id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
197k
cpes
listlengths
0
4.89k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
CVE-2020-15589
A design issue was discovered in GetInternetRequestHandle, InternetSendRequestEx and InternetSendRequestByBitrate in the client side of Zoho ManageEngine Desktop Central 10.0.552.W and Remote Access Plus before 10.1.2119.1. By exploiting this issue, an attacker-controlled server can force the client to skip TLS certificate validation, leading to a man-in-the-middle attack against HTTPS and unauthenticated remote code execution.
[ "cpe:2.3:a:zohocorp:manageengine_desktop_central:10.0.552.w:*:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_remote_access_plus:*:*:*:*:*:*:*:*" ]
null
8.1
null
6.8
GHSA-2366-wcjw-43wx
In the Linux kernel, the following vulnerability has been resolved:netrom: Fix a data-race around sysctl_netrom_transport_no_activity_timeoutWe need to protect the reader reading the sysctl value because the value can be changed concurrently.
[]
null
null
null
null
GHSA-x288-4cjf-cw6q
IBM Security Identity Manager 6.0.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 163493.
[]
null
null
null
null
CVE-2015-5111
Use-after-free vulnerability in Adobe Reader and Acrobat 10.x before 10.1.15 and 11.x before 11.0.12, Acrobat and Acrobat Reader DC Classic before 2015.006.30060, and Acrobat and Acrobat Reader DC Continuous before 2015.008.20082 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-4448, CVE-2015-5095, CVE-2015-5099, CVE-2015-5101, CVE-2015-5113, and CVE-2015-5114.
[ "cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
null
null
6.8
GHSA-f3mv-cjr3-hr9j
The Jobs for WordPress plugin before 2.7.8 does not sanitise and escape some of its Job settings, which could allow high privilege users such as contributor to perform Stored Cross-Site Scripting attacks
[]
null
5.9
null
null
GHSA-j9c5-6p9g-hwf3
Zoho ManageEngine Password Manager Pro before 12101 and PAM360 before 5510 are vulnerable to unauthenticated remote code execution. (This also affects ManageEngine Access Manager Plus before 4303 with authentication.)
[]
null
9.8
null
null
GHSA-p634-mhpc-5857
SQL Injection Vulnerability in ECTouch v2 via the shop page in index.php..
[]
null
null
null
null
GHSA-cc7p-25jw-497j
A vulnerability in the endpoint software of Cisco Secure Endpoint for Windows could allow an authenticated, local attacker to evade endpoint protection within a limited time window. This vulnerability is due to a timing issue that occurs between various software components. An attacker could exploit this vulnerability by persuading a user to put a malicious file into a specific folder and then persuading the user to execute the file within a limited time window. A successful exploit could allow the attacker to cause the endpoint software to fail to quarantine the malicious file or kill its process. Note: This vulnerability only applies to deployments that have the Windows Folder Redirection feature enabled.
[]
null
5
null
null
CVE-2015-3107
Use-after-free vulnerability in Adobe Flash Player before 13.0.0.292 and 14.x through 18.x before 18.0.0.160 on Windows and OS X and before 11.2.202.466 on Linux, Adobe AIR before 18.0.0.144 on Windows and before 18.0.0.143 on OS X and Android, Adobe AIR SDK before 18.0.0.144 on Windows and before 18.0.0.143 on OS X, and Adobe AIR SDK & Compiler before 18.0.0.144 on Windows and before 18.0.0.143 on OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-3103 and CVE-2015-3106.
[ "cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:evergreen:11.4:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:14.0.0.125:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:14.0.0.145:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:14.0.0.176:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:14.0.0.179:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:15.0.0.152:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:15.0.0.167:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:15.0.0.189:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:15.0.0.223:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:15.0.0.239:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:15.0.0.246:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:16.0.0.235:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:16.0.0.257:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:16.0.0.287:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:16.0.0.296:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:17.0.0.134:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:17.0.0.169:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:17.0.0.188:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*" ]
null
null
null
10
CVE-2015-2711
Mozilla Firefox before 38.0 does not recognize a referrer policy delivered by a referrer META element in cases of context-menu navigation and middle-click navigation, which allows remote attackers to obtain sensitive information by reading web-server Referer logs that contain private data in a URL, as demonstrated by a private path component.
[ "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" ]
null
null
null
4.3
RHSA-2021:4039
Red Hat Security Advisory: devtoolset-10-gcc security update
environment: Unicode's bidirectional (BiDi) override characters can cause trojan source attacks
[ "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
8.5
null
null
GHSA-7f3p-8cp9-3xf6
Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3112, CVE-2013-3121, CVE-2013-3139, and CVE-2013-3142.
[]
null
null
null
null
CVE-2007-1899
Multiple SQL injection vulnerabilities in myWebland myBloggie 2.1.6 allow remote attackers to execute arbitrary SQL commands via (1) the user_id parameter in a viewuser action to index.php, and allow remote authenticated administrators to execute arbitrary SQL commands via (2) the post_id parameter in an edit action to admin.php.
[ "cpe:2.3:a:mywebland:mybloggie:2.1.6:*:*:*:*:*:*:*" ]
null
null
null
5.1
GHSA-ffg3-vmf8-h87g
Authentication Bypass vulnerability in Hitachi Ops Center Analyzer on Linux, 64 bit (Hitachi Ops Center Analyzer detail view component), Hitachi Infrastructure Analytics Advisor on Linux, 64 bit (Hitachi Data Center Analyticscomponent).This issue affects Hitachi Ops Center Analyzer: from 10.0.0-00 before 11.0.3-00; Hitachi Infrastructure Analytics Advisor: from 2.1.0-00 through 4.4.0-00.
