id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
189k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
patch_commit_url
stringlengths
36
232
GHSA-x9xm-pqf5-5g9w
MFScripts YetiShare v3.5.2 through v4.5.4 might allow an attacker to reset a password by using a leaked hash (the hash never expires until used).
[]
null
null
null
null
null
CVE-2021-40480
Microsoft Office Visio Remote Code Execution Vulnerability
Microsoft Office Visio Remote Code Execution Vulnerability
[ "cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:*:*", "cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:*:*:*" ]
null
7.8
null
null
null
GHSA-3fq7-vqr9-hr59
A stack-based buffer overflow issue was discovered in Advantech WebAccess versions prior to V8.2_20170817. Researchers have identified multiple vulnerabilities where there is a lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer, which could allow an attacker to execute arbitrary code under the context of the process.
[]
null
null
9.8
null
null
CVE-2021-3423
Privilege escalation in Bitdefender GravityZone Business Security
Uncontrolled Search Path Element vulnerability in the openssl component as used in Bitdefender GravityZone Business Security allows an attacker to load a third party DLL to elevate privileges. This issue affects Bitdefender GravityZone Business Security versions prior to 6.6.23.329.
[ "cpe:2.3:a:bitdefender:gravityzone_business_security:*:*:*:*:*:*:*:*" ]
null
7.8
null
null
null
GHSA-5jqg-5g42-mwgq
K7TSMngr.exe in K7Computing K7AntiVirus Premium 15.1.0.53 has a Memory Leak.
[]
null
null
null
null
null
GHSA-jm7x-w2c2-x6qr
Cisco IOS 12.2, 12.4, 15.0, 15.2, and 15.3 allows remote attackers to cause a denial of service (device reload) via malformed Common Industrial Protocol (CIP) TCP packets, aka Bug ID CSCun63514.
[]
null
null
null
null
null
CVE-2018-19531
HTTL (aka Hyper-Text Template Language) through 1.0.11 allows remote command execution because the decodeXml function uses java.beans.XMLEncoder unsafely when configured without an xml.codec= setting.
[ "cpe:2.3:a:httl_project:httl:*:*:*:*:*:*:*:*" ]
null
null
9.8
7.5
null
CVE-2023-44809
D-Link device DIR-820L 1.05B03 is vulnerable to Insecure Permissions.
[ "cpe:2.3:h:d-link:dir-820l:-:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dir-820l_firmware:1.05b03:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:dir-820l:-:*:*:*:*:*:*:*" ]
null
9.8
null
null
null
CVE-2003-0734
Unknown vulnerability in the pam_filter mechanism in pam_ldap before version 162, when LDAP based authentication is being used, allows users to bypass host-based access restrictions and log onto the system.
[ "cpe:2.3:a:padl_software:pam_ldap:*:*:*:*:*:*:*:*" ]
null
null
null
10
null
CVE-2020-29054
An issue was discovered on CDATA 72408A, 9008A, 9016A, 92408A, 92416A, 9288, 97016, 97024P, 97028P, 97042P, 97084P, 97168P, FD1002S, FD1104, FD1104B, FD1104S, FD1104SN, FD1108S, FD1204S-R2, FD1204SN, FD1204SN-R2, FD1208S-R2, FD1216S-R1, FD1608GS, FD1608SN, FD1616GS, FD1616SN, and FD8000 devices. Attackers can use "show system infor" to discover cleartext TELNET credentials.
[ "cpe:2.3:o:cdatatec:72408a_firmware:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:72408a_firmware:2.4.03_000:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:72408a_firmware:2.4.04_001:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:72408a_firmware:2.4.05_000:*:*:*:*:*:*:*", "cpe:2.3:h:cdatatec:72408a:-:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:9008a_firmware:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:9008a_firmware:2.4.03_000:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:9008a_firmware:2.4.04_001:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:9008a_firmware:2.4.05_000:*:*:*:*:*:*:*", "cpe:2.3:h:cdatatec:9008a:-:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:9016a_firmware:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:9016a_firmware:2.4.03_000:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:9016a_firmware:2.4.04_001:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:9016a_firmware:2.4.05_000:*:*:*:*:*:*:*", "cpe:2.3:h:cdatatec:9016a:-:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:92408a_firmware:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:92408a_firmware:2.4.03_000:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:92408a_firmware:2.4.04_001:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:92408a_firmware:2.4.05_000:*:*:*:*:*:*:*", "cpe:2.3:h:cdatatec:92408a:-:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:92416a_firmware:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:92416a_firmware:2.4.03_000:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:92416a_firmware:2.4.04_001:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:92416a_firmware:2.4.05_000:*:*:*:*:*:*:*", "cpe:2.3:h:cdatatec:92416a:-:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:9288_firmware:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:9288_firmware:2.4.03_000:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:9288_firmware:2.4.04_001:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:9288_firmware:2.4.05_000:*:*:*:*:*:*:*", "cpe:2.3:h:cdatatec:9288:-:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:97016_firmware:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:97016_firmware:2.4.03_000:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:97016_firmware:2.4.04_001:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:97016_firmware:2.4.05_000:*:*:*:*:*:*:*", "cpe:2.3:h:cdatatec:97016:-:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:97024p_firmware:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:97024p_firmware:2.4.03_000:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:97024p_firmware:2.4.04_001:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:97024p_firmware:2.4.05_000:*:*:*:*:*:*:*", "cpe:2.3:h:cdatatec:97024p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:97028p_firmware:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:97028p_firmware:2.4.03_000:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:97028p_firmware:2.4.04_001:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:97028p_firmware:2.4.05_000:*:*:*:*:*:*:*", "cpe:2.3:h:cdatatec:97028p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:97042p_firmware:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:97042p_firmware:2.4.03_000:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:97042p_firmware:2.4.04_001:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:97042p_firmware:2.4.05_000:*:*:*:*:*:*:*", "cpe:2.3:h:cdatatec:97042p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:97084p_firmware:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:97084p_firmware:2.4.03_000:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:97084p_firmware:2.4.04_001:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