id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
139k
cpes
sequencelengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
CVE-2024-54133
Possible Content Security Policy bypass in Action Dispatch
Action Pack is a framework for handling and responding to web requests. There is a possible Cross Site Scripting (XSS) vulnerability in the `content_security_policy` helper starting in version 5.2.0 of Action Pack and prior to versions 7.0.8.7, 7.1.5.1, 7.2.2.1, and 8.0.0.1. Applications which set Content-Security-Policy (CSP) headers dynamically from untrusted user input may be vulnerable to carefully crafted inputs being able to inject new directives into the CSP. This could lead to a bypass of the CSP and its protection against XSS and other attacks. Versions 7.0.8.7, 7.1.5.1, 7.2.2.1, and 8.0.0.1 contain a fix. As a workaround, applications can avoid setting CSP headers dynamically from untrusted input, or can validate/sanitize that input.
[]
2.3
null
null
null
GHSA-7g8v-p8gp-3mff
A vulnerability, which was classified as critical, has been found in SourceCodester Computer Laboratory Management System 1.0. Affected by this issue is the function save_users of the file /classes/Users.php?f=save. The manipulation of the argument id leads to improper authorization. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-258914 is the identifier assigned to this vulnerability.
[]
null
5.4
null
null
CVE-2023-47793
WordPress Acme Fix Images plugin <= 1.0.0 - Broken Access Control vulnerability
Missing Authorization vulnerability in acmethemes Acme Fix Images allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Acme Fix Images: from n/a through 1.0.0.
[]
null
4.3
null
null
CVE-2016-0737
OpenStack Object Storage (Swift) before 2.4.0 does not properly close client connections, which allows remote attackers to cause a denial of service (proxy-server resource consumption) via a series of interrupted requests to a Large Object URL.
[ "cpe:2.3:a:openstack:swift:*:*:*:*:*:*:*:*" ]
null
null
7.5
5
GHSA-8chj-8rr6-cxcq
Cross-site scripting (XSS) vulnerability in acWEB 1.8 and 1.14 allows remote attackers to insert arbitrary HTML and web script via a URL, possibly via a "%db" request in a URL.
[]
null
null
null
null
CVE-2024-47328
WordPress Recover WooCommerce Cart Abandonment, Newsletter, Email Marketing, Marketing Automation By FunnelKit plugin <= 3.1.2 - SQL Injection vulnerability
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in FunnelKit Automation By Autonami allows SQL Injection.This issue affects Automation By Autonami: from n/a through 3.1.2.
[ "cpe:2.3:a:funnelkit:funnelkit_automations:*:*:*:*:*:wordpress:*:*" ]
null
7.6
null
null
CVE-2024-6086
Improper Access Control in lunary-ai/lunary
In version 1.2.7 of lunary-ai/lunary, any authenticated user, regardless of their role, can change the name of an organization due to improper access control. The function checkAccess() is not implemented, allowing users with the lowest privileges, such as the 'Prompt Editor' role, to modify organization attributes without proper authorization.
[ "cpe:2.3:a:lunary-ai:lunary:1.2.7:*:*:*:*:*:*:*", "cpe:2.3:a:lunary:lunary:1.2.7:*:*:*:*:*:*:*" ]
null
null
5.3
null
CVE-2022-20506
In onCreate of WifiDialogActivity.java, there is a missing permission check. This could lead to local escalation of privilege from a guest user with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-226133034
[ "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*" ]
null
7.8
null
null
CVE-2017-9933
Improper cache invalidation in Joomla! CMS 1.7.3 through 3.7.2 leads to disclosure of form contents.
[ "cpe:2.3:a:joomla:joomla\\!:1.7.3:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:1.7.4:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:1.7.5:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:2.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:2.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:2.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:2.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:2.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:2.5.5:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:2.5.6:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:2.5.7:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:2.5.8:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:2.5.9:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:2.5.10:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:2.5.11:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:2.5.12:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:2.5.13:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:2.5.14:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:2.5.15:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:2.5.16:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:2.5.17:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:2.5.18:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:2.5.19:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:2.5.20:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:2.5.21:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:2.5.22:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:2.5.23:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:2.5.24:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:2.5.25:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:2.5.26:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:2.5.27:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:2.5.28:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.4.0:alpha:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.4.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.4.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.4.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.4.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.4.1:rc1:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.4.1:rc2:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.4.2:rc1:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.4.5:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.4.6:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.4.7:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.4.8:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.4.8:rc:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.5.0:beta:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.5.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.5.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.5.0:beta4:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.5.0:beta5:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.5.0:rc:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.5.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.5.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.5.0:rc4:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.5.1:rc:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.6.0:alpha:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.6.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.6.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.6.0:rc:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.6.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.6.1:rc1:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.6.1:rc2:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.6.3:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.6.3:rc1:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.6.3:rc2:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.6.3:rc3:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.6.4:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.6.5:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.7.0:alpha_1:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.7.0:alpha_2:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.7.0:beta_1:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.7.0:beta_2:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.7.0:beta_3:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.7.0:beta_4:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.7.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.7.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.7.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.7.0:rc4:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.7.1:rc1:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.7.1:rc2:*:*:*:*:*:*" ]
null
null
7.5
5
GHSA-r243-xrwf-w499
The Data::Validate::IP module through 0.29 for Perl does not properly consider extraneous zero characters at the beginning of an IP address string, which (in some situations) allows attackers to bypass access control that is based on IP addresses.
[]
null
7.5
null
null
GHSA-2r3v-q9x3-7g46
Link injection in SimpleSAMLphp
BackgroundSeveral scripts part of SimpleSAMLphp display a web page with links obtained from the request parameters. This allows us to enhance usability, as the users are presented with links they can follow after completing a certain action, like logging out.DescriptionThe following scripts were not checking the URLs obtained via the HTTP request before displaying them as the target of links that the user may click on:`www/logout.php``modules/core/www/no_cookie.php`The issue allowed attackers to display links targeting a malicious website inside a trusted site running SimpleSAMLphp, due to the lack of security checks involving the `link_href` and `retryURL` HTTP parameters, respectively. The issue was resolved by including a verification of the URLs received in the request against a white list of websites specified in the `trusted.url.domains` configuration option.Affected versionsAll SimpleSAMLphp versions prior to 1.14.4.ImpactA remote attacker could craft a link pointing to a trusted website running SimpleSAMLphp, including a parameter pointing to a malicious website, and try to fool the victim into visiting that website by clicking on a link in the page presented by SimpleSAMLphp.ResolutionUpgrade to the latest version.CreditThis security issue was discovered and reported by John Page (hyp3rlinx).
