id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
197k
cpes
listlengths
0
4.89k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
CVE-2024-53247
Remote Code Execution through Deserialization of Untrusted Data in Splunk Secure Gateway app
In Splunk Enterprise versions below 9.3.2, 9.2.4, and 9.1.7, and versions below 3.4.261 and 3.7.13 of the Splunk Secure Gateway app on Splunk Cloud Platform, a low-privileged user that does not hold the “admin“ or “power“ Splunk roles could perform a Remote Code Execution (RCE).
[]
null
8.8
null
null
GHSA-qv6p-gp52-43vj
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Rami Yushuvaev Pastebin allows Stored XSS.This issue affects Pastebin: from n/a through 1.5.
[]
null
6.5
null
null
CVE-2019-5230
P20 Pro, P20, Mate RS smartphones with versions earlier than Charlotte-AL00A 9.1.0.321(C00E320R1P1T8), versions earlier than Emily-AL00A 9.1.0.321(C00E320R1P1T8), versions earlier than NEO-AL00D NEO-AL00 9.1.0.321(C786E320R1P1T8) have an improper validation vulnerability. The system does not perform a properly validation of certain input models, an attacker could trick the user to install a malicious application then craft a malformed model, successful exploit could allow the attacker to get and tamper certain output data information.
[ "cpe:2.3:o:huawei:p20_pro_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:p20_pro:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:p20_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:p20:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:mate_rs_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:mate_rs:-:*:*:*:*:*:*:*" ]
null
5.5
null
4.3
CVE-2006-0280
Unspecified vulnerability in Oracle PeopleSoft Enterprise Portal 8.4 Bundle 15, 8.8 Bundle 10, and 8.9 Bundle 2 has unspecified impact and attack vectors, as identified by Oracle Vuln# PSE01.
[ "cpe:2.3:a:oracle:peoplesoft_enterprise_portal:8.4:bundle15:*:*:*:*:*:*", "cpe:2.3:a:oracle:peoplesoft_enterprise_portal:8.8:bundle10:*:*:*:*:*:*", "cpe:2.3:a:oracle:peoplesoft_enterprise_portal:8.9:bundle2:*:*:*:*:*:*" ]
null
null
null
10
PYSEC-2017-139
null
There is a heap-based buffer overflow in the Exiv2::s2Data function of types.cpp in Exiv2 0.26. A Crafted input will lead to a denial of service attack.
[]
null
null
5.5
null
CVE-2009-2006
Multiple cross-site scripting (XSS) vulnerabilities in Dokeos 1.8.5, and possibly earlier, allow remote attackers to inject arbitrary web script or HTML via the (1) search_term parameter to main/auth/courses.php; the (2) frm_title and (3) frm_content parameters in a new personal agenda item action; the (4) title and (5) tutor_name parameters in a new course action; and the (6) student and (7) course parameters to main/mySpace/myStudents.php. NOTE: vectors 2 and 3 might only be exploitable via a separate CSRF vulnerability.
[ "cpe:2.3:a:dokeos:dokeos:1.8.5:*:*:*:*:*:*:*" ]
null
null
null
2.6
GHSA-7mvr-5x2g-wfc8
Bootstrap Cross-site Scripting vulnerability
In Bootstrap starting in version 2.3.0 and prior to versions 3.4.0 and 4.1.2, XSS is possible in the data-container property of tooltip. This is similar to CVE-2018-14041.
[]
null
null
6.1
null
GHSA-pgj3-fh25-fqr8
A missing authentication for critical function vulnerability has been reported to affect myQNAPcloud Link. If exploited, the vulnerability could allow users with the privilege level of some functionality via a network.We have already fixed the vulnerability in the following version: myQNAPcloud Link 2.4.51 and later
[]
null
9.9
null
null
GHSA-xg2r-m5g9-vr82
The JSON datasource plugin ( https://grafana.com/grafana/plugins/marcusolsson-json-datasource/ https://grafana.com/grafana/plugins/marcusolsson-json-datasource/ ) is a Grafana Labs maintained plugin for Grafana that allows for retrieving and processing JSON data from a remote endpoint (including a specific sub-path) configured by an administrator. Due to inadequate sanitization of the dashboard-supplied path parameter, it was possible to include path traversal characters (../) in the path parameter and send requests to paths on the configured endpoint outside the configured sub-path.In the rare case that this plugin is configured by an administrator to point back at the Grafana instance itself, this vulnerability becomes considerably more severe, as an administrator browsing a maliciously configured panel could be compelled to make requests to Grafana administrative API endpoints with their credentials, resulting in the potential for privilege escalation, hence the high score for this vulnerability.
[]
null
8
null
null
GHSA-9mv7-pqrg-f2x8
Unspecified vulnerability in EMC RSA Archer GRC Platform 5.x before 5.5 SP1 allows remote authenticated users to gain privileges via unknown vectors.
[]
null
null
null
null
CVE-2025-49980
WordPress WP User Profile Avatar plugin <= 1.0.6 - Broken Access Control Vulnerability
Missing Authorization vulnerability in WP Event Manager WP User Profile Avatar allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects WP User Profile Avatar: from n/a through 1.0.6.
[]
null
4.3
null
null
GHSA-jp22-8r3p-f4wr
A cross-site scripting (XSS) vulnerability in /hoteldruid/visualizza_contratto.php of Hoteldruid v3.0.5 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the destinatario_email1 parameter.
[]
null
5.4
null
null
GHSA-85r7-w5mv-c849
Rack Vulnerable to Path Traversal
`rack/file.rb` (`Rack::File`) in Rack 1.5.x before 1.5.2 and 1.4.x before 1.4.5 allows attackers to access arbitrary files outside the intended root directory via a crafted `PATH_INFO` environment variable, probably a directory traversal vulnerability that is remotely exploitable, aka "symlink path traversals."
[]
null
null
null
null
GHSA-694m-jhr9-pf77
Doorkeeper subject to Incorrect Permission Assignment
Doorkeeper version 4.2.0 and later contains a Incorrect Access Control vulnerability in Token revocation API's authorized method that can result in Access tokens are not revoked for public OAuth apps, leaking access until expiry.