:97084p_firmware:2.4.05_000:*:*:*:*:*:*:*", "cpe:2.3:h:cdatatec:97084p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:97168p_firmware:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:97168p_firmware:2.4.03_000:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:97168p_firmware:2.4.04_001:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:97168p_firmware:2.4.05_000:*:*:*:*:*:*:*", "cpe:2.3:h:cdatatec:97168p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1002s_firmware:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1002s_firmware:2.4.03_000:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1002s_firmware:2.4.04_001:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1002s_firmware:2.4.05_000:*:*:*:*:*:*:*", "cpe:2.3:h:cdatatec:fd1002s:-:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1104_firmware:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1104_firmware:2.4.03_000:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1104_firmware:2.4.04_001:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1104_firmware:2.4.05_000:*:*:*:*:*:*:*", "cpe:2.3:h:cdatatec:fd1104:-:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1104b_firmware:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1104b_firmware:2.4.03_000:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1104b_firmware:2.4.04_001:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1104b_firmware:2.4.05_000:*:*:*:*:*:*:*", "cpe:2.3:h:cdatatec:fd1104b:-:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1104s_firmware:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1104s_firmware:2.4.03_000:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1104s_firmware:2.4.04_001:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1104s_firmware:2.4.05_000:*:*:*:*:*:*:*", "cpe:2.3:h:cdatatec:fd1104s:-:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1104sn_firmware:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1104sn_firmware:2.4.03_000:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1104sn_firmware:2.4.04_001:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1104sn_firmware:2.4.05_000:*:*:*:*:*:*:*", "cpe:2.3:h:cdatatec:fd1104sn:-:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1108s_firmware:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1108s_firmware:2.4.03_000:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1108s_firmware:2.4.04_001:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1108s_firmware:2.4.05_000:*:*:*:*:*:*:*", "cpe:2.3:h:cdatatec:fd1108s:-:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1204s-r2_firmware:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1204s-r2_firmware:2.4.03_000:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1204s-r2_firmware:2.4.04_001:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1204s-r2_firmware:2.4.05_000:*:*:*:*:*:*:*", "cpe:2.3:h:cdatatec:fd1204s-r2:-:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1204sn_firmware:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1204sn_firmware:2.4.03_000:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1204sn_firmware:2.4.04_001:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1204sn_firmware:2.4.05_000:*:*:*:*:*:*:*", "cpe:2.3:h:cdatatec:fd1204sn:-:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1204sn-r2_firmware:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1204sn-r2_firmware:2.4.03_000:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1204sn-r2_firmware:2.4.04_001:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1204sn-r2_firmware:2.4.05_000:*:*:*:*:*:*:*", "cpe:2.3:h:cdatatec:fd1204sn-r2:-:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1208s-r2_firmware:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1208s-r2_firmware:2.4.03_000:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1208s-r2_firmware:2.4.04_001:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1208s-r2_firmware:2.4.05_000:*:*:*:*:*:*:*", "cpe:2.3:h:cdatatec:fd1208s-r2:-:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1216s-r1_firmware:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1216s-r1_firmware:2.4.03_000:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1216s-r1_firmware:2.4.04_001:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1216s-r1_firmware:2.4.05_000:*:*:*:*:*:*:*", "cpe:2.3:h:cdatatec:fd1216s-r1:-:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1608gs_firmware:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1608gs_firmware:2.4.03_000:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1608gs_firmware:2.4.04_001:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1608gs_firmware:2.4.05_000:*:*:*:*:*:*:*", "cpe:2.3:h:cdatatec:fd1608gs:-:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1608sn_firmware:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1608sn_firmware:2.4.03_000:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1608sn_firmware:2.4.04_001:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1608sn_firmware:2.4.05_000:*:*:*:*:*:*:*", "cpe:2.3:h:cdatatec:fd1608sn:-:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1616gs_firmware:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1616gs_firmware:2.4.03_000:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1616gs_firmware:2.4.04_001:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1616gs_firmware:2.4.05_000:*:*:*:*:*:*:*", "cpe:2.3:h:cdatatec:fd1616gs:-:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1616sn_firmware:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1616sn_firmware:2.4.03_000:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1616sn_firmware:2.4.04_001:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1616sn_firmware:2.4.05_000:*:*:*:*:*:*:*", "cpe:2.3:h:cdatatec:fd1616sn:-:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd8000_firmware:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd8000_firmware:2.4.03_000:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd8000_firmware:2.4.04_001:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd8000_firmware:2.4.05_000:*:*:*:*:*:*:*", "cpe:2.3:h:cdatatec:fd8000:-:*:*:*:*:*:*:*" ]
null
9.8
null
5
null
GHSA-74g4-6hq9-8qwm
The kernel in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an authenticated attacker to obtain information via a specially crafted application. aka "Windows Kernel Information Disclosure Vulnerability," a different vulnerability than CVE-2017-8492, CVE-2017-8490, CVE-2017-8489, CVE-2017-8488, CVE-2017-8485, CVE-2017-8483, CVE-2017-8482, CVE-2017-8480, CVE-2017-8479, CVE-2017-8478, CVE-2017-8476, CVE-2017-8474, CVE-2017-8469, CVE-2017-8462, CVE-2017-0300, CVE-2017-0299, and CVE-2017-0297.
[]
null
null
5
null
null
CVE-2020-7647
All versions before 1.6.7 and all versions after 2.0.0 inclusive and before 2.8.2 of io.jooby:jooby and org.jooby:jooby are vulnerable to Directory Traversal via two separate vectors.
