a use after free attack. Exploitation of this vulnerability requires the target to visit a malicious page or open a malicious file. The specific vulnerability exists within the parsing of DWG files. Crafted data in a DWG file can trigger a use after free attack past the end of an allocated buffer. An attacker could leverage this vulnerability in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Parsing of DWG files in Open Design Alliance Drawings SDK before 2023.6 lacks proper validation of the length of user-supplied XRecord data prior to copying it to a fixed-length heap-based buffer. An attacker could leverage this vulnerability to execute code in the context of the current process. A heap-based buffer overflow exists in the DXF file reading procedure in Open Design Alliance Drawings SDK before 2023.6. The specific flaw exists within the parsing of DXF files. The issue results from the lack of proper validation of the length of user-supplied XRecord data prior to copying it to a fixed-length heap-based buffer. An attacker could leverage this vulnerability to execute code in the context of the current process.
[]
null
null
7.8
null
CVE-2021-4088
Blind SQL injection in DLP ePO extension
SQL injection vulnerability in Data Loss Protection (DLP) ePO extension 11.8.x prior to 11.8.100, 11.7.x prior to 11.7.101, and 11.6.401 allows a remote authenticated attacker to inject unfiltered SQL into the DLP part of the ePO database. This could lead to remote code execution on the ePO server with privilege escalation.
[ "cpe:2.3:a:mcafee:data_loss_prevention:*:*:*:*:*:epolicy_orchestrator:*:*", "cpe:2.3:a:mcafee:data_loss_prevention:11.6.401:*:*:*:*:epolicy_orchestrator:*:*" ]
null
8.4
null
null
CVE-2007-0546
Toxiclab Shoutbox 1 stores sensitive information under the web root with insufficient access control, which allows remote attackers to download a database containing passwords via a direct request for db.mdb.
[ "cpe:2.3:a:toxiclab:shoutbox:1:*:*:*:*:*:*:*" ]
null
null
null
7.8
GHSA-5cc9-m24m-vpr3
A Server-Side Request Forgery (SSRF) in the component admin_webgather.php of SUCMS v1.0 allows attackers to access internal data and services via a crafted GET request.
[]
null
7.5
null
null
GHSA-ccmq-qvcp-5mrm
Unsafe deserialization in owlmixin
An exploitable vulnerability exists in the YAML loading functionality of util.py in OwlMixin before 2.0.0a12. A "Load YAML" string or file (aka load_yaml or load_yamlf) can execute arbitrary Python commands resulting in command execution because load is used where safe_load should have been used. An attacker can insert Python into loaded YAML to trigger this vulnerability.
[]
9.3
null
9.8
null
GHSA-9446-54vc-3xw5
An assert may be triggered, causing a temporary denial of service when a peer device sends a specially crafted malformed L2CAP packet. If a watchdog timer is not enabled, a hard reset is required to recover the device.
[]
null
6.5
null
null
CVE-2011-3141
Buffer overflow in the InBatch BatchField ActiveX control for Invensys Wonderware InBatch 8.1 SP1, 9.0, and 9.0 SP1 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unspecified vectors.
[ "cpe:2.3:a:invensys:wonderware_inbatch:8.1:sp1:*:*:*:*:*:*", "cpe:2.3:a:invensys:wonderware_inbatch:9.0:*:*:*:*:*:*:*", "cpe:2.3:a:invensys:wonderware_inbatch:9.0:sp1:*:*:*:*:*:*" ]
null
null
null
9.3
CVE-2022-25740
Buffer Copy Without Checking Size of Input in MODEM
Memory corruption in modem due to buffer overwrite while building an IPv6 multicast address based on the MAC address of the iface
[ "cpe:2.3:o:qualcomm:9205_lte_modem_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:9206_lte_modem_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:9207_lte_modem_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm8207_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca4004_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qts110_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_1100_wearable_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_1200_wearable_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_wear_1300_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_x5_lte_modem_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9306_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9330_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm8207:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9205_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9205:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9206_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9206:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9207_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9207:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca4004:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qts110:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_wear_1100_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_wear_1100:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_wear_1200_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_wear_1200:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_wear_1300_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_wear_1300:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_x5_lte_modem:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9306:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9330:-:*:*:*:*:*:*:*" ]
null
9.8
null
null
CVE-2019-2683
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Options). Supported versions that are affected are 5.6.43 and prior, 5.7.25 and prior and 8.0.15 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
[ "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:software_collections:1.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:*" ]
null
4.9
null
4
CVE-2019-15435
The Samsung A7 Android device with a build fingerprint of samsung/a7y17ltexx/a7y17lte:8.0.0/R16NW/A720FXXU7CSC2:user/release-keys contains a pre-installed app with a package name of com.samsung.android.themecenter app (versionCode=7000000, versionName=7.0.0.0) that allows other pre-installed apps to perform app installation via an accessible app component. This capability can be accessed by any pre-installed app on the device which can obtain signatureOrSystem permissions that are required by other other pre-installed apps that exported their capabilities to other pre-installed app.
[ "cpe:2.3:o:samsung:galaxy_a7_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:samsung:galaxy_a7:-:*:*:*:*:*:*:*" ]
null
7.8
null
4.6
CVE-2008-0767
ExtremeZ-IP.exe in ExtremeZ-IP File and Print Server 5.1.2x15 and earlier does not verify that a certain "number of URLs" field is consistent with the packet length, which allows remote attackers to cause a denial of service (daemon crash) via a large integer in this field in a packet to the Service Location Protocol (SLP) service on UDP port 427, triggering an out-of-bounds read.
[ "cpe:2.3:a:extremez:print_server:*:*:*:*:*:*:*:*", "cpe:2.3:a:extremez-ip:file_server:*:*:*:*:*:*:*:*" ]
null
null
null
5
GHSA-rqph-fqcj-v36g
Improper export of android application components vulnerability in TelephonyUI prior to SMR May-2024 Release 1 allows local attackers to reboot the device without proper permission.
[]
null
4
null
null
CVE-2020-35504
A NULL pointer dereference flaw was found in the SCSI emulation support of QEMU in versions before 6.0.0. This flaw allows a privileged guest user to crash the QEMU process on the host, resulting in a denial of service. The highest threat from this vulnerability is to system availability.
[ "cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*" ]
null
6
null
2.1