id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
197k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
CVE-2023-4712
Xintian Smart Table Integrated Management System AddUpdateRole.aspx sql injection
A vulnerability, which was classified as critical, was found in Xintian Smart Table Integrated Management System 5.6.9. This affects an unknown part of the file /SysManage/AddUpdateRole.aspx. The manipulation of the argument txtRoleName leads to sql injection. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-238575. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
[ "cpe:2.3:a:suntront:smart_table_integrated_management_system:5.6.9:*:*:*:*:*:*:*" ]
null
5.5
5.5
5.2
CVE-2023-4035
Simple Blog Card < 1.31 - Contributor+ Stored XSS via Shortcode
The Simple Blog Card WordPress plugin before 1.31 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks
[ "cpe:2.3:a:riverforest-wp:simple_blog_card:*:*:*:*:*:wordpress:*:*" ]
null
5.4
null
null
CVE-2019-9170
An issue was discovered in GitLab Community and Enterprise Edition before 11.6.10, 11.7.x before 11.7.6, and 11.8.x before 11.8.1. It has Incorrect Access Control.
[ "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*" ]
null
null
5.3
5
GHSA-r5cm-rxgc-r6wf
IBM Data Studio Web Console 3.x before 3.2, Optim Performance Manager 5.x before 5.2, InfoSphere Optim Configuration Manager 2.x before 2.2, and DB2 Recovery Expert 2.x do not have an off autocomplete attribute for the login-password field, which makes it easier for remote attackers to obtain access by leveraging an unattended workstation.
[]
null
null
null
null
CVE-2024-4444
LearnPress – WordPress LMS Plugin <= 4.2.6.5 - Unauthenticated Bypass to User Registration
The LearnPress – WordPress LMS Plugin plugin for WordPress is vulnerable to bypass to user registration in versions up to, and including, 4.2.6.5. This is due to missing checks in the 'create_account' function in the checkout. This makes it possible for unauthenticated attackers to register as the default role on the site, even if registration is disabled.
[]
null
5.3
null
null
CVE-2021-46336
There is an Assertion 'opts & PARSER_CLASS_LITERAL_CTOR_PRESENT' failed at /parser/js/js-parser-expr.c(parser_parse_class_body) in JerryScript 3.0.0.
[ "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*" ]
null
5.5
null
4.3
GHSA-536p-rfrq-jwj4
Buffer overflow in EMC RSA SecurID Software Token Converter before 2.6.1 allows remote attackers to cause a denial of service or possibly execute arbitrary code via unspecified vectors.
[]
null
null
null
null
CVE-2020-18964
Cross Site Request Forgery (CSRF) Vulnerability in ForestBlog latest version via the website Management background, which could let a remote malicious gain privileges.
[ "cpe:2.3:a:forestblog_project:forestblog:2019-04-04:*:*:*:*:*:*:*" ]
null
8.8
null
6.8
CVE-2024-2469
Remote Code Execution in GitHub Enterprise Server Allowed Administrators to gain SSH access to the appliance
An attacker with an Administrator role in GitHub Enterprise Server could gain SSH root access via remote code execution. This vulnerability affected GitHub Enterprise Server version 3.8.0 and above and was fixed in version 3.8.17, 3.9.12, 3.10.9, 3.11.7 and 3.12.1. This vulnerability was reported via the GitHub Bug Bounty program.
[ "cpe:2.3:a:github:enterprise_server:-:*:*:*:*:*:*:*" ]
null
8
null
null
GHSA-x469-9qwg-89hw
A vulnerability in the web-based management interface of Cisco&nbsp;Small Business RV042 Dual WAN VPN Routers and Cisco&nbsp;Small Business RV042G Dual Gigabit WAN VPN Routers could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of the affected software. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive browser-based information.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
[]
null
6.1
null
null
GHSA-vrjq-5hcv-6mhv
Race condition in the inet_frag_intern function in net/ipv4/inet_fragment.c in the Linux kernel through 3.13.6 allows remote attackers to cause a denial of service (use-after-free error) or possibly have unspecified other impact via a large series of fragmented ICMP Echo Request packets to a system with a heavy CPU load.
[]
null
null
null
null
CVE-2023-48945
A stack overflow in openlink virtuoso-opensource v7.2.11 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
[ "cpe:2.3:a:openlinksw:virtuoso:7.2.11:*:*:*:open_source:*:*:*" ]
null
7.5
null
null
RHBA-2012:0881
Red Hat Bug Fix Advisory: freeradius bug fix and enhancement update
freeradius: does not respect expired passwords when using the unix module
[ "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2024:0948
Red Hat Security Advisory: OpenShift Container Platform 4.13.35 security update
golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding
[ "cpe:/a:redhat:openshift:4.13::el8", "cpe:/a:redhat:openshift:4.13::el9" ]
null
7.5
null
null
CVE-2015-6937
The __rds_conn_create function in net/rds/connection.c in the Linux kernel through 4.2.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" ]
null
null
null
4.9
CVE-2024-39682
WordPress Cooked Plugin - Authenticated (Contributor+) HTML Injection via Recipe Excerpt
Cooked is a recipe plugin for WordPress. The Cooked plugin for WordPress is vulnerable to HTML Injection in versions up to, and including, 1.7.15.4 due to insufficient input sanitization and output escaping. This vulnerability allows authenticated attackers with contributor-level access and above to inject arbitrary HTML in pages that will be shown whenever a user accesses a compromised page. This issue has been addressed in release version 1.8.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.
[ "cpe:2.3:a:xjsv:cooked:*:*:*:*:*:*:*:*" ]
null
6.4
null
null
GHSA-8h9g-g25c-xm92
There are multiple ways an unauthenticated attacker could perform SQL injection on WebAccess/NMS (versions prior to 3.0.2) to gain access to sensitive information.
