id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
139k
cpes
sequencelengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
GHSA-jqpq-72xc-xqvj
Cross-site scripting (XSS) vulnerability in zTree 3.5.19.1 and possibly earlier allows remote attackers to inject arbitrary web script or HTML via the id parameter to demo/en/asyncData/getNodesForBigData.php.
[]
null
null
null
null
GHSA-px6v-x65q-3mw6
PHP remote file inclusion vulnerability in article mode for modules.php in SocialMPN allows remote attackers to execute arbitrary PHP code by modifying the name parameter to reference a URL on a remote web server that contains the code.
[]
null
null
null
null
GHSA-xcf7-vc8w-v2qg
Data Leakage Attacks vulnerability in the web portal component when in an MDR pair in McAfee Network Security Management (NSM) 9.1 < 9.1.7.75 (Update 4) and 9.2 < 9.2.7.31 Update2 allows administrators to view configuration information in plain text format via the GUI or GUI terminal commands.
[]
null
null
4.1
null
CVE-2024-29127
WordPress Advanced Access Manager plugin <= 6.9.20 - Reflected Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in AAM Advanced Access Manager allows Reflected XSS.This issue affects Advanced Access Manager: from n/a through 6.9.20.
[]
null
7.1
null
null
GHSA-mjwx-4m98-f8cv
Cisco UCS Invicta 4.3, 4.5, and 5.0.1 on Invicta appliances and Invicta Scaling System uses the same hardcoded GnuPG encryption key across different customers' installations, which allows remote attackers to defeat cryptographic protection mechanisms by sniffing network traffic to an Autosupport server and leveraging knowledge of this key from another installation, aka Bug ID CSCur85504.
[]
null
null
7.5
null
CVE-2024-50121
nfsd: cancel nfsd_shrinker_work using sync mode in nfs4_state_shutdown_net
In the Linux kernel, the following vulnerability has been resolved: nfsd: cancel nfsd_shrinker_work using sync mode in nfs4_state_shutdown_net In the normal case, when we excute `echo 0 > /proc/fs/nfsd/threads`, the function `nfs4_state_destroy_net` in `nfs4_state_shutdown_net` will release all resources related to the hashed `nfs4_client`. If the `nfsd_client_shrinker` is running concurrently, the `expire_client` function will first unhash this client and then destroy it. This can lead to the following warning. Additionally, numerous use-after-free errors may occur as well. nfsd_client_shrinker echo 0 > /proc/fs/nfsd/threads expire_client nfsd_shutdown_net unhash_client ... nfs4_state_shutdown_net /* won't wait shrinker exit */ /* cancel_work(&nn->nfsd_shrinker_work) * nfsd_file for this /* won't destroy unhashed client1 */ * client1 still alive nfs4_state_destroy_net */ nfsd_file_cache_shutdown /* trigger warning */ kmem_cache_destroy(nfsd_file_slab) kmem_cache_destroy(nfsd_file_mark_slab) /* release nfsd_file and mark */ __destroy_client ==================================================================== BUG nfsd_file (Not tainted): Objects remaining in nfsd_file on __kmem_cache_shutdown() -------------------------------------------------------------------- CPU: 4 UID: 0 PID: 764 Comm: sh Not tainted 6.12.0-rc3+ #1 dump_stack_lvl+0x53/0x70 slab_err+0xb0/0xf0 __kmem_cache_shutdown+0x15c/0x310 kmem_cache_destroy+0x66/0x160 nfsd_file_cache_shutdown+0xac/0x210 [nfsd] nfsd_destroy_serv+0x251/0x2a0 [nfsd] nfsd_svc+0x125/0x1e0 [nfsd] write_threads+0x16a/0x2a0 [nfsd] nfsctl_transaction_write+0x74/0xa0 [nfsd] vfs_write+0x1a5/0x6d0 ksys_write+0xc1/0x160 do_syscall_64+0x5f/0x170 entry_SYSCALL_64_after_hwframe+0x76/0x7e ==================================================================== BUG nfsd_file_mark (Tainted: G B W ): Objects remaining nfsd_file_mark on __kmem_cache_shutdown() -------------------------------------------------------------------- dump_stack_lvl+0x53/0x70 slab_err+0xb0/0xf0 __kmem_cache_shutdown+0x15c/0x310 kmem_cache_destroy+0x66/0x160 nfsd_file_cache_shutdown+0xc8/0x210 [nfsd] nfsd_destroy_serv+0x251/0x2a0 [nfsd] nfsd_svc+0x125/0x1e0 [nfsd] write_threads+0x16a/0x2a0 [nfsd] nfsctl_transaction_write+0x74/0xa0 [nfsd] vfs_write+0x1a5/0x6d0 ksys_write+0xc1/0x160 do_syscall_64+0x5f/0x170 entry_SYSCALL_64_after_hwframe+0x76/0x7e To resolve this issue, cancel `nfsd_shrinker_work` using synchronous mode in nfs4_state_shutdown_net.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:*" ]
null
7.8
null
null
GHSA-7724-hcxw-879r
Aruba has identified certain configurations of ArubaOS that can lead to sensitive information disclosure from the configured ESSIDs. The scenarios in which disclosure of potentially sensitive information can occur are complex, and depend on factors beyond the control of attackers.
[]
null
5.3
null
null
CVE-2022-1420
Use of Out-of-range Pointer Offset in vim/vim
Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior to 8.2.4774.
[ "cpe:2.3:a:vim:vim:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*" ]
null
null
6.8
null
CVE-2023-26512
Apache EventMesh RabbitMQ-Connector plugin allows RCE through deserialization of untrusted data
CWE-502 Deserialization of Untrusted Data at the rabbitmq-connector plugin module in Apache EventMesh (incubating) V1.7.0\V1.8.0 on windows\linux\mac os e.g. platforms allows attackers to send controlled message and remote code execute via rabbitmq messages. Users can use the code under the master branch in project repo to fix this issue, we will release the new version as soon as possible.
[ "cpe:2.3:a:apache:eventmesh:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
9.8
null
null
GHSA-gfjj-qhgp-2fr4
The video_usercopy function in drivers/media/video/v4l2-ioctl.c in the Linux kernel before 2.6.39 relies on the count value of a v4l2_ext_controls data structure to determine a kmalloc size, which might allow local users to cause a denial of service (memory consumption) via a large value.
[]
null
null
5.5
null
GHSA-8vhf-hgr9-gmr5
Stack-based buffer underflow in the mozilla::gfx::BasePoint4d function in Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 allows remote attackers to execute arbitrary code via crafted two-dimensional graphics data that is mishandled during clipping-region calculations.