[ "cpe:2.3:a:jooby:jooby:*:*:*:*:*:*:*:*" ]
null
5.3
null
5
null
GHSA-43wh-qf2q-fxjw
The Data Protection extension in the VMware GUI in IBM Tivoli Storage Manager for Virtual Environments: Data Protection for VMware (aka Spectrum Protect for Virtual Environments) 7.1 before 7.1.4 and Tivoli Storage FlashCopy Manager for VMware (aka Spectrum Protect Snapshot) 4.1 before 4.1.4 allows remote authenticated users to restore arbitrary virtual machines and consequently obtain sensitive information by visiting the vSphere inventory.
[]
null
null
8.5
null
null
CVE-2021-0436
In CryptoPlugin::decrypt of CryptoPlugin.cpp, there is a possible out of bounds read due to integer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-176496160
[ "cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*" ]
null
5.5
null
2.1
null
CVE-2022-0831
Cross-site Scripting (XSS) - Stored in pimcore/pimcore
Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 10.3.3.
[ "cpe:2.3:a:pimcore:pimcore:*:*:*:*:*:*:*:*" ]
null
null
4.6
null
null
GHSA-j2m5-w7qp-hqg7
An issue was discovered in Qt before 5.15.15, 6.x before 6.2.9, and 6.3.x through 6.5.x before 6.5.1. When a SVG file with an image inside it is rendered, a QTextLayout buffer overflow can be triggered.
[]
null
7.5
null
null
null
GHSA-hc4w-25w5-j59v
A vulnerability, which was classified as problematic, was found in OpenMRS Appointment Scheduling Module up to 1.16.x. This affects the function getNotes of the file api/src/main/java/org/openmrs/module/appointmentscheduling/AppointmentRequest.java of the component Notes Handler. The manipulation of the argument notes leads to cross site scripting. It is possible to initiate the attack remotely. Upgrading to version 1.17.0 is able to address this issue. The name of the patch is 2ccbe39c020809765de41eeb8ee4c70b5ec49cc8. It is recommended to upgrade the affected component. The identifier VDB-216741 was assigned to this vulnerability.
[]
null
6.1
null
null
null
GHSA-3959-4243-g349
Improper input validation for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow a privileged user to potentially enable escalation of privilege via local access.
[]
null
null
null
null
null
GHSA-c332-g293-hmxg
DLL Search Order Hijacking vulnerability in Microsoft Windows client in McAfee Total Protection (MTP) Free Antivirus Trial 16.0.R18 and earlier allows local users to execute arbitrary code via execution from a compromised folder placed by an attacker with administrator rights.
[]
null
6.5
null
null
null
CVE-2003-0089
Buffer overflow in the Software Distributor utilities for HP-UX B.11.00 and B.11.11 allows local users to execute arbitrary code via a long LANG environment variable to setuid programs such as (1) swinstall and (2) swmodify.
[ "cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*", "cpe:2.3:o:hp:hp-ux:11.11:*:*:*:*:*:*:*" ]
null
null
null
7.2
null
RHSA-2021:3073
Red Hat Security Advisory: nodejs:12 security, bug fix, and enhancement update
libuv: out-of-bounds read in uv__idna_toascii() can lead to information disclosures or crashes nodejs-hosted-git-info: Regular Expression denial of service via shortcutMatch in fromUrl() nodejs-ssri: Regular expression DoS (ReDoS) when parsing malicious SRI in strict mode
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.5
5.3
null
null
GHSA-vxr6-pwvm-cf57
A vulnerability has been identified in Siveillance Video Mobile Server V2022 R2 (All versions < V22.2a (80)). The mobile server component of affected applications improperly handles the log in for Active Directory accounts that are part of Administrators group. This could allow an unauthenticated remote attacker to access the application without a valid account.
[]
null
9.8
null
null
null
GHSA-36mr-q5jp-rfp3
A flaw was found in ImageMagick in MagickCore/quantum-export.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned long long` as well as a shift exponent that is too large for 64-bit type. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0.
[]
null
3.3
null
null
null
GHSA-396g-xc2g-5qhm
Vulnerability in Tenda AC8v4 .V16.03.34.09 due to sscanf and the last digit of s8 being overwritten with \x0. After executing set_client_qos, control over the gp register can be obtained.
[]
null
6.3
null
null
null
CVE-2024-11540
IrfanView DXF File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability
IrfanView DXF File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of DXF files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24700.
[ "cpe:2.3:a:irfanview:irfanview:-:*:*:*:*:*:*:*", "cpe:2.3:a:irfanview:irfanview:4.67:*:*:*:*:*:x64:*", "cpe:2.3:a:irfanview:irfanview:4.67:*:*:*:*:*:x86:*" ]
null
null
7.8
null
null
GHSA-749r-cw7g-mfcq
AtomCMS 2.0 is vulnerabie to SQL Injection via Atom.CMS_admin_ajax_list-sort.php
[]
null
9.8
null
null
null
CVE-2018-19754
Tarantella Enterprise before 3.11 allows bypassing Access Control.
[ "cpe:2.3:a:oracle:tarantella_enterprise:*:*:*:*:*:*:*:*" ]
null
null
8.8
6.5
null
CVE-2022-1175
Improper neutralization of user input in GitLab CE/EE versions 14.4 before 14.7.7, all versions starting from 14.8 before 14.8.5, all versions starting from 14.9 before 14.9.2 allowed an attacker to exploit XSS by injecting HTML in notes.
[ "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*" ]
null
8.7
null
null
null
GHSA-jrqc-6vfg-cfj2
Directory Services in Apple Mac OS X 10.0.2, 10.0.3, 10.2.8, 10.3.2 and Apple Mac OS X Server 10.2 through 10.3.2 accepts authentication server information from unknown LDAP or NetInfo sources as provided by a malicious DHCP server, which allows remote attackers to gain privileges.
[]
null
null
null
null
null
GHSA-f9cv-665r-275h
Prototype Pollution in merge-change
All current versions of package merge-change are vulnerable to Prototype Pollution via the utils.set function.