[]
null
null
7.5
null
RHSA-2007:0387
Red Hat Security Advisory: tcpdump security and bug fix update
tcpdump denial of service tcpdump BGP integer overflow
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
GHSA-rvwx-j74j-gwp8
A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0739, CVE-2019-0752, CVE-2019-0753.
[]
null
null
7.5
null
GHSA-crgh-9gf9-cqq9
Critical unrestricted file upload vulnerability in HubBank affecting version 1.0.2. This vulnerability allows a registered user to upload malicious PHP files via upload document fields, resulting in webshell execution.
[]
null
9.9
null
null
GHSA-gj48-w74w-8gvm
Path Traversal in TYPO3 Core
Due to a too loose type check in an API method, attackers could bypass the directory traversal check by providing an invalid UTF-8 encoding sequence.
[]
null
null
null
null
GHSA-5q29-f827-q5cx
A Plaintext Storage of a Password issue was discovered in Moxa OnCell G3110-HSPA Version 1.3 build 15082117 and previous versions, OnCell G3110-HSDPA Version 1.2 Build 09123015 and previous versions, OnCell G3150-HSDPA Version 1.4 Build 11051315 and previous versions, OnCell 5104-HSDPA, OnCell 5104-HSPA, and OnCell 5004-HSPA. The application's configuration file contains parameters that represent passwords in plaintext.
[]
null
null
9.8
null
GHSA-666j-5q83-85fx
The installation of Dantz Retrospect Client 5.0.540 on MacOS X 10.2.6, and possibly other versions, creates critical directories and files with world-writable permissions, which allows local users to gain privileges as other users by replacing programs with malicious code.
[]
null
null
null
null
GHSA-vvhw-w8wg-x5wc
Windows Graphics Component Remote Code Execution Vulnerability
[]
null
7.8
null
null
CVE-2017-12527
A Remote Code Execution vulnerability in HPE Intelligent Management Center (iMC) PLAT version PLAT 7.3 (E0504) was found. The problem was resolved in HPE Intelligent Management Center PLAT v7.3 (E0506) or any subsequent version.
[ "cpe:2.3:a:hp:intelligent_management_center:7.3:e0504:*:*:*:*:*:*" ]
null
null
8.8
9
CVE-2023-0660
Smart Slider 3 < 3.5.1.14 - Contributor+ Stored XSS
The Smart Slider 3 WordPress plugin before 3.5.1.14 does not properly validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks
[ "cpe:2.3:a:nextendweb:smart_slider_3:*:*:*:*:*:wordpress:*:*" ]
null
5.4
null
null
CVE-2025-2194
MRCMS org.marker.mushroom.controller.FileController list.do list cross site scripting
A vulnerability was found in MRCMS 3.1.2 and classified as problematic. This issue affects the function list of the file /admin/file/list.do of the component org.marker.mushroom.controller.FileController. The manipulation of the argument path leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
[]
5.1
3.5
3.5
4
GHSA-x2qc-gfcm-c5m4
The WordPress File Upload Free and Pro WordPress plugins before 4.16.3 allow users with a role as low as Contributor to perform path traversal via a shortcode argument, which can then be used to upload a PHP code disguised as an image inside the auto-loaded directory of the plugin, resulting in arbitrary code execution.
[]
null
8.8
null
null
GHSA-qfr6-h2pc-2893
Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow vulnerability via put_unweighted_pred_16_fallback in fallback-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted video file.
[]
null
6.5
null
null
GHSA-rphm-c8gw-3r38
OS Command Injection in lifion-verify-deps
lifion-verify-dependencies through 1.1.0 is vulnerable to OS command injection via a crafted dependency name on the scanned project's package.json file.
[]
null
8.8
null
null
GHSA-q6rc-73hq-57jq
Guangzhou NetEase Mail Master 4.14.1.1004 on Windows has a DLL hijacking vulnerability. Attackers can use this vulnerability to execute malicious code.
[]
null
null
null
null
GHSA-32gq-pfjx-x48v
An unspecified action handler in the management console in Symantec Endpoint Protection Manager (SEPM) 12.1 before 12.1-RU6-MP1 allows remote authenticated users to read arbitrary files via unknown vectors.
[]
null
null
null
null
GHSA-h7rw-gcq3-87vf
Array index error in Microsoft Word 2002 SP3 and Office 2004 for Mac allows remote attackers to execute arbitrary code via a crafted Word document that triggers memory corruption, aka "Word Index Vulnerability."
[]
null
null
null
null
CVE-2024-23832
Mastodon Remote user impersonation and takeover
Mastodon is a free, open-source social network server based on ActivityPub Mastodon allows configuration of LDAP for authentication. Due to insufficient origin validation in all Mastodon, attackers can impersonate and take over any remote account. Every Mastodon version prior to 3.5.17 is vulnerable, as well as 4.0.x versions prior to 4.0.13, 4.1.x version prior to 4.1.13, and 4.2.x versions prior to 4.2.5.
[ "cpe:2.3:a:joinmastodon:mastodon:*:*:*:*:*:*:*:*" ]
null
9.4
null
null
CVE-2007-1121
Multiple SQL injection vulnerabilities in Mathis Dirksen-Thedens ZephyrSoft Toolbox Address Book Continued (ABC) 1.00 allow remote attackers to execute arbitrary SQL commands via the id parameter to the (1) updateRow and (2) deleteRow functions in functions.php. NOTE: some of these details are obtained from third party information.
[ "cpe:2.3:a:zephyrsoft_toolbox:address_book_continued:1.00:*:*:*:*:*:*:*", "cpe:2.3:a:zephyrsoft_toolbox:address_book_continued:1.01:*:*:*:*:*:*:*" ]
null
null
null
6.4
CVE-2017-10612
Junos Space: Persistent Cross site scripting in Junos Space
A persistent site scripting vulnerability in Juniper Networks Junos Space allows users who can change certain configuration to implant malicious Javascript or HTML which may be used to steal information or perform actions as other Junos Space users or administrators. Affected releases are Juniper Networks Junos Space all versions prior to 17.1R1.