[]
null
null
8.8
null
CVE-2019-11248
Kubernetes kubelet exposes /debug/pprof info on healthz port
The debugging endpoint /debug/pprof is exposed over the unauthenticated Kubelet healthz port. The go pprof endpoint is exposed over the Kubelet's healthz port. This debugging endpoint can potentially leak sensitive information such as internal Kubelet memory addresses and configuration, or for limited denial of service. Versions prior to 1.15.0, 1.14.4, 1.13.8, and 1.12.10 are affected. The issue is of medium severity, but not exposed by the default configuration.
[ "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "cpe:2.3:a:kubernetes:kubernetes:1.13.0:-:*:*:*:*:*:*", "cpe:2.3:a:kubernetes:kubernetes:1.13.0:alpha0:*:*:*:*:*:*", "cpe:2.3:a:kubernetes:kubernetes:1.13.0:alpha1:*:*:*:*:*:*", "cpe:2.3:a:kubernetes:kubernetes:1.13.0:alpha2:*:*:*:*:*:*", "cpe:2.3:a:kubernetes:kubernetes:1.13.0:alpha3:*:*:*:*:*:*", "cpe:2.3:a:kubernetes:kubernetes:1.13.0:beta0:*:*:*:*:*:*", "cpe:2.3:a:kubernetes:kubernetes:1.13.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:kubernetes:kubernetes:1.13.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:kubernetes:kubernetes:1.13.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:kubernetes:kubernetes:1.13.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:kubernetes:kubernetes:1.13.1:-:*:*:*:*:*:*", "cpe:2.3:a:kubernetes:kubernetes:1.13.1:beta0:*:*:*:*:*:*", "cpe:2.3:a:kubernetes:kubernetes:1.13.2:-:*:*:*:*:*:*", "cpe:2.3:a:kubernetes:kubernetes:1.13.2:beta0:*:*:*:*:*:*", "cpe:2.3:a:kubernetes:kubernetes:1.13.3:-:*:*:*:*:*:*", "cpe:2.3:a:kubernetes:kubernetes:1.13.3:beta0:*:*:*:*:*:*", "cpe:2.3:a:kubernetes:kubernetes:1.13.4:-:*:*:*:*:*:*", "cpe:2.3:a:kubernetes:kubernetes:1.13.4:beta0:*:*:*:*:*:*", "cpe:2.3:a:kubernetes:kubernetes:1.13.5:-:*:*:*:*:*:*", "cpe:2.3:a:kubernetes:kubernetes:1.13.5:beta0:*:*:*:*:*:*", "cpe:2.3:a:kubernetes:kubernetes:1.13.6:-:*:*:*:*:*:*", "cpe:2.3:a:kubernetes:kubernetes:1.13.6:beta0:*:*:*:*:*:*", "cpe:2.3:a:kubernetes:kubernetes:1.13.7:-:*:*:*:*:*:*", "cpe:2.3:a:kubernetes:kubernetes:1.13.7:beta.0:*:*:*:*:*:*", "cpe:2.3:a:kubernetes:kubernetes:1.13.8:beta.0:*:*:*:*:*:*", "cpe:2.3:a:kubernetes:kubernetes:1.14.0:-:*:*:*:*:*:*", "cpe:2.3:a:kubernetes:kubernetes:1.14.0:alpha0:*:*:*:*:*:*", "cpe:2.3:a:kubernetes:kubernetes:1.14.0:alpha1:*:*:*:*:*:*", "cpe:2.3:a:kubernetes:kubernetes:1.14.0:alpha2:*:*:*:*:*:*", "cpe:2.3:a:kubernetes:kubernetes:1.14.0:alpha3:*:*:*:*:*:*", "cpe:2.3:a:kubernetes:kubernetes:1.14.0:beta0:*:*:*:*:*:*", "cpe:2.3:a:kubernetes:kubernetes:1.14.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:kubernetes:kubernetes:1.14.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:kubernetes:kubernetes:1.14.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:kubernetes:kubernetes:1.14.1:-:*:*:*:*:*:*", "cpe:2.3:a:kubernetes:kubernetes:1.14.1:beta0:*:*:*:*:*:*", "cpe:2.3:a:kubernetes:kubernetes:1.14.2:-:*:*:*:*:*:*", "cpe:2.3:a:kubernetes:kubernetes:1.14.2:beta0:*:*:*:*:*:*", "cpe:2.3:a:kubernetes:kubernetes:1.14.3:-:*:*:*:*:*:*", "cpe:2.3:a:kubernetes:kubernetes:1.14.3:beta0:*:*:*:*:*:*", "cpe:2.3:a:kubernetes:kubernetes:1.14.4:beta.0:*:*:*:*:*:*", "cpe:2.3:a:kubernetes:kubernetes:1.15.0:alpha0:*:*:*:*:*:*", "cpe:2.3:a:kubernetes:kubernetes:1.15.0:alpha1:*:*:*:*:*:*", "cpe:2.3:a:kubernetes:kubernetes:1.15.0:alpha2:*:*:*:*:*:*", "cpe:2.3:a:kubernetes:kubernetes:1.15.0:alpha3:*:*:*:*:*:*", "cpe:2.3:a:kubernetes:kubernetes:1.15.0:beta0:*:*:*:*:*:*", "cpe:2.3:a:kubernetes:kubernetes:1.15.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:kubernetes:kubernetes:1.15.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:kubernetes:kubernetes:1.15.0:rc1:*:*:*:*:*:*" ]
null
null
6.5
null
CVE-2022-45065
WordPress SEO Plugin by Squirrly SEO Plugin <= 12.1.20 is vulnerable to Cross Site Scripting (XSS)
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Squirrly SEO Plugin by Squirrly SEO plugin <= 12.1.20 versions.
[ "cpe:2.3:a:squirrly:seo_plugin_by_squirrly_seo:*:*:*:*:*:wordpress:*:*" ]
null
7.1
null
null
GHSA-mxrx-fg8p-5p5j
Bifrost vulnerable to authentication check flaw that leads to authentication bypass
ImpactThe admin and monitor user groups need to be authenticated by username and password. If we delete the X-Requested-With: XMLHttpRequest field in the request header,the authentication will be bypassed.Patcheshttps://github.com/brockercap/Bifrost/pull/201WorkaroundsUpgrade to the latest version
[]
null
8.8
null
null
CVE-2017-18729
Certain NETGEAR devices are affected by a stack-based buffer overflow by an unauthenticated attacker. This affects D6200 before 1.1.00.24, R6020 before 1.0.0.30, R6080 before 1.0.0.30, R6120 before 1.0.0.36, R6700v2 before 1.1.0.42, R6800 before 1.1.0.42, and R6900v2 before 1.1.0.42.