[]
null
9.8
null
null
null
CVE-2012-5339
Multiple cross-site scripting (XSS) vulnerabilities in phpMyAdmin 3.5.x before 3.5.3 allow remote authenticated users to inject arbitrary web script or HTML via a crafted name of (1) an event, (2) a procedure, or (3) a trigger.
[ "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.2:*:*:*:*:*:*:*" ]
null
null
null
3.5
null
CVE-2023-21165
In DevmemIntUnmapPMR of devicemem_server.c, there is a possible arbitrary code execution due to a use after free. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation.
[ "cpe:2.3:h:imaginationtech:powervr-gpu:-:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*" ]
null
8.4
null
null
null
CVE-2021-37289
Insecure Permissions in administration interface in Planex MZK-DP150N 1.42 and 1.43 allows attackers to execute system command as root via etc_ro/web/syscmd.asp.
[ "cpe:2.3:o:planex:mzk-dp150n_firmware:1.42:*:*:*:*:*:*:*", "cpe:2.3:o:planex:mzk-dp150n_firmware:1.43:*:*:*:*:*:*:*", "cpe:2.3:h:planex:mzk-dp150n:*:*:*:*:*:*:*:*" ]
null
7.2
null
null
null
CVE-2021-21209
Inappropriate implementation in storage in Google Chrome prior to 90.0.4430.72 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*" ]
null
6.5
null
4.3
null
CVE-2024-38634
serial: max3100: Lock port->lock when calling uart_handle_cts_change()
In the Linux kernel, the following vulnerability has been resolved: serial: max3100: Lock port->lock when calling uart_handle_cts_change() uart_handle_cts_change() has to be called with port lock taken, Since we run it in a separate work, the lock may not be taken at the time of running. Make sure that it's taken by explicitly doing that. Without it we got a splat: WARNING: CPU: 0 PID: 10 at drivers/tty/serial/serial_core.c:3491 uart_handle_cts_change+0xa6/0xb0 ... Workqueue: max3100-0 max3100_work [max3100] RIP: 0010:uart_handle_cts_change+0xa6/0xb0 ... max3100_handlerx+0xc5/0x110 [max3100] max3100_work+0x12a/0x340 [max3100]
[]
null
null
null
null
null
GHSA-r825-m227-647m
Macromedia Flash Plugin before 6,0,47,0 allows remote attackers to bypass the same-domain restriction and read arbitrary files via (1) an HTTP redirect, (2) a "file://" base in a web document, or (3) a relative URL from a web archive (mht file).
[]
null
null
null
null
null
CVE-2024-41305
A Server-Side Request Forgery (SSRF) in the Plugins Page of WonderCMS v3.4.3 allows attackers to force the application to make arbitrary requests via injection of crafted URLs into the pluginThemeUrl parameter.
[ "cpe:2.3:a:wondercms:wondercms:3.4.3:*:*:*:*:*:*:*" ]
null
7.1
null
null
null
GHSA-x3qv-75j5-j7h2
Business Space in IBM WebSphere Process Server 6.1.2.0 through 7.0.0.5 and Business Process Manager Advanced 7.5.x through 7.5.1.2, 8.0.x through 8.0.1.3, 8.5.0.x through 8.5.0.2, 8.5.5.x through 8.5.5.0, and 8.5.6.x through 8.5.6.2 allows remote authenticated users to bypass intended access restrictions and create an arbitrary page or space via unspecified vectors.
[]
null
null
4.3
null
null
GHSA-2j8g-w8gx-h43r
The vulnerability, if exploited, could allow an authenticated miscreant (with privileges to create or access publication targets of type Text File or HDFS) to upload and persist files that could potentially be executed.
[]
7.1
7.1
null
null
null
GHSA-x9pj-x79p-c849
The Download Manager and Payment Form WordPress Plugin – WP SmartPay plugin for WordPress is vulnerable to Insecure Direct Object Reference in versions 1.1.0 to 2.7.13 via the show() function due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with Subscriber-level access and above, to view other user's data like email address, name, and notes.
[]
null
4.3
null
null
null
RHSA-2015:1042
Red Hat Security Advisory: kernel security and bug fix update
kernel: pipe: iovec overrun leading to memory corruption
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
null
GHSA-x5qv-v22x-8gfj
A Cross-origin vulnerability exists in WebKit in Apple Safari before 10.0.1 when processing location attributes, which could let a remote malicious user obtain sensitive information.
[]
null
null
null
null
null
GHSA-v52w-54r2-qg83
ARRIS SBG6580-2 D30GW-SEAEAGLE-1.5.2.5-GA-00-NOSH devices allow remote attackers to discover credentials via iso.3.6.1.4.1.4491.2.4.1.1.6.1.1.0 and iso.3.6.1.4.1.4491.2.4.1.1.6.1.2.0 SNMP requests.
[]
null
9.8
null
null
null
GHSA-7q6p-x5rq-pp4c
Huawei Quidway S9700 V200R003C00SPC500, Quidway S9300 V200R003C00SPC500, Quidway S7700 V200R003C00SPC500, Quidway S6700 V200R003C00SPC300, Quidway S6300 V200R003C00SPC300, Quidway S5700 V200R003C00SPC300, Quidway S5300 V200R003C00SPC300 enable attackers to launch DoS attacks by crafting and sending malformed packets to these vulnerable products.
[]
null
null
7.5
null
null
GHSA-75pc-97g8-g5gc
Cross-site scripting (XSS) vulnerability in the Administration Console in IBM WebSphere Application Server 7.0 before 7.0.0.23 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
[]
null
null
null
null
null
GHSA-2wpm-jf5f-9mrw
PDF-XChange Editor PRC File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of PRC files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-26730.