[ "cpe:2.3:a:juniper:junos_space:*:*:*:*:*:*:*:*" ]
null
null
8
null
CVE-2022-45078
WordPress User Blocker Plugin <= 1.5.5 is vulnerable to CSV Injection
Improper Neutralization of Formula Elements in a CSV File vulnerability in Solwin Infotech User Blocker.This issue affects User Blocker: from n/a through 1.5.5.
[ "cpe:2.3:a:solwininfotech:user_blocker:*:*:*:*:*:wordpress:*:*" ]
null
7.2
null
null
CVE-2024-34357
TYPO3 vulnerable to Cross-Site Scripting in ShowImageController
TYPO3 is an enterprise content management system. Starting in version 9.0.0 and prior to versions 9.5.48 ELTS, 10.4.45 ELTS, 11.5.37 LTS, 12.4.15 LTS, and 13.1.1, failing to properly encode user-controlled values in file entities, the `ShowImageController` (`_eID tx_cms_showpic_`) is vulnerable to cross-site scripting. Exploiting this vulnerability requires a valid backend user account with access to file entities. TYPO3 versions 9.5.48 ELTS, 10.4.45 ELTS, 11.5.37 LTS, 12.4.15 LTS, 13.1.1 fix the problem described.
[]
null
5.4
null
null
RHSA-2025:3212
Red Hat Security Advisory: kernel security update
kernel: arm64: cacheinfo: Avoid out-of-bounds write to cacheinfo array
[ "cpe:/a:redhat:rhel_eus:9.2::appstream", "cpe:/a:redhat:rhel_eus:9.2::crb", "cpe:/o:redhat:rhel_eus:9.2::baseos" ]
null
7
null
null
GHSA-6rg9-2mxg-6j38
H3C Magic R100 R100V100R005 was discovered to contain a stack overflow vulnerability via the Asp_SetTimingtimeWifiAndLed parameter at /goform/aspForm.
[]
null
9.8
null
null
GHSA-8gv2-jv6w-q9f2
Caucho Resin Professional 3.1.0 and Caucho Resin 3.1.0 and earlier for Windows allows remote attackers to obtain the system path via certain URLs associated with (1) deploying web applications or (2) displaying .xtp files.
[]
null
null
null
null
PYSEC-2021-88
null
Zope is an open-source web application server. In Zope versions prior to 4.6 and 5.2, users can access untrusted modules indirectly through Python modules that are available for direct use. By default, only users with the Manager role can add or edit Zope Page Templates through the web, but sites that allow untrusted users to add/edit Zope Page Templates through the web are at risk from this vulnerability. The problem has been fixed in Zope 5.2 and 4.6. As a workaround, a site administrator can restrict adding/editing Zope Page Templates through the web using the standard Zope user/role permission mechanisms. Untrusted users should not be assigned the Zope Manager role and adding/editing Zope Page Templates through the web should be restricted to trusted users only.
[]
null
null
null
null
GHSA-p762-67q5-3hrq
Memory corruption while processing FIPS encryption or decryption IOCTL call invoked from user-space.
[]
null
7.8
null
null
CVE-2008-0865
Unspecified vulnerability in BEA WebLogic Portal 8.1 through SP6 allows remote attackers to bypass entitlements for instances of a floatable WLP portlet via unknown vectors.
[ "cpe:2.3:a:bea_systems:weblogic_portal:8.1_sp6:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:weblogic_portal:8.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:weblogic_portal:8.1:sp1:*:*:*:*:*:*", "cpe:2.3:a:oracle:weblogic_portal:8.1:sp2:*:*:*:*:*:*", "cpe:2.3:a:oracle:weblogic_portal:8.1:sp3:*:*:*:*:*:*", "cpe:2.3:a:oracle:weblogic_portal:8.1:sp4:*:*:*:*:*:*", "cpe:2.3:a:oracle:weblogic_portal:8.1:sp5:*:*:*:*:*:*" ]
null
null
null
5
PYSEC-2021-2
null
Improper Access Control on Configurations Endpoint for the Stable API of Apache Airflow allows users with Viewer or User role to get Airflow Configurations including sensitive information even when `[webserver] expose_config` is set to `False` in `airflow.cfg`. This allowed a privilege escalation attack. This issue affects Apache Airflow 2.0.0.
[]
null
null
null
null
GHSA-fh8g-8q9x-xp22
Certain NETGEAR devices are affected by command injection by an unauthenticated attacker via the vulnerable /sqfs/lib/libsal.so.0.0 library used by a CGI application, as demonstrated by setup.cgi?token=';$HTTP_USER_AGENT;' with an OS command in the User-Agent field. This affects GC108P before 1.0.7.3, GC108PP before 1.0.7.3, GS108Tv3 before 7.0.6.3, GS110TPPv1 before 7.0.6.3, GS110TPv3 before 7.0.6.3, GS110TUPv1 before 1.0.4.3, GS710TUPv1 before 1.0.4.3, GS716TP before 1.0.2.3, GS716TPP before 1.0.2.3, GS724TPPv1 before 2.0.4.3, GS724TPv2 before 2.0.4.3, GS728TPPv2 before 6.0.6.3, GS728TPv2 before 6.0.6.3, GS752TPPv1 before 6.0.6.3, GS752TPv2 before 6.0.6.3, MS510TXM before 1.0.2.3, and MS510TXUP before 1.0.2.3.
[]
null
null
null
null
GHSA-cv4x-fvx8-c5xh
Suricata before 4.0.5 stops TCP stream inspection upon a TCP RST from a server. This allows detection bypass because Windows TCP clients proceed with normal processing of TCP data that arrives shortly after an RST (i.e., they act as if the RST had not yet been received).
[]
null
null
7.5
null
GHSA-qmh6-m8qq-5h2c
Missing Authorization vulnerability in webrangers Clear Sucuri Cache allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Clear Sucuri Cache: from n/a through 1.4.