[ "cpe:2.3:o:netgear:d6200_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:d6200:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r6020_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r6020:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r6080_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r6080:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r6120_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r6120:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r6700_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r6700:v2:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r6800_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r6800:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r6900_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r6900:v2:*:*:*:*:*:*:*" ]
null
null
8.8
null
ICSA-22-298-07
Delta Electronics InfraSuite Device Master
Delta Electronics InfraSuite Device Master versions 00.00.01a and prior deserialize user-supplied data provided through the Device-DataCollect service port without proper verification. An attacker could provide malicious serialized objects to execute arbitrary code upon deserialization. CVE-2022-41778 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). Delta Electronics InfraSuite Device Master versions 00.00.01a and prior deserialize user-supplied data provided through the Device-Gateway service port without proper verification. An attacker could provide malicious serialized objects to execute arbitrary code upon deserialization. CVE-2022-38142 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). Delta Electronics InfraSuite Device Master versions 00.00.01a and prior deserialize network packets without proper verification. If the device connects to an attacker-controlled server, the attacker could send maliciously crafted packets that would be deserialized and executed, leading to remote code execution. CVE-2022-41779 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). Delta Electronics InfraSuite Device Master Versions 00.00.01a and prior allow attacker provided data already serialized into memory to be used in file operation application programmable interfaces (APIs). This could create arbitrary files, which could be used in API operations and could ultimately result in remote code execution. CVE-2022-41657 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). Delta Electronics InfraSuite Device Master Versions 00.00.01a and prior mishandle .ZIP archives containing characters used in path traversal. This path traversal could result in remote code execution. CVE-2022-41772 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). The database backup function in Delta Electronics InfraSuite Device Master Versions 00.00.01a and prior lacks proper authentication. An attacker could provide malicious serialized objects which, when deserialized, could activate an opcode for a backup scheduling function without authentication. This function allows the user to designate all function arguments and the file to be executed. This could allow the attacker to start any new process and achieve remote code execution. CVE-2022-40202 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). Delta Electronics InfraSuite Device Master versions 00.00.01a and prior lack proper authentication for functions that create and modify user groups. An attacker could provide malicious serialized objects that could run these functions without authentication to create a new user and add them to the administrator group. CVE-2022-41688 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). Delta Electronics InfraSuite Device Master versions 00.00.01a and prior lacks authentication for a function that changes group privileges. An attacker could use this to create a denial-of-service state or escalate their own privileges. CVE-2022-41644 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). Delta Electronics InfraSuite Device Master versions 00.00.01a and prior allow unauthenticated users to trigger the WriteConfiguration method, which could allow an attacker to provide new values for user configuration files such as UserListInfo.xml. This could lead to the changing of administrative passwords. CVE-2022-41776 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N). Delta Electronics InfraSuite Device Master versions 00.00.01a and prior allow unauthenticated users to access the aprunning endpoint, which could allow an attacker to retrieve any file from the RunningConfigs directory. The attacker could then view and modify configuration files such as UserListInfo.xml, which would allow them to see existing administrative passwords. CVE-2022-41629 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
[]
null
null
7.5
null
CVE-2017-3398
Vulnerability in the Oracle Advanced Outbound Telephony component of Oracle E-Business Suite (subcomponent: User Interface). Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5 and 12.2.6. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Advanced Outbound Telephony. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Advanced Outbound Telephony, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Advanced Outbound Telephony accessible data as well as unauthorized update, insert or delete access to some of Oracle Advanced Outbound Telephony accessible data. CVSS v3.0 Base Score 8.2 (Confidentiality and Integrity impacts).
[ "cpe:2.3:a:oracle:advanced_outbound_telephony:12.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:advanced_outbound_telephony:12.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:advanced_outbound_telephony:12.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:advanced_outbound_telephony:12.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:advanced_outbound_telephony:12.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:advanced_outbound_telephony:12.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:advanced_outbound_telephony:12.2.6:*:*:*:*:*:*:*" ]
null
null
8.2
5.8
GHSA-7893-9j9h-935c
The path autocompletion feature in Bash 4.4 allows local users to gain privileges via a crafted filename starting with a " (double quote) character and a command substitution metacharacter.
[]
null
null
7.8
null
CVE-2001-0375
Cisco PIX Firewall 515 and 520 with 5.1.4 OS running aaa authentication to a TACACS+ server allows remote attackers to cause a denial of service via a large number of authentication requests.
[ "cpe:2.3:h:cisco:pix_firewall_515:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:pix_firewall_520:*:*:*:*:*:*:*:*" ]
null
null
null
5
GHSA-662c-cj8q-qc4g
An issue was discovered in GitLab EE starting from version 16.7 before 17.0.6, version 17.1 before 17.1.4 and 17.2 before 17.2.2 that allowed bypassing the password re-entry requirement to approve a policy.
[]
null
4.2
null
null
GHSA-5x2p-gch7-phhj
Integer overflow in the TIFF image decoding routines in CUPS 1.3.9 and earlier allows remote attackers to cause a denial of service (daemon crash) and possibly execute arbitrary code via a crafted TIFF image, which is not properly handled by the (1) _cupsImageReadTIFF function in the imagetops filter and (2) imagetoraster filter, leading to a heap-based buffer overflow.
[]
null
null
null
null
CVE-2018-17558
Hardcoded manufacturer credentials and an OS command injection vulnerability in the /cgi-bin/mft/ directory on ABUS TVIP TVIP20050 LM.1.6.18, TVIP10051 LM.1.6.18, TVIP11050 MG.1.6.03.05, TVIP20550 LM.1.6.18, TVIP10050 LM.1.6.18, TVIP11550 MG.1.6.03, TVIP21050 MG.1.6.03, and TVIP51550 MG.1.6.03 cameras allow remote attackers to execute code as root.
