id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
189k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
patch_commit_url
stringlengths
36
232
GHSA-v2wv-63p9-455m
Multiple PHP remote file inclusion vulnerabilities in phpMyAgenda 3.0 Final and earlier allow remote attackers to execute arbitrary PHP code via a URL in the rootagenda parameter to (1) agendaplace.php3, (2) agendaplace2.php3, (3) infoevent.php3, and (4) agenda2.php3, different vectors than CVE-2006-2009.
[]
null
null
null
null
null
CVE-2008-1391
Multiple integer overflows in libc in NetBSD 4.x, FreeBSD 6.x and 7.x, and probably other BSD and Apple Mac OS platforms allow context-dependent attackers to execute arbitrary code via large values of certain integer fields in the format argument to (1) the strfmon function in lib/libc/stdlib/strfmon.c, related to the GET_NUMBER macro; and (2) the printf function, related to left_prec and right_prec.
[ "cpe:2.3:o:freebsd:freebsd:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:6.0:release:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:6.0:stable:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:6.0_p5_release:*:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:7.0:pre-release:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:7.0_beta4:*:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:7.0_releng:*:*:*:*:*:*:*", "cpe:2.3:o:netbsd:netbsd:4.0:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
GHSA-qwq9-fh29-mw39
OX App Suite through 7.10.4 allows XSS via use of the conversion API for a distributedFile.
[]
null
null
null
null
null
GHSA-fvp3-8575-r23w
Unspecified vulnerability in the mOffice - Outlook sync (com.innov8tion.isharesync) application 3.1 for Android has unknown impact and attack vectors.
[]
null
null
null
null
null
GHSA-xmj3-ch4w-5cq7
Tenda AC18 router v15.03.05.19 and v15.03.05.05 was discovered to contain a stack overflow via the list parameter at /goform/SetIpMacBind.
[]
null
9.8
null
null
null
GHSA-g454-m7r7-f68q
Multiple integer underflow vulnerabilities exist in the LXT2 lxt2_rd_iter_radix shift operation functionality of GTKWave 3.3.115. A specially crafted .lxt2 file can lead to memory corruption. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the integer underflow when performing the left shift operation.
[]
null
7
null
null
null
GHSA-5wpj-c6f7-24x8
Undefined behavior when users supply invalid resource handles
ImpactMultiple TensorFlow operations misbehave in eager mode when the resource handle provided to them is invalid:In graph mode, it would have been impossible to perform these API calls, but migration to TF 2.x eager mode opened up this vulnerability. If the resource handle is empty, then a reference is bound to a null pointer inside TensorFlow codebase (various codepaths). This is undefined behavior.PatchesWe have patched the issue in GitHub commit [a5b89cd68c02329d793356bda85d079e9e69b4e7](https://github.com/tensorflow/tensorflow/commit/a5b89cd68c02329d793356bda85d079e9e69b4e7) and GitHub commit [dbdd98c37bc25249e8f288bd30d01e118a7b4498](https://github.com/tensorflow/tensorflow/commit/dbdd98c37bc25249e8f288bd30d01e118a7b4498).The fix will be included in TensorFlow 2.9.0. We will also cherrypick this commit on TensorFlow 2.8.1, TensorFlow 2.7.2, and TensorFlow 2.6.4, as these are also affected and still in supported range.For more informationPlease consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.AttributionThis vulnerability has been reported by Hong Jin from Singapore Management University.
[]
null
5.5
null
null
null
GHSA-xpc7-m273-pggq
Zoho ManageEngine ServiceDesk 9.3 allows session hijacking and privilege escalation because an established guest session is automatically converted into an established administrator session when the guest user enters the administrator username, with an arbitrary incorrect password, in an mc/ login attempt within a different browser tab.
[]
null
null
8.8
null
null
CVE-2020-15599
Victor CMS through 2019-02-28 allows XSS via the register.php user_firstname or user_lastname field.
[ "cpe:2.3:a:victor_cms_project:victor_cms:*:*:*:*:*:*:*:*" ]
null
6.1
null
4.3
null
CVE-2007-2044
PHP remote file inclusion vulnerability in mod_weather.php in the Antonis Ventouris Weather module for Mambo and Joomla! allows remote attackers to execute arbitrary PHP code via a URL in the absolute_path parameter.
[ "cpe:2.3:a:antonis_ventouris:weather_module:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
GHSA-7677-xwx4-r4m4
Active IQ Unified Manager for VMware vSphere, Linux, and Microsoft Windows versions prior to 9.10P1 are susceptible to a vulnerability which could allow an attacker to discover cluster, node and Active IQ Unified Manager specific information via AutoSupport telemetry data that is sent even when AutoSupport has been disabled.
[]
null
5.3
null
null
null
GHSA-w57q-v7qr-v5m7
Path traversal vulnerability exists in a-blog cms versions prior to Ver. 3.1.43 and versions prior to Ver. 3.0.47. This is an issue with insufficient path validation in the backup feature, and exploitation requires the administrator privilege. If this vulnerability is exploited, a remote authenticated attacker with the administrator privilege may obtain or delete any file on the server.
[]
5.1
3.8
null
null
null
CVE-2025-54627
Out-of-bounds write vulnerability in the skia module. Impact: Successful exploitation of this vulnerability may affect service confidentiality.
[]
null
8.8
null
null
null
GHSA-m595-gqw8-5g7w
Cross-site scripting (XSS) vulnerability in /ajax.php/form/help-topic in Enhancesoft osTicket before 1.10.2 allows remote attackers to inject arbitrary web script or HTML via the "message" parameter.
[]
null
null
6.1
null
null
GHSA-59q6-5qj6-cxp2
The id3tag_sort function in id3tag.c for YAMT 0.5 allows remote attackers to execute arbitrary commands via an MP3 file with double quotes in the Artist tag.
