id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
189k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
patch_commit_url
stringlengths
38
232
GHSA-q392-pcc3-wq35
Windows Defender Credential Guard Information Disclosure Vulnerability. This CVE ID is unique from CVE-2022-34710, CVE-2022-34712.
[]
null
5.5
null
null
null
CVE-2024-11200
Goodlayers Core <= 2.0.7 - Reflected Cross-Site Scripting via 'font-family'
The Goodlayers Core plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘font-family’ parameter in all versions up to, and including, 2.0.7 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
[]
null
6.1
null
null
null
CVE-2020-12787
Microchip Atmel ATSAMA5 products in Secure Mode allow an attacker to bypass existing security mechanisms related to applet handling.
[ "cpe:2.3:o:microchip:atsama5d21c-cu_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d21c-cu:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d21c-cur_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d21c-cur:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d22c-cn_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d22c-cn:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d22c-cnr_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d22c-cnr:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d22c-cu_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d22c-cu:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d22c-cur_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d22c-cur:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d23c-cn_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d23c-cn:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d23c-cnr_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d23c-cnr:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d23c-cu_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d23c-cu:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d23c-cur_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d23c-cur:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d24c-cu_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d24c-cu:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d24c-cuf_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d24c-cuf:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d24c-cur_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d24c-cur:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d26c-cn_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d26c-cn:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d26c-cnr_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d26c-cnr:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d26c-cu_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d26c-cu:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d26c-cur_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d26c-cur:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d27c-cn_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d27c-cn:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d27c-cnr_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d27c-cnr:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d27c-cu_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d27c-cu:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d27c-cur_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d27c-cur:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d28c-cn_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d28c-cn:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d28c-cnr_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d28c-cnr:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d28c-cu_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d28c-cu:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d28c-cur_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d28c-cur:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d27c-cnvao_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d27c-cnvao:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d27c-cnrvao_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d27c-cnrvao:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d225c-d1m-cur_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d225c-d1m-cur:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d27c-d5m-cu_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d27c-d5m-cu:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d27c-d5m-cur_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d27c-d5m-cur:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d27c-d1g-cu_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d27c-d1g-cu:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d27c-d1g-cur_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d27c-d1g-cur:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d28c-d1g-cu_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d28c-d1g-cu:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d28c-d1g-cur_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d28c-d1g-cur:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d27c-ld1g-cu_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d27c-ld1g-cu:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d27c-ld1g-cur_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d27c-ld1g-cur:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d27c-ld2g-cu_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d27c-ld2g-cu:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d27c-ld2g-cur_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d27c-ld2g-cur:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d28c-ld1g-cu_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d28c-ld1g-cu:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d28c-ld1g-cur_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d28c-ld1g-cur:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d28c-ld2g-cu_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d28c-ld2g-cu:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d28c-ld2g-cur_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d28c-ld2g-cur:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d27-wlsom1_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d27-wlsom1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d27-som1_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d27-som1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d31a-cu_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d31a-cu:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d31a-cur_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d31a-cur:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d31a-cfu_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d31a-cfu:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d31a-cfur_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d31a-cfur:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d33a-cu_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d33a-cu:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d33a-cur_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d33a-cur:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d34a-cu_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d34a-cu:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d34a-cur_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d34a-cur:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d35a-cu_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d35a-cu:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d35a-cur_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d35a-cur:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d35a-cn_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d35a-cn:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d35a-cnr_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d35a-cnr:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d36a-cu_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d36a-cu:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d36a-cur_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d36a-cur:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d36a-cn_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d36a-cn:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d36a-cnr_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d36a-cnr:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d41a-cu_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d41a-cu:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d41a-cur_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d41a-cur:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d41b-cu_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d41b-cu:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d41b-cur_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d41b-cur:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d42a-cu_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d42a-cu:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d42a-cur_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d42a-cur:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d42b-cu_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d42b-cu:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d42b-cur_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d42b-cur:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d43a-cu_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d43a-cu:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d43a-cur_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d43a-cur:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d43b-cu_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d43b-cu:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d43b-cur_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d43b-cur:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d44a-cu_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d44a-cu:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d44a-cur_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d44a-cur:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d44b-cu_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d44b-cu:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d44b-cur_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d44b-cur:-:*:*:*:*:*:*:*" ]
null
7.5
null
4.3
null
CVE-2025-30867
WordPress SearchIQ plugin <= 4.7 - Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in SearchIQ SearchIQ allows Stored XSS. This issue affects SearchIQ: from n/a through 4.7.
[]
null
6.5
null
null
null
GHSA-72rg-w9mr-2x25
Apple Safari 4 Beta build 528.16 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a feeds: URI beginning with a (1) % (percent), (2) { (open curly bracket), (3) } (close curly bracket), (4) ^ (caret), (5) ` (backquote), or (6) | (pipe) character, followed by an & (ampersand) character.
[]
null
null
null
null
null
GHSA-x5mg-m5gw-qjf7
Cross-site scripting (XSS) vulnerability in the search form in the administration/monitoring panel on the Cisco Identity Services Engine (ISE) allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka Bug ID CSCuh87036.
[]
null
null
null
null
null
GHSA-x5hh-chcp-7jv5
In Wireshark through 2.0.13 and 2.2.x through 2.2.7, the WBXML dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-wbxml.c by adding validation of the relationships between indexes and lengths. NOTE: this vulnerability exists because of an incomplete fix for CVE-2017-7702.
[]
null
null
7.5
null
null
GHSA-2v36-ccwm-6xw3
Untrusted search path vulnerability in HIBUN Confidential File Decryption program prior to 10.50.0.5 allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory. Note this is a separate vulnerability from CVE-2017-10863.
[]
null
null
7.8
null
null
GHSA-xc3q-g386-79q2
Tashcom ASPEdit 2.9 stores the administration password (aka the FTP password) in cleartext in the registry, which might allow local users to view the password.
[]
null
null
null
null
null
CVE-2024-22889
Due to incorrect access control in Plone version v6.0.9, remote attackers can view and list all files hosted on the website via sending a crafted request.
[]
null
5.5
null
null
null
CVE-2022-46143
Affected devices do not check the TFTP blocksize correctly. This could allow an authenticated attacker to read from an uninitialized buffer that potentially contains previously allocated data.