[]
null
null
null
null
GHSA-6wxx-qjpx-w665
Multiple unknown "other problems" in the KINK dissector in Ethereal before 0.10.11 have unknown impact and attack vectors.
[]
null
null
null
null
CVE-2023-6515
IDOR in Mia Technology's Mia-Med
Authorization Bypass Through User-Controlled Key vulnerability in Mia Technology Inc. MİA-MED allows Authentication Abuse.This issue affects MİA-MED: before 1.0.7.
[ "cpe:2.3:a:miateknoloji:mia-med:*:*:*:*:*:*:*:*" ]
null
8.8
null
null
GHSA-mw3w-3jx9-mhff
In ProFTPD through 1.3.8b before cec01cc, supplemental group inheritance grants unintended access to GID 0 because of the lack of supplemental groups from mod_sql.
[]
null
7.5
null
null
GHSA-rqrm-gm9j-f8px
The d8s-xml for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. A potential code execution backdoor inserted by third parties is the democritus-utility package. The affected version of d8s-htm is 0.1.0.
[]
null
9.8
null
null
GHSA-v3wf-9r8f-h42x
An issue was discovered in osTicket before 1.10.7 and 1.12.x before 1.12.1. The Ticket creation form allows users to upload files along with queries. It was found that the file-upload functionality has fewer (or no) mitigations implemented for file content checks; also, the output is not handled properly, causing persistent XSS that leads to cookie stealing or malicious actions. For example, a non-agent user can upload a .html file, and Content-Disposition will be set to inline instead of attachment.
[]
null
null
5.4
null
CVE-2022-24171
Tenda routers G1 and G3 v15.11.0.17(9502)_CN were discovered to contain a command injection vulnerability in the function formSetPppoeServer. This vulnerability allows attackers to execute arbitrary commands via the pppoeServerIP, pppoeServerStartIP, and pppoeServerEndIP parameters.
[ "cpe:2.3:o:tendacn:g1_firmware:15.11.0.17\\(9502\\)_cn:*:*:*:*:*:*:*", "cpe:2.3:h:tendacn:g1:-:*:*:*:*:*:*:*", "cpe:2.3:o:tendacn:g3_firmware:15.11.0.17\\(9502\\)_cn:*:*:*:*:*:*:*", "cpe:2.3:h:tendacn:g3:-:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
GHSA-hf67-q588-8m5m
STDU Viewer 1.6.375 allows attackers to execute arbitrary code or cause a denial of service via a crafted .jb2 file, related to "Data from Faulting Address controls subsequent Write Address starting at STDUJBIG2File!DllGetClassObject+0x000000000000384b."
[]
null
null
7.8
null
GHSA-jhqx-5v5g-mpf3
Classpath resource disclosure in GWC Web Resource API on Windows / Tomcat
ImpactIf GeoServer is deployed in the Windows operating system using an Apache Tomcat web application server, it is possible to bypass existing input validation in the GeoWebCache ByteStreamController class and read arbitrary classpath resources with specific file name extensions.If GeoServer is also deployed as a web archive using the data directory embedded in the geoserver.war file (rather than an external data directory), it will likely be possible to read specific resources to gain administrator privileges. However, it is very unlikely that production environments will be using the embedded data directory since, depending on how GeoServer is deployed, it will be erased and re-installed (which would also reset to the default password) either every time the server restarts or every time a new GeoServer WAR is installed and is therefore difficult to maintain. An external data directory will always be used if GeoServer is running in standalone mode (via an installer or a binary).Patcheshttps://github.com/GeoWebCache/geowebcache/pull/1211WorkaroundsChange environment:Change from Windows operating system. This vulnerability depends on Windows file paths so Linux and Mac OS are not vulnerable.Change from Apache Tomcat application server. Jetty and WildFly are confirmed to not be vulnerable. Other application servers have not been tested and may be vulnerable.Disable anonymous access to the embeded GeoWebCache administration and status pages:Navigate to **Security > Authentication** PageLocate **Filter Chains** headingSelect the ``web`` filter filter chain (ant pattern ``/web/**,/gwc/rest/web/**,/``)Remove ``,/gwc/rest/web/**`` from the pattern (so that ``/web/**,/`` is left).Save the changesReferencesCVE-Pending
[]
null
7.5
null
null
GHSA-xm22-8c3w-j34x
A vulnerability was found in EyouCms up to 1.6.2. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /yxcms/index.php?r=admin/extendfield/mesedit&tabid=12&id=4 of the component HTTP POST Request Handler. The manipulation of the argument web_ico leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-225943.
[]
null
6.1
null
null
CVE-2019-2211
In createProjectionMapForQuery of TvProvider.java, there is possible SQL injection. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-135269669
[ "cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*" ]
null
7.5
null
7.8
GHSA-7gh9-pp96-5wvx
A command injection have been found in YouPHPTube Encoder. A successful attack could allow an attacker to compromise the server. Exploitable unauthenticated command injections exist in YouPHPTube Encoder 2.3 a plugin for providing encoder functionality in YouPHPTube. The parameter base64Url in /objects/getImageMP4.php is vulnerable to a command injection attack.
[]
null
9.8
null
null
GHSA-qf5q-fm5c-hc2p
In the Linux kernel, the following vulnerability has been resolved:bpftool: Fix undefined behavior in qsort(NULL, 0, ...)When netfilter has no entry to display, qsort is called with qsort(NULL, 0, ...). This results in undefined behavior, as UBSan reports:net.c:827:2: runtime error: null pointer passed as argument 1, which is declared to never be nullAlthough the C standard does not explicitly state whether calling qsort with a NULL pointer when the size is 0 constitutes undefined behavior, Section 7.1.4 of the C standard (Use of library functions) mentions:"Each of the following statements applies unless explicitly stated otherwise in the detailed descriptions that follow: If an argument to a function has an invalid value (such as a value outside the domain of the function, or a pointer outside the address space of the program, or a null pointer, or a pointer to non-modifiable storage when the corresponding parameter is not const-qualified) or a type (after promotion) not expected by a function with variable number of arguments, the behavior is undefined."To avoid this, add an early return when nf_link_info is NULL to prevent calling qsort with a NULL pointer.