[]
null
null
null
null
null
GHSA-mvq3-grx4-4vgx
The Penguin Run (aka com.skyboard.google.penguinRun) application 1.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[]
null
null
null
null
null
GHSA-25r2-9vcc-j43c
In Netgear XR300 V1.0.3.38_10.3.30, a stack-based buffer overflow vulnerability exists in the HTTPD service through the usb_device.cgi endpoint. The vulnerability occurs when processing POST requests containing the share_name parameter.
[]
null
6.5
null
null
null
RHSA-2025:2067
Red Hat Security Advisory: Red Hat Build of Apache Camel 4.8 for Quarkus 3.15 update is now available (RHBQ 3.15.3.SP1)
io.quarkus:quarkus-rest: Quarkus REST Endpoint Request Parameter Leakage Due to Shared Instance io.quarkus:quarkus-resteasy: Memory Leak in Quarkus RESTEasy Classic When Client Requests Timeout io.netty:netty-handler: SslHandler doesn't correctly validate packets which can lead to native crash when using native SSLEngine
[ "cpe:/a:redhat:camel_quarkus:3.15" ]
null
7.5
null
null
null
GHSA-fgpg-fxmj-5h69
Cross-site scripting (XSS) vulnerability in index.php in Jelsoft vBulletin allows remote attackers to spoof parts of a website via the loc parameter.
[]
null
null
null
null
null
CVE-2018-20017
SEMCMS 3.5 has XSS via the first text box to the SEMCMS_Main.php URI.
[ "cpe:2.3:a:sem-cms:semcms:3.5:*:*:*:*:*:*:*" ]
null
null
4.8
3.5
null
CVE-2019-1265
A security feature bypass vulnerability exists when Microsoft Yammer App for Android fails to apply the correct Intune MAM Policy.This could allow an attacker to perform functions that are restricted by Intune Policy.The security update addresses the vulnerability by correcting the way the policy is applied to Yammer App., aka 'Microsoft Yammer Security Feature Bypass Vulnerability'.
[ "cpe:2.3:a:microsoft:yammer:*:*:*:*:*:android:*:*" ]
null
7.5
null
5
null
GHSA-g48c-grh6-c63v
SAP NetWeaver (Knowledge Management), versions - 7.30, 7.31, 7.40, 7.50, allows an unauthenticated attacker to upload a malicious file and also to access, modify or make unavailable existing files but the impact is limited to the files themselves and is restricted by other policies such as access control lists and other upload file size restrictions, leading to Unrestricted File Upload.
[]
null
null
null
null
null
CVE-2023-32668
LuaTeX before 1.17.0 allows a document (compiled with the default settings) to make arbitrary network requests. This occurs because full access to the socket library is permitted by default, as stated in the documentation. This also affects TeX Live before 2023 r66984 and MiKTeX before 23.5.
[ "cpe:2.3:a:luatex_project:luatex:*:*:*:*:*:*:*:*", "cpe:2.3:a:miktex:miktex:*:*:*:*:*:*:*:*", "cpe:2.3:a:tug:tex_live:*:*:*:*:*:*:*:*" ]
null
5.5
null
null
null
GHSA-jvf3-mfxv-jcqr
Apache Pulsar Broker, Proxy, and WebSocket Proxy vulnerable to Improper Certificate Validation
TLS hostname verification cannot be enabled in the Pulsar Broker's Java Client, the Pulsar Broker's Java Admin Client, the Pulsar WebSocket Proxy's Java Client, and the Pulsar Proxy's Admin Client leaving intra-cluster connections and geo-replication connections vulnerable to man in the middle attacks, which could leak credentials, configuration data, message data, and any other data sent by these clients. The vulnerability is for both the pulsar+ssl protocol and HTTPS. An attacker can only take advantage of this vulnerability by taking control of a machine 'between' the client and the server. The attacker must then actively manipulate traffic to perform the attack by providing the client with a cryptographically valid certificate for an unrelated host. This issue affects Apache Pulsar Broker, Proxy, and WebSocket Proxy versions 2.7.0 to 2.7.4; 2.8.0 to 2.8.3; 2.9.0 to 2.9.2; 2.10.0; 2.6.4 and earlier.
[]
null
5.9
null
null
null
GHSA-xv73-w5x5-mf3h
Stack-based buffer overflow in the PestPatrol ActiveX control (ppctl.dll) 5.6.7.9 in CA eTrust PestPatrol allows remote attackers to execute arbitrary code via a long argument to the Initialize method.
[]
null
null
null
null
null
CVE-2009-1126
The kernel in Microsoft Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP2 does not properly validate the user-mode input associated with the editing of an unspecified desktop parameter, which allows local users to gain privileges via a crafted application, aka "Windows Desktop Parameter Edit Vulnerability."
[ "cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:*:x32:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:*:x64:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:itanium:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:sp2:x32:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:sp2:x64:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:*:*:x64:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*" ]
null
null
null
7.2
null
CVE-2021-34832
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader 11.0.0.49893. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the delay property. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-13928.
[ "cpe:2.3:a:foxit:pdf_reader:*:*:*:*:*:*:*:*", "cpe:2.3:a:foxitsoftware:pdf_editor:*:*:*:*:*:*:*:*", "cpe:2.3:a:foxitsoftware:pdf_editor:11.0.0.49893:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
null
7.8
null
null
GHSA-qx3m-v6p5-458w
Stack-based buffer overflow in SureThing CD/DVD Labeler 5.1.616 trial version allows user-assisted remote attackers to execute arbitrary code via a crafted (1) m3u or (2) pls playlist file. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
[]
null
null
null
null
null
CVE-2001-0998
IBM HACMP 4.4 allows remote attackers to cause a denial of service via a completed TCP connection to HACMP ports (e.g., using a port scan) that does not send additional data, which causes a failure in snmpd.
[ "cpe:2.3:a:ibm:hacmp:4.4:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:aix:4.3:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:aix:4.3.3:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:aix:5.1:*:*:*:*:*:*:*" ]
null
null
null
5
null
GHSA-58mm-w7mf-4q6h
Directory traversal vulnerability in download.php in the DB Backup plugin 4.5 and earlier for Wordpress allows remote attackers to read arbitrary files via a .. (dot dot) in the file parameter.