[]
null
3.7
null
null
GHSA-frpg-52qc-h9c8
An issue in symphony v.3.6.3 and before allows a remote attacker to execute arbitrary code via the log4j component.
[]
null
9.8
null
null
CVE-2024-30457
WordPress MDTF plugin <= 1.3.3.1 - Cross Site Request Forgery (CSRF) vulnerability
Cross-Site Request Forgery (CSRF) vulnerability in realmag777 WordPress Meta Data and Taxonomies Filter (MDTF).This issue affects WordPress Meta Data and Taxonomies Filter (MDTF): from n/a through 1.3.3.1.
[ "cpe:2.3:a:pluginus:wordpress_meta_data_and_taxonomies_filter:*:*:*:*:*:wordpress:*:*" ]
null
4.3
null
null
RHSA-2010:0396
Red Hat Security Advisory: httpd and httpd22 security and enhancement update
httpd: mod_proxy_ajp remote temporary DoS httpd: request header information leak
[ "cpe:/a:redhat:jboss_enterprise_web_server:1::el4", "cpe:/a:redhat:jboss_enterprise_web_server:1::el5" ]
null
null
null
null
GHSA-f56r-hm9p-96h7
SWFTools commit 772e55a2 was discovered to contain a stack overflow via ImageStream::getPixel(unsigned char*) at /xpdf/Stream.cc.
[]
null
5.5
null
null
GHSA-7g57-8pfv-q7q8
Cross-Site Request Forgery (CSRF) vulnerability in Marios Alexandrou Republish Old Posts.This issue affects Republish Old Posts: from n/a through 1.21.
[]
null
4.3
null
null
CVE-2006-6824
Multiple cross-site scripting (XSS) vulnerabilities in Jim Hu and Chad Little PHP iCalendar 2.23 rc1 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) getdate parameter in (a) day.php, (b) month.php, (c) year.php, (d) week.php, (e) search.php, (f) rss/index.php, (g) print.php, and (h) preferences.php; the (2) cpath parameter in (i) day.php, (j) month.php, (k) year.php, (l) week.php, and (m) search.php; the (3) query parameter in search.php; and possibly the cpath, (4) unset, and (5) set parameters in a setcookie action in preferences.php; different vectors than CVE-2006-3319. NOTE: it was later reported that vectors b, c, and d also affect 2.24.
[ "cpe:2.3:a:php_icalendar:php_icalendar:*:*:*:*:*:*:*:*", "cpe:2.3:a:php_icalendar:php_icalendar:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:php_icalendar:php_icalendar:2.2_beta:*:*:*:*:*:*:*", "cpe:2.3:a:php_icalendar:php_icalendar:2.22:*:*:*:*:*:*:*", "cpe:2.3:a:php_icalendar:php_icalendar:2.24:*:*:*:*:*:*:*" ]
null
null
null
4.3
GHSA-xx6v-23gw-w7gq
A remote arbitrary file read vulnerability was discovered in some Aruba Instant Access Point (IAP) products in version(s): Aruba Instant 6.5.x: 6.5.4.18 and below; Aruba Instant 8.3.x: 8.3.0.14 and below; Aruba Instant 8.5.x: 8.5.0.11 and below; Aruba Instant 8.6.x: 8.6.0.7 and below; Aruba Instant 8.7.x: 8.7.1.1 and below. Aruba has released patches for Aruba Instant that address this security vulnerability.
[]
null
5.9
null
null
GHSA-xp92-74fm-xffq
Winamp 5.666 Build 3516(x86) might allow attackers to execute arbitrary code or cause a denial of service via a crafted .flv file, related to "Error Code (0xe06d7363) starting at wow64!Wow64NotifyDebugger+0x000000000000001d."
[]
null
null
7.8
null
CVE-2023-41873
WordPress SAML Single Sign On – SSO Login plugin <= 5.0.4 - Broken Access Control vulnerability
Missing Authorization vulnerability in miniOrange SAML SP Single Sign On allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects SAML SP Single Sign On: from n/a through 5.0.4.
[]
null
4.3
null
null
RHSA-2017:2473
Red Hat Security Advisory: kernel security and bug fix update
kernel: a race between inotify_handle_event() and sys_rename()
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
7.8
null
CVE-2019-2146
In libxaac, there is a possible out of bounds read due to a missing bounds check. This could lead to information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-112859714
[ "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*" ]
null
6.5
null
4.3
RHSA-2023:6837
Red Hat Security Advisory: OpenShift Container Platform 4.14.2 bug fix and security update
golang.org/x/net/html: Cross site scripting golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
[ "cpe:/a:redhat:openshift:4.14::el8", "cpe:/a:redhat:openshift:4.14::el9" ]
null
7.5
null
null
GHSA-f3h9-c3qf-pc2f
Jamf Pro before 10.28.0 allows XSS related to inventory history, aka PI-009376.
[]
null
null
null
null
CVE-2018-11271
Improper authentication can happen on Remote command handling due to inappropriate handling of events in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Wearables in MDM9206, MDM9607, MDM9650, MSM8909W, MSM8996AU, QCS605, Qualcomm 215, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 615/16/SD 415, SD 625, SD 632, SD 636, SD 650/52, SD 675, SD 712 / SD 710 / SD 670, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SDA660, SDM439, SDM630, SDM660, SM7150, Snapdragon_High_Med_2016, SXR1130
[ "cpe:2.3:o:qualcomm:mdm9206_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9206:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9607_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9607:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9650:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:msm8909w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:msm8909w:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:msm8996au:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcs605_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcs605:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qm215_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qm215:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_210_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_210:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_212_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_212:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_205_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_205:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_425_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_425:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_427_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_427:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_430_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_430:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_435_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_435:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_439_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_439:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_429_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_429:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_450_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_450:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_615_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_615:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_616_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_616:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_415_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_415:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_625_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_625:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_632_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_632:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_636_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_636:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_650_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_650:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_652_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_652:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_675_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_675:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_712_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_712:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_710_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_710:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_670_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_670:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_820_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_820:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_820a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_820a:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_835_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_835:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_845_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_845:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_850_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_850:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd855_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd855:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sda660_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sda660:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdm439_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm439:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdm630_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm630:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdm660_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm660:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm7150_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm7150:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_high_med_2016_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_high_med_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sxr1130_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sxr1130:-:*:*:*:*:*:*:*" ]
null
null
9.8
7.5
CVE-2021-44335
David Brackeen ok-file-formats 203defd is vulnerable to Buffer Overflow. When the function of the ok-file-formats project is used, a heap-buffer-overflow occurs in function ok_png_transform_scanline() in "/ok_png.c:533".