[]
null
5.5
null
null
CVE-2024-11033
Denial of Service (DoS) in binary-husky/gpt_academic
A Denial of Service (DoS) vulnerability exists in the file upload feature of binary-husky/gpt_academic version 3.83. The vulnerability is due to improper handling of form-data with a large filename in the file upload request. An attacker can exploit this vulnerability by sending a payload with an excessively large filename, causing the server to become overwhelmed and unavailable for legitimate users.
[]
null
null
6.5
null
CVE-2022-21439
Vulnerability in the Oracle Solaris product of Oracle Systems (component: Kernel). Supported versions that are affected are 10 and 11. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle Solaris executes to compromise Oracle Solaris. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Solaris. CVSS 3.1 Base Score 4.2 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H).
[ "cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*", "cpe:2.3:o:oracle:solaris:11:*:*:*:*:*:*:*" ]
null
4.2
null
null
GHSA-mjwj-vr8g-j6xc
YzmCMS 3.7 has Stored XSS via the title parameter to advertisement/adver/edit.html.
[]
null
null
5.4
null
GHSA-8pr6-wgpr-wmvq
Certain NETGEAR devices are affected by command injection by an unauthenticated attacker. This affects CBR750 before 4.6.3.6, RBR750 before 3.2.17.12, RBR850 before 3.2.17.12, RBS750 before 3.2.17.12, RBS850 before 3.2.17.12, RBK752 before 3.2.17.12, and RBK852 before 3.2.17.12.
[]
null
null
null
null
GHSA-v5q2-22xg-c4g4
Multiple SQL injection vulnerabilities in RunCMS 1.4.1 allow remote attackers to execute arbitrary SQL commands via the (1) uid parameter in (a) class/sessions.class.php, and the (2) timezone_offset and (3) umode parameters in (b) class/xoopsuser.php.
[]
null
null
null
null
GHSA-7phr-5m9x-rw9q
Directory traversal in fast-http
This affects all versions of package fast-http. There is no path sanitization in the path provided at fs.readFile in index.js.
[]
null
7.5
null
null
GHSA-2cmj-fj8p-q47f
Due to missing authorization checks, any authenticated user is able to list, upload, or delete attachments to password safe entries in Pleasant Password Server before 7.8.3. To perform those actions on an entry, the user needs to know the corresponding "CredentialId" value, which uniquely identifies a password safe entry. Since "CredentialId" values are implemented as GUIDs, they are hard to guess. However, if for example an entry's owner grants read-only access to a malicious user, the value gets exposed to the malicious user. The same holds true for temporary grants.
[]
null
null
8.1
null
GHSA-cj77-3g7m-8jfm
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
[]
null
null
6.5
null
CVE-2024-57912
iio: pressure: zpa2326: fix information leak in triggered buffer
In the Linux kernel, the following vulnerability has been resolved: iio: pressure: zpa2326: fix information leak in triggered buffer The 'sample' local struct is used to push data to user space from a triggered buffer, but it has a hole between the temperature and the timestamp (u32 pressure, u16 temperature, GAP, u64 timestamp). This hole is never initialized. Initialize the struct to zero before using it to avoid pushing uninitialized information to userspace.
[]
null
7.1
null
null
CVE-2019-15514
The Privacy > Phone Number feature in the Telegram app 5.10 for Android and iOS provides an incorrect indication that the access level is Nobody, because attackers can find these numbers via the Group Info feature, e.g., by adding a significant fraction of a region's assigned phone numbers.
[ "cpe:2.3:a:telegram:telegram:5.10.0:*:*:*:*:android:*:*", "cpe:2.3:a:telegram:telegram:5.10.0:*:*:*:*:iphone_os:*:*" ]
null
null
5.3
5
CVE-2024-29116
WordPress WooThumbs for WooCommerce by Iconic plugin <= 5.5.3 - Reflected Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in IconicWP WooThumbs for WooCommerce by Iconic allows Reflected XSS.This issue affects WooThumbs for WooCommerce by Iconic: from n/a through 5.5.3.
[]
null
7.1
null
null
GHSA-c52r-r6j6-x3c5
IBM Cloud Pak System 2.3.3.6, 2.3.36 iFix1, 2.3.3.6 iFix2, 2.3.3.7, 2.3.3.7 iFix1, and 2.3.4.0 could disclose sensitive information about the system that could aid in further attacks against the system.
[]
null
5.3
null
null
GHSA-vcjj-9vg7-vf68
Null pointer dereference in TFLite
ImpactAn attacker can craft a TFLite model that would trigger a null pointer dereference, which would result in a crash and denial of service:The [implementation](https://github.com/tensorflow/tensorflow/blob/149562d49faa709ea80df1d99fc41d005b81082a/tensorflow/lite/kernels/internal/optimized/optimized_ops.h#L268-L285) unconditionally dereferences a pointer.PatchesWe have patched the issue in GitHub commit [15691e456c7dc9bd6be203b09765b063bf4a380c](https://github.com/tensorflow/tensorflow/commit/15691e456c7dc9bd6be203b09765b063bf4a380c).The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.For more informationPlease consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.AttributionThis vulnerability has been reported by Yakun Zhang of Baidu Security.
[]
8.5
7.8
null
null
RHSA-2020:2014
Red Hat Security Advisory: sqlite security update
sqlite: fts3: improve shadow table corruption detection
[ "cpe:/o:redhat:rhel_eus:7.6::computenode", "cpe:/o:redhat:rhel_eus:7.6::server" ]
null
8.8
null
null
GHSA-f679-g5v6-6qqr
Win32k Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-34449.