[]
null
null
null
null
null
GHSA-v46c-9q4v-m68p
The File Manager in CMS Made Simple through 2.2.10 has Reflected XSS via the "New name" field in a Rename action.
[]
null
null
4.8
null
null
CVE-2005-1686
Format string vulnerability in gedit 2.10.2 may allow attackers to cause a denial of service (application crash) via a bin file with format string specifiers in the filename. NOTE: while this issue is triggered on the command line by the gedit user, it has been reported that web browsers and email clients could be configured to provide a file name as an argument to gedit, so there is a valid attack that crosses security boundaries.
[ "cpe:2.3:a:gnome:gedit:2.10.2:*:*:*:*:*:*:*" ]
null
null
null
2.6
null
CVE-2017-8406
An issue was discovered on D-Link DCS-1130 devices. The device provides a crossdomain.xml file with no restrictions on who can access the webserver. This allows an hosted flash file on any domain to make calls to the device's webserver and pull any information that is stored on the device. In this case, user's credentials are stored in clear text on the device and can be pulled easily. It also seems that the device does not implement any cross-site scripting forgery protection mechanism which allows an attacker to trick a user who is logged in to the web management interface into executing a cross-site flashing attack on the user's browser and execute any action on the device provided by the web management interface which steals the credentials from tools_admin.cgi file's response and displays it inside a Textfield.
[ "cpe:2.3:o:dlink:dcs-1130_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:dcs-1130:-:*:*:*:*:*:*:*" ]
null
8.8
null
6.8
null
CVE-2005-3166
Unspecified vulnerability in "edit submission handling" for MediaWiki 1.4.x before 1.4.10 and 1.3.x before 1.3.16 allows remote attackers to cause a denial of service (corruption of the previous submission) via a crafted URL.
[ "cpe:2.3:a:mediawiki:mediawiki:1.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.3.6:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.3.7:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.3.8:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.3.9:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.3.10:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.3.11:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.3.12:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.3.13:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.3.14:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.3.15:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.4.5:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.4.6:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.4.7:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.4.8:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.4.9:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.4_beta1:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.4_beta2:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.4_beta3:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.4_beta4:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.4_beta5:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.4_beta6:*:*:*:*:*:*:*" ]
null
null
null
5
null
CVE-2018-10363
An issue was discovered in the WpDevArt "Booking calendar, Appointment Booking System" plugin 2.2.2 for WordPress. Multiple parameters allow remote attackers to manipulate the values to change data such as prices.
[ "cpe:2.3:a:wpdevart:booking_calendar:2.2.2:*:*:*:*:wordpress:*:*" ]
null
null
7.5
5
null
GHSA-3fhc-jpq3-mhwr
Unspecified vulnerability in the Render method in the ExportHTML.ocx ActiveX control in ExportHTML.dll in IBM SPSS Dimensions 5.5 and SPSS Data Collection 5.6, 6.0, and 6.0.1 allows remote attackers to execute arbitrary code via a crafted HTML document.
[]
null
null
null
null
null
CVE-2011-1499
acl.c in Tinyproxy before 1.8.3, when an Allow configuration setting specifies a CIDR block, permits TCP connections from all IP addresses, which makes it easier for remote attackers to hide the origin of web traffic by leveraging the open HTTP proxy server.
[ "cpe:2.3:a:banu:tinyproxy:*:*:*:*:*:*:*:*", "cpe:2.3:a:banu:tinyproxy:1.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:banu:tinyproxy:1.5.0:pre1:*:*:*:*:*:*", "cpe:2.3:a:banu:tinyproxy:1.5.0:pre2:*:*:*:*:*:*", "cpe:2.3:a:banu:tinyproxy:1.5.0:pre3:*:*:*:*:*:*", "cpe:2.3:a:banu:tinyproxy:1.5.0:pre4:*:*:*:*:*:*", "cpe:2.3:a:banu:tinyproxy:1.5.0:pre5:*:*:*:*:*:*", "cpe:2.3:a:banu:tinyproxy:1.5.0:pre6:*:*:*:*:*:*", "cpe:2.3:a:banu:tinyproxy:1.5.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:banu:tinyproxy:1.5.0:rc10:*:*:*:*:*:*", "cpe:2.3:a:banu:tinyproxy:1.5.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:banu:tinyproxy:1.5.0:rc4:*:*:*:*:*:*", "cpe:2.3:a:banu:tinyproxy:1.5.0:rc5:*:*:*:*:*:*", "cpe:2.3:a:banu:tinyproxy:1.5.0:rc6:*:*:*:*:*:*", "cpe:2.3:a:banu:tinyproxy:1.5.0:rc7:*:*:*:*:*:*", "cpe:2.3:a:banu:tinyproxy:1.5.0:rc8:*:*:*:*:*:*", "cpe:2.3:a:banu:tinyproxy:1.5.0:rc9:*:*:*:*:*:*", "cpe:2.3:a:banu:tinyproxy:1.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:banu:tinyproxy:1.5.1:pre1:*:*:*:*:*:*", "cpe:2.3:a:banu:tinyproxy:1.5.1:pre2:*:*:*:*:*:*", "cpe:2.3:a:banu:tinyproxy:1.5.1:pre3:*:*:*:*:*:*", "cpe:2.3:a:banu:tinyproxy:1.5.1:pre4:*:*:*:*:*:*", "cpe:2.3:a:banu:tinyproxy:1.5.1:pre5:*:*:*:*:*:*", "cpe:2.3:a:banu:tinyproxy:1.5.1:pre6:*:*:*:*:*:*", "cpe:2.3:a:banu:tinyproxy:1.5.1:rc1:*:*:*:*:*:*", "cpe:2.3:a:banu:tinyproxy:1.5.1:rc2:*:*:*:*:*:*", "cpe:2.3:a:banu:tinyproxy:1.5.1:rc3:*:*:*:*:*:*", "cpe:2.3:a:banu:tinyproxy:1.5.1:rc4:*:*:*:*:*:*", "cpe:2.3:a:banu:tinyproxy:1.