[ "cpe:2.3:o:siemens:ruggedcom_rm1224_lte\\(4g\\)_eu_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:ruggedcom_rm1224_lte\\(4g\\)_eu:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:ruggedcom_rm1224_lte\\(4g\\)_nam_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:ruggedcom_rm1224_lte\\(4g\\)_nam:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_m804pb_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_m804pb:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_m812-1_adsl-router_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_m812-1_adsl-router:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_m816-1_adsl-router_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_m816-1_adsl-router:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_m826-2_shdsl-router_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_m826-2_shdsl-router:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_m874-2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_m874-2:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_m874-3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_m874-3:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_m876-3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_m876-3:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_m876-4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_m876-4:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_mum853-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_mum853-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_mum856-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_mum856-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_s615_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_s615:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_s615_eec_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_s615_eec:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_sc622-2c_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_sc622-2c:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_sc626-2c_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_sc626-2c:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_sc632-2c_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_sc632-2c:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_sc636-2c_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_sc636-2c:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_sc642-2c_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_sc642-2c:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_sc646-2c_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_sc646-2c:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_w721-1_rj45_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_w721-1_rj45:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_w722-1_rj45_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_w722-1_rj45:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_w734-1_rj45_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_w734-1_rj45:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_w738-1_m12_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_w738-1_m12:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_w748-1_m12_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_w748-1_m12:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_w761-1_rj45_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_w761-1_rj45:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_w774-1_m12_eec_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_w774-1_m12_eec:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_w774-1_m12_rj45_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_w774-1_m12_rj45:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_w774-1_rj45_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_w774-1_rj45:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_w778-1_m12_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_w778-1_m12:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_w778-1_m12_eec_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_w778-1_m12_eec:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_w786-1_rj45_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_w786-1_rj45:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_w786-2_rj45_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_w786-2_rj45:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_w786-2_sfp_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_w786-2_sfp:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_w786-2ia_rj45_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_w786-2ia_rj45:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_w788-1_m12_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_w788-1_m12:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_w788-1_rj45_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_w788-1_rj45:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_w788-2_m12_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_w788-2_m12:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_w788-2_m12_eec_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_w788-2_m12_eec:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_w1748-1_m12_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_w1748-1_m12:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_w1788-1_m12_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_w1788-1_m12:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_w1788-2_eec_m12_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_w1788-2_eec_m12:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_w1788-2_m12_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_w1788-2_m12:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_w1788-2ia_m12_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_w1788-2ia_m12:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_wam763-1_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_wam763-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_wam766-1_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_wam766-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_wam766-1_6ghz_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_wam766-1_6ghz:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_wam766-1_ecc_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_wam766-1_ecc:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_wum763-1_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_wum763-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_wum766-1_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_wum766-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_wum766-1_6ghz_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_wum766-1_6ghz:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_xb205-3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_xb205-3:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_xb205-3ld_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_xb205-3ld:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_xb208_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_xb208:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_xb213-3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_xb213-3:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_xb213-3ld_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_xb213-3ld:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_xb216_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_xb216:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_xc206-2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_xc206-2:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_xc206-2g_poe_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_xc206-2g_poe:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_xc206-2g_poe_eec_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_xc206-2g_poe_eec:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_xc206-2sfp_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_xc206-2sfp:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_xc206-2sfp_eec_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_xc206-2sfp_eec:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_xc206-2sfp_g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_xc206-2sfp_g:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_xc206-2sfp_g_eec_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_xc206-2sfp_g_eec:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_xc208_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_xc208:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_xc208_eec_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_xc208_eec:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_xc208_poe_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_xc208_poe:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_xc216_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_xc216:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_xc216-3g_poe_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_xc216-3g_poe:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_xc216-4c_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_xc216-4c:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_xc216-4c_g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_xc216-4c_g:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_xc216-4c_g_eec_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_xc216-4c_g_eec:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_xc216eec_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_xc216eec:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_xc224_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_xc224:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_xc224-4c_g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_xc224-4c_g:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_xc224-4c_g_eec_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_xc224-4c_g_eec:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_xf204_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_xf204:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_xf204_dna_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_xf204_dna:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_xf204-2ba_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_xf204-2ba:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_xf204-2bca_dna_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_xf204-2bca_dna:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_xm408-4c_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_xm408-4c:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_xm408-8c_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_xm408-8c:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_xm416-4c_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_xm416-4c:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_xp208_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_xp208:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_xp208eec_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_xp208eec:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_xp208poe_eec_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_xp208poe_eec:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_xp216_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_xp216:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_xp216eec_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_xp216eec:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_xp216poe_eec_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_xp216poe_eec:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_xr324wg_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_xr324wg:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_xr326-2c_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_xr326-2c:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_xr326-2c_poe_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_xr326-2c_poe:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_xr328-4c_wg_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_xr328-4c_wg:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_xr524-8c_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_xr524-8c:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_xr526-8c_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_xr526-8c:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_xr528-6m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_xr528-6m:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_xr552-12m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_xr552-12m:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:siplus_net_scalance_xc206-2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:siplus_net_scalance_xc206-2:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:siplus_net_scalance_xc206-2sfp_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:siplus_net_scalance_xc206-2sfp:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:siplus_net_scalance_xc208_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:siplus_net_scalance_xc208:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:siplus_net_scalance_xc216-4c_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:siplus_net_scalance_xc216-4c:-:*:*:*:*:*:*:*" ]
5.1
2.7
null
null
null
CVE-2014-8307
Multiple cross-site scripting (XSS) vulnerabilities in skins/default/outline.tpl in C97net Cart Engine before 4.0 allow remote attackers to inject arbitrary web script or HTML via the (1) path parameter in the "drop down TOP menu (with path)" section or (2) print_this_page variable in the footer_content_block section, as demonstrated by the QUERY_STRING to (a) index.php, (b) checkout.php, (c) contact.php, (d) detail.php, (e) distro.php, (f) newsletter.php, (g) page.php, (h) profile.php, (i) search.php, (j) sitemap.php, (k) task.php, or (l) tell.php.
[ "cpe:2.3:a:c97:cart_engine:*:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
CVE-2016-6318
Stack-based buffer overflow in the FascistGecosUser function in lib/fascist.c in cracklib allows local users to cause a denial of service (application crash) or gain privileges via a long GECOS field, involving longbuffer.
