id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
189k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
patch_commit_url
stringlengths
38
232
GHSA-qc55-vm3j-74gp
JSNAPy allows unprivileged local users to alter files under the directory
JSNAPy is an open source python version of Junos Snapshot Administrator developed by Juniper available through github. The default configuration and sample files of JSNAPy automation tool versions prior to 1.3.0 are created world writable. This insecure file and directory permission allows unprivileged local users to alter the files under this directory including inserting operations not intended by the package maintainer, system administrator, or other users. This issue only affects users who downloaded and installed JSNAPy from github.
[]
7.1
null
5.5
null
null
CVE-1999-0874
Buffer overflow in IIS 4.0 allows remote attackers to cause a denial of service via a malformed request for files with .HTR, .IDC, or .STM extensions.
[ "cpe:2.3:a:microsoft:internet_information_server:4.0:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_nt:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*" ]
null
null
null
10
null
CVE-2017-0621
An elevation of privilege vulnerability in the Qualcomm camera driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10. Android ID: A-35399703. References: QC-CR#831322.
[ "cpe:2.3:o:linux:linux_kernel:3.10:*:*:*:*:*:*:*" ]
null
null
7
7.6
null
GHSA-x97v-6wf2-6ffp
An invalid memory address reference was discovered in the elf_lookup function in p_lx_elf.cpp in UPX 4.0.0 via a crafted Mach-O file.
[]
null
5.5
null
null
null
CVE-2016-0571
Unspecified vulnerability in the Oracle Balanced Scorecard component in Oracle E-Business Suite 11.5.10.2 and 12.1 allows remote attackers to affect confidentiality via unknown vectors.
[ "cpe:2.3:a:oracle:balanced_scorecard:11.5.10.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:balanced_scorecard:12.1:*:*:*:*:*:*:*" ]
null
null
null
5
null
CVE-2024-38142
Windows Secure Kernel Mode Elevation of Privilege Vulnerability
Windows Secure Kernel Mode Elevation of Privilege Vulnerability
[ "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*" ]
null
7.8
null
null
null
CVE-2022-25518
In CMDBuild from version 3.0 to 3.3.2 payload requests are saved in a temporary log table, which allows attackers with database access to read the password of the users who login to the application by querying the database table.
[ "cpe:2.3:a:tecnoteca:cmdbuild:*:*:*:*:*:*:*:*" ]
null
6.5
null
4
null
CVE-2017-15244
IrfanView version 4.44 (32bit) with PDF plugin version 4.43 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .pdf file, related to an "Error Code (0xe06d7363) starting at wow64!Wow64NotifyDebugger+0x000000000000001d."
[ "cpe:2.3:a:irfanview:irfanview:4.44:*:*:*:*:*:x86:*", "cpe:2.3:a:irfanview:pdf:4.43:*:*:*:*:*:*:*" ]
null
null
7.8
6.8
null
CVE-2024-22326
IBM System Storage improper authentication
IBM System Storage DS8900F 89.22.19.0, 89.30.68.0, 89.32.40.0, 89.33.48.0, 89.40.83.0, and 89.40.93.0 could allow a remote user to create an LDAP connection with a valid username and empty password to establish an anonymous connection.   IBM X-Force ID: 279518.
[ "cpe:2.3:o:ibm:system_storage_ds8000_management_console_firmware:89.22.19.0:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:system_storage_ds8000_management_console_firmware:89.30.68.0:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:system_storage_ds8000_management_console_firmware:89.32.40.0:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:system_storage_ds8000_management_console_firmware:89.33.48.0:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:system_storage_ds8000_management_console_firmware:89.40.83.0:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:system_storage_ds8000_management_console_firmware:89.40.93.0:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:ds8900f_firmware:89.22.19.0:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:ds8900f_firmware:89.30.68.0:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:ds8900f_firmware:89.32.40.0:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:ds8900f_firmware:89.33.48.0:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:ds8900f_firmware:89.40.83.0:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:ds8900f_firmware:89.40.93.0:*:*:*:*:*:*:*" ]
null
5
null
null
null
GHSA-qphx-chwr-chm3
SAP NetWeaver AS JAVA (IIOP service) (SERVERCORE), versions 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50, and SAP NetWeaver AS JAVA (IIOP service) (CORE-TOOLS), versions 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50, allows an attacker to send a crafted request from a vulnerable web application. It is usually used to target internal systems behind firewalls that are normally inaccessible to an attacker from the external network, resulting in a Server-Side Request Forgery vulnerability.
[]
null
null
null
null
null
GHSA-79hr-r4jh-cg4h
The administration interface on Cisco DPQ3925 devices with firmware r1 allows remote attackers to cause a denial of service (device restart) via a crafted HTTP request, aka Bug ID CSCup48105.
[]
null
null
7.5
null
null
CVE-2013-5580
The (1) Conn_StartLogin and (2) cb_Read_Resolver_Result functions in conn.c in ngIRCd 18 through 20.2, when the configuration option NoticeAuth is enabled, does not properly handle the return code for the Handle_Write function, which allows remote attackers to cause a denial of service (assertion failure and server crash) via unspecified vectors, related to a "notice auth" message not being sent to a new client.