[ "cpe:2.3:a:ok-file-formats_project:ok-file-formats:2021-06-05:*:*:*:*:*:*:*" ]
null
7.8
null
6.8
GHSA-j8hx-xmv6-rgjh
SQL injection vulnerability in profil.php in Mafya Oyun Scrpti (aka Mafia Game Script) allows remote attackers to execute arbitrary SQL commands via the id parameter.
[]
null
null
null
null
GHSA-48p9-7jxv-9qm6
An elevation of privilege vulnerability in the Synaptics touchscreen driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-31968442.
[]
null
null
7
null
CVE-2020-1461
An elevation of privilege vulnerability exists when the MpSigStub.exe for Defender allows file deletion in arbitrary locations.To exploit the vulnerability, an attacker would first have to log on to the system, aka 'Microsoft Defender Elevation of Privilege Vulnerability'.
[ "cpe:2.3:a:microsoft:windows_defender:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:itanium:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:forefront_endpoint_protection_2010:-:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:security_essentials:-:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:system_center_endpoint_protection:-:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:system_center_endpoint_protection:2012:-:*:*:*:*:*:*", "cpe:2.3:a:microsoft:system_center_endpoint_protection:2012:r2:*:*:*:*:*:*" ]
null
7.1
null
3.6
CVE-2020-1211
An elevation of privilege vulnerability exists in the way that the Connected Devices Platform Service handles objects in memory, aka 'Connected Devices Platform Service Elevation of Privilege Vulnerability'.
[ "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*" ]
null
7.8
null
6.8
GHSA-8wmr-2wmx-86gh
Unspecified vulnerability in "edit submission handling" for MediaWiki 1.4.x before 1.4.10 and 1.3.x before 1.3.16 allows remote attackers to cause a denial of service (corruption of the previous submission) via a crafted URL.
[]
null
null
null
null
CVE-2023-38622
Multiple integer overflow vulnerabilities exist in the VZT facgeometry parsing functionality of GTKWave 3.3.115. A specially crafted .vzt file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the integer overflow when allocating the `len` array.
[ "cpe:2.3:a:tonybybell:gtkwave:3.3.115:*:*:*:*:*:*:*" ]
null
7.8
null
null
CVE-2022-29496
A stack-based buffer overflow vulnerability exists in the BlynkConsole.h runCommand functionality of Blynk -Library v1.0.1. A specially-crafted network request can lead to command execution. An attacker can send a network request to trigger this vulnerability.
[ "cpe:2.3:a:blynk:blynk-library:1.0.1:*:*:*:*:*:*:*" ]
null
null
9
null
GHSA-2vj4-82m3-c6h5
Buffer overflow in efax 0.9 and earlier, when installed setuid root, allows local users to execute arbitrary code via a long -x argument.
[]
null
null
null
null
CVE-2017-14634
In libsndfile 1.0.28, a divide-by-zero error exists in the function double64_init() in double64.c, which may lead to DoS when playing a crafted audio file.
[ "cpe:2.3:a:libsndfile_project:libsndfile:1.0.28:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" ]
null
null
6.5
4.3
CVE-2006-0055
The ispell_op function in ee on FreeBSD 4.10 to 6.0 uses predictable filenames and does not confirm which file is being written, which allows local users to overwrite arbitrary files via a symlink attack when ee invokes ispell.
[ "cpe:2.3:o:freebsd:freebsd:4.10:*:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:4.10:release:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:4.10:release_p8:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:4.10:releng:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:4.11:release_p3:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:4.11:releng:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:4.11:stable:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:5.0:alpha:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:5.0:release_p14:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:5.0:releng:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:5.1:*:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:5.1:alpha:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:5.1:release:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:5.1:release_p5:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:5.1:releng:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:5.2:*:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:5.2.1:release:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:5.2.1:releng:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:5.3:*:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:5.3:release:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:5.3:releng:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:5.3:stable:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:5.4:pre-release:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:5.4:release:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:5.4:releng:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:6.0:release:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:6.0:stable:*:*:*:*:*:*" ]
null
null
null
2.1
CVE-2024-9292
Bridge Core <= 3.2.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode
The Bridge Core plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'formforall' shortcode in versions up to, and including, 3.2.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
6.4
null
null
ICSMA-21-012-01
SOOIL Dana Diabecare RS Products
A hard-coded physician PIN in the physician menu of the insulin pump allows attackers with physical access to change insulin therapy settings.CVE-2020-27256 has been assigned to this vulnerability. A CVSS v3 base score of 4.6 has been calculated; the CVSS vector string is (AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N). An information disclosure vulnerability in the communication protocol of the insulin pump and its AnyDana-i and AnyDana-A mobile applications allows unauthenticated attackers to extract the pump 's keypad lock PIN via Bluetooth Low Energy.CVE-2020-27258 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N). The communication protocol of the insulin pump and its AnyDana-i and AnyDana-A mobile applications use deterministic keys, which allows unauthenticated, physically proximate attackers to brute-force the keys via Bluetooth Low Energy.CVE-2020-27264 has been assigned to this vulnerability. A CVSS v3 base score of 7.6 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L). A client-side control vulnerability in the insulin pump and its AnyDana-i and AnyDana-A mobile applications allows physically proximate attackers to bypass user authentication checks via Bluetooth Low Energy.CVE-2020-27266 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N). A client-side control vulnerability in the insulin pump and its AnyDana-i and AnyDana-A mobile applications allows physically proximate attackers to bypass checks for default PINs via Bluetooth Low Energy.CVE-2020-27268 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N). The communication protocol of the insulin pump and its AnyDana-i and AnyDana-A mobile applications lacks replay protection measures, which allows unauthenticated, physically proximate attackers to replay communication sequences via Bluetooth Low Energy.CVE-2020-27269 has been assigned to this vulnerability. A CVSS v3 base score of 5.4 has been calculated; the CVSS vector string is (AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N). The communication protocol of the insulin pump and its AnyDana-i and AnyDana-A mobile applications does not use adequate measures to protect encryption keys in transit, which allows unauthenticated, physically proximate attackers to sniff the keys via Bluetooth Low Energy.CVE-2020-27270 has been assigned to this vulnerability. A CVSS v3 base score of 5.7 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N). The communication protocol of the insulin pump and its AnyDana-i and AnyDana-A mobile applications does not use adequate measures to authenticate the pump before exchanging keys, which allows unauthenticated, physically proximate attackers to eavesdrop the keys and spoof the pump via Bluetooth Low Energy.CVE-2020-27272 has been assigned to this vulnerability. A CVSS v3 base score of 5.7 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N). The communication protocol of the insulin pump and its AnyDana-i and AnyDana-A mobile applications does not use adequate measures to authenticate the communicating entities before exchanging keys, which allows unauthenticated, physically proximate attackers to eavesdrop the authentication sequence via Bluetooth Low Energy.CVE-2020-27276 has been assigned to this vulnerability. A CVSS v3 base score of 5.7 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N).