[]
null
9.4
null
null
CVE-2018-10606
WECON LeviStudio Versions 1.8.29 and 1.8.44 have multiple heap-based buffer overflow vulnerabilities that can be exploited when the application processes specially crafted project files.
[ "cpe:2.3:a:we-con:levistudiou:1.8.29:*:*:*:*:*:*:*", "cpe:2.3:a:we-con:levistudiou:1.8.44:*:*:*:*:*:*:*" ]
null
8.8
null
9.3
CVE-2020-1123
A denial of service vulnerability exists when Connected User Experiences and Telemetry Service improperly handles file operations, aka 'Connected User Experiences and Telemetry Service Denial of Service Vulnerability'. This CVE ID is unique from CVE-2020-1084.
[ "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*" ]
null
5.5
null
2.1
GHSA-rhp4-4ff3-m4c6
Memory leak in the gf_isom_oinf_read_entry function in MP4Box in GPAC 1.0.1 allows attackers to read memory via a crafted file.
[]
null
5.5
null
null
GHSA-jmx8-355m-8vwh
Unauthorized client-side property update in UIDL request handler in Vaadin 10 and 11
Missing check in UIDL request handler in com.vaadin:flow-server versions 1.0.0 through 1.0.5 (Vaadin 10.0.0 through 10.0.7, and 11.0.0 through 11.0.2) allows attacker to update element property values via crafted synchronization message.https://vaadin.com/security/cve-2018-25007
[]
null
2.6
null
null
GHSA-678w-6p5f-47x3
An issue was discovered in phpMyAdmin. In the user interface preference feature, a user can execute an SQL injection attack against the account of the control user. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.
[]
null
null
8.8
null
CVE-2012-0918
Unspecified vulnerability in Hitachi COBOL2002 Net Developer, Net Server Suite, and Net Client Suite 01-00, 01-01 through 01-01-/D, 01-02 through 01-02-/F, 01-03 through 01-03-/F, 02-00 through 02-00-/D, 02-01 through 02-01-/C, and possibly other versions before 02-01-/D allows remote attackers to execute arbitrary code via unknown attack vectors.
[ "cpe:2.3:a:hitachi:cobol2002_net_developer:01-00:*:*:*:*:*:*:*", "cpe:2.3:a:hitachi:cobol2002_net_developer:01-01:*:*:*:*:*:*:*", "cpe:2.3:a:hitachi:cobol2002_net_developer:01-01-\\/d:*:*:*:*:*:*:*", "cpe:2.3:a:hitachi:cobol2002_net_developer:01-02:*:*:*:*:*:*:*", "cpe:2.3:a:hitachi:cobol2002_net_developer:01-02-\\/f:*:*:*:*:*:*:*", "cpe:2.3:a:hitachi:cobol2002_net_developer:01-03:*:*:*:*:*:*:*", "cpe:2.3:a:hitachi:cobol2002_net_developer:01-03-\\/f:*:*:*:*:*:*:*", "cpe:2.3:a:hitachi:cobol2002_net_developer:02-00:*:*:*:*:*:*:*", "cpe:2.3:a:hitachi:cobol2002_net_developer:02-00-\\/d:*:*:*:*:*:*:*", "cpe:2.3:a:hitachi:cobol2002_net_developer:02-01:*:*:*:*:*:*:*", "cpe:2.3:a:hitachi:cobol2002_net_developer:02-01-\\/c:*:*:*:*:*:*:*", "cpe:2.3:a:hitachi:cobol2002_net_server_suite:01-00:*:*:*:*:*:*:*", "cpe:2.3:a:hitachi:cobol2002_net_server_suite:01-01:*:*:*:*:*:*:*", "cpe:2.3:a:hitachi:cobol2002_net_server_suite:01-01-\\/d:*:*:*:*:*:*:*", "cpe:2.3:a:hitachi:cobol2002_net_server_suite:01-02:*:*:*:*:*:*:*", "cpe:2.3:a:hitachi:cobol2002_net_server_suite:01-02-\\/f:*:*:*:*:*:*:*", "cpe:2.3:a:hitachi:cobol2002_net_server_suite:01-03:*:*:*:*:*:*:*", "cpe:2.3:a:hitachi:cobol2002_net_server_suite:01-03-\\/f:*:*:*:*:*:*:*", "cpe:2.3:a:hitachi:cobol2002_net_server_suite:02-00:*:*:*:*:*:*:*", "cpe:2.3:a:hitachi:cobol2002_net_server_suite:02-00-\\/d:*:*:*:*:*:*:*", "cpe:2.3:a:hitachi:cobol2002_net_server_suite:02-01:*:*:*:*:*:*:*", "cpe:2.3:a:hitachi:cobol2002_net_client_suite:01-00:*:*:*:*:*:*:*", "cpe:2.3:a:hitachi:cobol2002_net_client_suite:01-01:*:*:*:*:*:*:*", "cpe:2.3:a:hitachi:cobol2002_net_client_suite:01-01-\\/d:*:*:*:*:*:*:*", "cpe:2.3:a:hitachi:cobol2002_net_client_suite:01-02:*:*:*:*:*:*:*", "cpe:2.3:a:hitachi:cobol2002_net_client_suite:01-02-\\/f:*:*:*:*:*:*:*", "cpe:2.3:a:hitachi:cobol2002_net_client_suite:01-03:*:*:*:*:*:*:*", "cpe:2.3:a:hitachi:cobol2002_net_client_suite:01-03-\\/f:*:*:*:*:*:*:*", "cpe:2.3:a:hitachi:cobol2002_net_client_suite:02-00:*:*:*:*:*:*:*", "cpe:2.3:a:hitachi:cobol2002_net_client_suite:02-00-\\/d:*:*:*:*:*:*:*", "cpe:2.3:a:hitachi:cobol2002_net_client_suite:02-01:*:*:*:*:*:*:*" ]
null
null
null
10
CVE-2018-19566
A heap buffer over-read in parse_tiff_ifd in dcraw through 9.28 could be used by attackers able to supply malicious files to crash an application that bundles the dcraw code or leak private information.