[ "cpe:2.3:o:abus:tvip_10000_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:abus:tvip_10001_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:abus:tvip_10005a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:abus:tvip_10005b_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:abus:tvip_10005_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:abus:tvip_10050_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:abus:tvip_10051_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:abus:tvip_10055a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:abus:tvip_10055b_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:abus:tvip_10500_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:abus:tvip_10550_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:abus:tvip_11000_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:abus:tvip_11050_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:abus:tvip_11500_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:abus:tvip_11501_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:abus:tvip_11502_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:abus:tvip_11550_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:abus:tvip_11551_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:abus:tvip_11552_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:abus:tvip_20000_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:abus:tvip_20050_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:abus:tvip_20500_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:abus:tvip_20550_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:abus:tvip_21000_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:abus:tvip_21050_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:abus:tvip_21500_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:abus:tvip_21501_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:abus:tvip_21502_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:abus:tvip_21550_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:abus:tvip_21551_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:abus:tvip_21552_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:abus:tvip_22500_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:abus:tvip_31000_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:abus:tvip_31001_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:abus:tvip_31050_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:abus:tvip_31500_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:abus:tvip_31501_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:abus:tvip_31550_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:abus:tvip_31551_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:abus:tvip_32500_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:abus:tvip_51500_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:abus:tvip_51550_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:abus:tvip_71500_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:abus:tvip_71501_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:abus:tvip_71550_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:abus:tvip_71551_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:abus:tvip_72500_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:abus:tvip_10000:-:*:*:*:*:*:*:*", "cpe:2.3:h:abus:tvip_10001:-:*:*:*:*:*:*:*", "cpe:2.3:h:abus:tvip_10005:-:*:*:*:*:*:*:*", "cpe:2.3:h:abus:tvip_10005a:-:*:*:*:*:*:*:*", "cpe:2.3:h:abus:tvip_10005b:-:*:*:*:*:*:*:*", "cpe:2.3:h:abus:tvip_10050:-:*:*:*:*:*:*:*", "cpe:2.3:h:abus:tvip_10051:-:*:*:*:*:*:*:*", "cpe:2.3:h:abus:tvip_10055a:-:*:*:*:*:*:*:*", "cpe:2.3:h:abus:tvip_10055b:-:*:*:*:*:*:*:*", "cpe:2.3:h:abus:tvip_10500:-:*:*:*:*:*:*:*", "cpe:2.3:h:abus:tvip_10550:-:*:*:*:*:*:*:*", "cpe:2.3:h:abus:tvip_11000:-:*:*:*:*:*:*:*", "cpe:2.3:h:abus:tvip_11050:-:*:*:*:*:*:*:*", "cpe:2.3:h:abus:tvip_11500:-:*:*:*:*:*:*:*", "cpe:2.3:h:abus:tvip_11501:-:*:*:*:*:*:*:*", "cpe:2.3:h:abus:tvip_11502:-:*:*:*:*:*:*:*", "cpe:2.3:h:abus:tvip_11550:-:*:*:*:*:*:*:*", "cpe:2.3:h:abus:tvip_11551:-:*:*:*:*:*:*:*", "cpe:2.3:h:abus:tvip_11552:-:*:*:*:*:*:*:*", "cpe:2.3:h:abus:tvip_20000:-:*:*:*:*:*:*:*", "cpe:2.3:h:abus:tvip_20050:-:*:*:*:*:*:*:*", "cpe:2.3:h:abus:tvip_20500:-:*:*:*:*:*:*:*", "cpe:2.3:h:abus:tvip_20550:-:*:*:*:*:*:*:*", "cpe:2.3:h:abus:tvip_21000:-:*:*:*:*:*:*:*", "cpe:2.3:h:abus:tvip_21050:-:*:*:*:*:*:*:*", "cpe:2.3:h:abus:tvip_21500:-:*:*:*:*:*:*:*", "cpe:2.3:h:abus:tvip_21501:-:*:*:*:*:*:*:*", "cpe:2.3:h:abus:tvip_21502:-:*:*:*:*:*:*:*", "cpe:2.3:h:abus:tvip_21550:-:*:*:*:*:*:*:*", "cpe:2.3:h:abus:tvip_21551:-:*:*:*:*:*:*:*", "cpe:2.3:h:abus:tvip_21552:-:*:*:*:*:*:*:*", "cpe:2.3:h:abus:tvip_22500:-:*:*:*:*:*:*:*", "cpe:2.3:h:abus:tvip_31000:-:*:*:*:*:*:*:*", "cpe:2.3:h:abus:tvip_31001:-:*:*:*:*:*:*:*", "cpe:2.3:h:abus:tvip_31050:-:*:*:*:*:*:*:*", "cpe:2.3:h:abus:tvip_31500:-:*:*:*:*:*:*:*", "cpe:2.3:h:abus:tvip_31501:-:*:*:*:*:*:*:*", "cpe:2.3:h:abus:tvip_31550:-:*:*:*:*:*:*:*", "cpe:2.3:h:abus:tvip_31551:-:*:*:*:*:*:*:*", "cpe:2.3:h:abus:tvip_32500:-:*:*:*:*:*:*:*", "cpe:2.3:h:abus:tvip_51500:-:*:*:*:*:*:*:*", "cpe:2.3:h:abus:tvip_51550:-:*:*:*:*:*:*:*", "cpe:2.3:h:abus:tvip_71500:-:*:*:*:*:*:*:*", "cpe:2.3:h:abus:tvip_71501:-:*:*:*:*:*:*:*", "cpe:2.3:h:abus:tvip_71550:-:*:*:*:*:*:*:*", "cpe:2.3:h:abus:tvip_71551:-:*:*:*:*:*:*:*", "cpe:2.3:h:abus:tvip_72500:-:*:*:*:*:*:*:*" ]
null
9.8
null
null
GHSA-jfrh-cwq3-hcj6
An issue was discovered in EJBCA before 6.15.2.6 and 7.x before 7.3.1.2. It is intended to support restriction of available remote protocols (CMP, ACME, REST, etc.) through the system configuration. These restrictions can be bypassed by modifying the URI string from a client. (EJBCA's internal access control restrictions are still in place, and each respective protocol must be configured to allow for enrollment.)
[]
null
null
null
null
CVE-2014-0944
Cross-site request forgery (CSRF) vulnerability in the RES Console in Rule Execution Server in IBM Operational Decision Manager 7.5 before FP3 IF37, 8.0 before MP1 FP2, and 8.5 before MP1 IF26 allows remote authenticated users to hijack the authentication of arbitrary users for requests that insert XSS sequences.
[ "cpe:2.3:a:ibm:operational_decision_manager:7.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:operational_decision_manager:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:operational_decision_manager:8.5:*:*:*:*:*:*:*" ]
null
null
null
6
GHSA-8v72-7j9q-whx9
The ssl3_client_hello function in s3_clnt.c in OpenSSL 1.0.2 before 1.0.2a does not ensure that the PRNG is seeded before proceeding with a handshake, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by sniffing the network and then conducting a brute-force attack.
[]
null
null
null
null
ICSA-20-224-02
Schneider Electric APC Easy UPS On-Line
A vulnerability exists when accessing a vulnerable method of `FileUploadServlet` that may lead to uploading executable files to non-specified directories.CVE-2020-7521 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). A vulnerability exists when accessing a vulnerable method of `SoundUploadServlet` that may lead to uploading executable files to non-specified directories.CVE-2020-7522 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
[]
null
null
9.8
null
CVE-2006-7149
Multiple cross-site scripting (XSS) vulnerabilities in Mambo 4.6.x allow remote attackers to inject arbitrary web script or HTML via (1) the query string to (a) index.php, which reflects the string in an error message from mod_login.php; and the (2) mcname parameter to (b) moscomment.php and (c) com_comment.php.
[ "cpe:2.3:a:mambo:mambo:4.6:rc1:*:*:*:*:*:*", "cpe:2.3:a:mambo:mambo:4.6:rc2:*:*:*:*:*:*", "cpe:2.3:a:mambo:mambo:4.6.1:*:*:*:*:*:*:*" ]
null
null
null
4.3
GHSA-8wg3-xccm-r99v
**DISPUTED** SQL injection vulnerability in SQLiteDatabase.java in the SQLi Api in Android allows remote attackers to execute arbitrary SQL commands via the delete method.