[]
null
null
3.3
null
null
CVE-2009-2457
The DS\NDSD component in Novell eDirectory 8.8 before SP5 allows remote attackers to cause a denial of service (crash) via a malformed bind LDAP packet.
[ "cpe:2.3:a:novell:edirectory:8.8:*:*:*:*:*:*:*", "cpe:2.3:a:novell:edirectory:8.8:sp1:*:*:*:*:*:*", "cpe:2.3:a:novell:edirectory:8.8:sp2:*:*:*:*:*:*", "cpe:2.3:a:novell:edirectory:8.8:sp3:*:*:*:*:*:*", "cpe:2.3:a:novell:edirectory:8.8:sp3:ftf3:*:*:*:*:*", "cpe:2.3:a:novell:edirectory:8.8:sp4:*:*:*:*:*:*" ]
null
null
null
5
null
GHSA-vq62-87gp-hrvv
Grafana 8.4.3 allows reading files via (for example) a /dashboard/snapshot/%7B%7Bconstructor.constructor'/.. /.. /.. /.. /.. /.. /.. /.. /etc/passwd URI.
[]
null
7.5
null
null
null
CVE-2018-1000419
An improper authorization vulnerability exists in Jenkins HipChat Plugin 2.2.0 and earlier in HipChatNotifier.java that allows attackers with Overall/Read access to obtain credentials IDs for credentials stored in Jenkins.
[ "cpe:2.3:a:atlassian:hipchat:*:*:*:*:*:jenkins:*:*" ]
null
null
6.5
4
null
GHSA-8v54-wvr5-g36p
Improper access control vulnerability in FactoryCameraFB prior to version 3.4.74 allows untrusted applications to access arbitrary files with an escalated privilege.
[]
null
7.8
null
null
null
GHSA-xc59-v8wf-p73v
Cross-Site Request Forgery (CSRF) vulnerability in Scott Kingsley Clark Crony Cronjob Manager.This issue affects Crony Cronjob Manager: from n/a through 0.5.0.
[]
null
4.3
null
null
null
GHSA-j5hj-fhc9-g24m
rack-mini-profiler allows remote attackers to obtain sensitive information about allocated strings and objects
The rack-mini-profiler gem before 0.10.1 for Ruby allows remote attackers to obtain sensitive information about allocated strings and objects by leveraging incorrect ordering of security checks.
[]
null
null
5.3
null
null
GHSA-7rh9-qc99-8xg9
The MSI AmbientLink MsIo64 driver 1.0.0.8 has a Buffer Overflow (0x80102040, 0x80102044, 0x80102050,and 0x80102054).
[]
null
null
null
null
null
GHSA-wf73-fprx-hxjj
In the Linux kernel, the following vulnerability has been resolved:RDMA/hfi1: Fix potential integer multiplication overflow errorsWhen multiplying of different types, an overflow is possible even when storing the result in a larger type. This is because the conversion is done after the multiplication. So arithmetic overflow and thus in incorrect value is possible.Correct an instance of this in the inter packet delay calculation. Fix by ensuring one of the operands is u64 which will promote the other to u64 as well ensuring no overflow.
[]
null
5.5
null
null
null
CVE-2024-5084
Hash Form – Drag & Drop Form Builder <= 1.1.0 - Unauthenticated Arbitrary File Upload to Remote Code Execution
The Hash Form – Drag & Drop Form Builder plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'file_upload_action' function in all versions up to, and including, 1.1.0. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
[ "cpe:2.3:a:hashthemes:drag_and_drop_form_builder:*:*:*:*:*:*:*:*" ]
null
9.8
null
null
null
CVE-2018-17955
Static tempfile name allows overwriting of arbitrary files
In yast2-multipath before version 4.1.1 a static temporary filename allows local attackers to overwrite files on systems without symlink protection
[ "cpe:2.3:a:opensuse:yast2-multipath:*:*:*:*:*:*:*:*" ]
null
null
2.2
null
null
CVE-2024-8163
Chengdu Everbrite Network Technology BeikeShop files destroyFiles path traversal
A vulnerability classified as critical was found in Chengdu Everbrite Network Technology BeikeShop up to 1.5.5. Affected by this vulnerability is the function destroyFiles of the file /admin/file_manager/files. The manipulation of the argument files leads to path traversal. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
[ "cpe:2.3:a:chengdu_everbrite_network_technology:beike_shop:*:*:*:*:*:*:*:*", "cpe:2.3:a:beikeshop:beikeshop:*:*:*:*:*:*:*:*" ]
5.3
5.4
5.4
5.5
null
CVE-2025-26658
Broken Authentication in SAP Business One (Service Layer)
The Service Layer in SAP Business One, allows attackers to potentially gain unauthorized access and impersonate other users in the application to perform unauthorized actions. Due to the improper session management, the attackers can elevate themselves to higher privilege and can read, modify and/or write new data. To gain authenticated sessions of other users, the attacker must invest considerable time and effort. This vulnerability has a high impact on the confidentiality and integrity of the application with no effect on the availability of the application.
[]
null
6.8
null
null
null
GHSA-w9g9-5q3r-qpxx
Race condition in the Reset Safari implementation in Apple Safari before 4.0 on Windows might allow local users to read stored web-site passwords via unspecified vectors.
[]
null
null
null
null
null
CVE-2025-23897
WordPress Apply with LinkedIn buttons plugin <= 2.3 - Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Ivo Brett – ApplyMetrics Apply with LinkedIn buttons allows DOM-Based XSS.This issue affects Apply with LinkedIn buttons: from n/a through 2.3.
[]
null
6.5
null
null
null
GHSA-w867-jhfm-5qxq
VirtualPC_Services in Microsoft Virtual PC for Mac 6.0 through 6.1 allows local attackers to truncate and overwrite arbitrary files, and execute arbitrary code, via a symlink attack on the VPCServices_Log temporary file.