[]
null
5.3
null
null
CVE-2013-6748
Buffer overflow in the ActiveX control in qp2.cab in IBM Lotus Quickr for Domino 8.5.1 before 8.5.1.42-001b allows remote attackers to execute arbitrary code via a crafted HTML document, a different vulnerability than CVE-2013-6749.
[ "cpe:2.3:a:ibm:lotus_quickr_for_domino:8.5.1:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2018-16329
In ImageMagick before 7.0.8-8, a NULL pointer dereference exists in the GetMagickProperty function in MagickCore/property.c.
[ "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*" ]
null
null
9.8
7.5
CVE-2025-47519
WordPress Easy PayPal Events <= 1.2.2 - Cross Site Request Forgery (CSRF) Vulnerability
Cross-Site Request Forgery (CSRF) vulnerability in Scott Paterson Easy PayPal Events allows Cross Site Request Forgery. This issue affects Easy PayPal Events: from n/a through 1.2.2.
[]
null
4.3
null
null
CVE-2010-5256
Untrusted search path vulnerability in CDisplay 1.8.1 allows local users to gain privileges via a Trojan horse TRACE32.DLL file in the current working directory, as demonstrated by a directory that contains a .cba file. NOTE: some of these details are obtained from third party information.
[ "cpe:2.3:a:cdisplay:cdisplay:1.8.1:*:*:*:*:*:*:*" ]
null
null
null
6.9
CVE-2018-1463
IBM SAN Volume Controller, IBM Storwize, IBM Spectrum Virtualize and IBM FlashSystem products ( 6.1, 6.2, 6.3, 6.4, 7.1, 7.2, 7.3, 7.4, 7.5, 7.6, 7.6.1, 7.7, 7.7.1, 7.8, 7.8.1, 8.1, and 8.1.1) could allow an authenticated user to access system files they should not have access to some of which could contain account credentials. IBM X-Force ID: 140368.
[ "cpe:2.3:o:ibm:storwize_v7000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ibm:storwize_v7000:-:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:storwize_v5000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ibm:storwize_v5000:-:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:storwize_v3700_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ibm:storwize_v3700:-:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:storwize_v3500_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ibm:storwize_v3500:-:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:storwize_v9000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ibm:storwize_v9000:-:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:san_volume_controller_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ibm:san_volume_controller:-:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:spectrum_virtualize:*:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:spectrum_virtualize_for_public_cloud:*:*:*:*:*:*:*:*" ]
null
6.5
null
4
GHSA-49mv-qwq8-fv9m
Buffer overflow in the IsComponentInstalled method in Internet Explorer 6.0, when used on Windows 2000 before SP4 or Windows XP before SP1, allows remote attackers to execute arbitrary code via JavaScript that calls IsComponentInstalled with a long first argument.
[]
null
null
null
null
GHSA-jq4q-qv4r-4w86
Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS - Web Services). The supported version that is affected is 10.3.6.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle WebLogic Server accessible data. CVSS 3.0 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N).
[]
null
null
6.5
null
RHSA-2017:0091
Red Hat Security Advisory: kernel-rt security and bug fix update
kernel: Use after free in tcp_xmit_retransmit_queue kernel: Use-after-free in the recvmmsg exit path kernel: Slab out-of-bounds access in sctp_sf_ootb()
[ "cpe:/a:redhat:rhel_extras_rt:7" ]
null
null
5.9
null
GHSA-c962-q9ch-7qhw
Nagios 4.4.5 allows an attacker, who already has administrative access to change the "URL for JSON CGIs" configuration setting, to modify the Alert Histogram and Trends code via crafted versions of the archivejson.cgi, objectjson.cgi, and statusjson.cgi files.
[]
null
null
null
null
GHSA-fw4p-36j9-rrj3
Denial of Service in sequelize
Versions of `sequelize` prior to 4.44.4 are vulnerable to Denial of Service (DoS). The SQLite dialect fails to catch a `TypeError` exception for the `results` variable. The `results` value may be undefined and trigger the error on a `.map` call. This may allow attackers to submit malicious input that forces the exception and crashes the Node process.The following proof-of-concept crashes the Node process:RecommendationUpgrade to version 4.44.4 or later.
[]
null
null
null
null
CVE-2014-7652
The Magicam Photo Magic Editor (aka mobi.magicam.editor) application 5.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[ "cpe:2.3:a:magicam_photo_magic_editor_project:magicam_photo_magic_editor:5:*:*:*:*:android:*:*" ]
null
null
null
5.4
CVE-2015-9401
The websimon-tables plugin through 1.3.4 for WordPress has wp-admin/tools.php edit_style id XSS.
[ "cpe:2.3:a:websimon-tables_project:websimon-tables:*:*:*:*:*:wordpress:*:*" ]
null
4.8
null
3.5
CVE-2022-49739
gfs2: Always check inode size of inline inodes
In the Linux kernel, the following vulnerability has been resolved: gfs2: Always check inode size of inline inodes Check if the inode size of stuffed (inline) inodes is within the allowed range when reading inodes from disk (gfs2_dinode_in()). This prevents us from on-disk corruption. The two checks in stuffed_readpage() and gfs2_unstuffer_page() that just truncate inline data to the maximum allowed size don't actually make sense, and they can be removed now as well.
[]
null
null
null
null
GHSA-xxf9-g9h4-3pmj
Directory traversal vulnerability in region.php in KML share 1.1 allows remote attackers to read arbitrary files via a .. (dot dot) in the layer parameter.
[]
null
null
null
null
GHSA-wmpm-fq7r-jq56
Imporoper path validation in elFinder.NetCore
This affects all versions of package elFinder.NetCore. The ExtractAsync function within the FileSystem is vulnerable to arbitrary extraction due to insufficient validation.
[]
null
9.8
null
null
CVE-2024-40697
IBM Common Licensing information disclosure
IBM Common Licensing 9.0 does not require that users should have strong passwords by default, which makes it easier for attackers to compromise user accounts. IBM X-Force ID: 297895.