[ "cpe:2.3:a:dcraw_project:dcraw:*:*:*:*:*:*:*:*" ]
null
null
7.1
5.8
CVE-2022-24301
In Minetest before 5.4.0, players can add or subtract items from a different player's inventory.
[ "cpe:2.3:a:minetest:minetest:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*" ]
null
6.5
null
6.4
GHSA-4f4x-g56g-xrm8
A vulnerability in the web-based management interface of Cisco Smart Software Manager Satellite could allow an authenticated, remote attacker to conduct SQL injection attacks on an affected system. The vulnerability exists because the web-based management interface improperly validates values within SQL queries. An attacker could exploit this vulnerability by authenticating to the application and sending malicious SQL queries to an affected system. A successful exploit could allow the attacker to modify values on or return values from the underlying database or the operating system.
[]
null
null
null
null
GHSA-x4r7-xqx2-rrpj
Fuji Electric V-Server 4.0.3.0 and prior, A use after free vulnerability has been identified, which may allow remote code execution.
[]
null
null
9.8
null
GHSA-7qqp-g74r-7vjv
The unofficial SwiftLint extension before 1.4.5 for Visual Studio Code allows remote attackers to execute arbitrary code by constructing a malicious workspace with a crafted swiftlint.path configuration value that triggers execution upon opening the workspace.
[]
null
null
null
null
CVE-2006-5826
Buffer overflow in Texas Imperial Software WFTPD Pro Server 3.23.1.1 allows remote authenticated users to execute arbitrary code or cause a denial of service (application crash) via crafted APPE commands that contain "/" (slash) or "\" (backslash) characters.
[ "cpe:2.3:a:texas_imperial_software:wftpd:3.23.1.1:*:pro:*:*:*:*:*" ]
null
null
null
5.8
GHSA-j5xp-cqqg-c5jq
In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Mobile MDM9650, SD 210/SD 212/SD 205, SD 410/12, SD 430, SD 450, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 808, SD 810, SD 820, and SD 835, while printing debug message of a pointer in wlan_qmi_err_cb, the real kernel address will be printed regardless of the kptr_restrict system settings.
[]
null
null
7.5
null
CVE-2017-10989
The getNodeSize function in ext/rtree/rtree.c in SQLite through 3.19.3, as used in GDAL and other products, mishandles undersized RTree blobs in a crafted database, leading to a heap-based buffer over-read or possibly unspecified other impact.
[ "cpe:2.3:a:sqlite:sqlite:*:*:*:*:*:*:*:*" ]
null
null
9.8
7.5
CVE-2021-24162
Responsive Menu < 4.0.4 - CSRF to Settings Update
In the Reponsive Menu (free and Pro) WordPress plugins before 4.0.4, attackers could craft a request and trick an administrator into importing all new settings. These settings could be modified to include malicious JavaScript, therefore allowing an attacker to inject payloads that could aid in further infection of the site.
[ "cpe:2.3:a:expresstech:responsive_menu:*:*:*:*:free:wordpress:*:*", "cpe:2.3:a:expresstech:responsive_menu:*:*:*:*:pro:wordpress:*:*" ]
null
8.8
null
6.8
CVE-2023-25915
Authenticated Remote Command Execution in Danfoss AK-SM800A
Due to improper input validation, an authenticated remote attacker could execute arbitrary commands on the target system.
[ "cpe:2.3:o:danfoss:ak-sm_800a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:danfoss:ak-sm_800a_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:danfoss:ak-sm_800a:-:*:*:*:*:*:*:*" ]
null
9.9
null
null
GHSA-xr6p-m6mj-h42c
Just like in the previous report, an attacker could steal the account of different users. But in this case, it's a little bit more specific, because it is needed to be an editor in the same app as the victim.
[]
null
4.9
null
null
GHSA-jrv7-j2hm-r7h8
A write protection and execution bypass vulnerability in McAfee (now Intel Security) Application Control (MAC) 6.1.0 for Linux and earlier allows authenticated users to change binaries that are part of the Application Control whitelist and allows execution of binaries via specific conditions.
[]
null
null
5.5
null
GHSA-p3mm-64pw-w23h
The Guest Support – Complete customer support ticket system for WordPress plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the 'deleteMassTickets' function in all versions up to, and including, 1.2.2. This makes it possible for unauthenticated attackers to delete arbitrary support tickets.
[]
null
5.3
null
null
GHSA-w8g3-3xjr-4mq8
IBM QRadar Data Synchronization App 1.0 through 3.0.1 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 217370.
