id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
197k
cpes
listlengths
0
4.89k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
GHSA-gr3c-432v-3p98
Buffer overflow in sys_cmd.c for gtkftpd 1.0.4 and earlier allows remote attackers to execute arbitrary code by creating long directory names and listing them with a LIST command.
[]
null
null
null
null
CVE-2022-24189
The user_token authorization header on the Ourphoto App version 1.4.1 /apiv1/* end-points is not implemented properly. Removing the value causes all requests to succeed, bypassing authorization and session management. The impact of this vulnerability allows an attacker POST api calls with other users unique identifiers and enumerate information of all other end-users.
[ "cpe:2.3:a:sz-fujia:ourphoto:1.4.1:*:*:*:*:*:*:*" ]
null
6.5
null
null
GHSA-473c-q9jp-gmm7
Improper input validation in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.
[]
null
7
null
null
GHSA-cgjh-mqgp-mv76
The writeRandomBytes_RtlGenRandom function in xmlparse.c in libexpat in Expat 2.2.1 and 2.2.2 on Windows allows local users to gain privileges via a Trojan horse ADVAPI32.DLL in the current working directory because of an untrusted search path, aka DLL hijacking.
[]
null
null
7.8
null
GHSA-gj2c-q829-cqcx
Certain HP Enterprise LaserJet and HP LaserJet Managed Printers are potentially vulnerable to denial of service due to WS-Print request and potential injections of Cross Site Scripting via jQuery-UI.
[]
null
6.1
null
null
CVE-2015-5928
WebKit, as used in Apple iOS before 9.1, Safari before 9.0.1, and iTunes before 12.3.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-10-21-1, APPLE-SA-2015-10-21-3, and APPLE-SA-2015-10-21-5.
[ "cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" ]
null
null
null
6.8
GHSA-8q5q-7mvv-w97x
In the Linux kernel, the following vulnerability has been resolved:module: ensure that kobject_put() is safe for module type kobjectsIn 'lookup_or_create_module_kobject()', an internal kobject is created using 'module_ktype'. So call to 'kobject_put()' on error handling path causes an attempt to use an uninitialized completion pointer in 'module_kobject_release()'. In this scenario, we just want to release kobject without an extra synchronization required for a regular module unloading process, so adding an extra check whether 'complete()' is actually required makes 'kobject_put()' safe.
[]
null
null
null
null
GHSA-hq5f-r2v7-qp3x
IBM Security Access Manager Appliance 8.0.0 through 8.0.1.6, and 9.0.0 through 9.0.3.1 stores potentially sensitive information in log files that could be read by a remote user. IBM X-Force ID: 128617.
[]
null
null
4.3
null
CVE-2024-8102
The Ultimate WordPress Toolkit – WP Extended <= 3.0.8 - Authenticated (Subscriber+) Arbitrary Options Update
The The Ultimate WordPress Toolkit – WP Extended plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the module_all_toggle_ajax() function in all versions up to, and including, 3.0.8. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update arbitrary options on the WordPress site. This can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site.
[ "cpe:2.3:a:wpextended:wp_extended:*:*:*:*:*:*:*:*", "cpe:2.3:a:wpextended:wp_extended:*:*:*:*:*:wordpress:*:*" ]
null
8.8
null
null
GHSA-9jjx-pwqr-6p8g
The Universal Disk Format (UDF) filesystem driver in Linux kernel 2.6.17 and earlier allows local users to cause a denial of service (hang and crash) via certain operations involving truncated files, as demonstrated via the dd command.
[]
null
null
null
null
GHSA-3wv8-w3p3-hq59
gd_ctx.c in the GD component in PHP 5.4.x before 5.4.32 and 5.5.x before 5.5.16 does not ensure that pathnames lack %00 sequences, which might allow remote attackers to overwrite arbitrary files via crafted input to an application that calls the (1) imagegd, (2) imagegd2, (3) imagegif, (4) imagejpeg, (5) imagepng, (6) imagewbmp, or (7) imagewebp function.
[]
null
null
null
null
CVE-2017-18178
Authenticate/SWT in Progress Sitefinity 9.1 has an open redirect issue in which an authentication token is sent to the redirection target, if the target is specified using a certain %40 syntax. This is fixed in 10.1.
[ "cpe:2.3:a:progress:sitefinity:9.1:*:*:*:*:*:*:*" ]
null
null
6.1
5.8
GHSA-5747-m4w2-gqh6
An issue was discovered on Samsung mobile devices with N(7.x), O(8.0), and P(9.0) (Qualcomm chipsets) software. The Authnr Trustlet has a NULL pointer dereference. The Samsung ID is SVE-2019-13949 (May 2019).
[]
null
null
null
null
CVE-2024-58105
A vulnerability in the Trend Micro Apex One Security Agent Plug-in User Interface Manager could allow a local attacker to bypass existing security and execute arbitrary code on affected installations. This CVE address an addtional bypass not covered in CVE-2024-58104. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
[]
null
7.3
null
null
CVE-2007-2760
The canUpdate function in model/MRole.java in Adempiere before 3.1.6 does not properly validate user roles, which allows remote authenticated read-only users to gain read-write privileges. NOTE: some of these details are obtained from third party information.