[ "cpe:2.3:a:ibm:common_licensing:9.0:*:*:*:*:*:*:*" ]
null
7.5
null
null
GHSA-26jg-59fg-3j5v
Multiple PHP remote file inclusion vulnerabilities in Dmitry Sheiko SAPID Gallery 1.0 and earlier allow remote attackers to execute arbitrary PHP code via a URL in the (1) root_path parameter to (a) usr/extensions/get_calendar.inc.php or the (2) GLOBALS[root_path] parameter to (b) usr/extensions/get_tree.inc.php.
[]
null
null
null
null
GHSA-qfm5-c84w-r442
Multiple OS command injection vulnerabilities affecting Vonetsindustrial wifi bridge relays and wifi bridge repeaters, software versions 3.3.23.6.9 and prior, enable an authenticated remote attacker to execute arbitrary OS commands via various endpoint parameters.
[]
9.4
9.1
null
null
CVE-2025-53484
SecurePoll: Multiple locations vulnerable to Cross-Site Scripting (XSS) via unescaped input
User-controlled inputs are improperly escaped in: * VotePage.php (poll option input) * ResultPage::getPagesTab() and getErrorsTab() (user-controllable page names) This allows attackers to inject JavaScript and compromise user sessions under certain conditions. This issue affects Mediawiki - SecurePoll extension: from 1.39.X before 1.39.13, from 1.42.X before 1.42.7, from 1.43.X before 1.43.2.
[]
null
9.8
null
null
CVE-2021-34855
This vulnerability allows local attackers to disclose sensitive information on affected installations of Parallels Desktop 16.1.3 (49160). An attacker must first obtain the ability to execute low-privileged code on the target guest system in order to exploit this vulnerability. The specific flaw exists within the Toolgate component. The issue results from the lack of proper initialization of memory prior to accessing it. An attacker can leverage this in conjunction with other vulnerabilities to escalate privileges and execute arbitrary code in the context of the hypervisor. Was ZDI-CAN-13592.
[ "cpe:2.3:a:parallels:parallels_desktop:16.1.3:*:*:*:*:macos:*:*" ]
null
null
6.5
null
GHSA-69vw-w9h7-9c4r
TOTOLINK X5000R_V9.1.0cu.2089_B20211224 and X5000R_V9.1.0cu.2350_B20230313 were discovered to contain a remote code execution (RCE) vulnerability via the lang parameter in the setLanguageCfg function.
[]
null
9.8
null
null
GHSA-5jrx-2w68-hx2j
A vulnerability in the Cisco Umbrella Enterprise Roaming Client (ERC) could allow an authenticated, local attacker to elevate privileges to Administrator. To exploit the vulnerability, the attacker must authenticate with valid local user credentials. This vulnerability is due to improper implementation of file system permissions, which could allow non-administrative users to place files within restricted directories. An attacker could exploit this vulnerability by placing an executable file within the restricted directory, which when executed by the ERC client, would run with Administrator privileges.
[]
null
null
7.8
null
GHSA-m83p-2xxp-x33x
Hospital Management System in PHP with Source Code (HMS) 1.0 was discovered to contain a File upload vulnerability in treatmentrecord.php.
[]
null
9.8
null
null
GHSA-j3c4-gfqw-3f6c
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to an improper check of "privileges of the code" that bypasses the sandbox.
[]
null
null
null
null
CVE-2007-4668
Unspecified vulnerability in the server in Firebird before 2.0.2 allows remote attackers to determine the existence of arbitrary files, and possibly obtain other "file access," via unknown vectors, aka CORE-1312.
[ "cpe:2.3:a:firebirdsql:firebird:*:*:*:*:*:*:*:*" ]
null
null
null
5
CVE-2023-20561
Insufficient validation of the IOCTL (Input Output Control) input buffer in AMD μProf may allow an authenticated user to send an arbitrary address potentially resulting in a Windows crash leading to denial of service.
[ "cpe:2.3:a:amd:amd_uprof:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*" ]
null
5.5
null
null
CVE-2024-23345
Nautobot has XSS potential in rendered Markdown fields
Nautobot is a Network Source of Truth and Network Automation Platform built as a web application. All users of Nautobot versions earlier than 1.6.10 or 2.1.2 are potentially impacted by a cross-site scripting vulnerability. Due to inadequate input sanitization, any user-editable fields that support Markdown rendering, including are potentially susceptible to cross-site scripting (XSS) attacks via maliciously crafted data. This issue is fixed in Nautobot versions 1.6.10 and 2.1.2.
[ "cpe:2.3:a:networktocode:nautobot:*:*:*:*:*:*:*:*" ]
null
7.1
null
null
GHSA-px39-5h8c-j3c8
Exposure of system-scoped credentials in Jenkins Dimensions Plugin
Dimensions Plugin 0.9.3 and earlier does not set the appropriate context for credentials lookup, allowing the use of System-scoped credentials otherwise reserved for the global configuration.This allows attackers with Item/Configure permission to access and capture credentials they are not entitled to.Dimensions Plugin 0.9.3.1 defines the appropriate context for credentials lookup.
[]
null
4.3
null
null
GHSA-j5cm-9jc4-f88x
SQL injection vulnerability in CodeAstro Complaint Management System v.1.0 allows a remote attacker to execute arbitrary code and escalate privileges via the id parameter of the delete.php component.
[]
null
9.8
null
null
CVE-2008-6021
Multiple unspecified vulnerabilities in Attachmate Reflection for Secure IT UNIX Client and Server before 7.0 SP1 have unknown impact and attack vectors, aka "security vulnerabilities found by 3rd party analysis."
[ "cpe:2.3:a:attachmate:reflection_for_secure_it:7.0:*:unix_client:*:*:*:*:*", "cpe:2.3:a:attachmate:reflection_for_secure_it:7.0:*:unix_server:*:*:*:*:*" ]
null
null
null
10
CVE-2025-31214
This issue was addressed through improved state management. This issue is fixed in iOS 18.5 and iPadOS 18.5. An attacker in a privileged network position may be able to intercept network traffic.