[]
null
4.4
null
null
CVE-2009-1127
win32k.sys in the kernel in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 Gold and SP2 does not correctly validate an argument to an unspecified system call, which allows local users to gain privileges via a crafted application that triggers a NULL pointer dereference, aka "Win32k NULL Pointer Dereferencing Vulnerability."
[ "cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2003_server:*:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2003_server:*:sp2:itanium:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2003_server:*:sp2:x64:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:*:x32:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:*:x64:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x32:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:gold:itanium:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:itanium:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:*:*:x64:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:*" ]
null
null
null
7.2
CVE-2018-8736
A privilege escalation vulnerability in Nagios XI 5.2.x through 5.4.x before 5.4.13 allows an attacker to leverage an RCE vulnerability escalating to root.
[ "cpe:2.3:a:nagios:nagios_xi:*:*:*:*:*:*:*:*" ]
null
null
8.8
9
GHSA-55xr-gqp7-q7ff
An issue was discovered in Moxa SoftCMS versions prior to Version 1.6. Moxa SoftCMS Webserver does not properly validate input. An attacker could provide unexpected values and cause the program to crash or excessive consumption of resources could result in a denial-of-service condition.
[]
null
null
7.5
null
GHSA-qj4p-48x3-w6gm
Cross-site scripting (XSS) vulnerability in the administrator panel in phpForm.net LinkBase 2.0 allows remote attackers to inject arbitrary web script or HTML via the username in a registration, which is not properly handled when the administrator accesses the Users menu.
[]
null
null
null
null
GHSA-w67j-pm6m-f39v
Multiple cross-site scripting (XSS) vulnerabilities in index.php in TomatoCMS before 2.0.5 allow remote authenticated users, with "Add new article" privileges, to inject arbitrary web script or HTML via the (1) title, (2) subTitle, and (3) author parameters in conjunction with a /admin/news/article/add PATH_INFO.
[]
null
null
null
null
GHSA-56q8-wv5h-r272
Cross-site scripting (XSS) vulnerability in McAfee Email and Web Security (EWS) 5.5 through Patch 6 and 5.6 through Patch 3, and McAfee Email Gateway (MEG) 7.0.0 and 7.0.1, allows remote attackers to inject arbitrary web script or HTML via vectors related to the McAfee Security Appliance Management Console/Dashboard.
[]
null
null
null
null
GHSA-xhxm-p3qv-qprc
By tricking the browser with a `X-Frame-Options` header, a sandboxed iframe could have presented a button that, if clicked by a user, would bypass restrictions to open a new window. This vulnerability affects Firefox < 127 and Firefox ESR < 115.12.
[]
null
4.7
null
null
GHSA-9p6f-v932-mfxm
GNOME Evolution through 3.28.2 is prone to OpenPGP signatures being spoofed for arbitrary messages using a specially crafted email that contains a valid signature from the entity to be impersonated as an attachment.
[]
null
null
6.5
null
CVE-2015-9417
The testimonial-slider plugin through 1.2.1 for WordPress has CSRF with resultant XSS.
[ "cpe:2.3:a:slidervilla:testimonial_slider:*:*:*:*:*:wordpress:*:*" ]
null
6.5
null
4.3
GHSA-3qmr-hmpr-mv37
An issue was discovered in Docker Desktop through 2.2.0.5 on Windows. If a local attacker sets up their own named pipe prior to starting Docker with the same name, this attacker can intercept a connection attempt from Docker Service (which runs as SYSTEM), and then impersonate their privileges.
[]
null
7.8
null
null
CVE-2011-2887
IBM Lotus Symphony 3 before FP3 on Linux allows remote attackers to cause a denial of service (application crash) via a certain sample document.
[ "cpe:2.3:a:ibm:lotus_symphony:3.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_symphony:3.0.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_symphony:3.0.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
null
null
null
4.3
GHSA-jmf8-63p5-c49j
An Unrestricted Upload of File with Dangerous Type vulnerability in the Ajaxmanager File and Database explorer (ajaxmanager) module for PrestaShop through 2.3.0, allows remote attackers to upload dangerous files without restrictions.
[]
null
9.8
null
null
GHSA-f3vr-r77c-3q85
Aterm HC100RC Ver1.0.1 and earlier allows attacker with administrator rights to execute arbitrary OS commands via FactoryPassword parameter or bootmode parameter of a certain URL.
[]
null
null
7.2
null
GHSA-hwwj-8rjh-78m2
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in LambertGroup SHOUT allows SQL Injection. This issue affects SHOUT: from n/a through 3.5.3.
[]
null
8.5
null
null
GHSA-x36v-pwx4-c656
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
[]
null
null
null
null
CVE-2017-1086
In FreeBSD before 11.1-STABLE, 11.1-RELEASE-p4, 11.0-RELEASE-p15, 10.4-STABLE, 10.4-RELEASE-p3, and 10.3-RELEASE-p24, not all information in the struct ptrace_lwpinfo is relevant for the state of any thread, and the kernel does not fill the irrelevant bytes or short strings. Since the structure filled by the kernel is allocated on the kernel stack and copied to userspace, a leak of information of the kernel stack of the thread is possible from the debugger. As a result, some bytes from the kernel stack of the thread using ptrace (PT_LWPINFO) call can be observed in userspace.
