id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
139k
cpes
sequencelengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
GHSA-whjr-jj69-7prm
Malicious Package in import-mysql
This package contained malicious code. The package uploaded system information such as OS and hostname to a remote server.RecommendationRemove the package from your environment. There are no indications of further compromise.
[]
null
9.8
null
null
CVE-2009-4635
FFmpeg 0.5 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted MOV container with improperly ordered tags that cause (1) mov.c and (2) utils.c to use inconsistent codec types and identifiers, leading to processing of a video-structure pointer by the mp3 decoder, and a stack-based buffer overflow.
[ "cpe:2.3:a:ffmpeg:ffmpeg:0.5:*:*:*:*:*:*:*" ]
null
null
null
9.3
CVE-2014-6999
The Questoes OAB (aka com.pedefeijao.questoesoab) application oab_android_1.2 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[ "cpe:2.3:a:jogoeusei:questoes_oab:1.2:*:*:*:*:android:*:*" ]
null
null
null
5.4
CVE-2019-1015
An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory, aka 'Windows GDI Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2019-0968, CVE-2019-0977, CVE-2019-1009, CVE-2019-1010, CVE-2019-1011, CVE-2019-1012, CVE-2019-1013, CVE-2019-1016, CVE-2019-1046, CVE-2019-1047, CVE-2019-1048, CVE-2019-1049, CVE-2019-1050.
[ "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*" ]
null
null
6.5
4.3
GHSA-c7v8-rpjv-5f5x
VMware Workstation Pro/Player 12.x before 12.5.3 contains a security vulnerability that exists in the SVGA driver. An attacker may exploit this issue to crash the VM or trigger an out-of-bound read. Note: This issue can be triggered only when the host has no graphics card or no graphics drivers are installed.
[]
null
null
4.7
null
CVE-2021-0364
In mobile_log_d, there is a possible command injection due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Product: Android; Versions: Android-10, Android-11; Patch ID: ALPS05458478; Issue ID: ALPS05458503.
[ "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*" ]
null
6.7
null
4.6
CVE-2022-32284
Use of insufficiently random values vulnerability exists in Vnet/IP communication module VI461 of YOKOGAWA Wide Area Communication Router (WAC Router) AW810D, which may allow a remote attacker to cause denial-of-service (DoS) condition by sending a specially crafted packet.
[ "cpe:2.3:o:yokogawa:aw810d_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:yokogawa:aw810d:-:*:*:*:*:*:*:*" ]
null
7.5
null
7.8
GHSA-mg8w-w329-hc59
Bugzilla 2.16.x before 2.16.1 does not properly filter apostrophes from an email address during account creation, which allows remote attackers to execute arbitrary SQL via a SQL injection attack.
[]
null
null
null
null
CVE-2010-2452
Directory traversal vulnerability in the DCC functionality in KVIrc 3.4 and 4.0 allows remote attackers to overwrite arbitrary files via unknown vectors.
[ "cpe:2.3:a:kvirc:kvirc:3.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:kvirc:kvirc:4.0:*:*:*:*:*:*:*" ]
null
null
null
9.3
GHSA-5rgh-m6wh-gr8g
Cross-site scripting (XSS) vulnerability in index.php in Elaine Aquino Online Zone Journals (OZJournals) 1.5 allows remote attackers to inject arbitrary web script or HTML via the keywords parameter. NOTE: the provenance of this information is unknown; the details are obtained from third party information.
[]
null
null
null
null
CVE-2025-22810
WordPress Content Blocks Builder plugin <= 2.7.6 - Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in CBB Team Content Blocks Builder allows Stored XSS.This issue affects Content Blocks Builder: from n/a through 2.7.6.
[]
null
6.5
null
null
CVE-2008-4049
A certain ActiveX control in fwRemoteCfg.dll 3.3.3.1 in Friendly Technologies FriendlyPPPoE Client 3.0.0.57 allows remote attackers to execute arbitrary programs via arguments to the RunApp method.
[ "cpe:2.3:a:friendly_technologies:friendly_pppoe_client:3.0.0.57:*:*:*:*:*:*:*" ]
null
null
null
6.8
GHSA-87v8-hh3h-7p56
The sell function of a smart contract implementation for SwftCoin (SWFTC), a tradable Ethereum ERC20 token, allows a potential trap that could be used to cause financial damage to the seller, because of overflow of the multiplication of its argument amount and a manipulable variable sellPrice, aka the "tradeTrap" issue.
[]
null
null
7.5
null
RHSA-2019:0054
Red Hat Security Advisory: ansible security update
ansible: Failed tasks do not honour no_log option allowing for secrets to be disclosed in logs ansible: Inventory variables are loaded from current working directory when running ad-hoc command that can lead to code execution ansible: ansible.cfg is being read from current working directory allowing possible code execution
[ "cpe:/a:redhat:openstack:10::el7" ]
null
null
7.8
null
CVE-2011-4898
wp-admin/setup-config.php in the installation component in WordPress 3.3.1 and earlier generates different error messages for requests lacking a dbname parameter depending on whether the MySQL credentials are valid, which makes it easier for remote attackers to conduct brute-force attacks via a series of requests with different uname and pwd parameters. NOTE: the vendor disputes the significance of this issue; also, it is unclear whether providing intentionally vague error messages during installation would be reasonable from a usability perspective
[ "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:0.7:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:0.71:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:0.72:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:0.711:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:1.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:1.5.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:1.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:2.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:2.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:2.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:2.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:2.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:2.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:2.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:2.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:2.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:2.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:2.1:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:2.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:2.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:2.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:2.2:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:2.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:2.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:2.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:2.3:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:2.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:2.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:2.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:2.5:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:2.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:2.6:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:2.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:2.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:2.6.3:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:2.6.5:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:2.7:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:2.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:2.8:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:2.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:2.8.2:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:2.8.3:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:2.8.4:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:2.8.5:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:2.8.6:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:2.9:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:2.9.1:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:2.9.2:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.1:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.3:*:*:*:*:*:*:*" ]
null
null
null
5
RHSA-2020:4763
Red Hat Security Advisory: dovecot security update
dovecot: command followed by sufficient number of newlines leads to use-after-free dovecot: sending mail with empty quoted localpart leads to DoS
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
5.3
null
null
GHSA-hc9q-w29j-g2mr
eVisitorPass could allow a local attacker to gain elevated privileges on the system, caused by an error while in kiosk mode. By visiting the kiosk and typing ctrl+shift+esc, an attacker could exploit this vulnerability to open the task manager to kill the process or launch new processes on the system.