[ "cpe:2.3:a:barton:ngircd:18.0:*:*:*:*:*:*:*", "cpe:2.3:a:barton:ngircd:19.0:*:*:*:*:*:*:*", "cpe:2.3:a:barton:ngircd:19.1:*:*:*:*:*:*:*", "cpe:2.3:a:barton:ngircd:20.0:*:*:*:*:*:*:*", "cpe:2.3:a:barton:ngircd:20.1:*:*:*:*:*:*:*", "cpe:2.3:a:barton:ngircd:20.2:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
GHSA-rm3j-xjw9-m9p3
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, and 6 Update 35 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2012-1533.
[]
null
null
null
null
null
GHSA-27v5-v9w4-6pr5
Buffer overflow in the AStreamPeekStream function in input/stream.c in VideoLAN VLC media player before 2.2.0 allows remote attackers to cause a denial of service (crash) via a crafted wav file, related to "seek across EOF."
[]
null
null
5.5
null
null
GHSA-gv7p-f5gp-mj9q
Missing Authorization vulnerability in 8theme XStore Core.This issue affects XStore Core: from n/a through 5.3.5.
[]
null
6.5
null
null
null
CVE-2023-40145
Weintek cMT3000 HMI Web CGI OS Command Injection
In Weintek's cMT3000 HMI Web CGI device, an anonymous attacker can execute arbitrary commands after login to the device.
[ "cpe:2.3:o:weintek:cmt-fhd_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:weintek:cmt-fhd:-:*:*:*:*:*:*:*", "cpe:2.3:o:weintek:cmt-hdm_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:weintek:cmt-hdm:-:*:*:*:*:*:*:*", "cpe:2.3:o:weintek:cmt3071_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:weintek:cmt3071:-:*:*:*:*:*:*:*", "cpe:2.3:o:weintek:cmt3072_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:weintek:cmt3072:-:*:*:*:*:*:*:*", "cpe:2.3:o:weintek:cmt3090_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:weintek:cmt3090:-:*:*:*:*:*:*:*", "cpe:2.3:o:weintek:cmt3103_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:weintek:cmt3103:-:*:*:*:*:*:*:*", "cpe:2.3:o:weintek:cmt3151_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:weintek:cmt3151:-:*:*:*:*:*:*:*" ]
null
8.8
null
null
null
GHSA-vc24-x76h-c7c6
Format string vulnerability in POP3 client for Mirabilis ICQ Pro 2003a allows remote malicious servers to execute arbitrary code via format strings in the response to a UIDL command.
[]
null
null
null
null
null
GHSA-mr9m-2xh2-j9pw
In the Quick Access Service (QAAdminAgent.exe) in Acer Quick Access V2.01.3000 through 2.01.3027 and V3.00.3000 through V3.00.3008, a REGULAR user can load an arbitrary unsigned DLL into the signed service's process, which is running as NT AUTHORITY\SYSTEM. This is a DLL Hijacking vulnerability (including search order hijacking, which searches for the missing DLL in the PATH environment variable), which is caused by an uncontrolled search path element for nvapi.dll, atiadlxx.dll, or atiadlxy.dll.
[]
null
null
null
null
null
GHSA-q2q4-vx5m-7xc9
InCopy versions 20.0, 19.5.1 and earlier are affected by an Integer Underflow (Wrap or Wraparound) vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[]
null
7.8
null
null
null
CVE-2018-11762
In Apache Tika 0.9 to 1.18, in a rare edge case where a user does not specify an extract directory on the commandline (--extract-dir=) and the input file has an embedded file with an absolute path, such as "C:/evil.bat", tika-app would overwrite that file.
[ "cpe:2.3:a:apache:tika:*:*:*:*:*:*:*:*" ]
null
null
5.9
5.8
null
GHSA-rrwg-36fq-m273
Unspecified vulnerability in the Web Cache component in Oracle Fusion Middleware 11.1.1.9.0 allows remote attackers to affect confidentiality via vectors related to SSL support.
[]
null
null
null
null
null
GHSA-7w9q-vfgp-w49f
An issue was discovered in USC iLab cereal through 1.3.0. Serialization of an (initialized) C/C++ long double variable into a BinaryArchive or PortableBinaryArchive leaks several bytes of stack or heap memory, from which sensitive information (such as memory layout or private keys) can be gleaned if the archive is distributed outside of a trusted context.
[]
null
null
null
null
null
CVE-2018-3879
An exploitable JSON injection vulnerability exists in the credentials handler of video-core's HTTP server of Samsung SmartThings Hub STH-ETH-250 devices with firmware version 0.20.17. The video-core process incorrectly parses the user-controlled JSON payload, leading to a JSON injection which in turn leads to a SQL injection in the video-core database. An attacker can send a series of HTTP requests to trigger this vulnerability.
[ "cpe:2.3:o:samsung:sth-eth-250_firmware:0.20.17:*:*:*:*:*:*:*", "cpe:2.3:h:samsung:sth-eth-250:-:*:*:*:*:*:*:*" ]
null
null
8.8
null
null
CVE-2007-5775
Unspecified vulnerability in BitDefender allows attackers to execute arbitrary code via unspecified vectors, aka EEYEB-20071024. NOTE: as of 20071029, the only disclosure is a vague pre-advisory with no actionable information. However, since it is from a well-known researcher, it is being assigned a CVE identifier for tracking purposes.