[ "cpe:2.3:o:freebsd:freebsd:-:*:*:*:*:*:*:*" ]
null
null
3.3
2.1
CVE-2024-29064
Windows Hyper-V Denial of Service Vulnerability
Windows Hyper-V Denial of Service Vulnerability
[ "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*" ]
null
6.2
null
null
GHSA-xqp9-w6xm-qf2v
Microsoft Message Queuing Remote Code Execution Vulnerability
[]
null
9.8
null
null
GHSA-p598-2cg3-8qjf
The showHelp() function in Microsoft Internet Explorer 5.01, 5.5, and 6.0 supports certain types of pluggable protocols that allow remote attackers to bypass the cross-domain security model and execute arbitrary code, aka "Improper Cross Domain Security Validation with ShowHelp functionality."
[]
null
null
null
null
GHSA-4j38-wjhf-884r
Arbitrary code execution in Richfaces
JBoss RichFaces 3.1.0 through 3.3.4 allows unauthenticated remote attackers to inject expression language (EL) expressions and execute arbitrary Java code via a /DATA/ substring in a path with an org.richfaces.renderkit.html.Paint2DResource$ImageData object, aka RF-14310.
[]
null
null
9.8
null
CVE-2016-9398
The jpc_floorlog2 function in jpc_math.c in JasPer before 1.900.17 allows remote attackers to cause a denial of service (assertion failure) via unspecified vectors.
[ "cpe:2.3:a:jasper_project:jasper:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_desktop:12:sp2:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_server:12:sp2:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_server:12:sp2:*:*:*:*:raspberry_pi:*", "cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp2:*:*:*:*:*:*" ]
null
7.5
null
5
GHSA-qvfg-7rq7-85cm
The dissect_wa_payload function in epan/dissectors/packet-waveagent.c in the WaveAgent dissector in Wireshark 1.12.x before 1.12.7 mishandles large tag values, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
[]
null
null
null
null
GHSA-jmf4-pq78-f8vj
Moderate severity vulnerability that affects org.apache.hive:hive-jdbc
In Apache Hive 2.3.3, 3.1.0 and earlier, Hive "EXPLAIN" operation does not check for necessary authorization of involved entities in a query. An unauthorized user can do "EXPLAIN" on arbitrary table or view and expose table metadata and statistics.
[]
null
null
4.3
null
RHBA-2019:0885
Red Hat Bug Fix Advisory: Red Hat Ansible Tower 3.4.3-4 - Container
Tower: credentials leaked through environment variables
[ "cpe:/a:redhat:ansible_tower:3.4::el7" ]
null
null
7.2
null
CVE-2021-47259
NFS: Fix use-after-free in nfs4_init_client()
In the Linux kernel, the following vulnerability has been resolved: NFS: Fix use-after-free in nfs4_init_client() KASAN reports a use-after-free when attempting to mount two different exports through two different NICs that belong to the same server. Olga was able to hit this with kernels starting somewhere between 5.7 and 5.10, but I traced the patch that introduced the clear_bit() call to 4.13. So something must have changed in the refcounting of the clp pointer to make this call to nfs_put_client() the very last one.
[ "cpe:2.3:o:linux:linux_kernel:4.13:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*" ]
null
7.5
null
null
GHSA-2qc8-39fh-f2v4
Multiple PHP remote file inclusion vulnerabilities in FreeSchool 1.1.0 and earlier allow remote attackers to execute arbitrary PHP code via a URL in the CLASSPATH parameter to (1) bib_form.php, (2) bib_pldetails.php, (3) bib_plform.php, (4) bib_plsearchc.php, (5) bib_plsearchs.php, (6) bib_save.php, (7) bib_searchc.php, (8) bib_searchs.php, (9) edi_form.php, (10) edi_save.php, (11) gen_form.php, (12) gen_save.php, (13) lin_form.php, (14) lin_save.php, (15) luo_form.php, (16) luo_save.php, (17) sog_form.php, or (18) sog_save.php in biblioteca/; (19) cal_insert.php, (20) cal_save.php, or (21) cal_saveactivity.php in calendario/; (22) circolari/cir_save.php; or (23) modulistica/mdl_save.php.
[]
null
null
null
null
GHSA-cp62-q2rf-23j7
Unrestricted file upload vulnerability in upload.php in SeeBlick 1.0 Beta allows remote attackers to upload arbitrary files via unspecified vectors. NOTE: these files are stored with .html extensions, so the scope of the attack might be limited to resource consumption and possibly XSS.
[]
null
null
null
null
CVE-2022-38236
XPDF commit ffaf11c was discovered to contain a global-buffer overflow via Lexer::getObj(Object*) at /xpdf/Lexer.cc.
[ "cpe:2.3:a:xpdf_project:xpdf:3.04:*:*:*:*:*:*:*" ]
null
7.8
null
null
CVE-2020-35918
An issue was discovered in the branca crate before 0.10.0 for Rust. Decoding tokens (with invalid base62 data) can panic.
[ "cpe:2.3:a:hakobaito:branca:*:*:*:*:*:rust:*:*" ]
null
5.5
null
4.9
GHSA-qm34-9r78-66cq
ScienceLogic SL1 (formerly EM7) is affected by an unspecified vulnerability involving an unspecified third-party component packaged with SL1. The vulnerability is addressed in SL1 versions 12.1.3+, 12.2.3+, and 12.3+. Remediations have been made available for all SL1 versions back to version lines 10.1.x, 10.2.x, 11.1.x, 11.2.x, and 11.3.x.