[]
null
null
9.8
null
GHSA-g8wx-wwr2-j96m
The uploadFile function in upload/index.php in CosCMS before 1.822 allows remote administrators to execute arbitrary commands via shell metacharacters in the name of an uploaded file.
[]
null
null
null
null
GHSA-vv9c-r5jj-58f9
Integer overflow in the mem_check_range function in drivers/infiniband/sw/rxe/rxe_mr.c in the Linux kernel before 4.9.10 allows local users to cause a denial of service (memory corruption), obtain sensitive information from kernel memory, or possibly have unspecified other impact via a write or read request involving the "RDMA protocol over infiniband" (aka Soft RoCE) technology.
[]
null
null
7.8
null
RHSA-2022:0969
Red Hat Security Advisory: java-1.7.1-ibm security update
OpenJDK: Weak ciphers preferred over stronger ones for TLS (JSSE, 8264210) OpenJDK: Non-constant comparison during TLS handshakes (JSSE, 8269618) OpenJDK: Incomplete deserialization class filtering in ObjectInputStream (Serialization, 8264934) OpenJDK: Incomplete checks of StringBuffer and StringBuilder during deserialization (Libraries, 8270392) OpenJDK: Incorrect IdentityHashMap size checks during deserialization (Libraries, 8270416) OpenJDK: Excessive resource use when reading JAR manifest attributes (Libraries, 8272026) OpenJDK: Insufficient checks when deserializing exceptions in ObjectInputStream (Serialization, 8272236) OpenJDK: Excessive memory allocation in BMPImageReader (ImageIO, 8273756) OpenJDK: Integer overflow in BMPImageReader (ImageIO, 8273838)
[ "cpe:/a:redhat:rhel_extras:7" ]
null
5.3
null
null
GHSA-5m3c-wqgq-pc56
SQL injection vulnerability in MXChange before 0.2.0-pre10 PL492 allows remote attackers to execute arbitrary SQL commands via unknown vectors.
[]
null
null
null
null
GHSA-58pf-7w8g-r37r
Inappropriate implementation in WebApp Installer in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to potentially overlay and spoof the contents of the Omnibox (URL bar) via a crafted HTML page.
[]
null
null
null
null
GHSA-6w87-24cp-rprc
Unspecified vulnerability in the Address and Routing Parameter Area (ARPA) transport software in HP-UX B.11.11 and B.11.23 before 20060912 allows local users to cause a denial of service via unspecified vectors.
[]
null
null
null
null
CVE-2021-45803
MartDevelopers iResturant 1.0 is vulnerable to SQL Injection. SQL Injection occurs because this view parameter value is added to the SQL query without additional verification when viewing reservation.
[ "cpe:2.3:a:iresturant_project:iresturant:1.0:*:*:*:*:*:*:*" ]
null
8.8
null
6.5
CVE-2024-54266
WordPress ImageRecycle pdf & image compression plugin <= 3.1.16 - Reflected Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ImageRecycle ImageRecycle pdf & image compression allows Reflected XSS.This issue affects ImageRecycle pdf & image compression: from n/a through 3.1.16.
[ "cpe:2.3:a:imagerecycle:imagerecycle_pdf_\\&_image_compression:*:*:*:*:*:wordpress:*:*" ]
null
7.1
null
null
GHSA-5f5m-7p6h-2wm4
The protocol-inspection feature on Cisco Adaptive Security Appliances (ASA) devices does not properly implement the idle timeout, which allows remote attackers to cause a denial of service (connection-table exhaustion) via crafted requests that use an inspected protocol, aka Bug ID CSCuh13899.
[]
null
null
null
null
RHSA-2025:3801
Red Hat Security Advisory: RHEL AI 1.5 hdf5 security update
hdf5: heap buffer overread hdf5: multiple CVEs hdf5: multiple CVEs hdf5: multiple CVEs hdf5: multiple CVEs hdf5: multiple CVEs hdf5: multiple CVEs hdf5: multiple CVEs hdf5: multiple CVEs hdf5: multiple CVEs hdf5: multiple CVEs hdf5: multiple CVEs hdf5: multiple CVEs hdf5: multiple CVEs hdf5: multiple CVEs hdf5: multiple CVEs hdf5: multiple CVEs hdf5: multiple CVEs hdf5: multiple CVEs hdf5: multiple CVEs hdf5: multiple CVEs hdf5: multiple CVEs hdf5: multiple CVEs hdf5: multiple CVEs hdf5: multiple CVEs hdf5: multiple CVEs hdf5: multiple CVEs hdf5: multiple CVEs hdf5: multiple CVEs hdf5: multiple CVEs
[ "cpe:/a:redhat:enterprise_linux_ai:1.5::el9" ]
null
4.8
null
null
CVE-2023-40043
MOVEit Transfer System Administrator SQL Injection
In Progress MOVEit Transfer versions released before 2021.1.8 (13.1.8), 2022.0.8 (14.0.8), 2022.1.9 (14.1.9), 2023.0.6 (15.0.6), a SQL injection vulnerability has been identified in the MOVEit Transfer web interface that could allow a MOVEit system administrator account to gain unauthorized access to the MOVEit Transfer database. A MOVEit system administrator could submit a crafted payload to the MOVEit Transfer web interface which could result in modification and disclosure of MOVEit database content.
[ "cpe:2.3:a:progress:moveit_transfer:*:*:*:*:*:*:*:*" ]
null
7.2
null
null
GHSA-c6rr-f65f-365x
chaskiq is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
[]
null
null
null
null
CVE-2022-24342
In JetBrains TeamCity before 2021.2.1, URL injection leading to CSRF was possible.
[ "cpe:2.3:a:jetbrains:teamcity:*:*:*:*:*:*:*:*" ]
null
8.8
null
6.8
GHSA-xfgf-763r-q2wj
classifieds.cgi allows remote attackers to execute arbitrary commands by specifying them in a hidden variable in a CGI form.
[]
null
null
null
null
GHSA-w9qp-xc8f-8xcq
This vulnerability exists in SyroTech SY-GPON-1110-WDONT Router due to missing HTTPOnly flag for the session cookies associated with the router's web management interface. An attacker with remote access could exploit this by intercepting transmission within an HTTP session on the vulnerable system.Successful exploitation of this vulnerability could allow the attacker to capture cookies and obtain sensitive information on the targeted system.
[]
6.9
7.5
null
null
CVE-2025-27323
WordPress WP About Author plugin <= 1.5 - Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Jon Bishop WP About Author allows DOM-Based XSS. This issue affects WP About Author: from n/a through 1.5.
[]
null
6.5
null
null
GHSA-xw4m-phc2-7jvc
SQL injection vulnerability in the JOOFORGE Gamesbox (com_gamesbox) component 1.0.2, and possibly earlier, for Joomla! allows remote attackers to execute arbitrary SQL commands via the id parameter in a consoles action to index.php.