[ "cpe:2.3:a:cracklib_project:cracklib:*:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" ]
null
7.8
null
7.2
null
GHSA-f2r6-hpcq-7fm5
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.27 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in takeover of MySQL Server. CVSS 3.1 Base Score 7.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H).
[]
null
7.2
null
null
null
CVE-2023-30604
Hitron Technologies Inc. CODA-5310 - Broken Access Control
It is identified a vulnerability of insufficient authentication in the system configuration interface of Hitron Technologies CODA-5310. An unauthorized remote attacker can exploit this vulnerability to access system configuration interface, resulting in performing arbitrary system operation or disrupt service.
[ "cpe:2.3:o:hitrontech:coda-5310_firmware:7.2.4.7.1b3:*:*:*:*:*:*:*", "cpe:2.3:h:hitrontech:coda-5310:-:*:*:*:*:*:*:*" ]
null
9.8
null
null
null
CVE-2018-6168
Information leak in media engine in Google Chrome prior to 68.0.3440.75 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" ]
null
null
6.5
4.3
null
GHSA-fjh2-7f8q-wqm2
cPanel before 74.0.8 mishandles account suspension because of an invalid email_accounts.json file (SEC-445).
[]
null
null
null
null
null
PYSEC-2014-13
null
Requests (aka python-requests) before 2.3.0 allows remote servers to obtain a netrc password by reading the Authorization header in a redirected request.
[]
null
null
null
null
null
CVE-2022-44393
Sanitization Management System v1.0 is vulnerable to SQL Injection via /php-sms/admin/?page=services/view_service&id=.
[ "cpe:2.3:a:sanitization_management_system_project:sanitization_management_system:1.0:*:*:*:*:*:*:*" ]
null
7.2
null
null
null
GHSA-9459-cg27-85v2
The Security component in IBM WebSphere Application Server (WAS) 6.0.2 before 6.0.2.35 permits "non-standard http methods," which has unknown impact and remote attack vectors.
[]
null
null
null
null
null
GHSA-2wm5-c3g6-vrfw
Adobe Reader and Acrobat 10.x before 10.1.14 and 11.x before 11.0.11 on Windows and OS X allow attackers to bypass intended restrictions on JavaScript API execution via unspecified vectors, a different vulnerability than CVE-2015-3060, CVE-2015-3061, CVE-2015-3062, CVE-2015-3063, CVE-2015-3064, CVE-2015-3065, CVE-2015-3066, CVE-2015-3067, CVE-2015-3069, CVE-2015-3071, CVE-2015-3072, CVE-2015-3073, and CVE-2015-3074.
[]
null
null
null
null
null
GHSA-p632-fvpj-4vwp
An issue was discovered in O-RAN Software Community ric-plt-e2mgr in the G-Release environment, allows remote attackers to cause a denial of service (DoS) via a crafted request to the E2Manager API component.
[]
null
7.7
null
null
null
CVE-2020-35196
The official rabbitmq docker images before 3.7.13-beta.1-management-alpine (Alpine specific) contain a blank password for a root user. System using the rabbitmq docker container deployed by affected versions of the docker image may allow a remote attacker to achieve root access with a blank password.
[ "cpe:2.3:a:docker:rabbitmq_docker_image:*:*:*:*:*:*:*:*" ]
null
9.8
null
10
null
GHSA-7379-xh69-jh8v
The WPB Elementor Addons plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘url’ parameter in all versions up to, and including, 1.0.9 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
6.4
null
null
null
GHSA-j4xf-8w42-fqxq
Memory corruption Camera kernel when large number of devices are attached through userspace.
[]
null
7.8
null
null
null
GHSA-4jh9-8gvv-965j
The freshmail-newsletter plugin before 1.6 for WordPress has shortcode.php SQL Injection via the 'FM_form id=' substring.
[]
null
8.8
null
null
null
GHSA-ww3w-592j-5qrw
SimpleSAMLphp Incorrect IV generation for encryption
The aesEncrypt method in `lib/SimpleSAML/Utils/Crypto.php` in SimpleSAMLphp 1.14.x through 1.14.11 makes it easier for context-dependent attackers to bypass the encryption protection mechanism by leveraging use of the first 16 bytes of the secret key as the initialization vector (IV).
[]
null
null
5.9
null
null
GHSA-r894-c8ph-2pv7
A remote code execution vulnerability exists in Microsoft SharePoint when the software fails to check the source markup of an application package, aka "Microsoft SharePoint Remote Code Execution Vulnerability." This affects Microsoft SharePoint.
[]
null
null
8.8
null
null
GHSA-r8xp-52mq-rmm8
Apache ServiceComb Service-Center Exposure of Sensitive Information to an Unauthorized Actor vulnerability
Exposure of Sensitive Information to an Unauthorized Actor in Apache ServiceComb Service-Center. This issue affects Apache ServiceComb Service-Center before 2.1.0 (included). Users are recommended to upgrade to version 2.2.0, which fixes the issue.
[]
6.9
5.8
null
null
null
CVE-2017-11842
Windows kernel in Windows 8.1 and RT 8.1, Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and 1709, Windows Server 2016, and Windows Server, version 1709 allows an attacker to log in and run a specially crafted application due to the Windows kernel improperly initializing a memory address, aka "Windows Kernel Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-11849, CVE-2017-11851, and CVE-2017-11853.
[ "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*" ]
null
null
4.7
1.9
null
GHSA-g9qh-rx87-crmv
Microsoft Malware Protection Engine before 1.1.6603.0, as used in Microsoft Malicious Software Removal Tool (MSRT), Windows Defender, Security Essentials, Forefront Client Security, Forefront Endpoint Protection 2010, and Windows Live OneCare, allows local users to gain privileges via a crafted value of an unspecified user registry key.
[]
null
null
null
null
null
CVE-2018-3185
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.7.23 and prior and 8.0.12 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).
[ "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vmware_vsphere:*:*", "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*", "cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*" ]
null
5.5
null
5.5
null
GHSA-69qj-w566-92r6
SQL injection vulnerability in team.php in Posse Softball Director CMS allows remote attackers to execute arbitrary SQL commands via the idteam parameter.
[]
null
null
null
null
null
GHSA-95v7-jv4x-23ww
VMware Cloud Foundation contains an information disclosure vulnerability due to logging of credentials in plain-text within multiple log files on the SDDC Manager. A malicious actor with root access on VMware Cloud Foundation SDDC Manager may be able to view credentials in plaintext within one or more log files.