[]
null
null
null
null
null
CVE-2022-20519
In onCreate of AddAppNetworksActivity.java, there is a possible way for a guest user to configure WiFi networks due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-224772678
[ "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*" ]
null
3.3
null
null
null
GHSA-qvv6-wcx4-cj27
Rejected reason: Not used
[]
null
null
null
null
null
CVE-2021-23036
On version 16.0.x before 16.0.1.2, when a BIG-IP ASM and DataSafe profile are configured on a virtual server, undisclosed requests can cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
[ "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_datasafe:*:*:*:*:*:*:*:*" ]
null
7.5
null
4.3
null
CVE-2014-0820
Directory traversal vulnerability in the download feature in Cybozu Garoon 2.x through 2.5.4 and 3.x through 3.7 SP3 allows remote authenticated users to read arbitrary files via unspecified vectors.
[ "cpe:2.3:a:cybozu:garoon:2.0:sp1:*:*:*:*:*:*", "cpe:2.3:a:cybozu:garoon:2.0:sp2:*:*:*:*:*:*", "cpe:2.3:a:cybozu:garoon:2.0:sp3:*:*:*:*:*:*", "cpe:2.3:a:cybozu:garoon:2.0:sp4:*:*:*:*:*:*", "cpe:2.3:a:cybozu:garoon:2.0:sp5:*:*:*:*:*:*", "cpe:2.3:a:cybozu:garoon:2.0:sp6:*:*:*:*:*:*", "cpe:2.3:a:cybozu:garoon:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:cybozu:garoon:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:cybozu:garoon:2.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:cybozu:garoon:2.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:cybozu:garoon:2.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:cybozu:garoon:2.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:cybozu:garoon:2.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:cybozu:garoon:2.1:*:*:*:*:*:*:*", "cpe:2.3:a:cybozu:garoon:2.1:sp1:*:*:*:*:*:*", "cpe:2.3:a:cybozu:garoon:2.1:sp2:*:*:*:*:*:*", "cpe:2.3:a:cybozu:garoon:2.1:sp3:*:*:*:*:*:*", "cpe:2.3:a:cybozu:garoon:2.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:cybozu:garoon:2.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:cybozu:garoon:2.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:cybozu:garoon:2.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:cybozu:garoon:2.5:*:*:*:*:*:*:*", "cpe:2.3:a:cybozu:garoon:2.5:sp1:*:*:*:*:*:*", "cpe:2.3:a:cybozu:garoon:2.5:sp2:*:*:*:*:*:*", "cpe:2.3:a:cybozu:garoon:2.5:sp3:*:*:*:*:*:*", "cpe:2.3:a:cybozu:garoon:2.5:sp4:*:*:*:*:*:*", "cpe:2.3:a:cybozu:garoon:2.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:cybozu:garoon:2.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:cybozu:garoon:2.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:cybozu:garoon:2.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:cybozu:garoon:2.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:cybozu:garoon:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:cybozu:garoon:3.0:sp1:*:*:*:*:*:*", "cpe:2.3:a:cybozu:garoon:3.0:sp2:*:*:*:*:*:*", "cpe:2.3:a:cybozu:garoon:3.0:sp3:*:*:*:*:*:*", "cpe:2.3:a:cybozu:garoon:3.1:*:*:*:*:*:*:*", "cpe:2.3:a:cybozu:garoon:3.1:sp1:*:*:*:*:*:*", "cpe:2.3:a:cybozu:garoon:3.1:sp2:*:*:*:*:*:*", "cpe:2.3:a:cybozu:garoon:3.1:sp3:*:*:*:*:*:*", "cpe:2.3:a:cybozu:garoon:3.5:*:*:*:*:*:*:*", "cpe:2.3:a:cybozu:garoon:3.5:sp1:*:*:*:*:*:*", "cpe:2.3:a:cybozu:garoon:3.5:sp2:*:*:*:*:*:*", "cpe:2.3:a:cybozu:garoon:3.5:sp3:*:*:*:*:*:*", "cpe:2.3:a:cybozu:garoon:3.5:sp4:*:*:*:*:*:*", "cpe:2.3:a:cybozu:garoon:3.5:sp5:*:*:*:*:*:*", "cpe:2.3:a:cybozu:garoon:3.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:cybozu:garoon:3.7:*:*:*:*:*:*:*", "cpe:2.3:a:cybozu:garoon:3.7:sp1:*:*:*:*:*:*", "cpe:2.3:a:cybozu:garoon:3.7:sp2:*:*:*:*:*:*", "cpe:2.3:a:cybozu:garoon:3.7:sp3:*:*:*:*:*:*" ]
null
null
null
4
null
CVE-2024-12574
SVG Shortcode <= 1.0.1 - Authenticated (Author+) Stored Cross-Site Scripting via SVG Upload
The SVG Shortcode plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 1.0.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file.
[]
null
5.4
null
null
null
GHSA-rhpf-gwq4-5q7j
Missing Authorization vulnerability in redqteam Wishlist allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Wishlist: from n/a through 2.1.0.
[]
null
4.3
null
null
null
GHSA-qh6p-7hfp-vmv9
NVIDIA DCGM for Linux contains a vulnerability in HostEngine (server component) where a user may cause a heap-based buffer overflow through the bound socket. A successful exploit of this vulnerability may lead to denial of service and data tampering.
[]
null
7.1
null
null
null
GHSA-3vxv-r339-pjwj
Vulnerability in the Oracle Business Intelligence Enterprise Edition product of Oracle Analytics (component: Visual Analyzer). The supported version that is affected is 6.4.0.0.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Business Intelligence Enterprise Edition. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Business Intelligence Enterprise Edition, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Business Intelligence Enterprise Edition accessible data as well as unauthorized read access to a subset of Oracle Business Intelligence Enterprise Edition accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N).
[]
null
5.4
null
null
null
CVE-2025-48202
The femanager extension through 8.2.1 for TYPO3 allows Insecure Direct Object Reference.