[]
9.3
9.8
null
null
GHSA-g3x6-r9w9-mcxx
A Remote Code Execution (RCE) vulnerability was identified in GitHub Enterprise Server that allowed attackers to execute arbitrary code by exploiting the pre-receive hook functionality, potentially leading to privilege escalation and system compromise. The vulnerability involves using dynamically allocated ports that become temporarily available, such as during a hot patch upgrade. This means the vulnerability is only exploitable during specific operational conditions, which limits the attack window. Exploitation required either site administrator permissions to enable and configure pre-receive hooks or a user with permissions to modify repositories containing pre-receive hooks where this functionality was already enabled. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.17 and was fixed in versions 3.16.2, 3.15.6, 3.14.11, 3.13.14. This vulnerability was reported via the GitHub Bug Bounty program.
[]
7.1
null
null
null
CVE-2019-10621
Use after free issue when MAP and UNMAP calls at same time as data structure used my MAP may be freed by UNMAP function in Snapdragon Auto, Snapdragon Compute, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music in Nicobar, QCS405, Rennell, Saipan, SC8180X, SDX55, SM6150, SM7150, SM8150, SM8250, SXR2130
[ "cpe:2.3:o:qualcomm:nicobar_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:nicobar:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcs405_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcs405:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:rennell_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:rennell:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:saipan_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:saipan:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sc8180x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sc8180x:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdx55:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm6150_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm6150:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm7150_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm7150:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm8150_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm8150:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm8250_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm8250:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sxr2130_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sxr2130:-:*:*:*:*:*:*:*" ]
null
7.8
null
4.6
CVE-2024-37948
WordPress Caxton – Create Pro page layouts in Gutenberg plugin <= 1.30.1 - Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in PootlePress Caxton – Create Pro page layouts in Gutenberg allows Stored XSS.This issue affects Caxton – Create Pro page layouts in Gutenberg: from n/a through 1.30.1.
[]
null
6.5
null
null
CVE-2004-0437
Titan FTP Server version 3.01 build 163, and possibly other versions before build 169, allows remote authenticated users to cause a denial of service (crash) by disconnecting from the system during a "LIST -L" command, which causes Titan to access an invalid socket.
[ "cpe:2.3:a:south_river_technologies:titan_ftp_server:3.01_build_163:*:*:*:*:*:*:*" ]
null
null
null
5
GHSA-62rq-cf48-633w
In telecom service, there is a possible missing permission check. This could lead to local denial of service with no additional execution privileges needed
[]
null
5.5
null
null
CVE-2014-5504
SolarWinds Log and Event Manager before 6.0 uses "static" credentials, which makes it easier for remote attackers to obtain access to the database and execute arbitrary code via unspecified vectors, related to HyperSQL.
[ "cpe:2.3:a:solarwinds:log_and_event_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:solarwinds:log_and_event_manager:5.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:solarwinds:log_and_event_manager:5.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:solarwinds:log_and_event_manager:5.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:solarwinds:log_and_event_manager:5.6.0:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-pq29-2m6m-938v
global heap buffer overflow in skip_range in GitHub repository vim/vim prior to 8.2.4763. This vulnerability is capable of crashing software, Bypass Protection Mechanism, Modify Memory, and possible remote execution
[]
null
7.8
null
null
RHSA-2025:1285
Red Hat Security Advisory: RHTAS 1.1.1 - Red Hat Trusted Artifact Signer Release
golang.org/x/crypto/ssh: Misuse of ServerConfig.PublicKeyCallback may cause authorization bypass in golang.org/x/crypto
[ "cpe:/a:redhat:trusted_artifact_signer:1.1::el9" ]
null
8.2
null
null
CVE-2008-5658
Directory traversal vulnerability in the ZipArchive::extractTo function in PHP 5.2.6 and earlier allows context-dependent attackers to write arbitrary files via a ZIP file with a file whose name contains .. (dot dot) sequences.
[ "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.0.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.0.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.0.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.0.0:beta4:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.0.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.0.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.0.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.2.5:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-9vx6-546g-266v
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in N Squared Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin.This issue affects Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin: from n/a before 1.6.6.1.
[]
null
7.6
null
null
GHSA-xx33-26x2-m77p
In sourcecodetester Engineers Online Portal as of 10-21-21, an attacker can manipulate the Host header as seen by the web application and cause the application to behave in unexpected ways. Very often multiple websites are hosted on the same IP address. This is where the Host Header comes in. This header specifies which website should process the HTTP request. The web server uses the value of this header to dispatch the request to the specified website. Each website hosted on the same IP address is called a virtual host. And It's possible to send requests with arbitrary Host Headers to the first virtual host.
[]
null
null
null
null
CVE-2010-2761
The multipart_init function in (1) CGI.pm before 3.50 and (2) Simple.pm in CGI::Simple 1.112 and earlier uses a hardcoded value of the MIME boundary string in multipart/x-mixed-replace content, which allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via crafted input that contains this value, a different vulnerability than CVE-2010-3172.