[]
null
null
null
null
GHSA-c2hj-4gfw-x63q
Internet Explorer 5.5 does not display the Class ID (CLSID) when it is at the end of the file name, which could allow attackers to trick the user into executing dangerous programs by making it appear that the document is of a safe file type.
[]
null
null
null
null
CVE-2022-33127
The function that calls the diff tool in Diffy 3.4.1 does not properly handle double quotes in a filename when run in a windows environment. This allows attackers to execute arbitrary commands via a crafted string.
[ "cpe:2.3:a:diffy_project:diffy:3.4.1:*:*:*:*:ruby:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
RHSA-2020:5055
Red Hat Security Advisory: buildah security update
golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash
[ "cpe:/a:redhat:rhel_extras_other:7" ]
null
7.5
null
null
RHSA-2024:5393
Red Hat Security Advisory: thunderbird security update
mozilla: Fullscreen notification dialog can be obscured by document content mozilla: Out of bounds memory access in graphics shared memory handling mozilla: Type confusion in WebAssembly mozilla: Incomplete WebAssembly exception handing mozilla: Out of bounds read in editor component mozilla: Missing permission check when creating a StreamFilter mozilla: Uninitialized memory used by WebGL mozilla: Use-after-free in JavaScript garbage collection mozilla: Use-after-free in IndexedDB mozilla: Document content could partially obscure security prompts
[ "cpe:/a:redhat:rhel_aus:8.2::appstream" ]
null
6.1
null
null
CVE-2020-6235
SAP Solution Manager (Diagnostics Agent), version 7.2, does not perform the authentication check for the functionalities of the Collector Simulator, leading to Missing Authentication.
[ "cpe:2.3:a:sap:solution_manager:7.2:*:*:*:*:*:*:*" ]
null
null
8.6
null
CVE-2024-21633
Arbitrary file write on Decoding
Apktool is a tool for reverse engineering Android APK files. In versions 2.9.1 and prior, Apktool infers resource files' output path according to their resource names which can be manipulated by attacker to place files at desired location on the system Apktool runs on. Affected environments are those in which an attacker may write/overwrite any file that user has write access, and either user name is known or cwd is under user folder. Commit d348c43b24a9de350ff6e5bd610545a10c1fc712 contains a patch for this issue.
[ "cpe:2.3:a:apktool:apktool:*:*:*:*:*:*:*:*" ]
null
7.8
null
null
GHSA-mpqp-hhxg-m6w5
To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used.
[]
null
null
null
null
ICSA-21-257-22
Siemens Teamcenter Active Workspace
A path traversal vulnerability in the application could allow an attacker to bypass certain restrictions such as direct access to other services within the host.
[]
null
4.5
null
null
GHSA-q7wr-mqfr-3mcx
Stack-based buffer overflow in Visual IRC (ViRC) 2.0 allows remote IRC servers to execute arbitrary code via a long response to a JOIN command.
[]
null
null
null
null
GHSA-vgh8-7m36-cmw2
The fabric-interconnect component in Cisco Unified Computing System (UCS) allows local users to gain privileges and execute arbitrary operating-system commands via crafted parameters to a file-related command, aka Bug ID CSCtq86554.
[]
null
null
null
null
CVE-2011-1028
The $smarty.template variable in Smarty3 allows attackers to possibly execute arbitrary PHP code via the sysplugins/smarty_internal_compile_private_special_variable.php file.
[ "cpe:2.3:a:smarty:smarty:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
GHSA-vc5c-5fxh-338c
Unspecified vulnerability in the Oracle Application Object Library component in Oracle E-Business Suite and Applications 11.5.10CU1 has unknown impact and attack vectors, aka Vuln# APPS05.
[]
null
null
null
null
CVE-2008-0103
Unspecified vulnerability in Microsoft Office 2000 SP3, Office XP SP3, Office 2003 SP2, and Office 2004 for Mac allows remote attackers to execute arbitrary code via an Office document that contains a malformed object, related to a "memory handling error," aka "Microsoft Office Execution Jump Vulnerability."
[ "cpe:2.3:a:microsoft:office:2000:sp3:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2003:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2004:*:mac\\+os:*:*:*:*:*", "cpe:2.3:a:microsoft:office:xp:sp3:*:*:*:*:*:*" ]
null
null
null
9.3
GHSA-mw3j-f4pg-723r
A vulnerability has been identified in SIMATIC Drive Controller family (All versions < V2.9.4), SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants) (All versions), SIMATIC S7-1200 CPU family (incl. SIPLUS variants) (All versions >= V4.5.0 < V4.5.2), SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants) (All versions >= V2.9.2 < V2.9.4), SIMATIC S7-1500 Software Controller (All versions), SIMATIC S7-PLCSIM Advanced (All versions), TIM 1531 IRC (incl. SIPLUS NET variants) (All versions >= V2.2). An unauthenticated attacker could cause a denial-of-service condition in a PLC when sending specially prepared packet over port 102/tcp. A restart of the affected device is needed to restore normal operations.
[]
null
7.5
null
null
CVE-2024-41812
txtdot SSRF vulnerability in /get
txtdot is an HTTP proxy that parses only text, links, and pictures from pages, removing ads and heavy scripts. Prior to version 1.7.0, a Server-Side Request Forgery (SSRF) vulnerability in the `/get` route of txtdot allows remote attackers to use the server as a proxy to send HTTP GET requests to arbitrary targets and retrieve information in the internal network. Version 1.7.0 prevents displaying the response of forged requests, but the requests can still be sent. For complete mitigation, a firewall between txtdot and other internal network resources should be set.
[ "cpe:2.3:a:txtdot:txtdot:*:*:*:*:*:*:*:*" ]
null
7.5
null
null
CVE-2023-29505
An issue was discovered in Zoho ManageEngine Network Configuration Manager 12.6.165. The WebSocket endpoint allows Cross-site WebSocket hijacking.
[ "cpe:2.3:a:zohocorp:manageengine_network_configuration_manager:12.6:build126165:*:*:*:*:*:*" ]
null
4.3
null
null
CVE-2018-2862
Vulnerability in the Oracle Retail Point-of-Service component of Oracle Retail Applications (subcomponent: User Interface). Supported versions that are affected are 13.3.8, 13.4.9, 14.0.4 and 14.1.3. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Retail Point-of-Service. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Retail Point-of-Service accessible data as well as unauthorized update, insert or delete access to some of Oracle Retail Point-of-Service accessible data. CVSS 3.0 Base Score 7.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N).