[]
null
null
7.8
null
RHSA-2007:0912
Red Hat Security Advisory: libvorbis security update
libvorbis array boundary condition Multiple libvorbis flaws (CVE-2007-4066, CVE-2007-4029) Multiple libvorbis flaws (CVE-2007-4066, CVE-2007-4029) Multiple libvorbis flaws (CVE-2007-4066, CVE-2007-4029)
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws" ]
null
null
null
null
GHSA-7jh3-xvhx-2q5v
A vulnerability has been identified in Development/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller (All versions), Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200 (All versions), Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200P (All versions), RUGGEDCOM RM1224 (All Versions < 6.4), SCALANCE M-800 (All Versions < 6.4), SCALANCE S615 (All Versions < 6.4), SCALANCE W1700 IEEE 802.11ac (All versions), SCALANCE W700 IEEE 802.11n (All versions), SCALANCE X200-4 P IRT (All Versions < V5.5.0), SCALANCE X201-3P IRT (All Versions < V5.5.0), SCALANCE X201-3P IRT PRO (All Versions < V5.5.0), SCALANCE X202-2 IRT (All Versions < V5.5.0), SCALANCE X202-2P IRT (incl. SIPLUS NET variant) (All Versions < V5.5.0), SCALANCE X202-2P IRT PRO (All Versions < V5.5.0), SCALANCE X204 IRT (All Versions < V5.5.0), SCALANCE X204 IRT PRO (All Versions < V5.5.0), SCALANCE X204-2 (incl. SIPLUS NET variant) (All versions), SCALANCE X204-2FM (All versions), SCALANCE X204-2LD (incl. SIPLUS NET variant) (All versions), SCALANCE X204-2LD TS (All versions), SCALANCE X204-2TS (All versions), SCALANCE X206-1 (All versions), SCALANCE X206-1LD (incl. SIPLUS NET variant) (All versions), SCALANCE X208 (incl. SIPLUS NET variant) (All versions), SCALANCE X208PRO (All versions), SCALANCE X212-2 (All versions), SCALANCE X212-2LD (All versions), SCALANCE X216 (All versions), SCALANCE X224 (All versions), SCALANCE X302-7EEC (All versions), SCALANCE X304-2FE (All versions), SCALANCE X306-1LDFE (All versions), SCALANCE X307-2EEC (All versions), SCALANCE X307-3 (All versions), SCALANCE X307-3LD (All versions), SCALANCE X308-2 (incl. SIPLUS NET variant) (All versions), SCALANCE X308-2LD (All versions), SCALANCE X308-2LH (All versions), SCALANCE X308-2LH+ (All versions), SCALANCE X308-2M (All versions), SCALANCE X308-2M POE (All versions), SCALANCE X308-2M TS (All versions), SCALANCE X310 (All versions), SCALANCE X310FE (All versions), SCALANCE X320-1FE (All versions), SCALANCE X320-3LDFE (All versions), SCALANCE XB-200 (All versions), SCALANCE XC-200 (All versions), SCALANCE XF-200BA (All versions), SCALANCE XF201-3P IRT (All Versions < V5.5.0), SCALANCE XF202-2P IRT (All Versions < V5.5.0), SCALANCE XF204 (All versions), SCALANCE XF204 IRT (All Versions < V5.5.0), SCALANCE XF204-2 (incl. SIPLUS NET variant) (All versions), SCALANCE XF204-2BA IRT (All Versions < V5.5.0), SCALANCE XF206-1 (All versions), SCALANCE XF208 (All versions), SCALANCE XM400 (All versions < V6.3.1), SCALANCE XP-200 (All versions), SCALANCE XR-300WG (All versions), SCALANCE XR324-12M (All versions), SCALANCE XR324-12M TS (All versions), SCALANCE XR324-4M EEC (All versions), SCALANCE XR324-4M POE (All versions), SCALANCE XR324-4M POE TS (All versions), SCALANCE XR500 (All versions < V6.3.1), SIMATIC CFU PA (All versions), SIMATIC IE/PB-LINK V3 (All versions), SIMATIC MV500 family (All versions < V3.0), SIMATIC NET CM 1542-1 (All versions), SIMATIC NET CP1616/CP1604 (All Versions >= V2.7), SIMATIC NET CP1626 (All versions), SIMATIC NET DK-16xx PN IO (All Versions >= V2.7), SIMATIC PROFINET Driver (All versions), SIMATIC Power Line Booster PLB, Base Module (MLFB: 6ES7972-5AA10-0AB0) (All versions), SIMATIC S7-1200 CPU family (incl. SIPLUS variants) (All Versions < V4.5), SIMOCODE proV Ethernet/IP (All versions < V1.1.3), SIMOCODE proV PROFINET (All versions < V2.1.3), SOFTNET-IE PNIO (All versions). Affected devices contain a vulnerability that allows an unauthenticated attacker to trigger a denial-of-service condition. The vulnerability can be triggered if a large amount of DCP reset packets are sent to the device.
[]
8.7
7.5
null
null
GHSA-4439-mj69-f3rc
The Solaris Management Console (SMC) in Sun Solaris 8 and 9 generates different 404 error messages when a file does not exist versus when a file exists but is otherwise inaccessible, which could allow remote attackers to obtain sensitive information in conjunction with a directory traversal (..) attack.
[]
null
null
null
null
CVE-2022-40425
The d8s-html for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-networking package. The affected version is 0.1.0.