[]
null
null
null
null
null
GHSA-m8rj-f4jh-9cmx
In imsservice, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed
[]
null
5.5
null
null
null
CVE-2017-6610
A vulnerability in the Internet Key Exchange Version 1 (IKEv1) XAUTH code of Cisco ASA Software could allow an authenticated, remote attacker to cause a reload of an affected system. The vulnerability is due to insufficient validation of the IKEv1 XAUTH parameters passed during an IKEv1 negotiation. An attacker could exploit this vulnerability by sending crafted parameters. Note: Only traffic directed to the affected system can be used to exploit this vulnerability. This vulnerability only affects systems configured in routed firewall mode and in single or multiple context mode. This vulnerability can be triggered by IPv4 or IPv6 traffic. A valid IKEv1 Phase 1 needs to be established to exploit this vulnerability, which means that an attacker would need to have knowledge of a pre-shared key or have a valid certificate for phase 1 authentication. This vulnerability affects Cisco ASA Software running on the following products: Cisco ASA 1000V Cloud Firewall, Cisco ASA 5500 Series Adaptive Security Appliances, Cisco ASA 5500-X Series Next-Generation Firewalls, Cisco ASA Services Module for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers, Cisco Adaptive Security Virtual Appliance (ASAv), Cisco ASA for Firepower 9300 Series, Cisco ISA 3000 Industrial Security Appliance. Fixed versions: 9.1(7.7) 9.2(4.11) 9.4(4) 9.5(3) 9.6(1.5). Cisco Bug IDs: CSCuz11685.
[ "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.2.10:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.3.6:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.3.8:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.5:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.7:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.17:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.20:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.24:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.26:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.29:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.33:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.35:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.37:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.40:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.42:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1\\(7\\)4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1\\(7\\)6:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1\\(7\\)7:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.1.4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.2.8:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.3.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.4.5:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.5:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.5.10:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.5.12:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.5.15:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.5.21:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.6:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.6.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.6.4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.6.6:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.6.8:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.6.10:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2\\(0.0\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2\\(0.104\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2\\(3.1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.2.4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.2.7:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.2.8:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.3.3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.3.4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.4.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.4.4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.4.8:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.4.10:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3\\(1.50\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3\\(1.105\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3\\(2.100\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3\\(2.243\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.3.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.3.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.3.5:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.3.6:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.3.9:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.3.10:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.3.11:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.0.115:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.1.3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.1.5:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.2.3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.3.3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.3.4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.3.6:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.3.8:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.3.11:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4.3.12:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.5.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.5.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.5.2.6:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.5.2.10:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.5.2.14:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.1.3:*:*:*:*:*:*:*" ]
null
null
7.7
6.8
null
CVE-2024-4198
Mattermost versions 9.6.0, 9.5.x before 9.5.3, and 8.1.x before 8.1.12 fail to fully validate role changes which allows an attacker authenticated as team admin to demote users to guest via crafted HTTP requests.
[]
null
2.7
null
null
null
GHSA-6mrp-w3p5-m293
Multiple Vivotek IP Cameras remote authentication bypass that could allow access to the video stream
[]
null
null
null
null
null
GHSA-r7x8-hv2q-v9r7
A null pointer dereference flaw was found in Libtiff via `tif_dirinfo.c`. This issue may allow an attacker to trigger memory allocation failures through certain means, such as restricting the heap space size or injecting faults, causing a segmentation fault. This can cause an application crash, eventually leading to a denial of service.
[]
null
6.2
null
null
null
CVE-2023-21742
Microsoft SharePoint Server Remote Code Execution Vulnerability
Microsoft SharePoint Server Remote Code Execution Vulnerability
[ "cpe:2.3:a:microsoft:sharepoint_foundation:2013:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sharepoint_server:-:*:*:*:subscription:*:*:*", "cpe:2.3:a:microsoft:sharepoint_server:2013:sp1:*:*:enterprise:*:*:*", "cpe:2.3:a:microsoft:sharepoint_server:2016:*:*:*:enterprise:*:*:*", "cpe:2.3:a:microsoft:sharepoint_server:2019:*:*:*:*:*:*:*" ]
null
8.8
null
null
null
GHSA-8929-jmq3-999x
In YARA 3.7.1 and prior, parsing a specially crafted compiled rule file can cause an out of bounds read vulnerability in yr_execute_code in libyara/exec.c.
[]
null
null
7.8
null
null
CVE-2025-7834
PHPGurukul Complaint Management System cross-site request forgery
A vulnerability, which was classified as problematic, was found in PHPGurukul Complaint Management System 2.0. Affected is an unknown function. The manipulation leads to cross-site request forgery. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
[]
5.3
4.3
4.3
5
null
GHSA-45g2-wqp2-rh43
SQL injection vulnerability in ads.php in Softbiz Ad Management plus Script 1 allows remote authenticated users to execute arbitrary SQL commands via the package parameter.
[]
null
null
null
null
null
CVE-2015-0448
Unspecified vulnerability in Oracle Sun Solaris 11.2 allows local users to affect confidentiality, integrity, and availability via vectors related to ZFS File system.
[ "cpe:2.3:o:oracle:solaris:11.2:*:*:*:*:*:*:*" ]
null
null
null
7.2
null
CVE-2017-2244
Cross-site request forgery (CSRF) vulnerability in MFC-J960DWN firmware ver.D and earlier allows remote attackers to hijack the authentication of administrators via unspecified vectors.
[ "cpe:2.3:o:brother:mfc-j960dwn_firmware:d:*:*:*:*:*:*:*", "cpe:2.3:h:brother:mfc-j960dwn:-:*:*:*:*:*:*:*" ]
null
8.8
null
6.8
null
GHSA-565h-44m8-4c2v
A vulnerability was found in Xuxueli xxl-job up to 3.1.1 and classified as problematic. Affected by this issue is the function makeToken of the file src/main/java/com/xxl/job/admin/controller/IndexController.java of the component Token Generation. The manipulation leads to password hash with insufficient computational effort. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used.
[]
2.9
3.7
null
null
null
CVE-2019-9215
In Live555 before 2019.02.27, malformed headers lead to invalid memory access in the parseAuthorizationHeader function.