[]
null
5.3
null
null
null
CVE-2023-25080
Protection mechanism failure in some Intel(R) Distribution of OpenVINO toolkit software before version 2023.0.0 may allow an authenticated user to potentially enable information disclosure via local access.
[ "cpe:2.3:a:intel:openvino:*:*:*:*:*:*:*:*" ]
null
5.3
null
null
null
CVE-2024-8072
Mage AI allows remote unauthenticated attackers to leak the terminal server command history of arbitrary users
Mage AI allows remote unauthenticated attackers to leak the terminal server command history of arbitrary users
[ "cpe:2.3:a:mage:mage-ai:*:*:*:*:*:python:*:*" ]
null
5.3
null
null
null
CVE-2023-36392
DHCP Server Service Denial of Service Vulnerability
DHCP Server Service Denial of Service Vulnerability
[ "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*" ]
null
7.5
null
null
null
GHSA-wf4m-rq68-3mfc
Incorrect Authorization check affecting all versions of GitLab EE from 13.11 prior to 15.5.7, 15.6 prior to 15.6.4, and 15.7 prior to 15.7.2 allows group access tokens to continue working even after the group owner loses the ability to revoke them.
[]
null
7.5
null
null
null
GHSA-vxrh-cpg7-8vjr
openssl-src subject to NULL dereference validating DSA public key
An invalid pointer dereference on read can be triggered when an application tries to check a malformed DSA public key by the `EVP_PKEY_public_check()` function. This will most likely lead to an application crash. This function can be called on public keys supplied from untrusted sources which could allow an attacker to cause a denial of service attack.The TLS implementation in OpenSSL does not call this function but applications might call the function if there are additional security requirements imposed by standards such as FIPS 140-3.
[]
null
7.5
null
null
null
GHSA-gwfj-pw2x-h6c2
Out of bounds read in simd-json
The affected version of this crate did not guard against accessing memory beyond the range of its input data. A pointer cast to read the data into a 256-bit register could lead to a segmentation fault when the end plus the 32 bytes (256 bit) read would overlap into the next page during string parsing. This allows an attacker to eventually crash a service. The flaw was corrected by using a padding buffer for the last read from the input. So that we are we never read over the boundary of the input data.
[]
null
7.5
null
null
null
CVE-2023-32545
The affected application lacks proper validation of user-supplied data when parsing project files (e.g., CSP). This could lead to an out-of-bounds read in Cscape!CANPortMigration. An attacker could leverage this vulnerability to execute arbitrary code in the context of the current process.
[ "cpe:2.3:a:hornerautomation:cscape:9.90:sp8:*:*:*:*:*:*", "cpe:2.3:a:hornerautomation:cscape_envisionrv:4.70:*:*:*:*:*:*:*" ]
null
7.8
null
null
null
CVE-2025-54750
WordPress Funnel Builder by FunnelKit Plugin <= 3.11.1 - Local File Inclusion Vulnerability
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in FunnelKit Funnel Builder by FunnelKit allows PHP Local File Inclusion. This issue affects Funnel Builder by FunnelKit: from n/a through 3.11.1.
[]
null
7.5
null
null
null
CVE-2020-7677
Arbitrary Code Execution
This affects the package thenify before 3.3.1. The name argument provided to the package can be controlled by users without any sanitization, and this is provided to the eval function without any sanitization.
[ "cpe:2.3:a:thenify_project:thenify:*:*:*:*:*:node.js:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*" ]
null
8.6
null
null
null
GHSA-hh3p-9vmh-cjcr
Cross-site scripting (XSS) vulnerability in search.php of Gallery 1.1 through 1.3.4 allows remote attackers to insert arbitrary web script via the searchstring parameter.
[]
null
null
null
null
null
CVE-2023-31139
DHIS2 Core unrestricted session cookies with Personal Access Tokens
DHIS2 Core contains the service layer and Web API for DHIS2, an information system for data capture. Starting in the 2.37 branch and prior to versions 2.37.9.1, 2.38.3.1, and 2.39.1.2, Personal Access Tokens (PATs) generate unrestricted session cookies. This may lead to a bypass of other access restrictions (for example, based on allowed IP addresses or HTTP methods). DHIS2 implementers should upgrade to a supported version of DHIS2: 2.37.9.1, 2.38.3.1, or 2.39.1.2. Implementers can work around this issue by adding extra access control validations on a reverse proxy.
[ "cpe:2.3:a:dhis2:dhis_2:*:*:*:*:*:*:*:*" ]
null
4.3
null
null
null
CVE-2023-47094
A Stored Cross-Site Scripting (XSS) vulnerability in the Account Plans tab of System Settings in Virtualmin 7.7 allows remote attackers to inject arbitrary web script or HTML via the Plan name field while editing Account plan details.
[ "cpe:2.3:a:virtualmin:virtualmin:7.7:*:*:*:*:*:*:*" ]
null
5.4
null
null
null
GHSA-7mcp-f35c-w4mw
Heap-based Buffer Overflow vulnerability in RTI Connext Professional (Core Libraries) allows Overflow Variables and Tags.This issue affects Connext Professional: from 7.4.0 before 7.5.0, from 7.0.0 before 7.3.0.7, from 4.4 before 6.1.2.23.
[]
6.9
7.1
null
null
null
CVE-2020-2549
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: WLS Core Components). The supported version that is affected is 10.3.6.0.0. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.0 Base Score 7.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H).
[ "cpe:2.3:a:oracle:weblogic_server:10.3.6.0.0:*:*:*:*:*:*:*" ]
null
null
7.2
null
null
GHSA-cq2r-3hjp-3c67
IBM Emptoris Sourcing 9.5 - 10.1.3 could allow a remote attacker to conduct phishing attacks, using an open redirect attack. By persuading a victim to visit a specially-crafted Web site, a remote attacker could exploit this vulnerability to spoof the URL displayed to redirect a user to a malicious Web site that would appear to be trusted. This could allow the attacker to obtain highly sensitive information or conduct further attacks against the victim. IBM X-Force ID: 128174.