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:banu:tinyproxy:1.5.2:rc1:*:*:*:*:*:*", "cpe:2.3:a:banu:tinyproxy:1.5.2:rc2:*:*:*:*:*:*", "cpe:2.3:a:banu:tinyproxy:1.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:banu:tinyproxy:1.5.3:rc1:*:*:*:*:*:*", "cpe:2.3:a:banu:tinyproxy:1.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:banu:tinyproxy:1.6.0:a:*:*:*:*:*:*", "cpe:2.3:a:banu:tinyproxy:1.6.0:pre1:*:*:*:*:*:*", "cpe:2.3:a:banu:tinyproxy:1.6.0:pre2:*:*:*:*:*:*", "cpe:2.3:a:banu:tinyproxy:1.6.0:pre3:*:*:*:*:*:*", "cpe:2.3:a:banu:tinyproxy:1.6.0:pre4:*:*:*:*:*:*", "cpe:2.3:a:banu:tinyproxy:1.6.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:banu:tinyproxy:1.6.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:banu:tinyproxy:1.6.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:banu:tinyproxy:1.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:banu:tinyproxy:1.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:banu:tinyproxy:1.6.3:*:*:*:*:*:*:*", "cpe:2.3:a:banu:tinyproxy:1.6.4:*:*:*:*:*:*:*", "cpe:2.3:a:banu:tinyproxy:1.6.5:*:*:*:*:*:*:*", "cpe:2.3:a:banu:tinyproxy:1.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:banu:tinyproxy:1.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:banu:tinyproxy:1.8.0:*:*:*:*:*:*:*", "cpe:2.3:a:banu:tinyproxy:1.8.1:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*" ]
null
null
null
2.6
null
GHSA-7v76-5mmq-g5jr
The Internet Connection Firewall (ICF) in Microsoft Windows XP SP2 is configured by default to trust sessmgr.exe, which allows local users to use sessmgr.exe to create a local listening port that bypasses the ICF access controls.
[]
null
null
null
null
null
CVE-2000-0795
Buffer overflow in lpstat in IRIX 6.2 and 6.3 allows local users to gain root privileges via a long -n option.
[ "cpe:2.3:o:sgi:irix:6.2:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.3:*:*:*:*:*:*:*" ]
null
null
null
7.2
null
CVE-2017-7208
The decode_residual function in libavcodec in libav 9.21 allows remote attackers to cause a denial of service (buffer over-read) or obtain sensitive information from process memory via a crafted h264 video file.
[ "cpe:2.3:a:libav:libav:9.21:*:*:*:*:*:*:*" ]
null
null
7.1
5.8
null
CVE-2014-8325
The Calendar Base (cal) extension before 1.5.9 and 1.6.x before 1.6.1 for TYPO3 allows remote attackers to cause a denial of service (resource consumption) via vectors related to the PHP PCRE library.
[ "cpe:2.3:a:calender_base_project:calender_base:*:*:*:*:*:typo3:*:*", "cpe:2.3:a:calender_base_project:calender_base:1.5.0:*:*:*:*:typo3:*:*", "cpe:2.3:a:calender_base_project:calender_base:1.5.1:*:*:*:*:typo3:*:*", "cpe:2.3:a:calender_base_project:calender_base:1.5.2:*:*:*:*:typo3:*:*", "cpe:2.3:a:calender_base_project:calender_base:1.5.3:*:*:*:*:typo3:*:*", "cpe:2.3:a:calender_base_project:calender_base:1.5.4:*:*:*:*:typo3:*:*", "cpe:2.3:a:calender_base_project:calender_base:1.5.5:*:*:*:*:typo3:*:*", "cpe:2.3:a:calender_base_project:calender_base:1.5.6:*:*:*:*:typo3:*:*", "cpe:2.3:a:calender_base_project:calender_base:1.5.7:*:*:*:*:typo3:*:*", "cpe:2.3:a:calender_base_project:calender_base:1.6.0:*:*:*:*:typo3:*:*" ]
null
null
null
7.8
null
GHSA-44r2-3246-r77p
Dell Encryption and Dell Security Management Server, versions prior to 11.11.0, contain an Improper Link Resolution Before File Access ('Link Following') Vulnerability. A local malicious user could potentially exploit this vulnerability, leading to privilege escalation.
[]
null
7.3
null
null
null
GHSA-wf42-jg79-hchc
In the Linux kernel, the following vulnerability has been resolved:drm/tegra: Fix reference leak in tegra_dsi_ganged_probeThe reference taken by 'of_find_device_by_node()' must be released when not needed anymore. Add put_device() call to fix this.
[]
null
5.5
null
null
null
CVE-2006-5755
Linux kernel before 2.6.18, when running on x86_64 systems, does not properly save or restore EFLAGS during a context switch, which allows local users to cause a denial of service (crash) by causing SYSENTER to set an NT flag, which can trigger a crash on the IRET of the next task.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
null
null
null
4.9
null
GHSA-cf4g-fcf8-3cr9
`pnet_packet` buffer overrun in `set_payload` setters
As indicated by this [issue](https://github.com/libpnet/libpnet/issues/449#issuecomment-663355987), a buffer overrun is possible in the `set_payload` setter of the various mutable "Packet" struct setters. The offending `set_payload` functions were defined within the struct `impl` blocks in earlier versions of the package, and later by the `packet` macro.Fixed in the `packet` macro by [this](https://github.com/libpnet/libpnet/pull/455) PR.
[]
null
null
6
null
null
CVE-2025-3943
Use of GET Request Method With sensitive Query Strings
Use of GET Request Method With Sensitive Query Strings vulnerability in Tridium Niagara Framework on Windows, Linux, QNX, Tridium Niagara Enterprise Security on Windows, Linux, QNX allows Parameter Injection. This issue affects Niagara Framework: before 4.14.2, before 4.15.1, before 4.10.11; Niagara Enterprise Security: before 4.14.2, before 4.15.1, before 4.10.11. Tridium recommends upgrading to Niagara Framework and Enterprise Security versions 4.14.2u2, 4.15.u1, or 4.10u.11.