[]
null
7.8
null
null
GHSA-cgmp-2p2c-jgf9
Stored Cross-Site Scripting (XSS) vulnerabilities have been identified in OpenText ArcSight Logger. The vulnerabilities could be remotely exploited.
[]
null
8.1
null
null
ICSA-24-142-01
LCDS LAquis SCADA
There are multiple ways in LAquis SCADA for an attacker to access locations outside of their own directory.
[]
null
7.8
null
null
GHSA-rwcp-qrwg-56cg
Casdoor Cross-Site Request Forgery vulnerability
Casdoor v1.331.0 and below was discovered to contain a Cross-Site Request Forgery (CSRF) in the endpoint `/api/set-password`. This vulnerability allows attackers to arbitrarily change the victim user's password via supplying a crafted URL.
[]
null
6.5
null
null
GHSA-3xgj-vqg4-h895
In MITRE Caldera through 4.2.0 and 5.0.0 before 35bc06e, a Remote Code Execution (RCE) vulnerability was found in the dynamic agent (implant) compilation functionality of the server. This allows remote attackers to execute arbitrary code on the server that Caldera is running on via a crafted web request to the Caldera server API used for compiling and downloading of Caldera's Sandcat or Manx agent (implants). This web request can use the gcc -extldflags linker flag with sub-commands.
[]
null
10
null
null
GHSA-c9fv-v7xm-mfrf
NVIDIA GPU Display Driver for Windows contains a vulnerability in the kernel mode layer, where an out-of-bounds write can lead to denial of service, information disclosure, and data tampering.
[]
null
7.8
null
null
GHSA-3f8h-c4rw-wc8f
A validation issue existed in the handling of symlinks and was addressed with improved validation of symlinks. This issue is fixed in macOS Monterey 12.4. An app may be able to gain elevated privileges.
[]
null
7.8
null
null
CVE-2020-1033
Windows Kernel Information Disclosure Vulnerability
<p>An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system.</p> <p>An authenticated attacker could exploit this vulnerability by running a specially crafted application.</p> <p>The update addresses the vulnerability by correcting how the Windows kernel handles objects in memory.</p>
[ "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1803:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1803:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_1909:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_1903:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2004:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012_r2:*:*:*:*:*:*:x64:*" ]
null
4
null
null
GHSA-rx2j-whx7-3jv5
A vulnerability has been found in Campcodes Online Laundry Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /manage_receiving.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-263893 was assigned to this vulnerability.
[]
5.3
6.3
null
null
CVE-2020-5809
A stored XSS vulnerability exists in Umbraco CMS <= 8.9.1 or current. An authenticated user can inject arbitrary JavaScript code into iframes when editing content using the TinyMCE rich-text editor, as TinyMCE is configured to allow iframes by default in Umbraco CMS.
[ "cpe:2.3:a:umbraco:umbraco_cms:*:*:*:*:*:*:*:*" ]
null
5.4
null
3.5
CVE-2002-1495
Cross-site scripting (XSS) vulnerability in JAWmail 1.0-rc1 allows remote attackers to insert arbitrary script or HTML via (1) attached file names in the Read Mail feature, (2) text/html mails that are displayed in a pop-up window, and (3) certain malicious attributes within otherwise safe tags, such as onMouseOver.
[ "cpe:2.3:a:rudi_benkovic:jawmail:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:rudi_benkovic:jawmail:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:rudi_benkovic:jawmail:1.0_rc1:*:*:*:*:*:*:*" ]
null
null
null
4.3
CVE-2025-50065
Vulnerability in the Oracle GraalVM for JDK product of Oracle Java SE (component: Native Image). The supported version that is affected is Oracle GraalVM for JDK: 24.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle GraalVM for JDK. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle GraalVM for JDK. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
[]
null
3.7
null
null
CVE-2022-44463
AEM Reflected XSS Arbitrary code execution
Adobe Experience Manager version 6.5.14 (and earlier) is affected by a reflected Cross-Site Scripting (XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
[ "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:experience_manager_cloud_service:*:*:*:*:*:*:*:*" ]
null
5.4
null
null
CVE-2024-25168
SQL injection vulnerability in snow snow v.2.0.0 allows a remote attacker to execute arbitrary code via the dataScope parameter of the system/role/list interface.
[ "cpe:2.3:a:qimingjin:snow:2.0.0:*:*:*:*:*:*:*" ]
null
6.3
null
null
RHSA-2020:3981
Red Hat Security Advisory: samba security, bug fix, and enhancement update
samba: Crash after failed character conversion at log level 3 or above
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
6.5
null
null
GHSA-hp6r-93x9-m75r
Unspecified vulnerability in Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allows attackers to execute arbitrary code via a crafted image, a different vulnerability than CVE-2010-3629.
[]
null
null
null
null
CVE-2007-2332
Nortel VPN Router (aka Contivity) 1000, 2000, 4000, and 5000 before 6_05.140 uses a fixed DES key to encrypt passwords, which allows remote authenticated users to obtain a password via a brute force attack on a hash from the LDAP store.
[ "cpe:2.3:h:nortel:vpn_router_1010:*:*:*:*:*:*:*:*", "cpe:2.3:h:nortel:vpn_router_1050:*:*:*:*:*:*:*:*", "cpe:2.3:h:nortel:vpn_router_1100:*:*:*:*:*:*:*:*", "cpe:2.3:h:nortel:vpn_router_1700:*:*:*:*:*:*:*:*", "cpe:2.3:h:nortel:vpn_router_1740:*:*:*:*:*:*:*:*", "cpe:2.3:h:nortel:vpn_router_1750:*:*:*:*:*:*:*:*", "cpe:2.3:h:nortel:vpn_router_2700:*:*:*:*:*:*:*:*", "cpe:2.3:h:nortel:vpn_router_5000:*:*:*:*:*:*:*:*" ]
null
null
null
9
CVE-2009-4136
PostgreSQL 7.4.x before 7.4.27, 8.0.x before 8.0.23, 8.1.x before 8.1.19, 8.2.x before 8.2.15, 8.3.x before 8.3.9, and 8.4.x before 8.4.2 does not properly manage session-local state during execution of an index function by a database superuser, which allows remote authenticated users to gain privileges via a table with crafted index functions, as demonstrated by functions that modify (1) search_path or (2) a prepared statement, a related issue to CVE-2007-6600 and CVE-2009-3230.