[]
null
8.1
null
null
CVE-2024-1726
Quarkus: security checks for some inherited endpoints performed after serialization in resteasy reactive may trigger a denial of service
A flaw was discovered in the RESTEasy Reactive implementation in Quarkus. Due to security checks for some JAX-RS endpoints being performed after serialization, more processing resources are consumed while the HTTP request is checked. In certain configurations, if an attacker has knowledge of any POST, PUT, or PATCH request paths, they can potentially identify vulnerable endpoints and trigger excessive resource usage as the endpoints process the requests. This can result in a denial of service.
[ "cpe:/a:redhat:quarkus:3.2::el8", "cpe:/a:redhat:quarkus:2" ]
null
5.3
null
null
CVE-2019-2045
In JSCallTyper of typer.cc, there is an out of bounds write due to an incorrect bounds check. This could lead to remote code execution in the proxy auto-config with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-7.0 Android-7.1.1 Android-7.1.2 Android-8.1 Android-9 Android ID: A-117554758
[ "cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*" ]
null
null
9.8
10
CVE-2024-7137
Denial of Service in Silicon Labs RS9116 Bluetooth SDK
The L2CAP receive data buffer for L2CAP packets is restricted to packet sizes smaller than the maximum supported packet size. Receiving a packet that exceeds the restricted buffer length may cause a crash. A hard reset is required to recover the crashed device.
[]
null
6.5
null
null
GHSA-v254-7f59-gpqj
A Regular Expression Denial of Service vulnerability in GitLab CE/EE affecting all versions from 1.0.2 prior to 14.10.5, 15.0 prior to 15.0.4, and 15.1 prior to 15.1.1 allows an attacker to make a GitLab instance inaccessible via specially crafted web server response headers
[]
null
5.3
null
null
GHSA-h423-w6qv-2wj3
parse-server crashes when receiving file download request with invalid byte range
ImpactParse Server crashes when a file download request is received with an invalid byte range.PatchesImproved parsing of the range parameter to properly handle invalid range requests.WorkaroundsNoneReferences[GHSA-h423-w6qv-2wj3](https://github.com/parse-community/parse-server/security/advisories/GHSA-h423-w6qv-2wj3)
[]
null
7.5
null
null
CVE-2008-3111
Multiple buffer overflows in Sun Java Web Start in JDK and JRE 6 before Update 4, JDK and JRE 5.0 before Update 16, and SDK and JRE 1.4.x before 1.4.2_18 allow context-dependent attackers to gain privileges via an untrusted application, as demonstrated by (a) an application that grants itself privileges to (1) read local files, (2) write to local files, or (3) execute local programs; and as demonstrated by (b) a long value associated with a java-vm-args attribute in a j2se tag in a JNLP file, which triggers a stack-based buffer overflow in the GetVMArgsOption function; aka CR 6557220.
[ "cpe:2.3:a:sun:jdk:5.0:update_1:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:5.0:update_10:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:5.0:update_11:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:5.0:update_12:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:5.0:update_13:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:5.0:update_14:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:5.0:update_15:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:5.0:update_2:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:5.0:update_3:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:5.0:update_4:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:5.0:update_5:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:5.0:update_6:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:5.0:update_7:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:5.0:update_8:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:5.0:update_9:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:6:update_1:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:6:update_2:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:6:update_3:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_01:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_02:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_03:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_04:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_05:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_06:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_07:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_8:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_9:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_10:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_11:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_12:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_13:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_14:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_15:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_16:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_17:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:5.0:update_1:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:5.0:update_10:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:5.0:update_11:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:5.0:update_12:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:5.0:update_13:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:5.0:update_14:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:5.0:update_15:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:5.0:update_2:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:5.0:update_3:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:5.0:update_4:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:5.0:update_5:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:5.0:update_6:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:5.0:update_7:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:5.0:update_8:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:5.0:update_9:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:6:update_1:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:6:update_2:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:6:update_3:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.4:*:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.4.2_01:*:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.4.2_02:*:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.4.2_03:*:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.4.2_04:*:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.4.2_05:*:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.4.2_06:*:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.4.2_07:*:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.4.2_08:*:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.4.2_09:*:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.4.2_10:*:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.4.2_11:*:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.4.2_12:*:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.4.2_13:*:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.4.2_14:*:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.4.2_15:*:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.4.2_16:*:*:*:*:*:*:*", "cpe:2.3:a:sun:sdk:1.4.2_17:*:*:*:*:*:*:*" ]
null
null
null
10
GHSA-vcwq-r4jx-9c44
Improper buffer access in firmware for some Intel(R) NUCs may allow a privileged user to potentially enable escalation of privilege via local access.
[]
null
6.7
null
null
GHSA-fr6q-993j-xgrh
The wp-listings plugin before 2.0.2 for WordPress has includes/views/single-listing.php XSS.