[ "cpe:2.3:a:adempiere:adempiere:*:*:*:*:*:*:*:*" ]
null
null
null
9
CVE-2018-14444
libdxfrw 0.6.3 has an Integer Overflow in dwgCompressor::decompress18 in dwgutil.cpp, leading to an out-of-bounds read and application crash.
[ "cpe:2.3:a:libdxfrw_project:libdxfrw:0.6.3:*:*:*:*:*:*:*" ]
null
null
7.5
5
GHSA-xhwm-2wwh-ggc2
SQL injection vulnerability in Wiz-Ad 1.3 allows remote attackers to execute arbitrary SQL commands via unknown vectors. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
[]
null
null
null
null
GHSA-26jc-6p9c-5pc3
Cross-Site Request Forgery (CSRF) vulnerability in WP Spell Check WP Spell Check allows Cross Site Request Forgery. This issue affects WP Spell Check: from n/a through 9.21.
[]
null
5.4
null
null
CVE-2002-1409
ptrace on HP-UX 11.00 through 11.11 allows local users to cause a denial of service (data page fault panic) via "an incorrect reference to thread register state."
[ "cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*", "cpe:2.3:o:hp:hp-ux:11.04:*:*:*:*:*:*:*", "cpe:2.3:o:hp:hp-ux:11.11:*:*:*:*:*:*:*" ]
null
null
null
2.1
GHSA-wqxw-xh9c-cj6p
config.php in S9Y Serendipity 1.0 beta 2 allows remote attackers to inject arbitrary PHP code by editing values that are stored in config.php and later executed. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
[]
null
null
null
null
RHSA-2023:6343
Red Hat Security Advisory: LibRaw security update
LibRaw: stack buffer overflow in LibRaw_buffer_datastream::gets() in src/libraw_datastream.cpp
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
5.3
null
null
CVE-2018-8756
Eval injection in yzmphp/core/function/global.func.php in YzmCMS v3.7.1 allows remote attackers to achieve arbitrary code execution via PHP code in the POST data of an index.php?m=member&c=member_content&a=init request.
[ "cpe:2.3:a:yzmcms:yzmcms:3.7.1:*:*:*:*:*:*:*" ]
null
null
7.2
6.5
GHSA-798m-fchr-585w
Buffer overflows in Sun libnsl allow root access.
[]
null
null
null
null
GHSA-2xvq-9rfm-jm69
SQL injection vulnerability in index.php in the Tiny Event (tinyevent) 1.01 and earlier module for Xoops allows remote attackers to execute arbitrary SQL commands via the id parameter in a show action.
[]
null
null
null
null
CVE-2010-0575
Cisco Wireless LAN Controller (WLC) software, possibly 6.0.x or possibly 4.1 through 6.0.x, allows remote attackers to bypass ACLs in the controller CPU, and consequently send network traffic to unintended segments or devices, via unspecified vectors, a different vulnerability than CVE-2010-3034.
[ "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.61.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.99.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.112.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.117.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.130.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.173.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.174.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.176.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.182.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wireless_lan_controller_software:5.0.148.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wireless_lan_controller_software:5.0.148.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wireless_lan_controller_software:5.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wireless_lan_controller_software:5.1.151.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wireless_lan_controller_software:5.1.152.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wireless_lan_controller_software:5.1.160.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wireless_lan_controller_software:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:wireless_lan_controller_software:6.0.182.0:*:*:*:*:*:*:*" ]
null
null
null
5
GHSA-wpp8-9p7m-8gx2
Permission control vulnerability in the hidebug module Impact: Successful exploitation of this vulnerability may affect service confidentiality.
[]
null
8.2
null
null
GHSA-f2fm-4956-xvcv
Multiple cross-site scripting (XSS) vulnerabilities in YourFreeWorld Programs Rating Script allow remote attackers to inject arbitrary web script or HTML via the id parameter to (1) rate.php and (2) postcomments.php.
[]
null
null
null
null
CVE-2022-31568
The Rexians/rex-web repository through 2022-06-05 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.
[ "cpe:2.3:a:rexians:rex-web:*:*:*:*:*:*:*:*" ]
null
9.3
null
6.4
CVE-2017-6320
A remote command injection vulnerability exists in the Barracuda Load Balancer product line (confirmed on v5.4.0.004 (2015-11-26) and v6.0.1.006 (2016-08-19); fixed in 6.1.0.003 (2017-01-17)) in which an authenticated user can execute arbitrary shell commands and gain root privileges. The vulnerability stems from unsanitized data being processed in a system call when the delete_assessment command is issued.