[ "cpe:2.3:a:postgresql:postgresql:7.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:7.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:7.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:7.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:7.4.5:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:7.4.6:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:7.4.7:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:7.4.8:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:7.4.9:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:7.4.10:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:7.4.11:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:7.4.12:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:7.4.13:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:7.4.14:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:7.4.15:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:7.4.16:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:7.4.17:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:7.4.18:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:7.4.19:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:7.4.20:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:7.4.21:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:7.4.22:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:7.4.23:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:7.4.24:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:7.4.25:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:7.4.26:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.0.13:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.0.14:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.0.15:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.0.16:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.0.17:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.0.18:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.0.19:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.0.20:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.0.21:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.0.22:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.1.8:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.1.9:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.1.10:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.1.11:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.1.12:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.1.13:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.1.14:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.1.15:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.1.16:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.1.17:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.1.18:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.2:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.2.7:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.2.8:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.2.9:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.2.10:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.2.11:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.2.12:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.2.13:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.2.14:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.3.6:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.3.7:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.3.8:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.4.1:*:*:*:*:*:*:*" ]
null
null
null
6.5
CVE-2024-41997
An issue was discovered in version of Warp Terminal prior to 2024.07.18 (v0.2024.07.16.08.02). A command injection vulnerability exists in the Docker integration functionality. An attacker can create a specially crafted hyperlink using the `warp://action/docker/open_subshell` intent that when clicked by the victim results in command execution on the victim's machine.
[ "cpe:2.3:a:warp_terminal:warp_terminal:*:*:*:*:*:*:*:*" ]
null
6.6
null
null
CVE-2021-33459
An issue was discovered in yasm version 1.3.0. There is a NULL pointer dereference in nasm_parser_directive() in modules/parsers/nasm/nasm-parse.c.
[ "cpe:2.3:a:tortall:yasm:1.3.0:*:*:*:*:*:*:*" ]
null
5.5
null
null
GHSA-5xh6-wwgj-xqh4
Insufficiently protected credentials in the Intel(R) Team Blue mobile application in all versions may allow an authenticated user to potentially enable information disclosure via local access.
[]
null
5.5
null
null
GHSA-55gw-qcg5-xjrx
client/mount.cifs.c in mount.cifs in smbfs in Samba 3.0.22, 3.0.28a, 3.2.3, 3.3.2, 3.4.0, and 3.4.5 allows local users to mount a CIFS share on an arbitrary mountpoint, and gain privileges, via a symlink attack on the mountpoint directory file.
[]
null
null
null
null
GHSA-cmc8-222c-vqp9
Mattermost failed to properly validate that the channel that comes from the sync message is a shared channel
Mattermost versions 9.9.x <= 9.9.0, 9.5.x <= 9.5.6, 9.7.x <= 9.7.5 and 9.8.x <= 9.8.1 fail to properly validate that the channel that comes from the sync message is a shared channel, when shared channels are enabled, which allows a malicious remote to add users to arbitrary teams and channels
[]
9.3
8.7
null
null
GHSA-84v3-8746-q3rg
Man-in-the-middle (MitM) attack vulnerability in non-Mac OS agents in McAfee (now Intel Security) Agent (MA) 4.8.0 patch 2 and earlier allows attackers to make a McAfee Agent talk with another, possibly rogue, ePO server via McAfee Agent migration to another ePO server.
[]
null
null
5.3
null
GHSA-j63r-9mhq-4rr3
In deliverOnFlushComplete of LocationProviderManager.java, there is a possible way to bypass background activity launch restrictions due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12 Android-12L Android-13Android ID: A-235823542
[]
null
7.8
null
null
GHSA-q2jc-h887-p28w
Cross-Site Request Forgery (CSRF) vulnerability in Swashata WP Category Post List Widget.This issue affects WP Category Post List Widget: from n/a through 2.0.3.
[]
null
4.3
null
null
CVE-2005-3267
Integer overflow in Skype client before 1.4.x.84 on Windows, before 1.3.x.17 on Mac OS, before 1.2.x.18 on Linux, and 1.1.x.6 and earlier allows remote attackers to cause a denial of service (crash) via crafted network data with a large Object Counter value, which leads to a resultant heap-based buffer overflow.