[]
null
4.1
null
null
null
CVE-2018-16513
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact.
[ "cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:a:artifex:gpl_ghostscript:*:*:*:*:*:*:*:*", "cpe:2.3:a:pulsesecure:pulse_connect_secure:*:*:*:*:*:*:*:*" ]
null
null
7.8
6.8
null
GHSA-389x-839f-4rhx
Denial of Service attack on windows app using Netty
SummaryAn unsafe reading of environment file could potentially cause a denial of service in Netty. When loaded on an Windows application, Netty attemps to load a file that does not exist. If an attacker creates such a large file, the Netty application crash.DetailsA similar issue was previously reported in https://github.com/netty/netty/security/advisories/GHSA-xq3w-v528-46rv This issue was fixed, but the fix was incomplete in that null-bytes were not counted against the input limit.PoCThe PoC is the same as for https://github.com/netty/netty/security/advisories/GHSA-xq3w-v528-46rv with the detail that the file should only contain null-bytes; 0x00. When the null-bytes are encountered by the `InputStreamReader`, it will issue replacement characters in its charset decoding, which will fill up the line-buffer in the `BufferedReader.readLine()`, because the replacement character is not a line-break character.ImpactImpact is the same as https://github.com/netty/netty/security/advisories/GHSA-xq3w-v528-46rv
[]
null
5.5
null
null
null
GHSA-rx4v-33p7-72qj
A vulnerability was found in MRCMS 3.1.2 and classified as problematic. This issue affects some unknown processing of the file /admin/chip/add.do of the component Add Fragment Page. The manipulation leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
[]
4.8
2.4
null
null
null
CVE-2022-3515
A vulnerability was found in the Libksba library due to an integer overflow within the CRL parser. The vulnerability can be exploited remotely for code execution on the target system by passing specially crafted data to the application, for example, a malicious S/MIME attachment.
[ "cpe:2.3:a:gnupg:libksba:*:*:*:*:*:*:*:*", "cpe:2.3:a:gpg4win:gpg4win:*:*:*:*:*:*:*:*", "cpe:2.3:a:gnupg:vs-desktop:*:*:*:*:*:*:*:*", "cpe:2.3:a:gnupg:gnupg:*:*:*:*:lts:*:*:*", "cpe:2.3:a:gnupg:gnupg:*:*:*:*:-:*:*:*" ]
null
9.8
null
null
null
CVE-2020-10192
An issue was discovered in Munkireport before 5.3.0.3923. An unauthenticated actor can send a custom XSS payload through the /report/broken_client endpoint. The payload will be executed by any authenticated users browsing the application. This concerns app/views/listings/default.php.
[ "cpe:2.3:a:munkireport_project:munkireport:*:*:*:*:*:*:*:*" ]
null
6.1
null
4.3
null
GHSA-3xwr-f848-5v5p
A vulnerability classified as critical was found in SourceCodester Online Hotel Reservation System 1.0. Affected by this vulnerability is the function upload of the file /admin/mod_room/controller.php?action=add. The manipulation of the argument image leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
[]
5.3
6.3
null
null
null
GHSA-xhgm-q8m9-9c6v
(1) wp-dbmanager.php and (2) database-manage.php in the WP-DBManager (aka Database Manager) plugin before 2.7.2 for WordPress place credentials on the mysqldump command line, which allows local users to obtain sensitive information by listing the process.
[]
null
null
7.8
null
null
GHSA-fj35-5pqq-m427
The Gulf Credit Union (aka Fi_Mobile.Gulf) application 1.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[]
null
null
null
null
null
PYSEC-2023-153
null
Open Redirect vulnerability in Horizon Web Dashboard 19.4.0 thru 20.1.4 via the success_url parameter.
[]
null
6.1
null
null
null
GHSA-gppc-qq77-689m
A vulnerability classified as critical has been found in SourceCodester Prison Management System 1.0. This affects an unknown part of the file /Employee/delete_leave.php. The manipulation leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-259695.
[]
null
6.3
null
null
null
CVE-2021-22548
Arbitrary enclave memory overread vulnerability in Asylo TrustedPrimitives::UntrustedCall
An attacker can change the pointer to untrusted memory to point to trusted memory region which causes copying trusted memory to trusted memory, if the latter is later copied out, it allows for reading of memory regions from the trusted region. It is recommended to update past 0.6.2 or git commit https://github.com/google/asylo/commit/53ed5d8fd8118ced1466e509606dd2f473707a5c
[ "cpe:2.3:a:google:asylo:*:*:*:*:*:*:*:*" ]
null
6.5
null
null
null
CVE-2025-22117
ice: fix using untrusted value of pkt_len in ice_vc_fdir_parse_raw()
In the Linux kernel, the following vulnerability has been resolved: ice: fix using untrusted value of pkt_len in ice_vc_fdir_parse_raw() Fix using the untrusted value of proto->raw.pkt_len in function ice_vc_fdir_parse_raw() by verifying if it does not exceed the VIRTCHNL_MAX_SIZE_RAW_PACKET value.
[]
null
null
null
null
null
RHSA-2012:0715
Red Hat Security Advisory: thunderbird security update
Mozilla: Miscellaneous memory safety hazards (rv:13.0/ rv:10.0.5) (MFSA 2012-34) Mozilla: Miscellaneous memory safety hazards (rv:13.0/ rv:10.0.5) (MFSA 2012-34) Mozilla: Miscellaneous memory safety hazards (rv:13.0/ rv:10.0.5) (MFSA 2012-34) Mozilla: Miscellaneous memory safety hazards (rv:13.0/ rv:10.0.5) (MFSA 2012-34) Mozilla: Buffer overflow and use-after-free issues found using Address Sanitizer (MFSA 2012-40) Mozilla: Buffer overflow and use-after-free issues found using Address Sanitizer (MFSA 2012-40) Mozilla: Content Security Policy inline-script bypass (MFSA 2012-36) Mozilla: Information disclosure though Windows file shares and shortcut files (MFSA 2012-37) Mozilla: Use-after-free while replacing/inserting a node in a document (MFSA 2012-38) Mozilla: Buffer overflow and use-after-free issues found using Address Sanitizer (MFSA 2012-40) Mozilla: Miscellaneous memory safety hazards (rv:13.0/ rv:10.0.5) (MFSA 2012-34)
[ "cpe:/a:redhat:rhel_productivity:5", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
null
CVE-2004-0037
FirstClass Desktop Client 7.1 allows remote attackers to execute arbitrary commands via hyperlinks in FirstClass RTF messages.