[ "cpe:2.3:a:live555:streaming_media:*:*:*:*:*:*:*:*", "cpe:2.3:a:opensuse:backports_sle:15.0:-:*:*:*:*:*:*", "cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
null
GHSA-x52j-x9wp-ccf5
There is a SQL Injection vulnerability in ChurchCRM 4.4.5 via the 'PersonID' field in /churchcrm/WhyCameEditor.php.
[]
null
7.2
null
null
null
GHSA-6hw8-gq2c-479x
Dell DBUtilDrv2.sys driver (versions 2.5 and 2.6) contains an insufficient access control vulnerability which may lead to escalation of privileges, denial of service, or information disclosure. Local authenticated user access is required.
[]
null
7.8
null
null
null
GHSA-3cvw-6mcp-6g5g
Simple Client Management System 1.0 is vulnerable to SQL Injection via /cms/classes/Master.php?f=delete_designation.
[]
null
9.8
null
null
null
CVE-2024-23341
TuiTse-TsuSin html injection vulnerability in `tuitse_html` function
TuiTse-TsuSin is a package for organizing the comparative corpus of Taiwanese Chinese characters and Roman characters, and extracting sentences of the Taiwanese Chinese characters and the Roman characters. Prior to version 1.3.2, when using `tuitse_html` without quoting the input, there is a html injection vulnerability. Version 1.3.2 contains a patch for the issue. As a workaround, sanitize Taigi input with HTML quotation.
[ "cpe:2.3:a:ithuan:tuitse-tsusin:*:*:*:*:*:*:*:*" ]
null
6.1
null
null
null
CVE-2014-7295
The (1) Special:Preferences and (2) Special:UserLogin pages in MediaWiki before 1.19.20, 1.22.x before 1.22.12 and 1.23.x before 1.23.5 allows remote authenticated users to conduct cross-site scripting (XSS) attacks or have unspecified other impact via crafted CSS, as demonstrated by modifying MediaWiki:Common.css.
[ "cpe:2.3:a:mediawiki:mediawiki:*:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.19:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.19:beta_1:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.19:beta_2:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.19.0:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.19.1:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.19.2:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.19.3:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.19.4:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.19.5:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.19.6:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.19.7:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.19.8:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.19.9:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.19.10:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.19.11:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.19.12:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.19.13:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.19.14:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.19.15:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.19.16:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.19.17:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.19.18:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.22.0:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.22.1:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.22.2:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.22.3:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.22.4:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.22.5:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.22.6:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.22.7:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.22.8:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.22.9:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.22.10:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.22.11:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.23.0:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.23.1:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.23.2:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.23.3:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.23.4:*:*:*:*:*:*:*" ]
null
null
null
3.5
null
CVE-2010-0161
The nsAuthSSPI::Unwrap function in extensions/auth/nsAuthSSPI.cpp in Mozilla Thunderbird before 2.0.0.24 and SeaMonkey before 1.1.19 on Windows Vista, Windows Server 2008 R2, and Windows 7 allows remote SMTP, IMAP, and POP servers to cause a denial of service (heap memory corruption and application crash) or possibly execute arbitrary code via crafted data in a session that uses SSPI.
[ "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:0.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:0.7.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:0.7.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:0.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5:beta2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5.0.13:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5.0.14:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.14:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.16:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.17:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.18:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.19:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.21:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.22:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0:alpha:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0:beta:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1:alpha:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.10:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.11:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.12:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.13:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.14:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.15:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.16:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.17:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
GHSA-w8v4-5hx2-xq34
A vulnerability in the ArubaOS web-based management interface could allow an unauthenticated remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface. A successful exploit could allow an attacker to execute arbitrary script code in a victim's browser in the context of the affected interface.
[]
null
8.8
null
null
null
RHSA-2022:9029
Red Hat Security Advisory: Red Hat Virtualization Host security update [ovirt-4.5.3-3]
krb5: integer overflow vulnerabilities in PAC parsing
[ "cpe:/o:redhat:rhev_hypervisor:4.4::el8" ]
null
8.8
null
null
null
CVE-2022-0192
A DLL search path vulnerability was reported in Lenovo PCManager prior to version 4.0.40.2175 that could allow privilege escalation.
[ "cpe:2.3:a:lenovo:pcmanager:*:*:*:*:*:*:*:*" ]
null
7.3
null
null
null
CVE-2025-31400
WordPress WS Audio Player plugin <= 1.1.8 - CSRF to Stored XSS vulnerability
Cross-Site Request Forgery (CSRF) vulnerability in icyleaf WS Audio Player allows Stored XSS. This issue affects WS Audio Player: from n/a through 1.1.8.
[]
null
7.1
null
null
null
GHSA-37rv-6wmp-jjqr
In the Linux kernel, the following vulnerability has been resolved:bpf: Fail verification for sign-extension of packet data/data_end/data_metasyzbot reported a kernel crash due to commit 1f1e864b6555 ("bpf: Handle sign-extenstin ctx member accesses"). The reason is due to sign-extension of 32-bit load for packet data/data_end/data_meta uapi field.The original code looks like: r2 = *(s32 *)(r1 + 76) /* load __sk_buff->data */ r3 = *(u32 *)(r1 + 80) /* load __sk_buff->data_end */ r0 = r2 r0 += 8 if r3 > r0 goto +1 ... Note that __sk_buff->data load has 32-bit sign extension.After verification and convert_ctx_accesses(), the final asm code looks like: r2 = *(u64 *)(r1 +208) r2 = (s32)r2 r3 = *(u64 *)(r1 +80) r0 = r2 r0 += 8 if r3 > r0 goto pc+1 ... Note that 'r2 = (s32)r2' may make the kernel __sk_buff->data address invalid which may cause runtime failure.Currently, in C code, typically we have void *data = (void *)(long)skb->data; void *data_end = (void *)(long)skb->data_end; ... and it will generate r2 = *(u64 *)(r1 +208) r3 = *(u64 *)(r1 +80) r0 = r2 r0 += 8 if r3 > r0 goto pc+1If we allow sign-extension, void *data = (void *)(long)(int)skb->data; void *data_end = (void *)(long)skb->data_end; ... the generated code looks like r2 = *(u64 *)(r1 +208) r2 <<= 32 r2 s>>= 32 r3 = *(u64 *)(r1 +80) r0 = r2 r0 += 8 if r3 > r0 goto pc+1 and this will cause verification failure since "r2 <<= 32" is not allowed as "r2" is a packet pointer.To fix this issue for case r2 = *(s32 *)(r1 + 76) /* load __sk_buff->data */ this patch added additional checking in is_valid_access() callback function for packet data/data_end/data_meta access. If those accesses are with sign-extenstion, the verification will fail.[1] https://lore.kernel.org/bpf/[email protected]/
[]
null
5.5
null
null
null
GHSA-rfp5-6w27-jrq7
Incorrect Comparison, Permissive List of Allowed Inputs, and Privilege Context Switching Error in PostgreSQL
A flaw was found in the psql interactive terminal of PostgreSQL in versions before 13.1, before 12.5, before 11.10, before 10.15, before 9.6.20 and before 9.5.24. If an interactive psql session uses \gset when querying a compromised server, the attacker can execute arbitrary code as the operating system account running psql. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
[]
null
7.5
null
null
null
CVE-2008-6721
SQL injection vulnerability in index.php in AJ Square AJ Article allows remote attackers to execute arbitrary SQL commands via the txtName parameter (aka the username field).