[ "cpe:2.3:a:d8s-html_project:d8s-html:0.1.0:*:*:*:*:python:*:*" ]
null
9.8
null
null
CVE-2024-52559
drm/msm/gem: prevent integer overflow in msm_ioctl_gem_submit()
In the Linux kernel, the following vulnerability has been resolved: drm/msm/gem: prevent integer overflow in msm_ioctl_gem_submit() The "submit->cmd[i].size" and "submit->cmd[i].offset" variables are u32 values that come from the user via the submit_lookup_cmds() function. This addition could lead to an integer wrapping bug so use size_add() to prevent that. Patchwork: https://patchwork.freedesktop.org/patch/624696/
[]
null
5.5
null
null
GHSA-3f8r-4qwm-r7jf
Improper Authentication in Apache Traffic Control
Improper authentication is possible in Apache Traffic Control versions 3.0.0 and 3.0.1 if LDAP is enabled for login in the Traffic Ops API component. Given a username for a user that can be authenticated via LDAP, it is possible to improperly authenticate as that user without that user's correct password.
[]
null
9.8
null
null
GHSA-fgf4-56m5-8934
Microsoft Outlook 2007, Microsoft Outlook 2010, Microsoft Outlook 2013, Microsoft Outlook 2016, and Microsoft Office 2016 Click-to-Run allow an elevation of privilege vulnerability due to how the format of incoming message is validated, aka "Microsoft Outlook Elevation of Privilege Vulnerability".
[]
null
null
6.5
null
CVE-2024-1251
Tongda OA 2017 delete.php sql injection
A vulnerability classified as critical has been found in Tongda OA 2017 up to 11.10. Affected is an unknown function of the file /general/email/outbox/delete.php. The manipulation of the argument DELETE_STR leads to sql injection. The exploit has been disclosed to the public and may be used. VDB-252990 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
[ "cpe:2.3:a:tongda2000:office_anywhere_2017:*:*:*:*:*:*:*:*" ]
null
5.5
5.5
5.2
GHSA-5w24-r25p-r962
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an authenticated, remote attacker to execute arbitrary code or cause an affected device to restart unexpectedly. The vulnerabilities are due to improper validation of user-supplied input in the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system or cause the device to reload, resulting in a denial of service (DoS) condition. To exploit these vulnerabilities, an attacker would need to have valid administrator credentials on the affected device. Cisco has not released software updates that address these vulnerabilities.
[]
null
null
null
null
GHSA-4m8g-qfmv-jcqg
IBM Robotic Process Automation for Cloud Pak 20.12 through 21.0.3 is vulnerable to broken access control. A user is not correctly redirected to the platform log out screen when logging out of IBM RPA for Cloud Pak. IBM X-Force ID: 239081.
[]
null
8.8
null
null
GHSA-6c4v-4rmp-px63
In the Linux kernel, the following vulnerability has been resolved:wifi: iwlegacy: Clear stale interrupts before resuming deviceiwl4965 fails upon resume from hibernation on my laptop. The reason seems to be a stale interrupt which isn't being cleared out before interrupts are enabled. We end up with a race beween the resume trying to bring things back up, and the restart work (queued form the interrupt handler) trying to bring things down. Eventually the whole thing blows up.Fix the problem by clearing out any stale interrupts before interrupts get enabled during resume.Here's a debug log of the indicent: [ 12.042589] ieee80211 phy0: il_isr ISR inta 0x00000080, enabled 0xaa00008b, fh 0x00000000 [ 12.042625] ieee80211 phy0: il4965_irq_tasklet inta 0x00000080, enabled 0x00000000, fh 0x00000000 [ 12.042651] iwl4965 0000:10:00.0: RF_KILL bit toggled to enable radio. [ 12.042653] iwl4965 0000:10:00.0: On demand firmware reload [ 12.042690] ieee80211 phy0: il4965_irq_tasklet End inta 0x00000000, enabled 0xaa00008b, fh 0x00000000, flags 0x00000282 [ 12.052207] ieee80211 phy0: il4965_mac_start enter [ 12.052212] ieee80211 phy0: il_prep_station Add STA to driver ID 31: ff:ff:ff:ff:ff:ff [ 12.052244] ieee80211 phy0: il4965_set_hw_ready hardware ready [ 12.052324] ieee80211 phy0: il_apm_init Init card's basic functions [ 12.052348] ieee80211 phy0: il_apm_init L1 Enabled; Disabling L0S [ 12.055727] ieee80211 phy0: il4965_load_bsm Begin load bsm [ 12.056140] ieee80211 phy0: il4965_verify_bsm Begin verify bsm [ 12.058642] ieee80211 phy0: il4965_verify_bsm BSM bootstrap uCode image OK [ 12.058721] ieee80211 phy0: il4965_load_bsm BSM write complete, poll 1 iterations [ 12.058734] ieee80211 phy0: __il4965_up iwl4965 is coming up [ 12.058737] ieee80211 phy0: il4965_mac_start Start UP work done. [ 12.058757] ieee80211 phy0: __il4965_down iwl4965 is going down [ 12.058761] ieee80211 phy0: il_scan_cancel_timeout Scan cancel timeout [ 12.058762] ieee80211 phy0: il_do_scan_abort Not performing scan to abort [ 12.058765] ieee80211 phy0: il_clear_ucode_stations Clearing ucode stations in driver [ 12.058767] ieee80211 phy0: il_clear_ucode_stations No active stations found to be cleared [ 12.058819] ieee80211 phy0: _il_apm_stop Stop card, put in low power state [ 12.058827] ieee80211 phy0: _il_apm_stop_master stop master [ 12.058864] ieee80211 phy0: il4965_clear_free_frames 0 frames on pre-allocated heap on clear. [ 12.058869] ieee80211 phy0: Hardware restart was requested [ 16.132299] iwl4965 0000:10:00.0: START_ALIVE timeout after 4000ms. [ 16.132303] ------------[ cut here ]------------ [ 16.132304] Hardware became unavailable upon resume. This could be a software issue prior to suspend or a hardware issue. [ 16.132338] WARNING: CPU: 0 PID: 181 at net/mac80211/util.c:1826 ieee80211_reconfig+0x8f/0x14b0 [mac80211] [ 16.132390] Modules linked in: ctr ccm sch_fq_codel xt_tcpudp xt_multiport xt_state iptable_filter iptable_nat nf_nat nf_conntrack nf_defrag_ipv4 ip_tables x_tables binfmt_misc joydev mousedev btusb btrtl btintel btbcm bluetooth ecdh_generic ecc iTCO_wdt i2c_dev iwl4965 iwlegacy coretemp snd_hda_codec_analog pcspkr psmouse mac80211 snd_hda_codec_generic libarc4 sdhci_pci cqhci sha256_generic sdhci libsha256 firewire_ohci snd_hda_intel snd_intel_dspcfg mmc_core snd_hda_codec snd_hwdep firewire_core led_class iosf_mbi snd_hda_core uhci_hcd lpc_ich crc_itu_t cfg80211 ehci_pci ehci_hcd snd_pcm usbcore mfd_core rfkill snd_timer snd usb_common soundcore video parport_pc parport intel_agp wmi intel_gtt backlight e1000e agpgart evdev [ 16.132456] CPU: 0 UID: 0 PID: 181 Comm: kworker/u8:6 Not tainted 6.11.0-cl+ #143 [ 16.132460] Hardware name: Hewlett-Packard HP Compaq 6910p/30BE, BIOS 68MCU Ver. F.19 07/06/2010 [ 16.132463] Workqueue: async async_run_entry_fn [ 16.132469] RIP: 0010:ieee80211_reconfig+0x8f/0x14b0 [mac80211] [ 16.132501] Code: da 02 00 0 ---truncated---
[]
null
7
null
null
RHSA-2015:0009
Red Hat Security Advisory: kernel security update
kernel: x86: local privesc due to bad_iret and paranoid entry incompatibility
[ "cpe:/o:redhat:rhel_els:4::as", "cpe:/o:redhat:rhel_els:4::es" ]
null
null
8.4
null
CVE-2024-0869
The Instant Images – One Click Image Uploads from Unsplash, Openverse, Pixabay and Pexels plugin for WordPress is vulnerable to unauthorized arbitrary options update due to an insufficient check that neglects to verify whether the updated option belongs to the plugin on the instant-images/license REST API endpoint in all versions up to, and including, 6.1.0. This makes it possible for authors and higher to update arbitrary options.