[ "cpe:2.3:a:andy_armstrong:cgi.pm:*:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:1.4:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:1.42:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:1.43:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:1.44:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:1.45:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:1.50:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:1.51:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:1.52:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:1.53:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:1.54:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:1.55:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:1.56:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:1.57:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.01:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.13:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.14:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.15:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.16:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.17:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.18:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.19:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.20:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.21:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.22:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.23:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.24:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.25:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.26:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.27:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.28:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.29:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.30:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.31:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.32:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.33:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.34:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.35:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.36:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.37:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.38:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.39:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.40:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.41:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.42:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.43:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.44:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.45:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.46:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.47:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.48:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.49:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.50:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.51:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.52:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.53:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.54:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.55:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.56:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.57:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.58:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.59:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.60:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.61:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.62:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.63:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.64:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.65:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.66:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.67:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.68:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.69:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.70:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.71:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.72:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.73:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.74:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.75:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.76:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.77:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.78:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.79:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.80:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.81:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.82:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.83:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.84:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.85:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.86:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.87:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.88:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.89:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.90:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.91:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.92:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.93:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.94:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.95:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.96:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.97:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.98:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.99:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.751:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:2.752:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:3.00:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:3.01:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:3.02:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:3.03:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:3.04:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:3.05:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:3.06:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:3.07:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:3.08:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:3.09:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:3.10:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:3.11:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:3.12:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:3.13:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:3.14:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:3.15:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:3.16:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:3.17:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:3.18:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:3.19:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:3.20:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:3.21:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:3.22:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:3.23:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:3.24:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:3.25:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:3.26:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:3.27:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:3.28:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:3.29:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:3.30:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:3.31:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:3.32:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:3.33:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:3.34:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:3.35:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:3.36:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:3.37:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:3.38:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:3.39:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:3.40:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:3.41:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:3.42:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:3.43:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:3.44:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:3.45:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:3.46:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:3.47:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi.pm:3.48:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi-simple:*:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi-simple:0.078:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi-simple:0.079:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi-simple:0.080:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi-simple:0.081:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi-simple:0.082:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi-simple:0.83:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi-simple:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi-simple:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi-simple:1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi-simple:1.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi-simple:1.103:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi-simple:1.104:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi-simple:1.105:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi-simple:1.106:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi-simple:1.107:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi-simple:1.108:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi-simple:1.109:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi-simple:1.110:*:*:*:*:*:*:*", "cpe:2.3:a:andy_armstrong:cgi-simple:1.111:*:*:*:*:*:*:*" ]
null
null
null
4.3
CVE-2021-30621
Chromium: CVE-2021-30621 UI Spoofing in Autofill
[ "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:edge:*:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:edge_chromium:*:*:*:*:*:*:*:*" ]
null
6.5
null
4.3
GHSA-8gc6-65mm-xr6r
Malicious Package in bp66
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.RecommendationAny computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
[]
null
9.1
null
null
GHSA-xj4f-h5gm-5gh9
Unspecified vulnerability in the SNMPv2c implementation in Cisco ACE Application Control Engine Module for Catalyst 6500 Switches and 7600 Routers before A2(1.3) and Cisco ACE 4710 Application Control Engine Appliance before A3(2.1) allows remote attackers to cause a denial of service (device reload) via a crafted SNMPv1 packet.
[]
null
null
null
null
CVE-2025-30561
WordPress CAS Maestro plugin <= 1.1.3 - CSRF to Stored XSS vulnerability
Cross-Site Request Forgery (CSRF) vulnerability in Henrique Mouta CAS Maestro allows Stored XSS. This issue affects CAS Maestro: from n/a through 1.1.3.
[]
null
7.1
null
null
GHSA-c9h3-w54v-5g3j
Possible Cross-Site Scripting (XSS) Vulnerabilityin eDirectory has been discovered in OpenText™ eDirectory 9.2.5.0000.
[]
null
5.4
null
null
CVE-2011-3160
Unspecified vulnerability in HP Data Protector Notebook Extension 6.20 and Data Protector for Personal Computers 7.0 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1228.
[ "cpe:2.3:a:hp:data_protector_for_personal_computers:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:hp:data_protector_notebook_extension:6.20:*:*:*:*:*:*:*" ]
null
null
null
10
GHSA-32mh-jmjq-p49p
KACO New Energy XP100U Up to XP-JAVA 2.0 is affected by incorrect access control. Credentials will always be returned in plain-text from the local server during the KACO XP100U authentication process, regardless of whatever passwords have been provided, which leads to an information disclosure vulnerability.
[]
null
null
null
null
CVE-2012-5154
Integer overflow in Google Chrome before 24.0.1312.52 on Windows allows attackers to cause a denial of service or possibly have unspecified other impact via vectors related to allocation of shared memory.
[ "cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1272.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1272.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1273.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1274.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1275.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1276.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1276.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1277.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1278.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1279.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1280.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1281.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1281.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1281.2:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1281.3:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1282.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1283.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1284.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1284.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1284.2:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1285.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1285.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1285.2:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1286.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1286.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1287.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1287.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1288.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1288.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1289.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1289.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1290.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1290.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1290.2:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1291.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1291.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1292.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1292.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1293.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1294.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1295.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1296.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1296.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1297.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1298.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1298.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1299.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1300.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1301.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1301.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1301.2:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1302.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1303.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1304.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1304.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1305.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1305.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1305.2:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1305.3:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1305.4:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1306.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1306.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1307.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1307.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1308.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1309.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1310.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1311.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1311.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.2:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.3:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.4:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.5:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.6:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.7:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.8:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.9:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.10:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.11:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.12:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.13:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.14:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.15:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.16:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.17:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.18:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.19:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.20:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.21:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.22:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.23:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.24:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.25:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.26:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.27:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.28:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.29:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.30:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.31:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.32:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.33:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.34:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.35:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.36:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.37:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.38:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.39:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.40:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.41:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.42:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.43:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.44:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.45:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.46:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.47:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.48:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.49:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.50:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2025-30549
WordPress Yummly Rich Recipes plugin <= 4.2 - Cross Site Request Forgery (CSRF) vulnerability
Cross-Site Request Forgery (CSRF) vulnerability in Yummly Yummly Rich Recipes allows Cross Site Request Forgery. This issue affects Yummly Rich Recipes: from n/a through 4.2.