[]
null
null
null
null
RHSA-2024:4913
Red Hat Security Advisory: freeradius:3.0 security update
freeradius: forgery attack
[ "cpe:/a:redhat:rhel_aus:8.2::appstream" ]
null
9
null
null
GHSA-m8rp-vv92-46c7
gix-path improperly resolves configuration path reported by Git
Summary`gix-path` runs `git` to find the path of a configuration file associated with the `git` installation, but improperly resolves paths containing unusual or non-ASCII characters, in rare cases enabling a local attacker to inject configuration leading to code execution.DetailsIn `gix_path::env`, the underlying implementation of the `installation_config` and `installation_config_prefix` functions calls `git config -l --show-origin` to find the path of a file to treat as belonging to the `git` installation.Affected versions of `gix-path` do not pass `-z`/`--null` to cause `git` to report literal paths ([`650a1b5`](https://github.com/Byron/gitoxide/commit/650a1b5cf25e086197cc55a68525a411e1c28031)). Instead, to cover the occasional case that `git` outputs a quoted path, they attempt to parse the path by stripping the quotation marks:https://github.com/Byron/gitoxide/blob/1cfe577d461293879e91538dbc4bbfe01722e1e8/gix-path/src/env/git/mod.rs#L138-L142The problem is that, when a path is quoted, it may change in substantial ways beyond the concatenation of quotation marks. If not reversed, these changes can result in another valid path that is not equivalent to the original.This is not limited to paths with unusual characters such as quotation marks or newlines. Unless `git` is explicitly configured with `core.quotePath` set to `false`, it also happens when the path contains most non-ASCII characters, including accented or non-English letters. For example, `é` is transformed to `\303\251`, with literal backslashes. (This is an octal representation of the bytes in its UTF-8 encoding. This behavior is not limited to systems that encode paths with UTF-8 on disk.)Rarely, the configuration file `gix-path` wrongly attempts to open can be created by an attacker who has a limited user account on the system. The attacker would often need to request an account username tailored to carrying out the attack.PoCQuick demonstration on UnixOn a Unix-like system in which Git supports no higher scope than `system` for configuration variables (i.e., not on macOS with Apple Git), in a locale that supports UTF-8, with `gitoxide` installed, run:If the above conditions are satisfied and the `gix` command was built against an affected version of `gix-path`, then the last command's output looks something like this:Demonstration across user accounts on WindowsOn a test system running Windows on which Git for Windows is *not* installed system-wide—resembling a scenario in which users who wish to use Git are expected to install it themselves for their accounts—create two accounts, with these usernames:*Renée*, the target of the attack. This user may be a limited user or an administrator. Its user profile directory is assumed to be `C:\Users\Renée`.*Ren*, the user who carries out the attack. This user should be a limited user, since an administrator would not need to exploit this vulnerability to inject configuration. Its user profile directory is assumed to be `C:\Users\Ren`.As *Ren*, run these commands in PowerShell:(The `gitconfig` file can instead be written manually, in which case *Ren* need not have `git`.)As *Renée*:Install Git for Windows in the default location for non-systemwide installations, which for that user account is inside `C:\Users\Renée\AppData\Local\Programs`. For a non-administrative installation, Git for Windows will pick this location automatically. Allow the installer to place the directory containing `git` in the user's `PATH`, as it does by default.(The scenario can be modified for any location the attacker can predict. So, for example, *Renée* can install Git for Windows with [`scoop`](https://scoop.sh/), and *Ren* could carry out the attack with correspondingly modified path components in place of `AppData\Local\Programs\Git`.)Install `gitoxide` using any common technique, such as by [installing Rust](https://www.rust-lang.org/tools/install) and then running `cargo install gitoxide`.Open a PowerShell window and run a `gix` command that attempts to run the SSH client for transport. For example:At least one, and usually two, instances of the Windows calculator will pop up. This happens because `calc.exe` was configured in the fake configuration file the user *Ren* was able to cause to be used, by placing it at the location `gix-path` wrongly resolved the path of *Renée*'s own configuration file to.The `gitconfig` file written by the attacker can be adjusted with an arbitrary choice of payload, or to set other configuration variables.ImpactOn a single-user system, it is not possible to exploit this, unless `GIT_CONFIG_SYSTEM` and `GIT_CONFIG_GLOBAL` have been set to unusual values or Git has been installed in an unusual way. Such a scenario is not expected.Exploitation is unlikely even on a multi-user system, though it is plausible in some uncommon configurations or use cases. It is especially unlikely with Apple Git on macOS, due to its very high scoped configuration in `/Library` or `/Applications` that would be detected instead, as in CVE-2024-45305.The likelihood of exploitation may be higher on Windows, where attacks such as those shown in the Windows proof-of-concept above can be performed due to the status of `\` as a directory separator, and where there is no restriction on usernames containing accented or non-English letters (though the latter is also permitted on some other systems). Even then, complex user interaction is required. In most cases, a system administrator would have to approve an innocuous-seeming username, and then the targeted user (who could be the same or a different user) would have to use an application that uses `gix-path`.In general, exploitation is more likely to succeed if at least one of the following applies:Users are expected to install `git` themselves, and are likely to do so in predictable locations.Locations where `git` is installed, whether due to usernames in their paths or otherwise, contain characters that `git` quotes by default in paths, such as non-English letters and accented letters.A custom `system`-scope configuration file is specified with the `GIT_CONFIG_SYSTEM` environment variable, and its path is in an unusual location or has strangely named components.A `system`-scope configuration file is absent, empty, or suppressed by means other than `GIT_CONFIG_NOSYSTEM`. Currently, `gix-path` can treat a `global`-scope configuration file as belonging to the installation if no higher scope configuration file is available. This increases the likelihood of exploitation even on a system where `git` is installed system-wide in an ordinary way.However, exploitation is expected to be very difficult even under any combination of those factors.Although the effect here is similar to [CVE-2022-24765](https://github.com/git-for-windows/git/security/advisories/GHSA-vw2c-22j4-2fh2) once exploited, a greater degree of user interaction would usually be required, and the attack complexity here is much higher because the necessary conditions are uncommon and challenging to predict.
[]
5.3
6
null
null
CVE-2024-53867
Synapse Matrix has a partial room state leak via Sliding Sync
Synapse is an open-source Matrix homeserver. The Sliding Sync feature on Synapse versions between 1.113.0rc1 and 1.120.0 can leak partial room state changes to users no longer in a room. Non-state events, like messages, are unaffected. This vulnerability is fixed in 1.120.1.
[]
null
4.3
null
null
RHSA-2021:2983
Red Hat Security Advisory: OpenShift Container Platform 4.8.4 bug fix and security update
golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header golang: net: lookup functions may return invalid host names golang: archive/zip: malformed archive may cause panic or memory exhaustion golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents golang: crypto/tls: certificate of wrong type is causing TLS client to panic
[ "cpe:/a:redhat:openshift:4.8::el8" ]
null
6.5
null
null
CVE-2021-38000
Insufficient validation of untrusted input in Intents in Google Chrome on Android prior to 95.0.4638.69 allowed a remote attacker to arbitrarily browser to a malicious URL via a crafted HTML page.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*" ]
null
6.1
null
5.8
CVE-2025-26847
An issue was discovered in Znuny before 7.1.5. When generating a support bundle, not all passwords are masked.