[ "cpe:2.3:a:ajsquare:aj_article:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
GHSA-4q8v-gqw7-8xpx
In the Linux kernel, the following vulnerability has been resolved:crypto: arm64/neonbs - fix out-of-bounds access on short inputThe bit-sliced implementation of AES-CTR operates on blocks of 128 bytes, and will fall back to the plain NEON version for tail blocks or inputs that are shorter than 128 bytes to begin with.It will call straight into the plain NEON asm helper, which performs all memory accesses in granules of 16 bytes (the size of a NEON register). For this reason, the associated plain NEON glue code will copy inputs shorter than 16 bytes into a temporary buffer, given that this is a rare occurrence and it is not worth the effort to work around this in the asm code.The fallback from the bit-sliced NEON version fails to take this into account, potentially resulting in out-of-bounds accesses. So clone the same workaround, and use a temp buffer for short in/outputs.
[]
null
7.1
null
null
null
GHSA-j3wp-2v29-wh98
Buffer overflow in Ethereal 0.8.5 up to 0.10.14 allows remote attackers to execute arbitrary code via the telnet dissector.
[]
null
null
null
null
null
CVE-2025-47984
Windows GDI Information Disclosure Vulnerability
Protection mechanism failure in Windows GDI allows an unauthorized attacker to disclose information over a network.
[]
null
7.5
null
null
null
GHSA-hgq8-fc97-42ff
Directory traversal vulnerability in the fmserver servlet in Cisco Prime Data Center Network Manager (DCNM) before 7.1(1) allows remote attackers to read arbitrary files via a crafted pathname, aka Bug ID CSCus00241.
[]
null
null
null
null
null
GHSA-mrp7-xwff-9phj
The DataPilot feature in IBM Lotus Symphony 3 before FP3 allows user-assisted remote attackers to cause a denial of service (application crash) via a large .xls spreadsheet with an invalid Value reference.
[]
null
null
null
null
null
RHSA-2024:7312
Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.4 Product Security and Bug Fix Update
djangorestframework: Cross-site Scripting (XSS) via break_long_headers urllib3: proxy-authorization request header is not stripped during cross-origin redirects python-twisted: Reflected XSS via HTML Injection in Redirect Response
[ "cpe:/a:redhat:ansible_automation_platform:2.4::el8", "cpe:/a:redhat:ansible_automation_platform:2.4::el9", "cpe:/a:redhat:ansible_automation_platform_developer:2.4::el8", "cpe:/a:redhat:ansible_automation_platform_developer:2.4::el9" ]
null
4.2
null
null
null
CVE-2013-1422
webcalendar before 1.2.7 shows the reason for a failed login (e.g., "no such user").
[ "cpe:2.3:a:webcalendar_project:webcalendar:*:*:*:*:*:*:*:*" ]
null
5.3
null
5
null
CVE-2022-28286
Due to a layout change, iframe contents could have been rendered outside of its border. This could have led to user confusion or spoofing attacks. This vulnerability affects Thunderbird < 91.8, Firefox < 99, and Firefox ESR < 91.8.
[ "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*" ]
null
5.4
null
null
null
GHSA-jwrc-jxj5-hqh2
Zimbra Web Client (ZWC) in Zimbra Collaboration Suite 8.8 before 8.8.8.Patch4 and 8.7 before 8.7.11.Patch4 has Persistent XSS via a contact group.
[]
null
null
6.1
null
null
GHSA-3mqf-x35g-6j9q
HUAWEI P30 Pro smartphone with Versions earlier than 10.1.0.160(C00E160R2P8) has an integer overflow vulnerability. Some functions are lack of verification when they process some messages sent from other module. Attackers can exploit this vulnerability by send malicious message to cause integer overflow. This can compromise normal service.
[]
null
null
null
null
null
GHSA-p688-8h8g-h467
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in J.N. Breetvelt a.K.A. OpaJaap WP Photo Album Plus allows Reflected XSS.This issue affects WP Photo Album Plus: from n/a through 8.8.00.002.
[]
null
7.1
null
null
null
RHSA-2019:0081
Red Hat Security Advisory: openvswitch security and bug fix update
openvswitch: Mishandle of group mods in lib/ofp-util.c:parse_group_prop_ntr_selection_method() allows for assertion failure openvswitch: Error during bundle commit in ofproto/ofproto.c:ofproto_rule_insert__() allows for crash openvswitch: Buffer over-read in lib/ofp-actions.c:decode_bundle()
[ "cpe:/a:redhat:openstack:13::el7" ]
null
null
4.9
null
null
CVE-2025-25126
WordPress ZMSEO plugin <= 1.14.1 - CSRF to Stored XSS vulnerability
Cross-Site Request Forgery (CSRF) vulnerability in zmseo ZMSEO allows Stored XSS. This issue affects ZMSEO: from n/a through 1.14.1.
[]
null
7.1
null
null
null
CVE-2004-1166
CRLF injection vulnerability in Microsoft Internet Explorer 6.0.2800.1106 and earlier allows remote attackers to execute arbitrary FTP commands via an ftp:// URL that contains a URL-encoded newline ("%0a") before the FTP command, which causes the commands to be inserted into the resulting FTP session, as demonstrated using a PORT command.