[ "cpe:2.3:a:skype_technologies:skype:0.92.0.12:*:linux:*:*:*:*:*", "cpe:2.3:a:skype_technologies:skype:0.93.0.3:*:linux:*:*:*:*:*", "cpe:2.3:a:skype_technologies:skype:0.98.0.04:*:*:*:*:*:*:*", "cpe:2.3:a:skype_technologies:skype:1.0.0.1:*:linux:*:*:*:*:*", "cpe:2.3:a:skype_technologies:skype:1.0.0.7:*:linux:*:*:*:*:*", "cpe:2.3:a:skype_technologies:skype:1.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:skype_technologies:skype:1.0.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:skype_technologies:skype:1.0.0.18:*:*:*:*:*:*:*", "cpe:2.3:a:skype_technologies:skype:1.0.0.29:*:*:*:*:*:*:*", "cpe:2.3:a:skype_technologies:skype:1.0.0.94:*:*:*:*:*:*:*", "cpe:2.3:a:skype_technologies:skype:1.0.0.97:*:*:*:*:*:*:*", "cpe:2.3:a:skype_technologies:skype:1.0.0.100:*:*:*:*:*:*:*", "cpe:2.3:a:skype_technologies:skype:1.1.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:skype_technologies:skype:1.1.0.20:*:linux:*:*:*:*:*", "cpe:2.3:a:skype_technologies:skype:1.1.06:*:pocket_pc:*:*:*:*:*", "cpe:2.3:a:skype_technologies:skype:1.2.0.17:*:linux:*:*:*:*:*", "cpe:2.3:a:skype_technologies:skype:1.3.0.16:*:mac_os_x:*:*:*:*:*", "cpe:2.3:a:skype_technologies:skype:1.4.0.83:*:*:*:*:*:*:*" ]
null
null
null
10
CVE-2025-46530
WordPress Hacklog Remote Attachment <= 1.3.2 - Cross Site Request Forgery (CSRF) Vulnerability
Cross-Site Request Forgery (CSRF) vulnerability in HuangYe WuDeng Hacklog Remote Attachment allows Stored XSS. This issue affects Hacklog Remote Attachment: from n/a through 1.3.2.
[]
null
7.1
null
null
CVE-2023-49256
Predictable encryption passphrase used in publicly accessible configuration file
It is possible to download the configuration backup without authorization and decrypt included passwords using hardcoded static key.
[ "cpe:2.3:o:hongdian:h8951-4g-esp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hongdian:h8951-4g-esp:-:*:*:*:*:*:*:*" ]
null
7.5
null
null
CVE-2022-47975
The DUBAI module has a double free vulnerability. Successful exploitation of this vulnerability may affect system availability.
[ "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*" ]
null
7.5
null
null
GHSA-94v7-5fr6-w7f8
A Cross-site Scripting issue was discovered in Geovap Reliance SCADA Version 4.7.3 Update 2 and prior. This vulnerability could allow an unauthenticated attacker to inject arbitrary code.
[]
null
6.1
null
null
GHSA-4xv9-3gx8-hvhx
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in ioannup Code Generate allows Reflected XSS.This issue affects Code Generate: from n/a through 1.0.
[]
null
7.1
null
null
CVE-2015-1060
Open redirect vulnerability in lib/Cake/Controller/Controller.php in AdaptCMS 3.0.3 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the HTTP Referer header.
[ "cpe:2.3:a:insanevisions:adaptcms:3.0.3:*:*:*:*:*:*:*" ]
null
null
null
5.8
RHSA-2013:0733
Red Hat Security Advisory: JBoss Enterprise Portal Platform 5.2.2 security update
Portal: Cross Site Request Forgery
[ "cpe:/a:redhat:jboss_enterprise_portal_platform:5.2.2" ]
null
null
null
null
GHSA-w9p3-2qgf-68g5
Unknown vulnerability in the AUTH_DES authentication for RPC in Solaris 2.5.1, 2.6, and 7, SGI IRIX 6.5 to 6.5.19f, and possibly other platforms, allows remote attackers to gain privileges.
[]
null
null
null
null
RHSA-2008:0860
Red Hat Security Advisory: ipa security update
IPA Kerberos master password disclosure
[ "cpe:/a:redhat:enterprise_ipa:1.0" ]
null
null
null
null
GHSA-rfhm-xwgj-v2q9
Several XML External Entity (XXE) vulnerabilities in the Moog EXO Series EXVF5C-2 and EXVP7C2-3 units allow remote unauthenticated users to read arbitrary files via a crafted Document Type Definition (DTD) in an XML request.
[]
null
null
null
null
CVE-2025-2832
mingyuefusu 明月复苏 tushuguanlixitong 图书管理系统 cross-site request forgery
A vulnerability was found in mingyuefusu 明月复苏 tushuguanlixitong 图书管理系统 up to d4836f6b49cd0ac79a4021b15ce99ff7229d4694 and classified as problematic. This issue affects some unknown processing. The manipulation leads to cross-site request forgery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
[]
5.3
4.3
4.3
5
CVE-2016-5349
The high level operating systems (HLOS) was not providing sufficient memory address information to ensure that secure applications inside Qualcomm Secure Execution Environment (QSEE) only write to legitimate memory ranges related to the QSEE secure application's HLOS client. When secure applications inside Qualcomm Secure Execution Environment (QSEE) receive memory addresses from a high level operating system (HLOS) such as Linux Android, those address have previously been verified as belonging to HLOS memory space rather than QSEE memory space, but they were not verified to be from HLOS user space rather than kernel space. This lack of verification could lead to privilege escalation within the HLOS.
[ "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*" ]
null
null
5.5
4.3
CVE-2023-42046
PDF-XChange Editor J2K File Parsing Uninitialized Variable Information Disclosure Vulnerability
PDF-XChange Editor J2K File Parsing Uninitialized Variable Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of J2K files. The issue results from the lack of proper initialization of memory prior to accessing it. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-20907.
[ "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:-:*:*:*:*:*:*:*" ]
null
null
3.3
null
CVE-2019-18859
Digi AnywhereUSB 14 allows XSS via a link for the Digi Page.
[ "cpe:2.3:o:digi:anywhereusb\\/14_firmware:1.93.21.19:*:*:*:*:*:*:*", "cpe:2.3:h:digi:anywhereusb\\/14:-:*:*:*:*:*:*:*" ]
null
6.1
null
4.3
CVE-2022-20770
ClamAV CHM File Parsing Denial of Service Vulnerability Affecting Cisco Products: April 2022
On April 20, 2022, the following vulnerability in the ClamAV scanning library versions 0.103.5 and earlier and 0.104.2 and earlier was disclosed: A vulnerability in CHM file parser of Clam AntiVirus (ClamAV) versions 0.104.0 through 0.104.2 and LTS version 0.103.5 and prior versions could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. For a description of this vulnerability, see the ClamAV blog. This advisory will be updated as additional information becomes available.