[]
null
null
5.7
null
GHSA-47rr-8vrp-9283
Arbitrary file read vulnerability in Jenkins File System SCM Plugin
An arbitrary file read vulnerability in Jenkins File System SCM Plugin 2.1 and earlier allows attackers able to configure jobs in Jenkins to obtain the contents of any file on the Jenkins master.
[]
null
6.5
null
null
PYSEC-2022-237
null
In mistune through 2.0.2, support of inline markup is implemented by using regular expressions that can involve a high amount of backtracking on certain edge cases. This behavior is commonly named catastrophic backtracking.
[]
null
null
null
null
CVE-2019-15522
An issue was discovered in LINBIT csync2 through 2.0. csync_daemon_session in daemon.c neglects to force a failure of a hello command when the configuration requires use of SSL.
[ "cpe:2.3:a:linbit:csync2:*:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
cisco-sa-ssl-client-dos-cCrQPkA
Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software SSL/TLS Client Denial of Service Vulnerability
A vulnerability in the SSL/TLS client of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper memory management when a device initiates SSL/TLS connections. An attacker could exploit this vulnerability by ensuring that the device will connect to an SSL/TLS server that is using specific encryption parameters. A successful exploit could allow the attacker to cause the affected device to unexpectedly reload, resulting in a DoS condition. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is part of the November 2022 release of the Cisco ASA, FTD, and FMC Security Advisory Bundled publication. For a complete list of the advisories and links to them, see Cisco Event Response: November 2022 Semiannual Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication ["https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-74838"].
[]
null
7.7
null
null
GHSA-5f37-gxvh-23v6
Remote code execution in PHPMailer
ImpactThe `mailSend` function in the default `isMail` transport in PHPMailer before 5.2.18 might allow remote attackers to pass extra parameters to the mail command and consequently execute arbitrary code via a \&quot; (backslash double quote) in a crafted `Sender` property.PatchesFixed in 5.2.18WorkaroundsFilter and validate user input before passing it to internal functions.Referenceshttps://nvd.nist.gov/vuln/detail/CVE-2016-10033 Related to a follow-on issue in https://nvd.nist.gov/vuln/detail/CVE-2016-10045For more informationIf you have any questions or comments about this advisory:Open a private issue in [the PHPMailer project](https://github.com/PHPMailer/PHPMailer)
[]
null
9.8
null
null
GHSA-9mf2-hpj4-rw3r
TablePress Plugin vulnerable to Cross-site Scripting
A cross-site scripting vulnerability was found in an unknown function of the component Table Import Handler. The manipulation of the argument Import data leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
[]
null
4.8
null
null
CVE-2007-1190
Unspecified vulnerability in the EmbeddedWB Web Browser ActiveX control allows remote attackers to execute arbitrary code via unspecified vectors. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
[ "cpe:2.3:a:bsalsa:embeddedwb_web_browser:*:*:*:*:*:*:*:*" ]
null
null
null
6.8
GHSA-f2qv-vx92-pq7c
IBM Aspera Faspex 5.0.0 through 5.0.7 could allow a local user to obtain sensitive information due to improper encryption of certain data.
[]
null
2.5
null
null
GHSA-cggr-42mf-4mqj
Multiple cross-site scripting (XSS) vulnerabilities in the Internationalization module 6.x before 6.x-1.4 for Drupal allow remote authenticated users, with translate interface or administer blocks privileges, to inject arbitrary web script or HTML via (1) strings used in block translation or (2) the untranslated input.
[]
null
null
null
null
CVE-2005-4724
SQL injection vulnerability in post.php in PhpTagCool 1.0.3 allows remote attackers to execute arbitrary SQL commands via the X-Forwarded-For field in an HTTP header.
[ "cpe:2.3:a:phptagcool:phptagcool:1.0.3:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-66jg-p3fh-9w8p
Multiple unspecified vulnerabilities in the Intuit QuickBooks Online Edition ActiveX control before 10 allow remote attackers to create or overwrite arbitrary files via unspecified arguments to the (1) httpGETToFile, (2) httpPOSTFromFile, and possibly other methods, probably involving path traversal vulnerabilities in exposed dangerous methods. NOTE: this can be leveraged for code execution by writing to a Startup folder.
[]
null
null
null
null
CVE-2015-3877
Skia, as used in Android before 5.1.1 LMY48T, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, aka internal bug 20723696.
[ "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*" ]
null
null
null
10
GHSA-p9vw-hw52-76qx
A vulnerability classified as critical was found in SourceCodester Gas Agency Management System. Affected by this vulnerability is an unknown functionality of the file /gasmark/assets/myimages/oneWord.php. The manipulation of the argument shell leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-206173 was assigned to this vulnerability.
[]
null
9.8
null
null
RHSA-2015:2518
Red Hat Security Advisory: java-1.5.0-ibm security update
OpenJDK: missing checks for proper initialization in ObjectStreamClass (Serialization, 8103671) OpenJDK: HttpURLConnection header restriction bypass (Libraries, 8130193) OpenJDK: java.nio Buffers integer overflow issues (Libraries, 8130891) ICU: missing boundary checks in layout engine (OpenJDK 2D, 8132042) OpenJDK: incorrect access control context used in DGCImpl (RMI, 8080688) OpenJDK: incomplete constraints enforcement by AlgorithmChecker (Security, 8131291) OpenJDK: incorrect access control context used in DGCClient (RMI, 8076413) JDK: unspecified vulnerability fixed in 6u105, 7u91 and 8u65 (Deployment) OpenJDK: insufficient proxy class checks in RemoteObjectInvocationHandler (RMI, 8076339)
[ "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server", "cpe:/a:redhat:rhel_extras:6" ]
null
null
null
null
GHSA-qjrj-cvjq-fxjr
Multiple cross-site scripting (XSS) vulnerabilities in WordPress 2.3.2 allow remote attackers to inject arbitrary web script or HTML via the (1) inviteemail parameter in an invite action to wp-admin/users.php and the (2) to parameter in a sent action to wp-admin/invites.php.
[]
null
null
null
null
CVE-2019-19259
GitLab Enterprise Edition (EE) 11.3 and later through 12.5 allows an Insecure Direct Object Reference (IDOR).