[ "cpe:2.3:a:connekthq:instant_images_-_one_click_unsplash_uploads:*:*:*:*:*:wordpress:*:*" ]
null
8.8
null
null
GHSA-cr4g-c387-95hx
Cross Site Scripting (XSS) vulnerability in the Registration page of the admin panel in PHPGurukul User Registration & Login and User Management System With admin panel 2.1.
[]
null
4.8
null
null
GHSA-9r2h-3hf3-rrwc
IOHIDFamily in Apple iOS before 8 and Apple TV before 7 allows attackers to execute arbitrary code in a privileged context or cause a denial of service (NULL pointer dereference) via an application that provides crafted key-mapping properties.
[]
null
null
null
null
CVE-2020-25137
An issue was discovered in Observium Professional, Enterprise & Community 20.8.10631. It is vulnerable to Cross-Site Scripting (XSS) due to the fact that it is possible to inject and store malicious JavaScript code within it. This can occur via the alert_name or alert_message parameter to the /alert_check URI.
[ "cpe:2.3:a:observium:observium:20.8.10631:*:*:*:community:*:*:*", "cpe:2.3:a:observium:observium:20.8.10631:*:*:*:enterprise:*:*:*", "cpe:2.3:a:observium:observium:20.8.10631:*:*:*:professional:*:*:*" ]
null
6.1
null
4.3
GHSA-mw3p-5j46-wxgx
Integer signedness error in CoreText in Apple OS X before 10.9.2 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted Unicode font.
[]
null
null
null
null
CVE-2024-46838
userfaultfd: don't BUG_ON() if khugepaged yanks our page table
In the Linux kernel, the following vulnerability has been resolved: userfaultfd: don't BUG_ON() if khugepaged yanks our page table Since khugepaged was changed to allow retracting page tables in file mappings without holding the mmap lock, these BUG_ON()s are wrong - get rid of them. We could also remove the preceding "if (unlikely(...))" block, but then we could reach pte_offset_map_lock() with transhuge pages not just for file mappings but also for anonymous mappings - which would probably be fine but I think is not necessarily expected.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.11:rc5:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.11:rc6:*:*:*:*:*:*" ]
null
5.5
null
null
GHSA-w77j-c5x9-mgf9
Azure RTOS GUIX Studio Remote Code Execution Vulnerability
[]
null
7.8
null
null
GHSA-mjqx-jjhg-mfxj
Improper access control in some Intel(R) QAT drivers for Windows before version 1.9.0 may allow an authenticated user to potentially enable escalation of privilege via local access.
[]
null
6.7
null
null
CVE-2018-16068
Missing validation in Mojo in Google Chrome prior to 69.0.3497.81 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*" ]
null
null
9.6
6.8
CVE-2023-23517
The issue was addressed with improved memory handling. This issue is fixed in macOS Monterey 12.6.3, macOS Ventura 13.2, watchOS 9.3, macOS Big Sur 11.7.3, Safari 16.3, tvOS 16.3, iOS 16.3 and iPadOS 16.3. Processing maliciously crafted web content may lead to arbitrary code execution.
[ "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*" ]
null
8.8
null
null
GHSA-h97q-x4cw-q828
VariCAD 7.0 is installed with world-writeable files, which allows local users to replace the VariCAD programs with a Trojan horse program.
[]
null
null
null
null
GHSA-r72x-2h45-p59x
Jenkins Digital.ai App Management Publisher Plugin vulnerable to Cross-Site Request Forgery
Jenkins Digital.ai App Management Publisher Plugin 2.6 and earlier does not perform permission checks in several HTTP endpoints.This allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.Additionally, these HTTP endpoints do not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability.
[]
null
4.2
null
null
CVE-2024-58017
printk: Fix signed integer overflow when defining LOG_BUF_LEN_MAX
In the Linux kernel, the following vulnerability has been resolved: printk: Fix signed integer overflow when defining LOG_BUF_LEN_MAX Shifting 1 << 31 on a 32-bit int causes signed integer overflow, which leads to undefined behavior. To prevent this, cast 1 to u32 before performing the shift, ensuring well-defined behavior. This change explicitly avoids any potential overflow by ensuring that the shift occurs on an unsigned 32-bit integer.
[]
null
5.5
null
null
GHSA-5g3j-g6gx-xfcg
An authentication bypass vulnerability in the CGI program of Zyxel USG/ZyWALL series firmware versions 4.20 through 4.70, USG FLEX series firmware versions 4.50 through 5.20, ATP series firmware versions 4.32 through 5.20, VPN series firmware versions 4.30 through 5.20, and NSG series firmware versions V1.20 through V1.33 Patch 4, which could allow an attacker to bypass the web authentication and obtain administrative access of the device.