[ "cpe:2.3:a:clamav:clamav:*:*:*:*:lts:*:*:*", "cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_endpoint:*:*:*:*:*:macos:*:*", "cpe:2.3:a:cisco:secure_endpoint:*:*:*:*:*:linux:*:*", "cpe:2.3:a:cisco:secure_endpoint:*:*:*:*:*:windows:*:*", "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" ]
null
8.6
null
null
GHSA-qpwp-g5pp-85x7
An elevation of privilege vulnerability in Mediaserver could enable a local malicious application to execute arbitrary code within the context of a privileged process. This issue is rated as High because it could be used to gain local access to elevated capabilities, which are not normally accessible to a third-party application. Product: Android. Versions: 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1. Android ID: A-32660278.
[]
null
null
7.8
null
CVE-2005-4009
Multiple SQL injection vulnerabilities in PHP Lite Calendar Express 2.2 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) cid and (2) catid parameters to (a) day.php, (b) week.php, (c) month.php, and (d) year.php.
[ "cpe:2.3:a:php_lite:calendar_express:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:php_lite:calendar_express:2.2:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-9cx7-5w9f-75jq
Cross-site scripting (XSS) vulnerability in censura.php in Censura 1.16.04 allows remote attackers to inject arbitrary web script or HTML via the itemid parameter in a details action.
[]
null
null
null
null
GHSA-7v9h-r86q-xxf7
GoodTech SMTP Server 5.14 allows remote attackers to cause a denial of service (application crash) via a RCPT TO command with an invalid argument, as demonstrated using an "A" character.
[]
null
null
null
null
CVE-2022-0852
There is a flaw in convert2rhel. convert2rhel passes the Red Hat account password to subscription-manager via the command line, which could allow unauthorized users locally on the machine to view the password via the process command line via e.g. htop or ps. The specific impact varies upon the privileges of the Red Hat account in question, but it could affect the integrity, availability, and/or data confidentiality of other systems that are administered by that account. This occurs regardless of how the password is supplied to convert2rhel.
[ "cpe:2.3:a:convert2rhel_project:convert2rhel:*:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*" ]
null
5.5
null
null
RHSA-2008:0210
Red Hat Security Advisory: java-1.5.0-ibm security update
java-1.5.0 Privilege escalation via unstrusted applet and application Untrusted applet and application XSLT processing privilege escalation Buffer overflow security vulnerabilities in Java Web Start (CVE-2008-1189, CVE-2008-1190) Buffer overflow security vulnerabilities in Java Web Start (CVE-2008-1189, CVE-2008-1190) Buffer overflow security vulnerabilities in Java Web Start (CVE-2008-1189, CVE-2008-1190) Java Plugin same-origin-policy bypass JRE image parsing library allows privilege escalation (CVE-2008-1194) JRE image parsing library allows privilege escalation (CVE-2008-1194) Java-API calls in untrusted Javascript allow network privilege escalation Buffer overflow security vulnerabilities in Java Web Start
[ "cpe:/a:redhat:rhel_extras:4", "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server" ]
null
null
null
null
GHSA-fvg9-44pc-6w5x
platform/graphics/filters/FEColorMatrix.cpp in the SVG implementation in Blink, as used in Google Chrome before 43.0.2357.65, does not properly handle an insufficient number of values in an feColorMatrix filter, which allows remote attackers to cause a denial of service (container overflow) or possibly have unspecified other impact via a crafted document.
[]
null
null
null
null
CVE-2021-42699
AzeoTech DAQFactory
The affected product is vulnerable to cookie information being transmitted as cleartext over HTTP. An attacker can capture network traffic, obtain the user’s cookie and take over the account.
[ "cpe:2.3:a:azeotech:daqfactory:*:*:*:*:*:*:*:*", "cpe:2.3:a:azeotech:daqfactory:18.1:build_2347:*:*:*:*:*:*" ]
null
5.7
null
null
GHSA-8h9m-8gm6-f3r9
PY Software Active Webcam WebServer (webcam.exe) 5.5 allows remote attackers to determine the existence of files via an HTTP request with a full pathname, which produces different messages whether the file exists or not.
[]
null
null
null
null
GHSA-xj4g-c5mp-4x9c
Microsoft Host Integration Server (HIS) 2004 SP1, 2006 SP1, 2009, and 2010 allows remote attackers to cause a denial of service (SNA Server service outage) via crafted TCP or UDP traffic, aka "Endless Loop DoS in snabase.exe Vulnerability."
[]
null
null
null
null
CVE-2021-43804
Out-of-bounds read when parsing RTCP BYE message in PJSIP
PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In affected versions if the incoming RTCP BYE message contains a reason's length, this declared length is not checked against the actual received packet size, potentially resulting in an out-of-bound read access. This issue affects all users that use PJMEDIA and RTCP. A malicious actor can send a RTCP BYE message with an invalid reason length. Users are advised to upgrade as soon as possible. There are no known workarounds.
[ "cpe:2.3:a:teluu:pjsip:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*" ]
null
7.3
null
null
CVE-2020-2728
Vulnerability in the Identity Manager product of Oracle Fusion Middleware (component: OIM - LDAP user and role Synch). The supported version that is affected is 12.2.1.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Identity Manager. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Identity Manager accessible data. CVSS 3.0 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
[ "cpe:2.3:a:oracle:identity_manager:12.2.1.3.0:*:*:*:*:*:*:*" ]
null
null
7.5
null
CVE-2011-0751
Directory traversal vulnerability in nhttpd (aka Nostromo webserver) before 1.9.4 allows remote attackers to execute arbitrary programs or read arbitrary files via a ..%2f (encoded dot dot slash) in a URI.