[ "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*" ]
null
4.3
null
4
CVE-2009-1911
Directory traversal vulnerability in .include/init.php (aka admin/_include/init.php) in QuiXplorer 2.3.2 and earlier, as used in TinyWebGallery (TWG) 1.7.6 and earlier, allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the lang parameter to admin/index.php.
[ "cpe:2.3:a:tinywebgallery:tinywebgallery:*:*:*:*:*:*:*:*", "cpe:2.3:a:tinywebgallery:tinywebgallery:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:tinywebgallery:tinywebgallery:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:tinywebgallery:tinywebgallery:1.01:*:*:*:*:*:*:*", "cpe:2.3:a:tinywebgallery:tinywebgallery:1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:tinywebgallery:tinywebgallery:1.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:tinywebgallery:tinywebgallery:1.02:*:*:*:*:*:*:*", "cpe:2.3:a:tinywebgallery:tinywebgallery:1.2:*:*:*:*:*:*:*", "cpe:2.3:a:tinywebgallery:tinywebgallery:1.3:*:*:*:*:*:*:*", "cpe:2.3:a:tinywebgallery:tinywebgallery:1.03:*:*:*:*:*:*:*", "cpe:2.3:a:tinywebgallery:tinywebgallery:1.3a:*:*:*:*:*:*:*", "cpe:2.3:a:tinywebgallery:tinywebgallery:1.3b:*:*:*:*:*:*:*", "cpe:2.3:a:tinywebgallery:tinywebgallery:1.3c:*:*:*:*:*:*:*", "cpe:2.3:a:tinywebgallery:tinywebgallery:1.04:*:*:*:*:*:*:*", "cpe:2.3:a:tinywebgallery:tinywebgallery:1.4:*:*:*:*:*:*:*", "cpe:2.3:a:tinywebgallery:tinywebgallery:1.4.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:tinywebgallery:tinywebgallery:1.4.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:tinywebgallery:tinywebgallery:1.4.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:tinywebgallery:tinywebgallery:1.4.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:tinywebgallery:tinywebgallery:1.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:tinywebgallery:tinywebgallery:1.4.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:tinywebgallery:tinywebgallery:1.4.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:tinywebgallery:tinywebgallery:1.4.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:tinywebgallery:tinywebgallery:1.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:tinywebgallery:tinywebgallery:1.05:*:*:*:*:*:*:*", "cpe:2.3:a:tinywebgallery:tinywebgallery:1.5:*:*:*:*:*:*:*", "cpe:2.3:a:tinywebgallery:tinywebgallery:1.5.0.1_15.08.2006:*:*:*:*:*:*:*", "cpe:2.3:a:tinywebgallery:tinywebgallery:1.5.0.2_17.08.2006:*:*:*:*:*:*:*", "cpe:2.3:a:tinywebgallery:tinywebgallery:1.5.1_03.09.2006:*:*:*:*:*:*:*", "cpe:2.3:a:tinywebgallery:tinywebgallery:1.5.2.1_20.09.2006_1000:*:*:*:*:*:*:*", "cpe:2.3:a:tinywebgallery:tinywebgallery:1.5.2.2_21.09.2006_1000:*:*:*:*:*:*:*", "cpe:2.3:a:tinywebgallery:tinywebgallery:1.5.2_17.09.2006_1000:*:*:*:*:*:*:*", "cpe:2.3:a:tinywebgallery:tinywebgallery:1.5.3.1_11.10.2006_1000:*:*:*:*:*:*:*", "cpe:2.3:a:tinywebgallery:tinywebgallery:1.5.3.2_12.10.2006_1000:*:*:*:*:*:*:*", "cpe:2.3:a:tinywebgallery:tinywebgallery:1.5.3_08.10.2006_1000:*:*:*:*:*:*:*", "cpe:2.3:a:tinywebgallery:tinywebgallery:1.5.4_13.10.2006:*:*:*:*:*:*:*", "cpe:2.3:a:tinywebgallery:tinywebgallery:1.5.5_30.10.2006_2200:*:*:*:*:*:*:*", "cpe:2.3:a:tinywebgallery:tinywebgallery:1.6:*:*:*:*:*:*:*", "cpe:2.3:a:tinywebgallery:tinywebgallery:1.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:tinywebgallery:tinywebgallery:1.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:tinywebgallery:tinywebgallery:1.6.3:*:*:*:*:*:*:*", "cpe:2.3:a:tinywebgallery:tinywebgallery:1.6.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:tinywebgallery:tinywebgallery:1.7:*:*:*:*:*:*:*", "cpe:2.3:a:tinywebgallery:tinywebgallery:1.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:tinywebgallery:tinywebgallery:1.7.2-18.04.2008:*:*:*:*:*:*:*", "cpe:2.3:a:tinywebgallery:tinywebgallery:1.7.3-12.05.2008:*:*:*:*:*:*:*", "cpe:2.3:a:tinywebgallery:tinywebgallery:1.7.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:tinywebgallery:tinywebgallery:1.7.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:tinywebgallery:tinywebgallery:1.7.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:tinywebgallery:tinywebgallery:1.7.4:*:*:*:*:*:*:*", "cpe:2.3:a:tinywebgallery:tinywebgallery:1.7.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:tinywebgallery:tinywebgallery:1.7.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:tinywebgallery:tinywebgallery:1.7.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:tinywebgallery:tinywebgallery:1.7.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:tinywebgallery:tinywebgallery:1.7.4.5:*:*:*:*:*:*:*", "cpe:2.3:a:tinywebgallery:tinywebgallery:1.7.5:*:*:*:*:*:*:*", "cpe:2.3:a:tinywebgallery:tinywebgallery:1.7.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:claudio_klingler:quixplorer:*:*:*:*:*:*:*:*", "cpe:2.3:a:claudio_klingler:quixplorer:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:claudio_klingler:quixplorer:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:claudio_klingler:quixplorer:1.2:*:*:*:*:*:*:*", "cpe:2.3:a:claudio_klingler:quixplorer:1.4:*:*:*:*:*:*:*", "cpe:2.3:a:claudio_klingler:quixplorer:1.5:*:*:*:*:*:*:*", "cpe:2.3:a:claudio_klingler:quixplorer:1.6:*:*:*:*:*:*:*", "cpe:2.3:a:claudio_klingler:quixplorer:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:claudio_klingler:quixplorer:2.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:claudio_klingler:quixplorer:2.2:*:*:*:*:*:*:*", "cpe:2.3:a:claudio_klingler:quixplorer:2.3:*:*:*:*:*:*:*", "cpe:2.3:a:claudio_klingler:quixplorer:2.3.1:*:*:*:*:*:*:*" ]
null
null
null
6.8
CVE-2023-32647
Improper access control in some Intel(R) XTU software before version 7.12.0.29 may allow an authenticated user to potentially enable escalation of privilege via local access.