[ "cpe:2.3:a:microsoft:ie:6.0:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:ie:6.0:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:6.0:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
RHBA-2023:2977
Red Hat Bug Fix Advisory: linux-firmware bug fix and enhancement update
amd: Return Address Predictor vulnerability leading to information disclosure
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
5.6
null
null
null
CVE-2019-1381
An information disclosure vulnerability exists when the Windows Servicing Stack allows access to unprivileged file locations, aka 'Microsoft Windows Information Disclosure Vulnerability'.
[ "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*" ]
null
5.5
null
2.1
null
CVE-2006-2361
PHP remote file inclusion vulnerability in pafiledb_constants.php in Download Manager (mxBB pafiledb) integration, as used with phpBB, allows remote attackers to execute arbitrary PHP code via a URL in the module_root_path parameter.
[ "cpe:2.3:a:mxbb:mxbb_portal:2.7:*:*:*:*:*:*:*", "cpe:2.3:a:mxbb:mxbb_portal:2.8:*:*:*:*:*:*:*", "cpe:2.3:a:php_arena:pafiledb:1.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:php_arena:pafiledb:2.0.1:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
GHSA-62cw-wm98-px97
Dell Secure Connect Gateway (SCG) Policy Manager, all versions, contain(s) a Stored Cross-Site Scripting Vulnerability in the Filters page. An adjacent network high privileged attacker could potentially exploit this vulnerability, leading to the storage of malicious HTML or JavaScript codes in a trusted application data store. When a victim user accesses the data store through their browsers, the malicious code gets executed by the web browser in the context of the vulnerable web application. Exploitation may lead to information disclosure, session theft, or client-side request forgery.
[]
null
7.6
null
null
null
RHSA-2020:1185
Red Hat Security Advisory: libsndfile security update
libsndfile: stack-based buffer overflow in sndfile-deinterleave utility
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
7.8
null
null
CVE-2016-1112
Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allow attackers to obtain sensitive information via unspecified vectors.
[ "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:reader:*:*:*:*:*:*:*:*" ]
null
null
9.8
10
null
CVE-2020-2243
Jenkins Cadence vManager Plugin 3.0.4 and earlier does not escape build descriptions in tooltips, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Run/Update permission.
[ "cpe:2.3:a:jenkins:cadence_vmanager:*:*:*:*:*:jenkins:*:*" ]
null
5.4
null
3.5
null
GHSA-j875-fvf8-9cgw
In seninf, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07992786; Issue ID: ALPS07992786.
[]
null
6.7
null
null
null
CVE-2010-4218
Unspecified vulnerability in Web Services in IBM ENOVIA 6 has unknown impact and attack vectors, related to a system that becomes "exposed to the internet."
[ "cpe:2.3:a:ibm:enovia:6:*:*:*:*:*:*:*" ]
null
null
null
10
null
GHSA-7j47-pqh4-2284
SQL injection vulnerability in diary.php in My Databook allows remote attackers to execute arbitrary SQL commands via the delete parameter.
[]
null
null
null
null
null
CVE-2022-24120
Certain General Electric Renewable Energy products store cleartext credentials in flash memory. This affects iNET and iNET II before 8.3.0.
[ "cpe:2.3:o:ge:inet_900_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ge:inet_900:-:*:*:*:*:*:*:*", "cpe:2.3:o:ge:inet_ii_900_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ge:inet_ii_900:-:*:*:*:*:*:*:*", "cpe:2.3:o:ge:sd1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ge:sd1:-:*:*:*:*:*:*:*", "cpe:2.3:o:ge:sd2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ge:sd2:-:*:*:*:*:*:*:*", "cpe:2.3:o:ge:sd4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ge:sd4:-:*:*:*:*:*:*:*", "cpe:2.3:o:ge:sd9_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ge:sd9:-:*:*:*:*:*:*:*", "cpe:2.3:o:ge:td220max_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ge:td220max:-:*:*:*:*:*:*:*", "cpe:2.3:o:ge:td220x_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ge:td220x:-:*:*:*:*:*:*:*" ]
null
4.6
null
null
null
GHSA-2679-jq7r-8cph
A flaw was found in the Linux kernel. A use-after-free may be triggered in asus_kbd_backlight_set when plugging/disconnecting in a malicious USB device, which advertises itself as an Asus device. Similarly to the previous known CVE-2023-25012, but in asus devices, the work_struct may be scheduled by the LED controller while the device is disconnecting, triggering a use-after-free on the struct asus_kbd_leds *led structure. A malicious USB device may exploit the issue to cause memory corruption with controlled data.
[]
null
6.8
null
null
null
GHSA-2vcm-447j-6j4j
GFI MailEssentials prior to version 21.8 is vulnerable to an XML External Entity (XXE) issue. An authenticated and remote attacker can send crafted HTTP requests to read arbitrary system files.
[]
null
6.5
null
null
null
GHSA-wcwj-fgp8-wvg8
libpng 1.0.6 through 1.0.32, 1.2.0 through 1.2.26, and 1.4.0beta01 through 1.4.0beta19 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a PNG file with zero length "unknown" chunks, which trigger an access of uninitialized memory.
[]
null
null
null
null
null
GHSA-9c64-5jjg-w2cj
The Baseboard Management Controller (BMC) firmware in HPE Apollo 70 System prior to version 3.0.14.0 has a local buffer overflow in libifc.so websetremoteimageinfo function.
[]
null
null
null
null
null
CVE-2021-21087
ColdFusion Improper neutralization of web input during page generation could lead to arbitrary JavaScript execution in the browser
Adobe Coldfusion versions 2016 (update 16 and earlier), 2018 (update 10 and earlier) and 2021.0.0.323925 are affected by an Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability. An attacker could abuse this vulnerability to execute arbitrary JavaScript code in context of the current user. Exploitation of this issue requires user interaction.