[ "cpe:2.3:a:oracle:retail_point-of-service:13.3.8:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:retail_point-of-service:13.4.9:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:retail_point-of-service:14.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:retail_point-of-service:14.1.3:*:*:*:*:*:*:*" ]
null
null
7.1
5.5
CVE-2017-13795
An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari before 11.0.1 is affected. iCloud before 7.1 on Windows is affected. iTunes before 12.7.1 on Windows is affected. tvOS before 11.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
[ "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "cpe:2.3:a:apple:webkit:-:*:*:*:*:*:*:*" ]
null
null
8.8
6.8
GHSA-gqvj-vmm6-rx6c
In the Linux kernel, the following vulnerability has been resolved:ALSA: hda/cs_dsp_ctl: Use private_free for control cleanupUse the control private_free callback to free the associated data block. This ensures that the memory won't leak, whatever way the control gets destroyed.The original implementation didn't actually remove the ALSA controls in hda_cs_dsp_control_remove(). It only freed the internal tracking structure. This meant it was possible to remove/unload the amp driver while leaving its ALSA controls still present in the soundcard. Obviously attempting to access them could cause segfaults or at least dereferencing stale pointers.
[]
null
3.3
null
null
CVE-2007-0152
OhhASP stores sensitive information under the web root with insufficient access control, which allows remote attackers to download a database containing passwords via a direct request for db/OhhASP.mdb.
[ "cpe:2.3:a:ohhasp:ohhasp:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2022-0334
A flaw was found in Moodle in versions 3.11 to 3.11.4, 3.10 to 3.10.8, 3.9 to 3.9.11 and earlier unsupported versions. Insufficient capability checks could lead to users accessing their grade report for courses where they did not have the required gradereport/user:view capability.
[ "cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*" ]
null
4.3
null
4
CVE-2016-8587
dlp_policy_upload.cgi in Trend Micro Threat Discovery Appliance 2.6.1062r1 and earlier allows remote authenticated users to execute arbitrary code via an archive file containing a symlink to /eng_ptn_stores/prod/sensorSDK/data/ or /eng_ptn_stores/prod/sensorSDK/backup_pol/.
[ "cpe:2.3:a:trendmicro:threat_discovery_appliance:*:r1:*:*:*:*:*:*" ]
null
null
7.3
6
GHSA-xg84-73vx-pq6f
Microsoft Power Platform Connector Spoofing Vulnerability
[]
null
9.6
null
null
CVE-2020-15140
Remote Code Execution in Red Discord Bot
In Red Discord Bot before version 3.3.11, a RCE exploit has been discovered in the Trivia module: this exploit allows Discord users with specifically crafted usernames to inject code into the Trivia module's leaderboard command. By abusing this exploit, it's possible to perform destructive actions and/or access sensitive information. This critical exploit has been fixed on version 3.3.11.
[ "cpe:2.3:a:cogboard:red_discord_bot:*:*:*:*:*:*:*:*" ]
null
8.2
null
null
GHSA-jmqq-vjpq-9xcm
IBM Security Verify Bridge contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data. IBM X-Force ID: 196618.
[]
null
null
null
null
GHSA-w573-j2v8-vx6p
The Category Posts Widget WordPress plugin before 4.9.18 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
[]
null
4.8
null
null
CVE-2012-5616
Apache CloudStack 4.0.0-incubating and Citrix CloudPlatform (formerly Citrix CloudStack) before 3.0.6 stores sensitive information in the log4j.conf log file, which allows local users to obtain (1) the SSH private key as recorded by the createSSHKeyPair API, (2) the password of an added host as recorded by the AddHost API, or the password of an added VM as recorded by the (3) DeployVM or (4) ResetPasswordForVM API.
[ "cpe:2.3:a:apache:cloudstack:4.0.0:incubating:*:*:*:*:*:*", "cpe:2.3:a:citrix:cloudplatform:*:*:*:*:*:*:*:*" ]
null
null
null
1.5
CVE-1999-1126
Cisco Resource Manager (CRM) 1.1 and earlier creates certain files with insecure permissions that allow local users to obtain sensitive configuration information including usernames, passwords, and SNMP community strings, from (1) swim_swd.log, (2) swim_debug.log, (3) dbi_debug.log, and (4) temporary files whose names begin with "DPR_".
[ "cpe:2.3:a:cisco:resource_manager:*:*:*:*:*:*:*:*" ]
null
null
null
2.1
CVE-2001-0582
Ben Spink CrushFTP FTP Server 2.1.6 and earlier allows a local attacker to access arbitrary files via a '..' (dot dot) attack, or variations, in (1) GET, (2) CD, (3) NLST, (4) SIZE, (5) RETR.
[ "cpe:2.3:a:ben_spink:crushftp_ftp_server:*:*:*:*:*:*:*:*", "cpe:2.3:a:ben_spink:crushftp_ftp_server:2.1.4:*:*:*:*:*:*:*" ]
null
null
null
4.6
GHSA-673q-v95c-q7mf
common.inc.php in phpWebLog 0.4.2 does not properly initialize the $CONF array, which inadvertently sets the password to a single character, allowing remote attackers to easily guess the SiteKey and gain administrative privileges to phpWebLog.
[]
null
null
null
null
CVE-2013-1464
Cross-site scripting (XSS) vulnerability in assets/player.swf in the Audio Player plugin before 2.0.4.6 for Wordpress allows remote attackers to inject arbitrary web script or HTML via the playerID parameter.
[ "cpe:2.3:a:doryphores:audio_player:*:*:*:*:*:*:*:*", "cpe:2.3:a:doryphores:audio_player:2.0.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:doryphores:audio_player:2.0.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:doryphores:audio_player:2.0.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:doryphores:audio_player:2.0.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:doryphores:audio_player:2.0.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:doryphores:audio_player:2.0.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:doryphores:audio_player:2.0.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:doryphores:audio_player:2.0.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:-:*:*:*:*:*:*:*" ]
null
null
null
4.3
GHSA-37cp-q8r5-mf55
Cross-site scripting (XSS) vulnerability in the server in IBM Cognos Business Intelligence (BI) 8.4.1, 10.1, 10.1.1, 10.2, and 10.2.1 allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors.
[]
null
null
null
null
GHSA-r2hw-65x7-986p
Proietti Tech srl Planet Time Enterprise 4.2.0.1,4.2.0.0,4.1.0.0,4.0.0.0,3.3.1.0,3.3.0.0 is vulnerable to Remote code execution via the Viewstate parameter.
[]
null
9.8
null
null
CVE-2010-2743
The kernel-mode drivers in Microsoft Windows XP SP3 do not properly perform indexing of a function-pointer table during the loading of keyboard layouts from disk, which allows local users to gain privileges via a crafted application, as demonstrated in the wild in July 2010 by the Stuxnet worm, aka "Win32k Keyboard Layout Vulnerability." NOTE: this might be a duplicate of CVE-2010-3888 or CVE-2010-3889.