[ "cpe:2.3:a:bitdefender:antivirus:*:*:*:*:*:*:*:*", "cpe:2.3:a:bitdefender:internet_security:*:*:*:*:*:*:*:*", "cpe:2.3:a:bitdefender:total_security:*:*:*:*:*:*:*:*" ]
null
9.8
null
9.3
null
GHSA-jfv4-xrpg-w38g
A remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.
[]
null
null
null
null
null
GHSA-q8x4-6vcv-jjgf
The compression code in MaraDNS before 0.9.01 allows remote attackers to cause a denial of service via crafted DNS packets.
[]
null
null
null
null
null
RHSA-2025:8346
Red Hat Security Advisory: kpatch-patch-4_18_0-477_43_1, kpatch-patch-4_18_0-477_67_1, kpatch-patch-4_18_0-477_81_1, and kpatch-patch-4_18_0-477_89_1 security update
kernel: netfilter: ipset: add missing range check in bitmap_ip_uadt kernel: vsock: Keep the binding until socket destruction
[ "cpe:/o:redhat:rhel_eus:8.8::baseos" ]
null
7.8
null
null
null
CVE-2023-2400
Improper deletion of resource in the user management feature in Devolutions Server 2023.1.8 and earlier allows an administrator to view users vaults of deleted users via database access.
[ "cpe:2.3:a:devolutions:devolutions_server:*:*:*:*:*:*:*:*" ]
null
2.7
null
null
null
CVE-2008-0922
SQL injection vulnerability in the Manuales 0.1 module for PHP-Nuke allows remote attackers to execute arbitrary SQL commands via the cid parameter in a viewdownload action to modules.php.
[ "cpe:2.3:a:php-nuke:manuales:0.1:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
GHSA-qq2g-cjgq-hwqr
Buffer overflow in vxTftpSrv 1.7.0 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a TFTP request with a long filename argument.
[]
null
null
null
null
null
GHSA-wp3g-pr4h-q6vv
Moodle does not enforce capability requirements for reading blog comments
Moodle through 2.1.10, 2.2.x before 2.2.10, 2.3.x before 2.3.7, and 2.4.x before 2.4.4 does not enforce capability requirements for reading blog comments, which allows remote attackers to obtain sensitive information via a crafted request.
[]
null
null
null
null
null
CVE-2006-3326
Directory traversal vulnerability in QuickZip 3.06.3 allows remote user-assisted attackers to overwrite arbitrary files or directories via .. (dot dot) sequences in filenames within (1) TAR,(2) GZ, and (3) JAR archives. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
[ "cpe:2.3:a:joesph_leung:quickzip:3.06.3:*:*:*:*:*:*:*" ]
null
null
null
2.6
null
CVE-2019-6611
When BIG-IP 14.0.0-14.1.0.1, 13.0.0-13.1.1.4, 12.1.0-12.1.4, 11.6.1-11.6.3.4, and 11.5.2-11.5.8 are processing certain rare data sequences occurring in PPTP VPN traffic, the BIG-IP system may execute incorrect logic. The TMM may restart and produce a core file as a result of this condition. The BIG-IP system provisioned with the CGNAT module and configured with a virtual server using a PPTP profile is exposed to this vulnerability.
[ "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*" ]
null
7.5
null
5
null
GHSA-2hcx-274x-74jw
Unspecified vulnerability in the PeopleSoft Enterprise HRMS component in Oracle PeopleSoft and JDEdwards Suite 9.0 Bundle #14 and 9.1 Bundle #4 allows remote authenticated users to affect confidentiality via unknown vectors related to eProfile - Manager Desktop.
[]
null
null
null
null
null
GHSA-x5ff-9455-hv4q
In EPESI 1.8.2 rev20170830, there is Stored XSS in the Tasks Title parameter.
[]
null
null
5.4
null
null
GHSA-2x68-h5x4-c4qp
ssl3_get_record in s3_pkt.c for OpenSSL before 0.9.7a and 0.9.6 before 0.9.6i does not perform a MAC computation if an incorrect block cipher padding is used, which causes an information leak (timing discrepancy) that may make it easier to launch cryptographic attacks that rely on distinguishing between padding and MAC verification errors, possibly leading to extraction of the original plaintext, aka the "Vaudenay timing attack."
[]
null
null
null
null
null
CVE-2019-8905
do_core_note in readelf.c in libmagic.a in file 5.35 has a stack-based buffer over-read, related to file_printable, a different vulnerability than CVE-2018-10360.
[ "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:file_project:file:5.35:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*" ]
null
4.4
null
3.6
null
GHSA-7jqf-v358-p8g7
Apache Tomcat Allocation of Resources Without Limits or Throttling vulnerability
Allocation of Resources Without Limits or Throttling vulnerability in Apache Tomcat.This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M20, from 10.1.0-M1 through 10.1.24, from 9.0.13 through 9.0.89. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.35 through 8.5.100 and 7.0.92 through 7.0.109.Users are recommended to upgrade to version 11.0.0-M21, 10.1.25, or 9.0.90, which fixes the issue.Apache Tomcat, under certain configurations on any platform, allows an attacker to cause an OutOfMemoryError by abusing the TLS handshake process.
[]
7.7
8.6
null
null
null
GHSA-mv52-68qh-v324
masqmail before 0.2.18 allows remote attackers to execute arbitrary commands via crafted e-mail addresses that are not properly sanitized when creating a failed delivery message.