[ "cpe:2.3:a:adobe:coldfusion:2016:-:*:*:*:*:*:*", "cpe:2.3:a:adobe:coldfusion:2016:update1:*:*:*:*:*:*", "cpe:2.3:a:adobe:coldfusion:2016:update10:*:*:*:*:*:*", "cpe:2.3:a:adobe:coldfusion:2016:update11:*:*:*:*:*:*", "cpe:2.3:a:adobe:coldfusion:2016:update12:*:*:*:*:*:*", "cpe:2.3:a:adobe:coldfusion:2016:update13:*:*:*:*:*:*", "cpe:2.3:a:adobe:coldfusion:2016:update14:*:*:*:*:*:*", "cpe:2.3:a:adobe:coldfusion:2016:update15:*:*:*:*:*:*", "cpe:2.3:a:adobe:coldfusion:2016:update16:*:*:*:*:*:*", "cpe:2.3:a:adobe:coldfusion:2016:update2:*:*:*:*:*:*", "cpe:2.3:a:adobe:coldfusion:2016:update3:*:*:*:*:*:*", "cpe:2.3:a:adobe:coldfusion:2016:update4:*:*:*:*:*:*", "cpe:2.3:a:adobe:coldfusion:2016:update5:*:*:*:*:*:*", "cpe:2.3:a:adobe:coldfusion:2016:update6:*:*:*:*:*:*", "cpe:2.3:a:adobe:coldfusion:2016:update7:*:*:*:*:*:*", "cpe:2.3:a:adobe:coldfusion:2016:update8:*:*:*:*:*:*", "cpe:2.3:a:adobe:coldfusion:2016:update9:*:*:*:*:*:*", "cpe:2.3:a:adobe:coldfusion:2018:-:*:*:*:*:*:*", "cpe:2.3:a:adobe:coldfusion:2018:update1:*:*:*:*:*:*", "cpe:2.3:a:adobe:coldfusion:2018:update10:*:*:*:*:*:*", "cpe:2.3:a:adobe:coldfusion:2018:update2:*:*:*:*:*:*", "cpe:2.3:a:adobe:coldfusion:2018:update3:*:*:*:*:*:*", "cpe:2.3:a:adobe:coldfusion:2018:update4:*:*:*:*:*:*", "cpe:2.3:a:adobe:coldfusion:2018:update5:*:*:*:*:*:*", "cpe:2.3:a:adobe:coldfusion:2018:update6:*:*:*:*:*:*", "cpe:2.3:a:adobe:coldfusion:2018:update7:*:*:*:*:*:*", "cpe:2.3:a:adobe:coldfusion:2018:update8:*:*:*:*:*:*", "cpe:2.3:a:adobe:coldfusion:2018:update9:*:*:*:*:*:*", "cpe:2.3:a:adobe:coldfusion:2021.0.0.323925:*:*:*:*:*:*:*" ]
null
null
5.4
null
null
GHSA-9rxx-ff39-wwfv
Dell PowerProtect DD, versions prior to 8.0, LTS 7.13.1.0, LTS 7.10.1.30, LTS 7.7.5.40 on DDMC contain a relative path traversal vulnerability. A remote high privileged attacker could potentially exploit this vulnerability, leading to the application sending over an unauthorized file to the managed system.
[]
null
4.1
null
null
null
CVE-2003-1071
rpc.walld (wall daemon) for Solaris 2.6 through 9 allows local users to send messages to logged on users that appear to come from arbitrary user IDs by closing stderr before executing wall, then supplying a spoofed from header.
[ "cpe:2.3:o:sun:solaris:2.5.1:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*", "cpe:2.3:o:sun:solaris:7.0:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:solaris:8.0:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:solaris:9.0:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*", "cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*", "cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*", "cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*" ]
null
null
null
2.1
null
CVE-2024-20143
In V6 DA, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS09167056; Issue ID: MSV-2069.
[]
null
6.6
null
null
null
ICSA-22-195-01
Siemens SCALANCE X Switch Devices
The webserver of affected devices calculates session ids and nonces in an insecure manner. This could allow an unauthenticated remote attacker to brute-force session ids and hijack existing sessions. Affected devices do not properly validate the GET parameter XNo of incoming HTTP requests. This could allow an unauthenticated remote attacker to crash affected devices. Affected devices do not properly validate the URI of incoming HTTP GET requests. This could allow an unauthenticated remote attacker to crash affected devices.
[]
null
9.6
null
null
null
CVE-2025-32700
AbuseFilter log interfaces expose global private and hidden filters when central DB is not available
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Wikimedia Foundation AbuseFilter. This vulnerability is associated with program files includes/Api/QueryAbuseLog.Php, includes/Pager/AbuseLogPager.Php, includes/Special/SpecialAbuseLog.Php, includes/View/AbuseFilterViewExamine.Php. This issue affects AbuseFilter: from >= 1.43.0 before 1.43.1.
[]
2.3
null
null
null
null
CVE-2016-2065
sound/soc/msm/qdsp6v2/msm-audio-effects-q6-v2.c in the MSM QDSP6 audio driver for the Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, allows attackers to cause a denial of service (out-of-bounds write and memory corruption) or possibly have unspecified other impact via a crafted application that makes an ioctl call triggering incorrect use of a parameters pointer.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
null
7.8
null
6.8
null
GHSA-j8jq-cv4q-c5x6
Unspecified vulnerability in the PeopleSoft Enterprise HRMS component in Oracle PeopleSoft Products 9.0 allows remote authenticated users to affect confidentiality and integrity via unknown vectors related to eCompensation Manager Desktop.
[]
null
null
null
null
null
GHSA-r6c7-73ch-fhc5
Vulnerability in the Enterprise Manager Base Platform product of Oracle Enterprise Manager (component: Event Management). Supported versions that are affected are 12.1.0.5, 13.2.0.0 and 13.3.0.0. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Enterprise Manager Base Platform. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Enterprise Manager Base Platform accessible data as well as unauthorized update, insert or delete access to some of Enterprise Manager Base Platform accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Enterprise Manager Base Platform. CVSS 3.0 Base Score 6.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:L).
[]
null
6
null
null
null
CVE-2025-3733
baguetteBox.js - Moderately critical - Cross Site Scripting - SA-CONTRIB-2025-034
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Drupal baguetteBox.Js allows Cross-Site Scripting (XSS).This issue affects baguetteBox.Js: from 0.0.0 before 2.0.4, from 3.0.0 before 3.0.1.
[]
null
6.5
null
null
null
PYSEC-2014-112
null
The instance rescue mode in OpenStack Compute (Nova) 2013.2 before 2013.2.3 and Icehouse before 2014.1, when using libvirt to spawn images and use_cow_images is set to false, allows remote authenticated users to read certain compute host files by overwriting an instance disk with a crafted image.
[]
null
null
null
null
null