[]
null
9.1
null
null
GHSA-jpfw-vm34-2p3p
xen/arm: Boot modules are not scrubbed The bootloader will load boot modules (e.g. kernel, initramfs...) in a temporary area before they are copied by Xen to each domain memory. To ensure sensitive data is not leaked from the modules, Xen must "scrub" them before handing the page over to the allocator. Unfortunately, it was discovered that modules will not be scrubbed on Arm.
[]
null
null
null
null
CVE-2017-16345
An attacker could send an authenticated HTTP request to trigger this vulnerability in Insteon Hub running firmware version 1012. At 0x9d01c318 the value for the s_port key is copied using strcpy to the buffer at 0xa00017f4. This buffer is 6 bytes large, sending anything longer will cause a buffer overflow. The destination can also be shifted by using an sn_speaker parameter between "0" and "3".
[ "cpe:2.3:o:insteon:hub_firmware:1012:*:*:*:*:*:*:*", "cpe:2.3:h:insteon:hub:-:*:*:*:*:*:*:*" ]
null
null
8.5
null
GHSA-865x-x787-2cjj
Luci in Red Hat Conga stores the user's username and password in a Base64 encoded string in the __ac session cookie, which allows attackers to gain privileges by accessing this cookie. NOTE: this issue has been SPLIT due to different vulnerability types. Use CVE-2013-7347 for the incorrect enforcement of a user timeout.
[]
null
null
null
null
CVE-2011-0402
dpkg-source in dpkg before 1.14.31 and 1.15.x allows user-assisted remote attackers to modify arbitrary files via a symlink attack on unspecified files in the .pc directory.
[ "cpe:2.3:a:debian:dpkg:*:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.9.19:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.9.20:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.9.21:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.10:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.10.1:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.10.2:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.10.3:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.10.4:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.10.5:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.10.6:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.10.7:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.10.8:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.10.9:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.10.10:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.10.11:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.10.12:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.10.13:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.10.14:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.10.15:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.10.16:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.10.17:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.10.18:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.10.18.1:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.10.19:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.10.20:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.10.21:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.10.22:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.10.23:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.10.24:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.10.25:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.10.26:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.10.27:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.10.28:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.13.0:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.13.1:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.13.2:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.13.3:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.13.4:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.13.5:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.13.6:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.13.7:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.13.8:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.13.9:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.13.10:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.13.11:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.13.11.1:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.13.12:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.13.13:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.13.14:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.13.15:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.13.16:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.13.17:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.13.18:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.13.19:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.13.20:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.13.21:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.13.22:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.13.23:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.13.24:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.13.25:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.14.0:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.14.1:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.14.2:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.14.3:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.14.4:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.14.5:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.14.6:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.14.7:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.14.8:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.14.9:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.14.10:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.14.11:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.14.12:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.14.13:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.14.14:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.14.15:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.14.16:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.14.16.1:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.14.16.2:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.14.16.3:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.14.16.4:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.14.16.5:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.14.16.6:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.14.17:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.14.18:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.14.19:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.14.20:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.14.21:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.14.22:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.14.23:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.14.24:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.14.25:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.14.26:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.14.27:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.14.28:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.14.29:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.15.0:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.15.1:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.15.2:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.15.3:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.15.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.15.4:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.15.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.15.5:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.15.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.15.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.15.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.15.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.15.5.5:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.15.5.6:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.15.6:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.15.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.15.7:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.15.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.15.7.2:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.15.8:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.15.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.15.8.2:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.15.8.3:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.15.8.4:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.15.8.5:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.15.8.6:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.15.8.7:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.15.8.8:*:*:*:*:*:*:*" ]
null
null
null
6.8
GHSA-pxq4-p292-h272
Xerox WorkCentre and WorkCentre Pro before 12.060.17.000, 13.x before 13.060.17.000, and 14.x before 14.060.17.000 allow remote attackers to gain access via unspecified vectors related to "browser permissions."
[]
null
null
null
null
CVE-2023-27941
A validation issue was addressed with improved input sanitization. This issue is fixed in macOS Ventura 13.3, iOS 15.7.4 and iPadOS 15.7.4, macOS Monterey 12.6.4, macOS Big Sur 11.7.5. An app may be able to disclose kernel memory.
[ "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*" ]
null
5.5
null
null
GHSA-p9g5-cmfc-4v42
On certain Brother devices, authorization is mishandled by including a valid AuthCookie cookie in the HTTP response to a failed login attempt. Affected models are: MFC-J6973CDW MFC-J4420DW MFC-8710DW MFC-J4620DW MFC-L8850CDW MFC-J3720 MFC-J6520DW MFC-L2740DW MFC-J5910DW MFC-J6920DW MFC-L2700DW MFC-9130CW MFC-9330CDW MFC-9340CDW MFC-J5620DW MFC-J6720DW MFC-L8600CDW MFC-L9550CDW MFC-L2720DW DCP-L2540DW DCP-L2520DW HL-3140CW HL-3170CDW HL-3180CDW HL-L8350CDW HL-L2380DW ADS-2500W ADS-1000W ADS-1500W.
[]
null
null
9.8
null
CVE-2023-29537
Multiple race conditions in the font initialization could have led to memory corruption and execution of attacker-controlled code. This vulnerability affects Firefox for Android < 112, Firefox < 112, and Focus for Android < 112.
[ "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:android:*:*", "cpe:2.3:a:mozilla:focus:*:*:*:*:*:android:*:*" ]
null
7.5
null
null
CVE-2008-6121
CRLF injection vulnerability in SocialEngine (SE) 2.7 and earlier allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via the PHPSESSID cookie.
[ "cpe:2.3:a:socialengine:socialengine:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2025-21492
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.36 and prior and 8.4.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
[ "cpe:2.3:a:oracle:mysql_server:8.0.36_and_prior:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql_server:8.4.0:*:*:*:*:*:*:*" ]
null
4.9
null
null