[]
null
null
null
null
null
CVE-2009-4104
SQL injection vulnerability in Lyften Designs LyftenBloggie (com_lyftenbloggie) component 1.0.4 for Joomla! allows remote attackers to execute arbitrary SQL commands via the author parameter to index.php.
[ "cpe:2.3:a:joomla:joomla\\!:*:*:*:*:*:*:*:*", "cpe:2.3:a:lyften:com_lyftenbloggie:1.0.4:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2024-6878
Directory Browsing in Eliz Software's Panel
Files or Directories Accessible to External Parties vulnerability in Eliz Software Panel allows Collect Data from Common Resource Locations.This issue affects Panel: before v2.3.24.
[ "cpe:2.3:a:eliz_software:panel:*:*:*:*:*:*:*:*" ]
9.2
null
null
null
null
GHSA-vq94-jf3p-92rx
A vulnerability was found in freeSSHd 1.0.9 on Windows. It has been classified as problematic. This affects an unknown part. The manipulation leads to denial of service. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-251547.
[]
null
5.3
null
null
null
CVE-2020-19047
Cross Site Request Forgey (CSRF) in iWebShop v5.3 allows remote atatckers to execute arbitrary code via malicious POST request to the component '/index.php?controller=system&action=admin_edit_act'.
[ "cpe:2.3:a:iwebshop:iwebshop:5.3:*:*:*:*:*:*:*" ]
null
8.8
null
6.8
null
GHSA-q86q-3rhp-gfqv
A vulnerability classified as problematic has been found in PHPGurukul Teacher Subject Allocation Management System 1.0. Affected is an unknown function of the file /admin/course.php of the component Delete Course Handler. The manipulation of the argument delid leads to cross-site request forgery. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-247896.
[]
null
4.3
null
null
null
GHSA-hjq7-734v-xhcw
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_event: Align BR/EDR JUST_WORKS paring with LEThis aligned BR/EDR JUST_WORKS method with LE which since 92516cd97fd4 ("Bluetooth: Always request for user confirmation for Just Works") always request user confirmation with confirm_hint set since the likes of bluetoothd have dedicated policy around JUST_WORKS method (e.g. main.conf:JustWorksRepairing).CVE: CVE-2024-8805
[]
null
null
null
null
null
RHSA-2022:0260
Red Hat Security Advisory: Red Hat OpenStack Platform 16.1 (etcd) security update
golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet golang: crypto/tls: certificate of wrong type is causing TLS client to panic golang: net/http: limit growth of header canonicalization cache
[ "cpe:/a:redhat:openstack:16.1::el8" ]
null
7.5
null
null
null
GHSA-hh4p-jcm5-55rv
Array index error in VLC media player 0.9.2 allows remote attackers to overwrite arbitrary memory and execute arbitrary code via an XSPF playlist file with a negative identifier tag, which passes a signed comparison.
[]
null
null
null
null
null
RHEA-2018:2189
Red Hat Enhancement Advisory: Red Hat JBoss Web Server 5.0.0 enhancement update
tomcat: A bug in the UTF-8 decoder can lead to DoS
[ "cpe:/a:redhat:jboss_enterprise_web_server:5.0::el6" ]
null
null
7.5
null
null
CVE-2024-28941
Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
[]
null
8.8
null
null
null
GHSA-526f-868j-w52f
Tenda W20E router V15.11.0.6 contains a stack overflow in the function formSetPortMapping with post request 'goform/setPortMapping/'. This vulnerability allows attackers to cause a Denial of Service (DoS) or Remote Code Execution (RCE) via the portMappingServer, portMappingProtocol, portMappingWan, porMappingtInternal, and portMappingExternal parameters.
[]
null
9.8
null
null
null
GHSA-789g-hjf7-fq63
Tenda TX3 US_TX3V1.0br_V16.03.13.11_multi_TDE01 was discovered to contain a stack overflow via the list parameter at /goform/SetVirtualServerCfg.
[]
null
9.8
null
null
null
CVE-2025-30733
Vulnerability in the RDBMS Listener component of Oracle Database Server. Supported versions that are affected are 19.3-19.26, 21.3-21.17 and 23.4-23.7. Easily exploitable vulnerability allows unauthenticated attacker with network access via Oracle Net to compromise RDBMS Listener. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all RDBMS Listener accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N).
[]
null
6.5
null
null
null
GHSA-ph78-5q58-gqxj
A clone version of an ELM327 OBD2 Bluetooth device has a hardcoded PIN, leading to arbitrary commands to an OBD-II bus of a vehicle, as demonstrated by turning off the vehicle's lights.
[]
null
9.8
null
null
null
CVE-2022-27108
OrangeHRM 4.10 is vulnerable to Insecure Direct Object Reference (IDOR) via the end point symfony/web/index.php/time/createTimesheet`. Any user can create a timesheet in another user's account.
[ "cpe:2.3:a:orangehrm:orangehrm:4.10:*:*:*:*:*:*:*" ]
null
4.3
null
4
null
CVE-2024-51428
An issue in Espressif Esp idf v5.3.0 allows attackers to cause a Denial of Service (DoS) via a crafted data channel packet.
[ "cpe:2.3:a:expressif:esp_idf:*:*:*:*:*:*:*:*" ]
null
7.5
null
null
null
CVE-2023-36850
Junos OS: MX Series: An MPC will crash upon receipt of a malformed CFM packet.