[ "cpe:2.3:a:nazgul:nostromo:*:*:*:*:*:*:*:*", "cpe:2.3:a:nazgul:nostromo:0.1:*:*:*:*:*:*:*", "cpe:2.3:a:nazgul:nostromo:0.2:*:*:*:*:*:*:*", "cpe:2.3:a:nazgul:nostromo:0.3:*:*:*:*:*:*:*", "cpe:2.3:a:nazgul:nostromo:0.4:*:*:*:*:*:*:*", "cpe:2.3:a:nazgul:nostromo:0.5:*:*:*:*:*:*:*", "cpe:2.3:a:nazgul:nostromo:0.6:*:*:*:*:*:*:*", "cpe:2.3:a:nazgul:nostromo:0.7:*:*:*:*:*:*:*", "cpe:2.3:a:nazgul:nostromo:0.8:*:*:*:*:*:*:*", "cpe:2.3:a:nazgul:nostromo:0.9:*:*:*:*:*:*:*", "cpe:2.3:a:nazgul:nostromo:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:nazgul:nostromo:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:nazgul:nostromo:1.2:*:*:*:*:*:*:*", "cpe:2.3:a:nazgul:nostromo:1.3:*:*:*:*:*:*:*", "cpe:2.3:a:nazgul:nostromo:1.4:*:*:*:*:*:*:*", "cpe:2.3:a:nazgul:nostromo:1.5:*:*:*:*:*:*:*", "cpe:2.3:a:nazgul:nostromo:1.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:nazgul:nostromo:1.6:*:*:*:*:*:*:*", "cpe:2.3:a:nazgul:nostromo:1.7:*:*:*:*:*:*:*", "cpe:2.3:a:nazgul:nostromo:1.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:nazgul:nostromo:1.7.2:*:*:*:*:*:*:*", "cpe:2.3:a:nazgul:nostromo:1.7.3:*:*:*:*:*:*:*", "cpe:2.3:a:nazgul:nostromo:1.7.4:*:*:*:*:*:*:*", "cpe:2.3:a:nazgul:nostromo:1.7.5:*:*:*:*:*:*:*", "cpe:2.3:a:nazgul:nostromo:1.7.6:*:*:*:*:*:*:*", "cpe:2.3:a:nazgul:nostromo:1.7.7:*:*:*:*:*:*:*", "cpe:2.3:a:nazgul:nostromo:1.7.8:*:*:*:*:*:*:*", "cpe:2.3:a:nazgul:nostromo:1.7.9:*:*:*:*:*:*:*", "cpe:2.3:a:nazgul:nostromo:1.8:*:*:*:*:*:*:*", "cpe:2.3:a:nazgul:nostromo:1.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:nazgul:nostromo:1.8.2:*:*:*:*:*:*:*", "cpe:2.3:a:nazgul:nostromo:1.8.3:*:*:*:*:*:*:*", "cpe:2.3:a:nazgul:nostromo:1.8.4:*:*:*:*:*:*:*", "cpe:2.3:a:nazgul:nostromo:1.8.5:*:*:*:*:*:*:*", "cpe:2.3:a:nazgul:nostromo:1.8.6:*:*:*:*:*:*:*", "cpe:2.3:a:nazgul:nostromo:1.8.7:*:*:*:*:*:*:*", "cpe:2.3:a:nazgul:nostromo:1.8.8:*:*:*:*:*:*:*", "cpe:2.3:a:nazgul:nostromo:1.8.9:*:*:*:*:*:*:*", "cpe:2.3:a:nazgul:nostromo:1.9:*:*:*:*:*:*:*", "cpe:2.3:a:nazgul:nostromo:1.9.1:*:*:*:*:*:*:*", "cpe:2.3:a:nazgul:nostromo:1.9.2:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2021-20027
A buffer overflow vulnerability in SonicOS allows a remote attacker to cause a Denial of Service (DoS) by sending a specially crafted request. This vulnerability affects SonicOS Gen5, Gen6, Gen7 platforms, and SonicOSv virtual firewalls.
[ "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:nsa_2650:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:nsa_2700:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:nsa_3650:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:nsa_3700:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:nsa_4650:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:nsa_4700:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:nsa_5650:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:nsa_6650:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:nsa_6700:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:nsa_9250:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:nsa_9450:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:nsa_9650:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:tz270:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:tz270w:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:tz300:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:tz300p:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:tz300w:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:tz350:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:tz350w:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:tz370:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:tz370w:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:tz400:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:tz400w:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:tz470:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:tz470w:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:tz500:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:tz500w:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:tz570:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:tz570p:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:tz570w:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:tz600:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:tz600p:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:tz670:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:nsv_10:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:nsv_100:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:nsv_1600:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:nsv_200:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:nsv_25:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:nsv_270:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:nsv_300:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:nsv_400:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:nsv_470:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:nsv_50:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:nsv_800:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:nsv_870:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:nssp_12400:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:nssp_12800:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:nssp_13700:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:nssp_15700:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:soho_250:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:soho_250w:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:supermassive_9800:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:supermassive_9200:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:supermassive_9400:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:supermassive_9600:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:supermassive_e10200:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:supermassive_e10400:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:supermassive_e10800:-:*:*:*:*:*:*:*" ]
null
7.5
null
5
GHSA-qjf7-48q3-r5pp
An issue was discovered in the endpoint protection agent in Zoho ManageEngine Device Control Plus 10.1.2228.15. Despite configuring complete restrictions on USB pendrives, USB HDD devices, memory cards, USB connections to mobile devices, etc., it is still possible to bypass the USB restrictions by booting into Safe Mode. This allows a file to be exchanged outside the laptop/system. Safe Mode can be launched by any user (even without admin rights). Data exfiltration can occur, and also malware might be introduced onto the system.
[]
null
7.8
null
null