[ "cpe:2.3:a:intel:extreme_tuning_utility:*:*:*:*:*:*:*:*" ]
null
6.8
null
null
GHSA-qhxw-jx34-g2pf
There is a vulnerability of unstrict input parameter verification in the audio assembly.Successful exploitation of this vulnerability may cause out-of-bounds access.
[]
null
9.8
null
null
GHSA-5pv5-vwqw-425f
A vulnerability in Juniper Networks Junos OS Evolved may allow an attacker to cause a Denial of Service (DoS) by sending a high rate of specific packets to the device, resulting in a pfemand process crash. The pfemand process is responsible for packet forwarding on the device. By continuously sending the packet flood, an attacker can repeatedly crash the pfemand process causing a sustained Denial of Service. This issue can only be triggered by traffic sent to the device. Transit traffic does not cause this issue. This issue affects all version of Junos OS Evolved prior to 19.1R1-EVO.
[]
null
null
null
null
CVE-2024-20672
.NET Denial of Service Vulnerability
.NET Denial of Service Vulnerability
[ "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*" ]
null
7.5
null
null
GHSA-j8ph-gjhc-23q8
Denial of service in "poll" in OpenBSD.
[]
null
null
null
null
GHSA-x4m4-rgq3-wf3x
A CWE-522: Insufficiently Protected Credentials vulnerability exists that could result in unwanted access to a DCE instance when performed over a network by a malicious third-party. This CVE is unique from CVE-2022-32520. Affected Products: Data Center Expert (Versions prior to V7.9.0)
[]
null
9.8
null
null
CVE-2024-25526
RuvarOA v6.01 and v12.01 were discovered to contain a SQL injection vulnerability via the project_id parameter at /ProjectManage/pm_gatt_inc.aspx.
[ "cpe:2.3:a:ruvar:ruvaroa:-:*:*:*:*:*:*:*" ]
null
8.1
null
null
CVE-2008-0919
Cross-site scripting (XSS) vulnerability in session/login.php in Open Source Security Information Management (OSSIM) 0.9.9 rc5 and earlier allows remote attackers to inject arbitrary web script or HTML via the dest parameter.
[ "cpe:2.3:a:open_source_security_information_management:os-sim:0.1alpha:*:*:*:*:*:*:*", "cpe:2.3:a:open_source_security_information_management:os-sim:0.2alpha:*:*:*:*:*:*:*", "cpe:2.3:a:open_source_security_information_management:os-sim:0.3.1alpha:*:*:*:*:*:*:*", "cpe:2.3:a:open_source_security_information_management:os-sim:0.3alpha:*:*:*:*:*:*:*", "cpe:2.3:a:open_source_security_information_management:os-sim:0.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:open_source_security_information_management:os-sim:0.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:open_source_security_information_management:os-sim:0.6:*:*:*:*:*:*:*", "cpe:2.3:a:open_source_security_information_management:os-sim:0.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:open_source_security_information_management:os-sim:0.6.3:*:*:*:*:*:*:*", "cpe:2.3:a:open_source_security_information_management:os-sim:0.7:*:*:*:*:*:*:*", "cpe:2.3:a:open_source_security_information_management:os-sim:0.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:open_source_security_information_management:os-sim:0.8:*:*:*:*:*:*:*", "cpe:2.3:a:open_source_security_information_management:os-sim:0.9:*:*:*:*:*:*:*", "cpe:2.3:a:open_source_security_information_management:os-sim:0.9.1:*:*:*:*:*:*:*", "cpe:2.3:a:open_source_security_information_management:os-sim:0.9.2:*:*:*:*:*:*:*", "cpe:2.3:a:open_source_security_information_management:os-sim:0.9.3:*:*:*:*:*:*:*", "cpe:2.3:a:open_source_security_information_management:os-sim:0.9.4:*:*:*:*:*:*:*", "cpe:2.3:a:open_source_security_information_management:os-sim:0.9.5:*:*:*:*:*:*:*", "cpe:2.3:a:open_source_security_information_management:os-sim:0.9.6:*:*:*:*:*:*:*", "cpe:2.3:a:open_source_security_information_management:os-sim:0.9.7:*:*:*:*:*:*:*", "cpe:2.3:a:open_source_security_information_management:os-sim:0.9.8:*:*:*:*:*:*:*", "cpe:2.3:a:open_source_security_information_management:os-sim:0.9.9_rc1:*:*:*:*:*:*:*", "cpe:2.3:a:open_source_security_information_management:os-sim:0.9.9_rc2:*:*:*:*:*:*:*", "cpe:2.3:a:open_source_security_information_management:os-sim:0.9.9_rc3:*:*:*:*:*:*:*", "cpe:2.3:a:open_source_security_information_management:os-sim:0.9.9_rc4:*:*:*:*:*:*:*" ]
null
null
null
4.3
GHSA-2373-h4hh-88wg
Online Diagnostic Lab Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /odlms/admin/?page=appointments/view_appointment.
[]
null
7.2
null
null
CVE-2024-23302
Couchbase Server before 7.2.4 has a private key leak in goxdcr.log.
[ "cpe:2.3:a:couchbase:couchbase_server:*:*:*:*:*:*:*:*" ]
null
7.5
null
null
CVE-2020-5336
RSA Archer, versions prior to 6.7 P1 (6.7.0.1), contain a URL injection vulnerability. An unauthenticated attacker could potentially exploit this vulnerability by tricking a victim application user to execute malicious JavaScript code on the affected system.
[ "cpe:2.3:a:rsa:archer:*:*:*:*:*:*:*:*" ]
null
4.6
null
null
GHSA-r3f3-f3vp-h6w9
The OSPF implementation on NEC IP38X, IX1000, IX2000, and IX3000 routers does not consider the possibility of duplicate Link State ID values in Link State Advertisement (LSA) packets before performing operations on the LSA database, which allows remote attackers to cause a denial of service (routing disruption) or obtain sensitive packet information via a crafted LSA packet, a related issue to CVE-2013-0149.
[]
null
null
null
null
GHSA-w6wc-j68w-9v9h
Auth. Stored Cross-Site Scripting (XSS) vulnerability in Mr.Vibe vSlider Multi Image Slider for WordPress plugin <= 4.1.2 versions.