An Improper Validation of Specified Index, Position, or Offset in Input vulnerability in the Connectivity Fault Management(CFM) module of Juniper Networks Junos OS on MX Series(except MPC10, MPC11 and LC9600) allows an adjacent attacker on the local broadcast domain to cause a Denial of Service(DoS). Upon receiving a malformed CFM packet, the MPC crashes. Continued receipt of these packets causes a sustained denial of service. This issue can only be triggered when CFM hasn't been configured. This issue affects: Juniper Networks Junos OS All versions prior to 19.1R3-S10 on MX Series; 19.2 versions prior to 19.2R3-S7 on MX Series; 19.3 versions prior to 19.3R3-S8 on MX Series; 19.4 versions prior to 19.4R3-S12 on MX Series; 20.1 version 20.1R1 and later versions on MX Series; 20.2 versions prior to 20.2R3-S7 on MX Series; 20.3 version 20.3R1 and later versions on MX Series; 20.4 versions prior to 20.4R3-S7 on MX Series; 21.1 versions prior to 21.1R3-S5 on MX Series; 21.2 versions prior to 21.2R3-S4 on MX Series; 21.3 versions prior to 21.3R3-S4 on MX Series; 21.4 versions prior to 21.4R3-S3 on MX Series; 22.1 versions prior to 22.1R3-S2 on MX Series; 22.2 versions prior to 22.2R3 on MX Series; 22.3 versions prior to 22.3R2, 22.3R3 on MX Series; 22.4 versions prior to 22.4R2 on MX Series.
[ "cpe:2.3:o:juniper:junos:19.1:-:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.1:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.1:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.1:r1-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.1:r1-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.1:r1-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.1:r1-s5:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.1:r1-s6:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.1:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.1:r2-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.1:r2-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.1:r2-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.1:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.1:r3-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.1:r3-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.1:r3-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.1:r3-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.1:r3-s5:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.1:r3-s6:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.1:r3-s7:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.1:r3-s8:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.1:r3-s9:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.2:-:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.2:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.2:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.2:r1-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.2:r1-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.2:r1-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.2:r1-s5:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.2:r1-s6:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.2:r1-s7:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.2:r1-s8:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.2:r1-s9:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.2:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.2:r2-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.2:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.2:r3-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.2:r3-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.2:r3-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.2:r3-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.2:r3-s5:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.2:r3-s6:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.3:-:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.3:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.3:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.3:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.3:r2-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.3:r2-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.3:r2-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.3:r2-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.3:r2-s5:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.3:r2-s6:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.3:r2-s7:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.3:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.3:r3-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.3:r3-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.3:r3-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.3:r3-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.3:r3-s5:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.3:r3-s6:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.3:r3-s7:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:-:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r1-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r1-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r1-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r2-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r2-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r2-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r2-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r2-s5:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r2-s6:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r2-s7:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r3-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r3-s10:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r3-s11:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r3-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r3-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r3-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r3-s5:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r3-s6:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r3-s7:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r3-s8:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r3-s9:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.1:-:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.1:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.1:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.1:r1-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.1:r1-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.1:r1-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.1:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.1:r2-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.1:r2-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.1:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.1:r3-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.1:r3-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.1:r3-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.1:r3-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.1:r3-s5:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.2:-:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.2:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.2:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.2:r1-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.2:r1-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.2:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.2:r2-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.2:r2-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.2:r2-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.2:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.2:r3-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.2:r3-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.2:r3-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.2:r3-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.2:r3-s5:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.2:r3-s6:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.3:-:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.3:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.3:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.3:r1-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.3:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.3:r2-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.3:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.3:r3-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.3:r3-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.3:r3-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.3:r3-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.3:r3-s5:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.3:r3-s6:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.4:-:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.4:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.4:r2-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.4:r2-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.4:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.4:r3-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.4:r3-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.4:r3-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.4:r3-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.4:r3-s5:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.4:r3-s6:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.1:-:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.1:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.1:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.1:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.1:r2-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.1:r2-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.1:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.1:r3-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.1:r3-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.1:r3-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.1:r3-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.2:r2-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.2:r2-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.2:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.2:r3-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.2:r3-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.2:r3-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.3:-:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.3:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.3:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.3:r1-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.3:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.3:r2-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.3:r2-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.3:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.3:r3-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.3:r3-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.3:r3-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.4:-:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.4:r1-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.4:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.4:r2-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.4:r2-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.4:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.4:r3-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.4:r3-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:22.1:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:22.1:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:22.1:r1-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:22.1:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:22.1:r2-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:22.1:r2-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:22.1:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:22.1:r3-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:22.2:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:22.2:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:22.2:r1-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:22.2:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:22.2:r2-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:22.2:r2-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:22.3:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:22.3:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:22.3:r1-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:22.4:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:22.4:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:22.4:r1-s2:*:*:*:*:*:*", "cpe:2.3:h:juniper:mx10:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:mx10000:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:mx10003:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:mx10008:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:mx10016:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:mx104:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:mx150:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:mx2008:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:mx2010:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:mx2020:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:mx204:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:mx240:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:mx40:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:mx480:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:mx5:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:mx80:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:mx960:-:*:*:*:*:*:*:*" ]
null
6.5
null
null
null
GHSA-4xvh-qj78-6qgr
SQL injection vulnerability in the Slide Show (com_slideshow) component for Joomla! allows remote attackers to execute arbitrary SQL commands via the catid parameter to index.php.