[]
null
9.8
null
null
GHSA-xcwx-q3p9-3495
Cross Site Scripting vulnerability found in Typecho v.1.2.0 allows a remote attacker to execute arbitrary code viathe Post Editorparameter.
[]
null
4.8
null
null
CVE-2015-3190
With Cloud Foundry Runtime cf-release versions v209 or earlier, UAA Standalone versions 2.2.6 or earlier and Pivotal Cloud Foundry Runtime 1.4.5 or earlier the UAA logout link is susceptible to an open redirect which allows an attacker to insert malicious web page as a redirect parameter.
[ "cpe:2.3:a:cloudfoundry:cf-release:*:*:*:*:*:*:*:*", "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:*:*:*:*:*:*:*:*", "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:*:*:*:*:*:*:*:*" ]
null
6.1
null
5.8
CVE-2023-40277
An issue was discovered in OpenClinic GA 5.247.01. A Reflected Cross-Site Scripting (XSS) vulnerability has been discovered in the login.jsp message parameter.
[ "cpe:2.3:a:openclinic_ga_project:openclinic_ga:*:*:*:*:*:*:*:*" ]
null
6.1
null
null
GHSA-988v-43hf-hxp3
The Database for Contact Form 7, WPforms, Elementor forms plugin for WordPress is vulnerable to Stored Cross-Site Scripting in all versions up to, and including, 1.3.8 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
7.2
null
null
GHSA-8r5c-mgwc-qg49
An issue was discovered in Regify Regipay Client for Windows version 4.5.1.0 allows DLL hijacking: a user can trigger the execution of arbitrary code every time the product is executed.
[]
null
7.8
null
null
GHSA-qq79-32v4-8c7v
The console login resource in Atlassian Crowd before version 3.0.2 and from version 3.1.0 before version 3.1.1 allows remote attackers, who have previously obtained a user's JSESSIONID cookie, to gain access to some of the built-in and potentially third party rest resources via a session fixation vulnerability.
[]
null
null
8.1
null
CVE-2025-22563
WordPress Pretty Urls Plugin <= 1.5.4 - Cross Site Request Forgery (CSRF) vulnerability
Cross-Site Request Forgery (CSRF) vulnerability in Faaiq Pretty Url allows Cross Site Request Forgery.This issue affects Pretty Url: from n/a through 1.5.4.
[]
null
4.3
null
null
cisco-sa-20180606-prime-password-reset
Cisco Prime Collaboration Provisioning Unauthorized Password Reset Vulnerability
A vulnerability in the password reset function of Cisco Prime Collaboration Provisioning (PCP) could allow an unauthenticated, remote attacker to gain unauthorized access to an affected device. The vulnerability is due to insufficient validation of a password reset request. An attacker could exploit this vulnerability by submitting a password reset request and changing the password for any user on an affected system. An exploit could allow the attacker to gain administrative-level privileges on the affected system. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180606-prime-password-reset ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180606-prime-password-reset"]
[]
null
null
7.5
null
GHSA-hmg7-4c9c-v6g9
serendipity_moveMediaDirectory in Serendipity 2.0.3 allows remote attackers to upload and execute arbitrary PHP code because it mishandles an extensionless filename during a rename, as demonstrated by "php" as a filename.
[]
null
null
9.8
null
GHSA-48g9-8f3w-6mc2
Directory traversal vulnerability in the agentUpload servlet in ZOHO ManageEngine EventLog Analyzer 9.0 build 9002 and 8.2 build 8020 allows remote attackers to execute arbitrary code by uploading a ZIP file which contains an executable file with .. (dot dot) sequences in its name, then accessing the executable via a direct request to the file under the web root. Fixed in Build 11072.
[]
null
null
null
null
CVE-2013-5866
Unspecified vulnerability in Oracle Solaris 11.1 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Kernel.
[ "cpe:2.3:o:oracle:sunos:5.11.1:*:*:*:*:*:*:*" ]
null
null
null
5.2
GHSA-rjpg-gjcq-25gr
Cisco IOS 12.4 allows remote attackers to cause a denial of service (device crash) via a normal, properly formed SSL packet that occurs during termination of an SSL session.
[]
null
null
null
null
GHSA-rm2v-wh2x-rj6w
An SQL injection vulnerability was found in Cloudera Data Science Workbench (CDSW) 1.4.0 through 1.4.2. This would allow any authenticated user to run arbitrary queries against CDSW's internal database. The database contains user contact information, encrypted CDSW passwords (in the case of local authentication), API keys, and stored Kerberos keytabs.
[]
null
null
9.9
null
CVE-2017-9991
Heap-based buffer overflow in the xwd_decode_frame function in libavcodec/xwddec.c in FFmpeg before 2.8.12, 3.0.x before 3.0.8, 3.1.x before 3.1.8, 3.2.x before 3.2.5, and 3.3.x before 3.3.1 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted file.
[ "cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:3.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:3.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:3.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:3.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:3.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:3.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:3.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:3.1:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:3.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:3.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:3.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:3.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:3.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:3.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:3.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:3.2:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:3.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:3.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:3.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:3.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:3.3:*:*:*:*:*:*:*" ]
null
null
7.8
6.8
CVE-2022-24048
MariaDB CONNECT Storage Engine Stack-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16191.
[ "cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*", "cpe:2.3:a:mariadb:mariadb:10.8.0:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*" ]
null
null
7
null
GHSA-7w8r-57xm-qr69
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Popup Maker Popup Maker allows Stored XSS. This issue affects Popup Maker: from n/a through 1.20.2.
[]
null
6.5
null
null
GHSA-4j4v-78mf-pr9p
Adobe Experience Manager versions 6.5.18 and earlier are affected by a Cross-site Scripting (DOM-based XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
[]
null
5.4
null
null
CVE-2007-2853
The VCDAPILibApi ActiveX control in vc9api.DLL 9.0.0.57 in Virtual CD 9.0.0.2 allows remote attackers to execute arbitrary commands via a command line in the first argument to the VCDLaunchAndWait function.