[]
null
5.9
null
null
CVE-2021-0692
In sendBroadcastToInstaller of FirstScreenBroadcast.java, there is a possible activity launch due to an unsafe PendingIntent. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-9 Android-10Android ID: A-179289753
[ "cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*" ]
null
7.8
null
4.6
RHSA-2013:0504
Red Hat Security Advisory: dhcp security and bug fix update
dhcp: reduced expiration time of an IPv6 lease may cause dhcpd to crash
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
GHSA-xx3f-8qwx-w9mh
The (1) av-centerd SOAP service and (2) backup command in the ossim-framework service in AlienVault OSSIM before 4.6.0 allows remote attackers to execute arbitrary commands via unspecified vectors.
[]
null
null
null
null
CVE-2020-12259
rConfig 3.9.4 is vulnerable to reflected XSS. The configDevice.php file improperly validates user input. An attacker can exploit this vulnerability by crafting arbitrary JavaScript in the rid GET parameter of devicemgmnt.php.
[ "cpe:2.3:a:rconfig:rconfig:3.9.4:*:*:*:*:*:*:*" ]
null
5.4
null
3.5
CVE-2024-24459
An invalid memory access when handling the ProtocolIE_ID field of S1Setup Request messages in Athonet vEPC MME v11.4.0 allows attackers to cause a Denial of Service (DoS) to the cellular network by repeatedly initiating connections and sending a crafted payload.
[ "cpe:2.3:a:athonet:vepc_mmc:11.4.0:*:*:*:*:*:*:*" ]
null
5.9
null
null
GHSA-9vvm-hf5j-x32h
A stack-based buffer overflow exists in Juplink RX4-1500, a WiFi router, in versions 1.0.2 through 1.0.5. An authenticated attacker can exploit this vulnerability to achieve code execution as root.
[]
null
9
null
null
GHSA-w732-gjhm-9ghp
Buffer overflow in qwik-smtpd allows remote attackers to use the server as an SMTP spam relay via a long HELO command, which overwrites the adjacent localIP data buffer.
[]
null
null
null
null
CVE-2021-31194
OLE Automation Remote Code Execution Vulnerability
OLE Automation Remote Code Execution Vulnerability
[ "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1809:10.0.17134.2207:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1803:10.0.17134.2207:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1803:10.0.17134.2207:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.1935:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.1935:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.1935:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.1935:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1556:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1556:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1809:10.0.18363.1556:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_1909:10.0.18363.1556:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1809:10.0.19041.982:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2004:10.0.19041.982:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_20h2:10.0.19042.982:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_20h2:10.0.19042.982:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_server_20h2:10.0.19042.982:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.18931:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.18931:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.4401:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.4401:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.4401:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:6.1.7601.24597:sp1:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_7:6.1.7601.24598:sp1:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_7:6.1.7601.24597:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_7:6.1.7601.24598:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20017:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20017:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_rt_8.1:6.3.9600.20017:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21117:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21117:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_server_2008_r2:6.1.7601.24597:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2008_r2:6.1.7601.24598:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23347:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012_r2:6.3.9600.20017:*:*:*:*:*:x64:*" ]
null
8.8
null
null
GHSA-cx72-f838-ppm8
Race condition in the scan_get_next_rmap_item function in mm/ksm.c in the Linux kernel before 2.6.39.3, when Kernel SamePage Merging (KSM) is enabled, allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a crafted application.
[]
null
null
null
null
CVE-2011-0775
pivotx/modules/module_image.php in PivotX 2.2.2 allows remote attackers to obtain sensitive information via a non-existent file in the image parameter, which reveals the installation path in an error message. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
[ "cpe:2.3:a:pivotx:pivotx:2.2.2:*:*:*:*:*:*:*" ]
null
null
null
5
GHSA-r59g-mrhc-mh44
Unspecified vulnerability in the Core RDBMS component in Oracle Database Server 11.1.0.7, 11.2.0.3, 11.2.0.4, and 12.1.0.1 allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors related to "Advisor" and "Select Any Dictionary" privileges.
[]
null
null
null
null
CVE-2017-6444
The MikroTik Router hAP Lite 6.25 has no protection mechanism for unsolicited TCP ACK packets in the case of a fast network connection, which allows remote attackers to cause a denial of service (CPU consumption) by sending many ACK packets. After the attacker stops the exploit, the CPU usage is 100% and the router requires a reboot for normal operation.
[ "cpe:2.3:o:mikrotik:routeros:6.25:*:*:*:*:*:*:*", "cpe:2.3:h:mikrotik:router_hap_lite:-:*:*:*:*:*:*:*" ]
null
7.5
null
7.8
GHSA-hfr7-hjgv-x44h
Microsoft Outlook 2002 and 2003 allows user-assisted remote attackers to execute arbitrary code via a malformed VEVENT record in an .iCal meeting request or ICS file.
[]
null
null
null
null
GHSA-gm9v-q76h-x92w
PHP remote file inclusion vulnerability in admin/lib_action_step.php in Hot Open Tickets (HOT) 11012004_ver2f, when register_globals is enabled, allows remote attackers to include arbitrary files via the GLOBALS[CLASS_PATH] parameter. NOTE: this issue might be resultant from a global overwrite vulnerability.
[]
null
null
null
null
CVE-2023-33161
Microsoft Excel Remote Code Execution Vulnerability
Microsoft Excel Remote Code Execution Vulnerability
[ "cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:x64:*", "cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:x86:*", "cpe:2.3:a:microsoft:office:2019:*:*:*:*:macos:*:*", "cpe:2.3:a:microsoft:office:2021:*:*:*:ltsc:macos:*:*" ]
null
7.8
null
null
RHSA-2020:5622
Red Hat Security Advisory: thunderbird security update
chromium-browser: Uninitialized Use in V8 Mozilla: Heap buffer overflow in WebGL Mozilla: CSS Sanitizer performed incorrect sanitization Mozilla: Incorrect cast of StyleGenericFlexBasis resulted in a heap use-after-free Mozilla: Internal network hosts could have been probed by a malicious webpage Mozilla: The proxy.onRequest API did not catch view-source URLs Mozilla: Memory safety bugs fixed in Firefox 84 and Firefox ESR 78.6
[ "cpe:/a:redhat:rhel_eus:8.2::appstream" ]
null
8.8
6.1
null
CVE-2025-24413
Adobe Commerce | Cross-site Scripting (Stored XSS) (CWE-79)
Adobe Commerce versions 2.4.8-beta1, 2.4.7-p3, 2.4.6-p8, 2.4.5-p10, 2.4.4-p11 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. A successful attacker can abuse this to achieve session takeover, increasing the confidentiality and integrity impact as high.