[]
null
null
null
null
null
CVE-2020-26968
Mozilla developers reported memory safety bugs present in Firefox 82 and Firefox ESR 78.4. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.
[ "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*" ]
null
8.8
null
9.3
null
GHSA-cwcx-f6p9-rr2m
Race condition in NVMap in NVIDIA Tegra Linux Kernel 3.10 allows local users to gain privileges via a crafted NVMAP_IOC_CREATE IOCTL call, which triggers a use-after-free error, as demonstrated by using a race condition to escape the Chrome sandbox.
[]
null
null
null
null
null
GHSA-jcw5-2cq8-2rxx
Race in V8 in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
[]
null
null
null
null
null
GHSA-pww9-97j5-gqjg
IBM Security Identity Manager (ISIM) Virtual Appliance 7.0.0.0 through 7.0.1.0 before 7.0.1-ISS-SIM-FP0001 allows remote authenticated users to execute arbitrary code with administrator privileges via unspecified vectors. IBM X-Force ID: 111640.
[]
null
null
8.8
null
null
CVE-2023-44379
baserCMS Cross-site Scripting vulnerability in Site search Feature
baserCMS is a website development framework. Prior to version 5.0.9, there is a cross-site scripting vulnerability in the site search feature. Version 5.0.9 contains a fix for this vulnerability.
[ "cpe:2.3:a:basercms:basercms:*:*:*:*:*:*:*:*" ]
null
6.1
null
null
null
GHSA-cppf-5jf5-fg5j
A vulnerability was found in ESAFENET CDG 5. It has been declared as critical. This vulnerability affects unknown code of the file /com/esafenet/servlet/policy/PrintPolicyService.java. The manipulation of the argument policyId leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
[]
5.3
6.3
null
null
null
GHSA-r8x4-v9xf-r2pq
Integer overflow or wraparound in Microsoft Graphics Component allows an authorized attacker to execute code locally.
[]
null
7.8
null
null
null
GHSA-qf34-69mr-2hfx
Cross-Site Request Forgery (CSRF) vulnerability in Hands, Inc e-shops allows Reflected XSS.This issue affects e-shops: from n/a through 1.0.3.
[]
null
7.1
null
null
null
RHSA-2025:7160
Red Hat Security Advisory: bootc security update
rust-openssl: rust openssl ssl::select_next_proto use after free
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
4.8
null
null
null
GHSA-w2c4-vpgj-g3jp
In JetBrains Ktor before 2.3.1 headers containing authentication data could be added to the exception's message
[]
null
3.3
null
null
null
CVE-2022-1909
Cross-site Scripting (XSS) - Stored in causefx/organizr
Cross-site Scripting (XSS) - Stored in GitHub repository causefx/organizr prior to 2.1.2200.
[ "cpe:2.3:a:organizr:organizr:*:*:*:*:*:*:*:*" ]
null
null
9
null
null
CVE-2013-1495
asr in Oracle Auto Service Request in Oracle Support Tools before 4.3.2 allows local users to modify arbitrary files via a symlink attack on a predictable filename in /tmp.
[ "cpe:2.3:a:oracle:support_tools:*:*:*:*:*:*:*:*" ]
null
null
null
6.9
null
CVE-2022-26749
A buffer overflow issue was addressed with improved memory handling. This issue is fixed in macOS Monterey 12.4. An application may be able to execute arbitrary code with kernel privileges.
[ "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*" ]
null
7.8
null
9.3
null
GHSA-25hr-jmpc-2w97
Privileges are not fully verified server-side, which can be abused by a user with limited privileges to bypass authorization and access privileged functionality.
[]
null
8.8
null
null
null
GHSA-6fm6-5ph4-2rpq
Buffer overflow in GNOME libraries 1.0.8 allows local user to gain root access via a long --espeaker argument in programs such as nethack.
[]
null
null
null
null
null
CVE-2024-28826
Unrestricted upload and download paths in check_sftp
Improper restriction of local upload and download paths in check_sftp in Checkmk before 2.3.0p4, 2.2.0p27, 2.1.0p44, and in Checkmk 2.0.0 (EOL) allows attackers with sufficient permissions to configure the check to read and write local files on the Checkmk site server.
[ "cpe:2.3:a:checkmk:checkmk:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:*:*:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:-:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:b1:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:b2:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:b3:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:b4:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:b5:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:b6:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:b7:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:b8:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:b9:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p1:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p10:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p11:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p12:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p13:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p14:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p15:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p16:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p17:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p18:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p19:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p2:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p20:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p21:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p22:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p23:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p24:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p25:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p26:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p27:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p28:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p29:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p3:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p30:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p31:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p32:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p33:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p34:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p35:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p36:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p37:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p38:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p39:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p4:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p40:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p41:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p42:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p43:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p5:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p6:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p7:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p8:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p9:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:-:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:b1:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:b2:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:b3:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:b4:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:b5:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:b6:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:b7:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:b8:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:i1:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:p1:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:p10:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:p11:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:p12:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:p13:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:p14:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:p15:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:p16:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:p17:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:p18:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:p19:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:p2:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:p20:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:p21:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:p22:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:p23:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:p24:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:p25:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:p26:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:p3:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:p4:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:p5:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:p6:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:p7:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:p8:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:p9:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.3.0:-:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.3.0:b1:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.3.0:b2:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.3.0:b3:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.3.0:b4:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.3.0:b5:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.3.0:b6:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.3.0:p1:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.3.0:p2:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.3.0:p3:*:*:*:*:*:*" ]
null
8.8
null
null
null
CVE-2025-52714
WordPress Traveler < 3.2.2 - SQL Injection Vulnerability
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in shinetheme Traveler allows SQL Injection. This issue affects Traveler: from n/a through n/a.