[ "cpe:2.3:a:h\\+h:vcdapilibapi_activex_control:9.0.0.57:*:*:*:*:*:*:*", "cpe:2.3:a:h\\+h:virtual_cd:9.0.0.2:*:*:*:*:*:*:*" ]
null
null
null
10
CVE-2008-1549
Multiple SQL injection vulnerabilities in Aeries Browser Interface (ABI) 3.8.3.14 in Eagle Software Aries Student Information System allow remote attackers to execute arbitrary SQL commands via the (1) GrdBk parameter to GradebookOptions.asp and the (2) SchlCode variable to loginproc.asp, a different vector than CVE-2008-0942.
[ "cpe:2.3:a:aeries:aeries_student_information_system:3.8.3.14:*:*:*:*:*:*:*" ]
null
null
null
6.8
GHSA-wp4j-j8m8-qj4m
Heap-based buffer overflow in rsync before 2.5.7, when running in server mode, allows remote attackers to execute arbitrary code and possibly escape the chroot jail.
[]
null
null
null
null
CVE-2022-22045
Windows.Devices.Picker.dll Elevation of Privilege Vulnerability
Windows.Devices.Picker.dll Elevation of Privilege Vulnerability
[ "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*" ]
null
7.8
null
null
CVE-2023-3648
Mismatched Memory Management Routines in Wireshark
Kafka dissector crash in Wireshark 4.0.0 to 4.0.6 and 3.6.0 to 3.6.14 allows denial of service via packet injection or crafted capture file
[ "cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*" ]
null
5.3
null
null
CVE-2015-3220
The tlslite library before 0.4.9 for Python allows remote attackers to trigger a denial of service (runtime exception and process crash).
[ "cpe:2.3:a:tlslite_project:tlslite:*:*:*:*:*:python:*:*" ]
null
null
7.5
5
CVE-2018-4101
An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari before 11.1 is affected. iCloud before 7.4 on Windows is affected. iTunes before 12.7.4 on Windows is affected. tvOS before 11.3 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
[ "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*", "cpe:2.3:a:webkitgtk:webkitgtk\\+:*:*:*:*:*:*:*:*" ]
null
null
8.8
6.8
RHSA-2006:0329
Red Hat Security Advisory: mozilla security update
security flaw Firefox Tag Order Vulnerability security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
CVE-1999-1273
Squid Internet Object Cache 1.1.20 allows users to bypass access control lists (ACLs) by encoding the URL with hexadecimal escape sequences.
[ "cpe:2.3:a:national_science_foundation:squid_web_proxy:1.1.20:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-wx3r-hh3w-28wg
Vulnerability in the Java SE product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
[]
null
null
null
null
GHSA-3ffg-w27c-62q6
The Simple Popup Newsletter WordPress plugin is vulnerable to Reflected Cross-Site Scripting due to the use of $_SERVER['PHP_SELF'] in the ~/simple-popup-newsletter.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 1.4.7.
[]
null
null
null
null
RHSA-2023:4877
Red Hat Security Advisory: java-1.8.0-ibm security update
OpenJDK: improper handling of slash characters in URI-to-path conversion (8305312)
[ "cpe:/a:redhat:enterprise_linux:8::supplementary" ]
null
3.7
null
null
CVE-2022-44212
In GL.iNet Goodcloud 1.0, insecure design allows remote attacker to access devices' admin panel.
[ "cpe:2.3:a:gl-inet:goodcloud:*:*:*:*:*:*:*:*" ]
null
5.9
null
null
CVE-2016-3188
The _prepopulate_request_walk function in the Prepopulate module 7.x-2.x before 7.x-2.1 for Drupal allows remote attackers to modify the (1) actions, (2) container, (3) token, (4) password, (5) password_confirm, (6) text_format, or (7) markup field type, and consequently have unspecified impact, via unspecified vectors.
[ "cpe:2.3:a:prepopulate_project:prepopulate:7.x-2.0:*:*:*:*:drupal:*:*", "cpe:2.3:a:prepopulate_project:prepopulate:7.x-2.x:dev:*:*:*:drupal:*:*" ]
null
null
7.3
7.5
CVE-2020-15145
Local privilege elevation in Composer-Setup for Windows
In Composer-Setup for Windows before version 6.0.0, if the developer's computer is shared with other users, a local attacker may be able to exploit the following scenarios. 1. A local regular user may modify the existing `C:\ProgramData\ComposerSetup\bin\composer.bat` in order to get elevated command execution when composer is run by an administrator. 2. A local regular user may create a specially crafted dll in the `C:\ProgramData\ComposerSetup\bin` folder in order to get Local System privileges. See: https://itm4n.github.io/windows-server-netman-dll-hijacking. 3. If the directory of the php.exe selected by the user is not in the system path, it is added without checking that it is admin secured, as per Microsoft guidelines. See: https://msrc-blog.microsoft.com/2018/04/04/triaging-a-dll-planting-vulnerability.
[ "cpe:2.3:a:getcomposer:composer-setup:*:*:*:*:*:windows:*:*" ]
null
6.7
null
null
GHSA-cm49-f24p-g723
HTTP response splitting vulnerability in language_select.asp in ASP Nuke 0.80 allows remote attackers to spoof web content and poison web caches via CRLF ("%0d%0a") sequences in the LangCode parameter.
[]
null
null
null
null
GHSA-r6q4-ffqf-6p9j
Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083.
[]
null
8.8
null
null
CVE-2005-0225
firehol.sh in FireHOL before 1.224 creates temporary files with predictable file names, which could allow local users to overwrite arbitrary files via a symlink attack.