[]
null
4.3
null
null
GHSA-2cwh-9m9v-957f
Dzzoffice Version 2.02.1 is affected by cross-site scripting (XSS) due to a lack of sanitization of input data at all upload functions in webroot/dzz/attach/Uploader.class.php and return a wrong response in content-type of output data in webroot/dzz/attach/controller.php.
[]
null
null
null
null
GHSA-h9f9-5vmf-w2j3
On BIG-IP 14.0.0-14.1.0.1, 13.0.0-13.1.1.4, and 12.1.0-12.1.4, the Traffic Management Microkernel (TMM) may restart when a virtual server has an HTTP/2 profile with Application Layer Protocol Negotiation (ALPN) enabled and it processes traffic where the ALPN extension size is zero.
[]
null
7.5
null
null
GHSA-fqw9-5rf7-p2x8
Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
[]
null
8.8
null
null
GHSA-c335-497w-rpm6
GPAC v2.1-DEV-rev232-gfcaa01ebb-master was discovered to contain a stack overflow when processing ISOM_IOD.
[]
null
7.8
null
null
CVE-2020-27248
A specially crafted document can cause the document parser to copy data from a particular record type into a static-sized buffer within an object that is smaller than the size used for the copy, which will cause a heap-based buffer overflow. In version/Instance 0x0003 and 0x0014, an attacker can entice the victim to open a document to trigger this vulnerability. This affects SoftMaker Software GmbH SoftMaker Office PlanMaker 2021 (Revision 1014).
[ "cpe:2.3:a:softmaker:planmaker_2021:1014:*:*:*:*:*:*:*" ]
null
null
8.8
null
GHSA-6q78-6xvr-26fg
Jenkins Groovy Plugin sandbox bypass vulnerability
Jenkins Script Security sandbox protection could be circumvented during the script compilation phase by applying AST transforming annotations such as `@Grab` to source code elements.Both the pipeline validation REST APIs and actual script/pipeline execution are affected.This allowed users with Overall/Read permission, or able to control Jenkinsfile or sandboxed Pipeline shared library contents in SCM, to bypass the sandbox protection and execute arbitrary code on the Jenkins controller.All known unsafe AST transformations in Groovy are now prohibited in sandboxed scripts.
[]
null
8.8
null
null
CVE-2022-4861
Incorrect Implementation of Authentication Algorithm
Incorrect implementation in authentication protocol in M-Files Client before 22.5.11356.0 allows high privileged user to get other users tokens to another resource.
[ "cpe:2.3:a:m-files:m-files_client:*:*:*:*:*:*:*:*" ]
null
4.8
null
null
GHSA-f9h7-gj94-825h
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Sensei Sensei Pro (WC Paid Courses) allows Stored XSS.This issue affects Sensei Pro (WC Paid Courses): from n/a through 4.23.1.1.23.1.
[]
null
6.5
null
null
CVE-2019-19721
An off-by-one error in the DecodeBlock function in codec/sdl_image.c in VideoLAN VLC media player before 3.0.9 allows remote attackers to cause a denial of service (memory corruption) via a crafted image file. NOTE: this may be related to the SDL_Image product.
[ "cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*" ]
null
7.8
null
6.8
GHSA-xcp6-3jg8-q26g
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound WooCommerce Order Search allows Reflected XSS. This issue affects WooCommerce Order Search: from n/a through 1.1.0.
[]
null
7.1
null
null
CVE-2019-17609
HongCMS 3.0.0 has XSS via the install/index.php dbusername parameter.
[ "cpe:2.3:a:hongcms_project:hongcms:3.0.0:*:*:*:*:*:*:*" ]
null
6.1
null
4.3
GHSA-fc4p-683j-c929
Unspecified vulnerability in the kernel in Sun OpenSolaris 2009.06 allows remote attackers to cause a denial of service (panic) via unknown vectors, as demonstrated by the vd_solaris2 module in VulnDisco Pack Professional 8.12. NOTE: as of 20091203, this disclosure has no actionable information. However, because the VulnDisco Pack author is a reliable researcher, the issue is being assigned a CVE identifier for tracking purposes.
[]
null
null
null
null
CVE-2022-36776
IBM Cloud Pak for Security (CP4S) 1.10.0.0 79and 1.10.2.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 233663.
[ "cpe:2.3:a:ibm:cloud_pak_for_security:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*" ]
null
5.4
null
null
CVE-2024-3831
Enter Addons – Ultimate Template Builder for Elementor <= 2.1.5 - Authenticated (Contributor+) Stored Cross-Site Scripting via Heading widget
The Enter Addons – Ultimate Template Builder for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Heading widget in all versions up to, and including, 2.1.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor access or above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
6.4
null
null
CVE-2017-7931
In ABB IP GATEWAY 3.39 and prior, by accessing a specific uniform resource locator (URL) on the web server, a malicious user is able to access the configuration files and application pages without authentication.
[ "cpe:2.3:o:abb:ip_gateway_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:abb:ip_gateway:-:*:*:*:*:*:*:*" ]
null
null
9.8
7.5