[]
null
9.3
null
null
null
GHSA-2pg5-4r32-p73j
MicroBlog 0.9.5 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by init.php and certain other files.
[]
null
null
null
null
null
CVE-2016-3735
Piwigo is image gallery software written in PHP. When a criteria is not met on a host, piwigo defaults to usingmt_rand in order to generate password reset tokens. mt_rand output can be predicted after recovering the seed used to generate it. This low an unauthenticated attacker to take over an account providing they know an administrators email address in order to be able to request password reset.
[ "cpe:2.3:a:piwigo:piwigo:*:*:*:*:*:*:*:*" ]
null
8.1
null
6.8
null
CVE-2006-6506
The "Feed Preview" feature in Mozilla Firefox 2.0 before 2.0.0.1 sends the URL of the feed when requesting favicon.ico icons, which results in a privacy leak that might allow feed viewing services to determine browsing habits.
[ "cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
CVE-2025-1269
Open Redirect in HAVELSAN's Open Source Project Liman MYS
URL Redirection to Untrusted Site ('Open Redirect') vulnerability in HAVELSAN Liman MYS allows Cross-Site Flashing.This issue affects Liman MYS: before 2.1.1 - 1010.
[]
null
4.8
null
null
null
GHSA-8xxw-82jx-c77h
Heap-based buffer overflow in Calife 2.8.5 and earlier may allow local users to execute arbitrary code via a long password.
[]
null
null
null
null
null
GHSA-c8xf-mfg5-fp93
Directory traversal vulnerability in the web interface on Foscam devices with firmware before 11.37.2.49 allows remote attackers to read arbitrary files via a .. (dot dot) in the URI, as demonstrated by discovering (1) web credentials or (2) Wi-Fi credentials.
[]
null
null
null
null
null
CVE-2022-35937
OOB read in `Gather_nd` op in TensorFlow Lite
TensorFlow is an open source platform for machine learning. The `GatherNd` function takes arguments that determine the sizes of inputs and outputs. If the inputs given are greater than or equal to the sizes of the outputs, an out-of-bounds memory read is triggered. This issue has been patched in GitHub commit 595a65a3e224a0362d7e68c2213acfc2b499a196. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
[ "cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*", "cpe:2.3:a:google:tensorflow:2.10:rc0:*:*:*:*:*:*", "cpe:2.3:a:google:tensorflow:2.10:rc1:*:*:*:*:*:*", "cpe:2.3:a:google:tensorflow:2.10:rc2:*:*:*:*:*:*", "cpe:2.3:a:google:tensorflow:2.10:rc3:*:*:*:*:*:*" ]
null
7
null
null
null
RHSA-2008:0832
Red Hat Security Advisory: JBoss Enterprise Application Platform 4.3.0CP02 security update
Apache Tomcat's default security policy is too open JBossEAP allows download of non-EJB class files
[ "cpe:/a:redhat:jboss_enterprise_application_platform:4.3.0::el5" ]
null
null
null
null
null
CVE-2022-21514
Vulnerability in the Oracle Solaris product of Oracle Systems (component: Remote Administration Daemon). The supported version that is affected is 11. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Solaris. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Solaris. CVSS 3.1 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
[ "cpe:2.3:o:oracle:solaris:11:*:*:*:*:*:*:*" ]
null
7.5
null
null
null
GHSA-qjg7-q66x-8cc5
The Musulmanin.com (aka com.wSalyafiyailimurdjiya) application 0.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[]
null
null
null
null
null
CVE-2022-30214
Windows DNS Server Remote Code Execution Vulnerability
Windows DNS Server Remote Code Execution Vulnerability
[ "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*" ]
null
6.6
null
null
null
GHSA-hm2q-8f77-qrwh
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Mat Bao Corp WP Helper Premium allows Reflected XSS.This issue affects WP Helper Premium: from n/a before 4.6.0.
[]
null
7.1
null
null
null
GHSA-gwm4-rx9h-rpwj
Vulnerability in the Oracle Advanced Outbound Telephony component of Oracle E-Business Suite (subcomponent: User Interface). Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5 and 12.2.6. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Advanced Outbound Telephony. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Advanced Outbound Telephony, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Advanced Outbound Telephony accessible data as well as unauthorized update, insert or delete access to some of Oracle Advanced Outbound Telephony accessible data. CVSS v3.0 Base Score 8.2 (Confidentiality and Integrity impacts).
[]
null
null
8.2
null
null
RHSA-2015:1718
Red Hat Security Advisory: qemu-kvm-rhev security update
Qemu: rtl8139 uninitialized heap memory information leakage to guest (XSA-140)
[ "cpe:/a:redhat:openstack:7::el7" ]
null
null
null
null
null
CVE-2016-0042
Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 mishandle DLL loading, which allows local users to gain privileges via a crafted application, aka "Windows DLL Loading Remote Code Execution Vulnerability."