[ "cpe:2.3:a:opentext:opentext_firstclass_desktop_client:7.1:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
GHSA-vq6r-22q3-83cv
The Team – Team Members Showcase Plugin plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the response() function in all versions up to, and including, 4.4.9. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update the plugin's settings.
[]
null
4.3
null
null
null
GHSA-6qx2-mpv3-45g8
The BEA WebLogic Server proxy plug-in before June 2006 for the Apache HTTP Server does not properly handle protocol errors, which allows remote attackers to cause a denial of service (server outage).
[]
null
null
null
null
null
GHSA-2682-qq7m-44gj
Missing Authorization vulnerability in WP SCHEMA PRO Schema Pro.This issue affects Schema Pro: from n/a through 2.7.8.
[]
null
6.5
null
null
null
CVE-2021-38353
Dropdown and scrollable Text <= 2.0 Reflected Cross-Site Scripting
The Dropdown and scrollable Text WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the content parameter found in the ~/index.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 2.0.
[ "cpe:2.3:a:webodid:dropdown_and_scrollable_text:*:*:*:*:*:wordpress:*:*" ]
null
6.1
null
null
null
GHSA-q5q3-h939-p643
Improper access control vulnerability in pfSense CE and pfSense Plus (pfSense CE software versions prior to 2.6.0 and pfSense Plus software versions prior to 22.01) allows a remote attacker with the privilege to change NTP GPS settings to rewrite existing files on the file system, which may result in arbitrary command execution.
[]
null
8.8
null
null
null
RHSA-2025:8530
Red Hat Security Advisory: webkit2gtk3 security update
webkitgtk: A malicious website may exfiltrate data cross-origin webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash
[ "cpe:/a:redhat:rhel_aus:8.4::appstream" ]
null
8.8
null
null
null
CVE-2010-4595
The Connection Manager in IBM Lotus Mobile Connect before 6.1.4 disables the http.device.stanza blacklisting functionality for HTTP Access Services (HTTP-AS), which allows remote attackers to bypass intended access restrictions via an HTTP request that contains a disallowed User-Agent header.
[ "cpe:2.3:a:ibm:lotus_mobile_connect:*:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_mobile_connect:6.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_mobile_connect:6.1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_mobile_connect:6.1.2:*:*:*:*:*:*:*" ]
null
null
null
5
null
GHSA-vqjv-jhp4-724w
Sendmail 8.9.0 through 8.12.6 allows remote attackers to bypass relaying restrictions enforced by the 'check_relay' function by spoofing a blank DNS hostname.
[]
null
null
null
null
null
CVE-2017-6481
Multiple Cross-Site Scripting (XSS) issues were discovered in phpipam 1.2. The vulnerabilities exist due to insufficient filtration of user-supplied data passed to several pages (instructions in app/admin/instructions/preview.php; subnetId in app/admin/powerDNS/refresh-ptr-records.php). An attacker could execute arbitrary HTML and script code in a browser in the context of the vulnerable website.
[ "cpe:2.3:a:phpipam:phpipam:*:*:*:*:*:*:*:*" ]
null
null
6.1
4.3
null
GHSA-h95c-frw5-64m7
An SQL Injection vulnerability existed in DLP Extension 11.11.1.3. The vulnerability allowed an attacker to perform arbitrary SQL queries potentially leading to command execution.
[]
null
4.9
null
null
null
RHSA-2024:4972
Red Hat Security Advisory: Errata Advisory for Red Hat OpenShift GitOps v1.11.7 security update
argo-cd: Argo CD web terminal session doesn't expire argocd: Unauthenticated Denial of Service (DoS) Vulnerability via /api/webhook Endpoint in Argo CD
[ "cpe:/a:redhat:openshift_gitops:1.11::el8" ]
null
7.5
null
null
null
GHSA-mxv4-g2w3-q67w
Adobe Acrobat and Reader versions 2020.006.20042 and earlier, 2017.011.30166 and earlier, 2017.011.30166 and earlier, and 2015.006.30518 and earlier have a security bypass vulnerability. Successful exploitation could lead to security feature bypass.
[]
null
null
null
null
null
CVE-2022-2503
Linux Kernel LoadPin bypass via dm-verity table reload
Dm-verity is used for extending root-of-trust to root filesystems. LoadPin builds on this property to restrict module/firmware loads to just the trusted root filesystem. Device-mapper table reloads currently allow users with root privileges to switch out the target with an equivalent dm-linear target and bypass verification till reboot. This allows root to bypass LoadPin and can be used to load untrusted and unverified kernel modules and firmware, which implies arbitrary kernel execution and persistence for peripherals that do not verify firmware updates. We recommend upgrading past commit 4caae58406f8ceb741603eee460d79bacca9b1b5
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
null
6.9
null
null
null
CVE-2024-10087
XSS in iKSORIS
Internet Starter, one of SoftCOM iKSORIS system modules, is vulnerable to Reflected XSS (Cross-site Scripting) attacks. An attacker might craft a link containing a malicious script, which then gets directly embedded in references to other resources, what causes the script to run in user's context multiple times.  This vulnerability has been patched in version 79.0
[]
5.3
null
null
null
null
CVE-2024-32281
Tenda AC7V1.0 v15.03.06.44 firmware contains a command injection vulnerablility in formexeCommand function via the cmdinput parameter.