[ "cpe:2.3:a:firehol:firehol:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.2:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.3:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.4:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.5:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.6:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.7:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.8:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.9:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.10:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.11:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.12:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.13:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.14:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.15:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.16:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.17:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.18:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.19:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.20:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.21:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.22:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.23:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.24:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.25:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.26:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.27:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.28:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.29:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.30:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.31:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.32:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.33:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.34:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.35:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.36:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.37:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.38:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.39:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.40:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.41:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.42:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.43:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.44:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.45:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.46:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.47:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.48:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.49:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.50:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.51:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.52:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.53:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.54:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.55:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.56:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.57:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.58:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.59:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.60:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.61:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.62:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.63:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.64:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.65:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.66:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.67:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.68:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.69:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.70:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.71:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.72:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.73:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.74:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.75:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.76:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.77:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.78:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.79:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.80:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.81:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.82:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.83:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.84:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.85:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.86:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.87:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.88:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.89:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.90:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.91:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.92:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.93:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.94:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.95:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.96:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.97:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.98:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.99:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.100:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.101:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.102:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.103:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.104:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.105:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.106:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.107:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.108:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.109:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.110:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.111:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.112:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.113:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.114:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.115:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.116:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.117:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.118:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.119:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.120:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.121:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.122:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.123:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.124:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.125:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.126:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.127:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.128:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.129:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.130:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.131:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.132:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.133:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.134:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.135:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.136:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.137:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.138:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.139:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.140:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.141:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.142:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.143:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.144:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.145:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.146:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.147:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.148:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.149:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.150:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.151:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.152:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.153:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.154:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.155:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.156:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.157:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.158:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.159:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.160:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.161:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.162:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.163:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.164:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.165:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.166:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.167:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.168:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.169:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.170:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.171:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.172:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.173:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.174:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.175:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.176:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.177:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.178:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.179:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.180:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.181:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.182:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.183:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.184:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.185:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.186:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.187:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.188:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.189:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.190:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.191:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.192:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.193:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.194:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.195:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.196:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.197:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.198:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.199:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.200:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.201:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.202:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.203:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.204:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.205:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.206:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.207:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.208:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.209:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.210:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.211:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.212:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.213:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.214:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.215:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.216:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.217:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.218:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.219:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.220:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.221:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.222:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.223:*:*:*:*:*:*:*", "cpe:2.3:a:firehol:firehol:1.224:*:*:*:*:*:*:*" ]
null
null
null
2.1
GHSA-wg24-v48r-f3mm
Adobe Experience Manager versions 6.5.19 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
[]
null
5.4
null
null
GHSA-5vmp-m5v2-hx47
tough root metadata version is not checked for sequential versioning
SummaryWhen updating the root role, a TUF client must establish a trusted line of continuity to the latest set of keys. While sequentially downloading new versions of the root metadata file, tough will not check that the root object version it received was the next sequential version from the previously trusted root metadata.ImpactThe tough client will trust an outdated or rotated root role in the event that an actor with control of the storage medium of a trusted TUF repository inappropriately replaced the contents of one of the root metadata files with an adequately signed previous version. As a result, tough could trust content associated with a previous root role.Impacted versions: < v0.20.0PatchesA fix for this issue is available in tough version 0.20.0 and later. Customers are advised to upgrade to version 0.20.0 or later and ensure any forked or derivative code is patched to incorporate the new fixes.WorkaroundsThere is no recommended work around. Customers are advised to upgrade to version 0.20.0 or the latest version.ReferencesIf you have any questions or comments about this advisory we ask that you contact AWS/Amazon Security via our vulnerability reporting page [1] or directly via email to [[email protected]](mailto:[email protected]). Please do not create a public GitHub issue.[1] Vulnerability reporting page: https://aws.amazon.com/security/vulnerability-reportingAcknowledgementThese issues were identified by the [TUF-Conformance project](https://github.com/theupdateframework/tuf-conformance). We would like to thank Google for collaborating on this issue through the coordinated vulnerability disclosure process.
[]
5.7
4.2
null
null
CVE-2007-5888
Cross-site scripting (XSS) vulnerability in displayecard.php in Coppermine Photo Gallery (CPG) before 1.4.14 allows remote attackers to inject arbitrary web script or HTML via the data parameter.
[ "cpe:2.3:a:coppermine:coppermine_photo_gallery:*:*:*:*:*:*:*:*" ]
null
null
null
4.3
RHSA-2018:1641
Red Hat Security Advisory: kernel security update
hw: cpu: speculative store bypass
[ "cpe:/o:redhat:rhel_aus:6.4::server" ]
null
null
5.6
null
GHSA-jj4v-gxj5-fv6v
IBM Security QRadar Incident Forensics 7.2.x before 7.2.5 Patch 5 places session IDs in https URLs, which allows remote attackers to obtain sensitive information by reading (1) web-server access logs, (2) web-server Referer logs, or (3) the browser history.
[]
null
null
null
null
GHSA-5rx8-fj4j-9jh2
A security feature bypass exists when Windows Secure Boot improperly restricts access to debugging functionality, aka 'Windows Secure Boot Security Feature Bypass Vulnerability'.
[]
null
4.6
null
null
CVE-2022-32347
Hospital's Patient Records Management System v1.0 is vulnerable to SQL Injection via /hprms/classes/Master.php?f=delete_room.
[ "cpe:2.3:a:hospital\\'s_patient_records_management_system_project:hospital\\'s_patient_records_management_system:1.0:*:*:*:*:*:*:*" ]
null
7.2
null
6.5
RHSA-2024:1640
Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.4 Product Security and Bug Fix Update
golang: net/http/internal: Denial of Service (DoS) via Resource Consumption via HTTP requests GitPython: Blind local file inclusion axios: exposure of confidential data stored in cookies python-twisted: disordered HTTP pipeline response in twisted.web python-aiohttp: numerous issues in HTTP parser with header parsing python-cryptography: NULL-dereference when loading PKCS7 certificates golang-fips/openssl: Memory leaks in code encrypting and decrypting RSA payloads jinja2: HTML attribute injection when passing user input as keys to xmlattr filter aiohttp: follow_symlinks directory traversal vulnerability python-aiohttp: http request smuggling Django: denial-of-service in ``intcomma`` template filter python-django: Potential regular expression denial-of-service in django.utils.text.Truncator.words()
[ "cpe:/a:redhat:ansible_automation_platform:2.4::el8", "cpe:/a:redhat:ansible_automation_platform:2.4::el9", "cpe:/a:redhat:ansible_automation_platform_developer:2.4::el8", "cpe:/a:redhat:ansible_automation_platform_developer:2.4::el9", "cpe:/a:redhat:ansible_automation_platform_inside:2.4::el8", "cpe:/a:redhat:ansible_automation_platform_inside:2.4::el9" ]
null
7.5
null
null
GHSA-r6wq-vrxj-qwhf
Multiple cross-site scripting (XSS) vulnerabilities in BilboBlog 0.2.1 allow remote authenticated administrators to inject arbitrary web script or HTML via the (1) content parameter to admin/update.php, related to conflicting code in widget.php; and allow remote attackers to inject arbitrary web script or HTML via the (2) titleId parameter to head.php, reachable through index.php; the (3) t_lang[lang_copyright] parameter to footer.php; the (4) content parameter to the default URI under admin/; the (5) url, (6) t_lang[lang_admin_help], (7) t_lang[lang_admin_clear_cache], (8) t_lang[lang_admin_home], and (9) t_lang[lang_admin_logout] parameters to admin/homelink.php; and the (10) t_lang[lang_admin_new_post] parameter to admin/post.php. NOTE: some of these details are obtained from third party information.