[ "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*" ]
null
null
7.8
7.2
null
GHSA-phg8-x4rr-qpgf
An issue was discovered in Delta RM 1.2. Using the /risque/risque/ajax-details endpoint, with a POST request indicating the risk to access with the id parameter, it is possible for users to access risks of other companies.
[]
null
4.3
null
null
null
GHSA-cc99-x3h3-44pj
ImageMagick 7.0.7-1 and older version are vulnerable to null pointer dereference in the MagickCore component and might lead to denial of service
[]
null
6.5
null
null
null
CVE-2021-39598
An issue was discovered in swftools through 20200710. A NULL pointer dereference exists in the function callcode() located in code.c. It allows an attacker to cause Denial of Service.
[ "cpe:2.3:a:swftools:swftools:*:*:*:*:*:*:*:*" ]
null
5.5
null
4.3
null
GHSA-f72p-cqvh-qg6q
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in CodeBard CodeBard's Patron Button and Widgets for Patreon allows Reflected XSS.This issue affects CodeBard's Patron Button and Widgets for Patreon: from n/a through 2.2.0.
[]
null
7.1
null
null
null
CVE-2018-8998
In Advanced SystemCare Ultimate 11.0.1.58, the driver file (Monitor_x86.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x9c4060cc.
[ "cpe:2.3:a:iobit:advanced_systemcare_ultimate:11.0.1.58:*:*:*:*:*:*:*" ]
null
null
7.8
6.1
null
GHSA-62pv-x8q7-86rc
dvips converter for Postscript files in the tetex package calls the system() function insecurely, which allows remote attackers to execute arbitrary commands via certain print jobs, possibly involving fonts.
[]
null
null
null
null
null
RHSA-2024:6189
Red Hat Security Advisory: buildah security update
golang: crypto/x509: Verify panics on certificates with an unknown public key algorithm
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
5.9
null
null
null
CVE-2006-5637
PHP remote file inclusion vulnerability in faq_reply.php in Faq Administrator 2.1b allows remote attackers to execute arbitrary PHP code via a URL in the email parameter.
[ "cpe:2.3:a:faq_administrator:faq_administrator:2.1b:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
GHSA-7m92-63xh-fv49
Google Chrome before 17.0.963.65 does not properly handle text, which allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted document.
[]
null
null
null
null
null
GHSA-jv6w-84rc-rmvf
Directory traversal vulnerability in the Visor GUI Console in GridGain before 1.7.16, 1.8.x before 1.8.12, 1.9.x before 1.9.7, and 8.x before 8.1.5 allows remote authenticated users to read arbitrary files on remote cluster nodes via a crafted path.
[]
null
null
6.5
null
null
CVE-2022-49841
serial: imx: Add missing .thaw_noirq hook
In the Linux kernel, the following vulnerability has been resolved: serial: imx: Add missing .thaw_noirq hook The following warning is seen with non-console UART instance when system hibernates. [ 37.371969] ------------[ cut here ]------------ [ 37.376599] uart3_root_clk already disabled [ 37.380810] WARNING: CPU: 0 PID: 296 at drivers/clk/clk.c:952 clk_core_disable+0xa4/0xb0 ... [ 37.506986] Call trace: [ 37.509432] clk_core_disable+0xa4/0xb0 [ 37.513270] clk_disable+0x34/0x50 [ 37.516672] imx_uart_thaw+0x38/0x5c [ 37.520250] platform_pm_thaw+0x30/0x6c [ 37.524089] dpm_run_callback.constprop.0+0x3c/0xd4 [ 37.528972] device_resume+0x7c/0x160 [ 37.532633] dpm_resume+0xe8/0x230 [ 37.536036] hibernation_snapshot+0x288/0x430 [ 37.540397] hibernate+0x10c/0x2e0 [ 37.543798] state_store+0xc4/0xd0 [ 37.547203] kobj_attr_store+0x1c/0x30 [ 37.550953] sysfs_kf_write+0x48/0x60 [ 37.554619] kernfs_fop_write_iter+0x118/0x1ac [ 37.559063] new_sync_write+0xe8/0x184 [ 37.562812] vfs_write+0x230/0x290 [ 37.566214] ksys_write+0x68/0xf4 [ 37.569529] __arm64_sys_write+0x20/0x2c [ 37.573452] invoke_syscall.constprop.0+0x50/0xf0 [ 37.578156] do_el0_svc+0x11c/0x150 [ 37.581648] el0_svc+0x30/0x140 [ 37.584792] el0t_64_sync_handler+0xe8/0xf0 [ 37.588976] el0t_64_sync+0x1a0/0x1a4 [ 37.592639] ---[ end trace 56e22eec54676d75 ]--- On hibernating, pm core calls into related hooks in sequence like: .freeze .freeze_noirq .thaw_noirq .thaw With .thaw_noirq hook being absent, the clock will be disabled in a unbalanced call which results the warning above. imx_uart_freeze() clk_prepare_enable() imx_uart_suspend_noirq() clk_disable() imx_uart_thaw clk_disable_unprepare() Adding the missing .thaw_noirq hook as imx_uart_resume_noirq() will have the call sequence corrected as below and thus fix the warning. imx_uart_freeze() clk_prepare_enable() imx_uart_suspend_noirq() clk_disable() imx_uart_resume_noirq() clk_enable() imx_uart_thaw clk_disable_unprepare()
[]
null
null
null
null
null