[ "cpe:2.3:o:tenda:ac7_firmware:15.03.06.44:*:*:*:*:*:*:*" ]
null
8.8
null
null
null
GHSA-p7fw-qcf4-849w
The Linear plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'linear_block_buy_commissions' shortcode in all versions up to, and including, 2.7.12 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
6.4
null
null
null
GHSA-wg6m-m95x-w5j3
GSC build 2067 and earlier relies on the client to enforce administrator privileges, which allows remote attackers to execute arbitrary administrator commands via a crafted packet.
[]
null
null
null
null
null
CVE-2008-2347
MyPicGallery 1.0 allows remote attackers to bypass application authentication and gain administrative access by setting the userID parameter to "admin" in a direct request to admin/addUser.php.
[ "cpe:2.3:a:mypicgallery:mypicgallery:1.0:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2017-11628
In PHP before 5.6.31, 7.x before 7.0.21, and 7.1.x before 7.1.7, a stack-based buffer overflow in the zend_ini_do_op() function in Zend/zend_ini_parser.c could cause a denial of service or potentially allow executing code. NOTE: this is only relevant for PHP applications that accept untrusted input (instead of the system's php.ini file) for the parse_ini_string or parse_ini_file function, e.g., a web application for syntax validation of php.ini directives.
[ "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:7.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:7.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:7.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:7.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:7.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:7.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:7.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:7.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:7.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:7.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:7.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:7.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:7.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:7.0.13:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:7.0.14:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:7.0.15:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:7.0.16:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:7.0.17:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:7.0.18:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:7.0.19:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:7.0.20:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:7.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:7.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:7.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:7.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:7.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:7.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:7.1.6:*:*:*:*:*:*:*" ]
null
null
7.8
6.8
null
GHSA-9rmh-v8rw-6322
Cross-Site Request Forgery (CSRF) vulnerability in Recapture Cart Recovery and Email Marketing Recapture for WooCommerce allows Cross Site Request Forgery. This issue affects Recapture for WooCommerce: from n/a through 1.0.43.
[]
null
6.5
null
null
null
CVE-2006-2284
Multiple PHP remote file inclusion vulnerabilities in Claroline 1.7.5 allow remote attackers to execute arbitrary PHP code via a URL in the (1) clarolineRepositorySys parameter in ldap.inc.php and the (2) claro_CasLibPath parameter in casProcess.inc.php.
[ "cpe:2.3:a:claroline:claroline:1.5:*:*:*:*:*:*:*", "cpe:2.3:a:claroline:claroline:1.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:claroline:claroline:1.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:claroline:claroline:1.6:*:*:*:*:*:*:*", "cpe:2.3:a:claroline:claroline:1.6_beta:*:*:*:*:*:*:*", "cpe:2.3:a:claroline:claroline:1.6_rc1:*:*:*:*:*:*:*", "cpe:2.3:a:claroline:claroline:1.7.2:*:*:*:*:*:*:*", "cpe:2.3:a:claroline:claroline:1.7.4:*:*:*:*:*:*:*", "cpe:2.3:a:claroline:claroline:1.7.5:*:*:*:*:*:*:*", "cpe:2.3:a:dokeos:dokeos:1.4:*:*:*:*:*:*:*", "cpe:2.3:a:dokeos:dokeos:1.5:*:*:*:*:*:*:*", "cpe:2.3:a:dokeos:dokeos:1.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:dokeos:dokeos:1.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:dokeos:dokeos:1.5.5:*:*:*:*:*:*:*", "cpe:2.3:a:dokeos:dokeos:1.6.4:*:*:*:*:*:*:*", "cpe:2.3:a:dokeos:dokeos:1.6_rc2:*:*:*:*:*:*:*" ]
null
null
null
6.8
null
CVE-2024-34219
TOTOLINK CP450 V4.1.0cu.747_B20191224 was discovered to contain a vulnerability in the SetTelnetCfg function, which allows attackers to log in through telnet.
[ "cpe:2.3:o:totolink:cp450_firmware:4.1.0cu.747_b20191224:*:*:*:*:*:*:*" ]
null
8.6
null
null
null
GHSA-375g-39jq-vq7m
Potential buffer overflow in CBOR2 decoder
SummaryEver since https://github.com/agronholm/cbor2/pull/204 (or specifically https://github.com/agronholm/cbor2/commit/387755eacf0be35591a478d3c67fe10618a6d542) was merged, I can create a reproducible crash when running the snippet under PoC on a current Debian bullseye aarm64 on a Raspberry Pi 3 (I was **not** able to reproduce this on my x86_64 Laptop with Python 3.11; I suspect because there is enough memory to allocate still)DetailsPoCIf one calls it without the indirection via the pool executor, a SystemError is shown that hides the buffer overflow.ImpactAn attacker can crash a service using cbor2 to parse a CBOR binary by sending a long enough object.
[]
null
7.5
null
null
null
CVE-2000-0257
Buffer overflow in the NetWare remote web administration utility allows remote attackers to cause a denial of service or execute commands via a long URL.
[ "cpe:2.3:o:novell:netware:5.1:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2020-26953
It was possible to cause the browser to enter fullscreen mode without displaying the security UI; thus making it possible to attempt a phishing attack or otherwise confuse the user. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.
[ "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*" ]
null
4.3
null
4.3
null
CVE-2014-1832
Phusion Passenger 4.0.37 allows local users to write to certain files and directories via a symlink attack on (1) control_process.pid or a (2) generation-* file. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-1831.