[]
null
null
5.4
null
null
GHSA-9v82-w8v5-2v72
Multiple unknown vulnerabilities in Linux kernel 2.4 and 2.6 allow local users to gain privileges or access kernel memory, as found by the Sparse source code checking tool.
[]
null
null
null
null
null
CVE-2018-3023
Vulnerability in the Oracle Banking Payments component of Oracle Financial Services Applications (subcomponent: Payments Core). Supported versions that are affected are 12.2.0, 12.3.0, 12.4.0, 12.5.0 and 14.1.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Banking Payments. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Banking Payments accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Banking Payments. CVSS 3.0 Base Score 5.4 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L).
[ "cpe:2.3:a:oracle:banking_payments:12.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:banking_payments:12.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:banking_payments:12.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:banking_payments:12.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:banking_payments:14.1.0:*:*:*:*:*:*:*" ]
null
null
5.4
5.5
null
CVE-2019-9874
Deserialization of Untrusted Data in the Sitecore.Security.AntiCSRF (aka anti CSRF) module in Sitecore CMS 7.0 to 7.2 and Sitecore XP 7.5 to 8.2 allows an unauthenticated attacker to execute arbitrary code by sending a serialized .NET object in the HTTP POST parameter __CSRFTOKEN.
[ "cpe:2.3:a:sitecore:cms:*:*:*:*:*:*:*:*", "cpe:2.3:a:sitecore:experience_platform:*:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
null
GHSA-qf6j-fwrq-x6wp
Multiple SQL injection vulnerabilities in clientes.asp in the TopManage OLK module 1.91.30 for SAP allow remote attackers to execute arbitrary SQL commands via the (1) PriceFrom, (2) PriceTo, and (3) InvFrom parameters, as reachable from olk/c_p/searchCart.asp, and other unspecified vectors when performing an advanced search. NOTE: some of these details are obtained from third party information.
[]
null
null
null
null
null
CVE-2022-32395
Prison Management System v1.0 was discovered to contain a SQL injection vulnerability via the 'id' parameter at /pms/admin/crimes/manage_crime.php:4
[ "cpe:2.3:a:prison_management_system_project:prison_management_system:1.0:*:*:*:*:*:*:*" ]
null
8.8
null
6.5
null
GHSA-w7fm-92w5-g2m4
Dell EMC ECS, versions prior to 3.5, contains an Exposure of Resource vulnerability. A remote unauthenticated attacker can access the list of DT (Directory Table) objects of all internally running services and gain knowledge of sensitive data of the system.
[]
null
null
null
null
null
CVE-2012-2164
The Web client in IBM Rational ClearQuest 7.1.x before 7.1.2.7 and 8.x before 8.0.0.3 allows remote authenticated users to bypass intended access restrictions, and use the Site Administration menu to modify system settings, via a parameter-tampering attack.
[ "cpe:2.3:a:ibm:rational_clearquest:7.1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_clearquest:7.1.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_clearquest:7.1.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_clearquest:7.1.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_clearquest:7.1.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_clearquest:7.1.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_clearquest:7.1.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_clearquest:7.1.1.8:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_clearquest:7.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_clearquest:7.1.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_clearquest:7.1.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_clearquest:7.1.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_clearquest:7.1.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_clearquest:7.1.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_clearquest:7.1.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_clearquest:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_clearquest:8.0.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_clearquest:8.0.0.2:*:*:*:*:*:*:*" ]
null
null
null
5.5
null
CVE-2020-1700
A flaw was found in the way the Ceph RGW Beast front-end handles unexpected disconnects. An authenticated attacker can abuse this flaw by making multiple disconnect attempts resulting in a permanent leak of a socket connection by radosgw. This flaw could lead to a denial of service condition by pile up of CLOSE_WAIT sockets, eventually leading to the exhaustion of available resources, preventing legitimate users from connecting to the system.
[ "cpe:2.3:a:ceph:ceph:-:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:openshift_container_storage:4.2:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*" ]
null
6.5
null
null
null
GHSA-p3vp-jg8v-gfmh
The HL Twitter WordPress plugin through 2014.1.18 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack
[]
null
2.4
null
null
null
GHSA-gjp7-cxjr-8j3h
Multiple cross-site scripting (XSS) vulnerabilities in Forms/rpAuth_1 on ZyXEL P-660HW-T1 2 devices with ZyNOS firmware 3.40(AXH.0) allow remote attackers to inject arbitrary web script or HTML via the (1) LoginPassword or (2) hiddenPassword parameter.
[]
null
null
6.1
null
null
CVE-2021-42272
Adobe Animate GIF File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability
Adobe Animate version 21.0.9 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious GIF file.
[ "cpe:2.3:a:adobe:animate:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
null
7.8
null
null
GHSA-rpqj-rcqg-c3f9
Password vulnerability found in Vinga WR-AC1200 81.102.1.4370 and before allows a remote attacker to execute arbitrary code via the password parameter at the /goform/sysTools and /adm/systools.asp endpoints.
[]
null
9.8
null
null
null
GHSA-vq58-gww6-824f
A vulnerability was found in Campcodes Video Sharing Website 1.0. It has been classified as critical. This affects an unknown part of the file watch.php. The manipulation of the argument code leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-225915.
[]
null
9.8
null
null
null
GHSA-73g9-626v-8vv8
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
[]
null
null
null
null
null
GHSA-j9gj-f45m-w3fp
SQL injection vulnerability in chat/staff/default.aspx in ReadyDesk 9.1 allows remote attackers to execute arbitrary SQL commands via the user name field.
[]
null
null
9.8
null
null