[ "cpe:2.3:o:microsoft:windows_2003_server:*:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2003_server:*:sp2:itanium:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:*:itanium:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:*:x32:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:*:x64:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:r2:itanium:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:r2:x64:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x32:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:itanium:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:*" ]
null
null
null
7.2
GHSA-mphf-cc86-chgh
A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiManager versions 7.6.0 through 7.6.1, versions 7.4.5 through 7.4.0, and versions 7.2.1 through 7.2.8, FortiManager Cloud versions 7.6.0 through 7.6.1, versions 7.4.0 through 7.4.4, and versions 7.2.2 through 7.2.7 may allow an authenticated remote attacker to execute unauthorized code via FGFM crafted requests.
[]
null
7.2
null
null
GHSA-7rvj-6cpm-cm89
In the Linux kernel, the following vulnerability has been resolved:PCI: mediatek: Fix refcount leak in mtk_pcie_subsys_powerup()The of_find_compatible_node() function returns a node pointer with refcount incremented, We should use of_node_put() on it when done Add the missing of_node_put() to release the refcount.
[]
null
5.5
null
null
CVE-2019-13675
Insufficient data validation in extensions in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to disable extensions via a crafted HTML page.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" ]
null
4.3
null
4.3
GHSA-7q48-m9w3-vrpc
The OSM – OpenStreetMap plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's osm_map and osm_map_v3 shortcodes in all versions up to, and including, 6.1.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
6.4
null
null
GHSA-253g-4jm3-6p9v
Huawei Honor Magic2 mobile phones with versions earlier than 10.0.0.175(C00E59R2P11) have an information leak vulnerability. Due to a module using weak encryption tool, an attacker with the root permission may exploit the vulnerability to obtain some information.
[]
null
null
null
null
CVE-2024-11293
Registration Forms – User Registration Forms, Invitation-Based Registrations, Front-end User Profile, Login Form & Content Restriction Social Sites Login <= 1.7.9 - Authentication Bypass via WordPress.com OAuth provider
The Registration Forms – User Registration Forms, Invitation-Based Registrations, Front-end User Profile, Login Form & Content Restriction Social Sites Login plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 1.7.9. This is due to insufficient verification on the user being returned by the social login token. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the email and the user does not have an already-existing account for the service returning the token.
[ "cpe:2.3:a:genetechsolutions:pie_register:-:*:*:*:*:wordpress:*:*" ]
null
8.1
null
null
CVE-2013-4969
Puppet before 3.3.3 and 3.4 before 3.4.1 and Puppet Enterprise (PE) before 2.8.4 and 3.1 before 3.1.1 allows local users to overwrite arbitrary files via a symlink attack on unspecified files.
[ "cpe:2.3:a:puppetlabs:puppet:*:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet_enterprise:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:*" ]
null
null
null
2.1
CVE-2015-5583
Adobe Reader and Acrobat 10.x before 10.1.16 and 11.x before 11.0.13, Acrobat and Acrobat Reader DC Classic before 2015.006.30094, and Acrobat and Acrobat Reader DC Continuous before 2015.009.20069 on Windows and OS X allow attackers to bypass intended sandbox restrictions and obtain sensitive PDF information by launching a print job on a remote printer, a different vulnerability than CVE-2015-6705, CVE-2015-6706, and CVE-2015-7624.
[ "cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
null
null
4.3
GHSA-8v22-4px4-6c2p
In the Linux kernel, the following vulnerability has been resolved:drm/amd/display: Fix memory leak[why] Resource release is needed on the error handling path to prevent memory leak.[how] Fix this by adding kfree on the error handling path.
[]
null
5.5
null
null
GHSA-5xwp-7xf8-2r9c
The DRDA Services component in IBM DB2 UDB 9.5 before FP6a allows remote authenticated users to cause a denial of service (database server ABEND) by using the client CLI on Linux, UNIX, or Windows for executing a prepared statement with a large number of parameter markers.
[]
null
null
null
null
CVE-2019-12154
XXE in the XML parser library in RealObjects PDFreactor before 10.1.10722 allows attackers to supply malicious XML content in externally referenced resources, leading to disclosure of local file contents and/or denial of service conditions.
[ "cpe:2.3:a:realobjects:pdfreactor:*:*:*:*:*:*:*:*" ]
null
null
9.1
6.4
CVE-2007-6035
SQL injection vulnerability in graph.php in Cacti before 0.8.7a allows remote attackers to execute arbitrary SQL commands via the local_graph_id parameter.
[ "cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2023-36705
Windows Installer Elevation of Privilege Vulnerability
Windows Installer Elevation of Privilege Vulnerability
[ "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2008:sp2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*" ]
null
7.8
null
null
GHSA-gj47-jf8p-7hxm
Under specific circumstances, insecure permissions in Ivanti Velocity License Server before version 5.2 allows a local authenticated attacker to achieve local privilege escalation.
[]
null
7
null
null
GHSA-cmmj-wqg9-f37x
The expat XML parser code, as used in the open source Jabber (jabberd) 1.4.3 and earlier, jadc2s 0.9.0 and earlier, and possibly other packages, allows remote attackers to cause a denial of service (application crash) via a malformed packet to a socket that accepts XML connections.
[]
null
null
null
null
GHSA-v85g-hrr5-4jw4
The Simple Matted Thumbnails WordPress plugin is vulnerable to Reflected Cross-Site Scripting due to a reflected $_SERVER["PHP_SELF"] value in the ~/simple-matted-thumbnail.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 1.01.
[]
null
null
null
null
CVE-2007-3946
mod_auth (http_auth.c) in lighttpd before 1.4.16 allows remote attackers to cause a denial of service (daemon crash) via unspecified vectors involving (1) a memory leak, (2) use of md5-sess without a cnonce, (3) base64 encoded strings, and (4) trailing whitespace in the Auth-Digest header.
[ "cpe:2.3:a:lighttpd:lighttpd:*:*:*:*:*:*:*:*" ]
null
null
null
6.4
GHSA-jjf9-2cqq-64fg
Google Chrome before 11.0.696.57 on Linux does not properly isolate renderer processes, which has unspecified impact and remote attack vectors.
[]
null
null
null
null
CVE-2008-4364
SQL injection vulnerability in default.aspx in ParsaGostar ParsaWeb CMS allows remote attackers to execute arbitrary SQL commands via the (1) id parameter in the "page" page and (2) txtSearch parameter in the "Search" page.
[ "cpe:2.3:a:parsagostar:parsaweb_cms:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-68x7-7r4x-g878
Unspecified vulnerability in mosMedia (com_mosmedia) 1.0.8 and earlier for Joomla! has unspecified impact and attack vectors.
[]
null
null
null
null
GHSA-2j5w-cwc3-8hxw
Improper Certificate Validation in Jenkins Spira Importer Plugin
Jenkins Spira Importer Plugin 3.2.3 and earlier disables SSL/TLS certificate validation for the Jenkins master JVM.
[]
null
8.2
null
null