[ "cpe:2.3:a:phusion:passenger:*:*:*:*:*:*:*:*" ]
null
null
null
2.1
null
GHSA-cxcw-75qj-r943
In the Linux kernel, the following vulnerability has been resolved:jfs: add check read-only before txBeginAnon() callAdded a read-only check before calling `txBeginAnon` in `extAlloc` and `extRecord`. This prevents modification attempts on a read-only mounted filesystem, avoiding potential errors or crashes.Call trace: txBeginAnon+0xac/0x154 extAlloc+0xe8/0xdec fs/jfs/jfs_extent.c:78 jfs_get_block+0x340/0xb98 fs/jfs/inode.c:248 __block_write_begin_int+0x580/0x166c fs/buffer.c:2128 __block_write_begin fs/buffer.c:2177 [inline] block_write_begin+0x98/0x11c fs/buffer.c:2236 jfs_write_begin+0x44/0x88 fs/jfs/inode.c:299
[]
null
null
null
null
null
GHSA-qpfh-2wpm-c362
Spring Cloud Config Server may not use Vault token sent by clients using a X-CONFIG-TOKEN header when making requests to Vault. Your application may be affected by this if the following are true:You have Spring Vault on the classpath of your Spring Cloud Config Server andYou are using the X-CONFIG-TOKEN header to send a Vault token to the Spring Cloud Config Server for the Config Server to use when making requests to Vault andYou are using the default Spring Vault SessionManager implementation LifecycleAwareSessionManager or a SessionManager implementation that persists the Vault token such as SimpleSessionManager.In this case the SessionManager persists the first token it retrieves and will continue to use that token even if client requests to the Spring Cloud Config Server include a X-CONFIG-TOKEN header with a different value. Affected Spring Products and Versions Spring Cloud Config:2.2.1.RELEASE - 4.2.1Mitigation Users of affected versions should upgrade to the corresponding fixed version.Affected version(s)Fix versionAvailability4.2.x4.2.2OSS4.1.x4.1.6OSS4.0.x4.0.10Commercial3.1.x3.1.10Commercial3.0.x4.1.6OSS2.2.x4.1.6OSS NOTE: Spring Cloud Config 3.0.x and 2.2.x are no longer under open source or commercial support. Users of these versions are encouraged to upgrade to a supported version.No other mitigation steps are necessary.
[]
null
5.3
null
null
null
CVE-2025-22736
WordPress User Management plugin <= 1.2 - Privilege Escalation vulnerability
Incorrect Privilege Assignment vulnerability in WPExperts User Management allows Privilege Escalation.This issue affects User Management: from n/a through 1.2.
[]
null
8.8
null
null
null
GHSA-whx8-2789-8w4w
cJSON 1.7.15 might allow a denial of service via a crafted JSON document such as {"a": true, "b": [ null,9999999999999999999999999999999999999999999999912345678901234567]}.
[]
null
2.9
null
null
null
GHSA-8rm9-ph3p-x36x
The smacker_decode_header_tree function in libavcodec/smacker.c in FFmpeg before 0.10 allows remote attackers to have an unspecified impact via crafted Smacker data.
[]
null
null
null
null
null
CVE-2011-0638
Microsoft Windows does not properly warn the user before enabling additional Human Interface Device (HID) functionality over USB, which allows user-assisted attackers to execute arbitrary programs via crafted USB data, as demonstrated by keyboard and mouse data sent by malware on a smartphone that the user connected to the computer.
[ "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*" ]
null
null
null
6.9
null
GHSA-5p45-3ch6-hr6j
A vulnerability was found in Campcodes Complete Online DJ Booking System 1.0. It has been declared as problematic. This vulnerability affects unknown code of the file /admin/booking-search.php. The manipulation of the argument searchdata leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-257470 is the identifier assigned to this vulnerability.
[]
null
3.5
null
null
null
GHSA-fc7q-x42h-7ff2
In the Linux kernel, the following vulnerability has been resolved:drm/i915/bios: Tolerate devdata==NULL in intel_bios_encoder_supports_dp_dual_mode()If we have no VBT, or the VBT didn't declare the encoder in question, we won't have the 'devdata' for the encoder. Instead of oopsing just bail early.We won't be able to tell whether the port is DP++ or not, but so be it.(cherry picked from commit 26410896206342c8a80d2b027923e9ee7d33b733)
[]
null
null
null
null
null
GHSA-h5pc-cx6w-rpgv
The ISO ES-IS parser in tcpdump before 4.9.2 has a buffer over-read in print-isoclns.c:esis_print().
[]
null
null
9.8
null
null
CVE-2024-22271
Spring Cloud Function Web DOS Vulnerability
In Spring Cloud Function framework, versions 4.1.x prior to 4.1.2, 4.0.x prior to 4.0.8 an application is vulnerable to a DOS attack when attempting to compose functions with non-existing functions. Specifically, an application is vulnerable when all of the following are true: User is using Spring Cloud Function Web module Affected Spring Products and Versions Spring Cloud Function Framework 4.1.0 to 4.1.2 4.0.0 to 4.0.8 References https://spring.io/security/cve-2022-22979   https://checkmarx.com/blog/spring-function-cloud-dos-cve-2022-22979-and-unintended-function-invocation/  History 2020-01-16: Initial vulnerability report published.
[ "cpe:2.3:a:vmware:spring_cloud_function:4.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:spring_cloud_function:4.1.0:*:*:*:*:*:*:*" ]
null
8.2
null
null
null
CVE-2025-4195
itsourcecode Gym Management System ajax.php sql injection
A vulnerability was found in itsourcecode Gym Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /ajax.php?action=save_member. The manipulation of the argument umember_id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
[]
6.9
7.3
7.3
7.5
null
GHSA-2vq9-q9w6-2hh6
The remember me feature in portal/scr_authentif.php in POSH (aka Posh portal or Portaneo) 3.0, 3.2.1, 3.3.0, and earlier stores the username and MD5 digest of the password in cleartext in a cookie, which allows attackers to obtain sensitive information by reading this cookie.
[]
null
null
null
null
null
GHSA-cq5q-99pr-fc9j
Microsoft Message Queuing Remote Code Execution Vulnerability
[]
null
7.3
null
null
null
GHSA-94xh-5q62-p3f9
** DISPUTED ** PHP remote file inclusion vulnerability in common.php in PHP Photo Album allows remote attackers to execute arbitrary PHP code via a URL in the db_file parameter. NOTE: CVE disputes this vulnerability, because versions 0.3.2.6 and 0.4.1beta do not contain this file. However, it is possible that the original researcher was referring to a different product.
[]
null
null
null
null
null