[]
null
null
null
null
RHSA-2023:1583
Red Hat Security Advisory: nodejs:18 security, bug fix, and enhancement update
glob-parent: Regular Expression Denial of Service http-cache-semantics: Regular Expression Denial of Service (ReDoS) vulnerability Node.js: Permissions policies can be bypassed via process.mainModule Node.js: OpenSSL error handling issues in nodejs crypto library Node.js: insecure loading of ICU data through ICU_DATA environment variable Node.js: Fetch API did not protect against CRLF injection in host headers Node.js: Regular Expression Denial of Service in Headers fetch API
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.5
null
null
GHSA-x57r-7jqf-5w9p
Cross-site scripting (XSS) vulnerability in the Classic-UI with the CSV export link and pagination feature in Icinga before 1.14 allows remote attackers to inject arbitrary web script or HTML via the query string to cgi-bin/status.cgi.
[]
null
null
6.1
null
CVE-2024-5966
Grey Opaque <= 2.0.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via Download-Button Shortcode
The Grey Opaque theme for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘url’ parameter within the theme's Download-Button shortcode in all versions up to, and including, 2.0.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[ "cpe:2.3:a:grey_opaque_project:grey_opaque:*:*:*:*:*:wordpress:*:*" ]
null
6.4
null
null
CVE-2024-5130
Incorrect Authorization in lunary-ai/lunary
An Incorrect Authorization vulnerability exists in lunary-ai/lunary versions up to and including 1.2.2, which allows unauthenticated users to delete any dataset. The vulnerability is due to the lack of proper authorization checks in the dataset deletion endpoint. Specifically, the endpoint does not verify if the provided project ID belongs to the current user, thereby allowing any dataset to be deleted without proper authentication. This issue was fixed in version 1.2.8.
[ "cpe:2.3:a:lunary-ai:lunary:*:*:*:*:*:*:*:*", "cpe:2.3:a:lunary:lunary:*:*:*:*:*:*:*:*" ]
null
null
7.5
null
CVE-2024-28094
Blind SQL Injection in Chat functionality in Schoolbox
Chat functionality in Schoolbox application before version 23.1.3 is vulnerable to blind SQL Injection enabling the authenticated attackers to read, modify, and delete database records.
[]
null
8.8
null
null
CVE-2022-25238
Silverstripe silverstripe/framework through 4.10.0 allows XSS, inside of script tags that can can be added to website content via XHR by an authenticated CMS user if the cwp-core module is not installed on the sanitise_server_side contig is not set to true in project code.
[ "cpe:2.3:a:silverstripe:framework:*:*:*:*:*:*:*:*" ]
null
5.4
null
3.5
GHSA-5jx2-rp58-679c
An elevation of privilege vulnerability in libstagefright in Mediaserver could enable a local malicious application to execute arbitrary code within the context of a privileged process. This issue is rated as High because it could be used to gain local access to elevated capabilities, which are not normally accessible to a third-party application. Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1. Android ID: A-34749392.
[]
null
null
7.8
null
GHSA-vrrf-4f63-4j27
gtkutils.c in Pidgin before 2.10.8 on Windows allows user-assisted remote attackers to execute arbitrary programs via a message containing a file: URL that is improperly handled during construction of an explorer.exe command. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-3185.
[]
null
null
null
null
CVE-2018-5341
An issue was discovered in Zoho ManageEngine Desktop Central 10.0.124 and 10.0.184: a missing server-side check on the file type/extension when uploading and modifying scripts.
[ "cpe:2.3:a:zohocorp:manageengine_desktop_central:10.0.124:*:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_desktop_central:10.0.184:*:*:*:*:*:*:*" ]
null
null
9.8
7.5
CVE-2019-19909
An issue was discovered in Public Knowledge Project (PKP) pkp-lib before 3.1.2-2, as used in Open Journal Systems (OJS) before 3.1.2-2. Code injection can occur in the OJS report generator if an authenticated Journal Manager user visits a crafted URL, because unserialize is used.
[ "cpe:2.3:a:sfu:open_journal_system:*:*:*:*:*:*:*:*" ]
null
8.8
null
6.8
RHSA-2023:6246
Red Hat Security Advisory: .NET 7.0 security update
dotnet: Denial of Service with Client Certificates using .NET Kestrel
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
6.5
null
null
CVE-2021-42542
Emerson WirelessHART Gateway
The affected product is vulnerable to directory traversal due to mishandling of provided backup folder structure.
[ "cpe:2.3:o:emerson:wireless_1410_gateway_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:emerson:wireless_1410_gateway:*:*:*:*:*:*:*:*", "cpe:2.3:o:emerson:wireless_1410d_gateway_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:emerson:wireless_1410d_gateway:*:*:*:*:*:*:*:*", "cpe:2.3:o:emerson:wireless_1420_gateway_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:emerson:wireless_1420_gateway:-:*:*:*:*:*:*:*" ]
null
8
null
null
CVE-2018-3151
Vulnerability in the Oracle iProcurement component of Oracle E-Business Suite (subcomponent: E-Content Manager Catalog). Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6 and 12.2.7. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle iProcurement. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle iProcurement accessible data. CVSS 3.0 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
[ "cpe:2.3:a:oracle:iprocurement:12.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:iprocurement:12.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:iprocurement:12.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:iprocurement:12.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:iprocurement:12.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:iprocurement:12.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:iprocurement:12.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:iprocurement:12.2.7:*:*:*:*:*:*:*" ]
null
null
7.5
5