[]
null
8.7
null
null
GHSA-mcvc-x6m2-v4xm
Unspecified vulnerability in the Oracle Applications Framework component in Oracle E-Business Suite 11.5.10.2, 12.0.6, 12.1.3, 12.2.2, 12.2.3, and 12.2.4 allows remote attackers to affect integrity via vectors related to LOV, a different vulnerability than CVE-2014-6539.
[]
null
null
null
null
CVE-2018-12914
A remote code execution issue was discovered in PublicCMS V4.0.20180210. An attacker can upload a ZIP archive that contains a .jsp file with a directory traversal pathname. After an unzip operation, the attacker can execute arbitrary code by visiting a .jsp URI.
[ "cpe:2.3:a:publiccms:publiccms:4.0.20180210:*:*:*:*:*:*:*" ]
null
null
9.8
7.5
GHSA-3fhf-6939-qg8p
rest-client Gem Vulnerable to Session Fixation
REST client for Ruby (aka rest-client) versions 1.6.1.a until 1.8.0 allow remote attackers to conduct session fixation attacks or obtain sensitive cookie information by leveraging passage of cookies set in a response to a redirect.
[]
null
null
9.8
null
CVE-2025-26618
SSH SFTP packet size not verified properly in Erlang OTP
Erlang is a programming language and runtime system for building massively scalable soft real-time systems with requirements on high availability. OTP is a set of Erlang libraries, which consists of the Erlang runtime system, a number of ready-to-use components mainly written in Erlang. Packet size is not verified properly for SFTP packets. As a result when multiple SSH packets (conforming to max SSH packet size) are received by ssh, they might be combined into an SFTP packet which will exceed the max allowed packet size and potentially cause large amount of memory to be allocated. Note that situation described above can only happen for successfully authenticated users after completing the SSH handshake. This issue has been patched in OTP versions 27.2.4, 26.2.5.9, and 25.3.2.18. There are no known workarounds for this vulnerability.
[]
7
null
null
null
CVE-2019-14024
Possible stack-use-after-scope issue in NFC usecase for card emulation in Snapdragon Auto, Snapdragon Industrial IOT, Snapdragon Mobile in MSM8917, MSM8953, Nicobar, QM215, Rennell, SDM429, SDM439, SDM450, SDM632, SDM670, SDM710, SDM845, SM6150, SM7150, SM8150, SM8250, SXR2130
[ "cpe:2.3:o:qualcomm:msm8917_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:msm8917:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:msm8953_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:msm8953:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:nicobar_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:nicobar:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qm215_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qm215:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:rennell_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:rennell:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdm429_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm429:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdm439_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm439:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdm450_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm450:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdm632_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm632:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdm670_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm670:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdm710_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm710:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdm845_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm845:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm6150_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm6150:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm7150_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm7150:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm8150_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm8150:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm8250_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm8250:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sxr2130_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sxr2130:-:*:*:*:*:*:*:*" ]
null
7.8
null
7.2
GHSA-4q6r-3f26-q97v
The azx_position_ok function in hda_intel.c in Linux kernel 2.6.33-rc4 and earlier, when running on the AMD780V chip set, allows context-dependent attackers to cause a denial of service (crash) via unknown manipulations that trigger a divide-by-zero error.
[]
null
null
null
null
GHSA-h3c8-6jfp-5p96
IBM TRIRIGA Application Platform 3.3 before 3.3.2.6, 3.4 before 3.4.2.3, and 3.5 before 3.5.0.1 allows remote authenticated users to obtain sensitive information by reading an error message. IBM X-Force ID: 111784.
[]
null
null
4.3
null
CVE-2016-10061
The ReadGROUP4Image function in coders/tiff.c in ImageMagick before 7.0.1-10 does not check the return value of the fputc function, which allows remote attackers to cause a denial of service (crash) via a crafted image file.
[ "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*" ]
null
6.5
null
4.3
cisco-sa-20190925-nxos-vman-cmd-inj
Cisco NX-OS Software Virtualization Manager Command Injection Vulnerability
A vulnerability in a CLI command related to the virtualization manager (VMAN) in Cisco NX-OS Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying Linux operating system with root privileges. The vulnerability is due to insufficient validation of arguments passed to a specific VMAN CLI command on an affected device. An attacker could exploit this vulnerability by including malicious input as the argument of an affected command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying Linux operating system with root privileges, which may lead to complete system compromise. An attacker would need valid administrator credentials to exploit this vulnerability. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190925-nxos-vman-cmd-inj ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190925-nxos-vman-cmd-inj"]
[]
null
null
6.7
null
GHSA-xq3c-8gqm-v648
async-graphql / async-graphql - @DOS GraphQL Nested Fragments overflow
ImpactExecuting deeply nested queries may cause stack overflow.PatchesUpgrade to `v4.0.6`
[]
null
7.5
null
null
CVE-2008-7254
Directory traversal vulnerability in includes/template-loader.php in Irmin CMS (formerly Pepsi CMS) 0.5 and 0.6 BETA2, when register_globals is enabled, allows remote attackers to include and execute arbitrary files via a .. (dot dot) in the _Root_Path parameter. NOTE: some of these details are obtained from third party information.
[ "cpe:2.3:a:ermenegildo_fiorito:irmin_cms:0.5:*:*:*:*:*:*:*", "cpe:2.3:a:ermenegildo_fiorito:irmin_cms:0.6:beta2:*:*:*:*:*:*" ]
null
null
null
6.8
RHSA-2024:6824
Red Hat Security Advisory: OpenShift Container Platform 4.16.14 security update
containers/image: digest type does not guarantee valid type golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON Bare Metal Operator: BMO can expose particularly named secrets from other namespaces via BMH CRD
[ "cpe:/a:redhat:openshift:4.16::el9" ]
null
4.9
null
null
CVE-2022-46424
An exploitable firmware modification vulnerability was discovered on the Netgear XWN5001 Powerline 500 WiFi Access Point. An attacker can conduct a MITM (Man-in-the-Middle) attack to modify the user-uploaded firmware image and bypass the CRC check, allowing attackers to execute arbitrary code or cause a Denial of Service (DoS). This affects v0.4.1.1 and earlier.
[ "cpe:2.3:o:netgear:xwn5001_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:xwn5001:-:*:*:*:*:*:*:*" ]
null
8.1
null
null
GHSA-3jh2-34x2-mr98
Unknown "front page vulnerability with Moodle servers" for Moodle before 1.3.2 has unknown impact and attack vectors.
[]
null
null
null
null
GHSA-g89m-fvmx-hp6x
Unspecified vulnerability in the DB Sharding component in Oracle Database Server 12.1.0.2 allows local users to affect integrity via unknown vectors.
[]
null
null
4.4
null