[ "cpe:2.3:a:barracuda:load_balancer_adc:*:*:*:*:*:*:*:*" ]
null
8.8
null
9
GHSA-84p4-9xrj-9rj5
The application uses several hard-coded credentials to encrypt config files during backup, to decrypt the new firmware during an update and some passwords allow a direct connection to the database server of the affected device.
[]
null
8.4
null
null
GHSA-57r9-fg5q-jxx8
Nagios XI before v5.8.7 was discovered to contain a cross-site scripting (XSS) vulnerability via the ajax.php script in CCM 3.1.5.
[]
null
6.1
null
null
CVE-2023-20615
In ril, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07629572; Issue ID: ALPS07629572.
[ "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*" ]
null
6.7
null
null
GHSA-rvwh-w28g-6mhp
Tenda F1202 V1.0BR_V1.2.0.20(408), FH1202_V1.2.0.19_EN were discovered to contain a stack overflow in the page parameter in the function fromSafeUrlFilter.
[]
null
9.8
null
null
GHSA-r258-mhfc-387p
phpGraphy 0.9.11 and earlier allows remote attackers to bypass authentication and gain administrator privileges via a direct request to index.php with the editwelcome parameter set to 1, which can then be used to modify the main page to inject arbitrary HTML and web script. NOTE: XSS attacks are resultant from this issue, since normal functionality allows the admin to modify pages.
[]
null
null
null
null
GHSA-3j75-7jc2-vqcg
For native-to-JS bridging, the app requires a unique token to be passed that ensures non-app code can't call the bridging functions. That token was being used for JS-to-native also, but it isn't needed in this case, and its usage was also leaking this token. This vulnerability affects Firefox for iOS < 25.
[]
null
null
null
null
GHSA-pcc5-fpf6-mmhc
The unformat_24bit_color function in the format parsing code in Irssi before 0.8.20, when compiled with true-color enabled, allows remote attackers to cause a denial of service (heap corruption and crash) via an incomplete 24bit color code.
[]
null
null
7.5
null
CVE-2008-1106
The management interface in Akamai Client (formerly Red Swoosh) 3322 and earlier allows remote attackers to bypass authentication via an HTTP request that contains (1) no Referer header, or (2) a spoofed Referer header that matches an approved domain, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks and force the client to download and execute arbitrary files.
[ "cpe:2.3:a:akamai_technologies:client:*:*:*:*:*:*:*:*", "cpe:2.3:a:red_swoosh:client:*:*:*:*:*:*:*:*" ]
null
null
null
7.1
GHSA-c2vh-54mm-f6jj
Buffer overflow in the SAP NetWeaver Dispatcher in SAP Kernel 7.00 32-bit and 7.40 64-bit allows remote authenticated users to cause a denial of service or possibly execute arbitrary code via unspecified vectors, related to the Spool System, aka SAP Note 2061271.
[]
null
null
null
null
GHSA-fmw8-4xqq-qh9j
Out-of-bounds write in the PCX image codec in QNX SDP versions 8.0, 7.1 and 7.0 could allow an unauthenticated attacker to cause a denial-of-service condition or execute code in the context of the process using the image codec.
[]
null
9.8
null
null
GHSA-c6r9-q7wr-w7fv
An issue has been discovered in GitLab affecting all versions starting from 13.11 before 15.8.5, all versions starting from 15.9 before 15.9.4, all versions starting from 15.10 before 15.10.1. It was possible that a project member demoted to a user role to read project updates by doing a diff with a pre-existing fork.
[]
null
6.5
null
null
GHSA-vv2x-8p3m-39x2
IBM Guardium Data Encryption (GDE) 4.0.0.4 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. IBM X-Force ID: 196212.
[]
null
null
null
null
CVE-2024-23111
An improper neutralization of input during web page Generation ('Cross-site Scripting') vulnerability [CWE-79] in FortiOS version 7.4.3 and below, 7.2 all versions, 7.0 all versions and FortiProxy version 7.4.2 and below, 7.2 all versions, 7.0 all versions reboot page may allow a remote privileged attacker with super-admin access to execute JavaScript code via crafted HTTP GET requests.
[ "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*" ]
null
6.2
null
null
GHSA-hc5q-h9r6-gq33
Adobe Substance 3D Designer version 12.4.0 (and earlier) is affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[]
null
7.8
null
null
CVE-2018-6788
In Jiangmin Antivirus 16.0.0.100, the driver file (KVFG.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x2208C0.
[ "cpe:2.3:a:jiangmin:antivirus:16.0.0.100:*:*:*:*:*:*:*" ]
null
null
7.8
6.1
GHSA-3fvh-9jm8-5rg5
In bluetooth service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed.
[]
null
5.5
null
null
cisco-sa-phone-logs-2O7f7ExM
Cisco IP Phones Call Log Information Disclosure Vulnerability
A vulnerability in the Web Access feature of Cisco IP Phones could allow an unauthenticated, remote attacker to view sensitive information on an affected device. The vulnerability is due to improper access controls on the web-based management interface of an affected device. An attacker could exploit this vulnerability by sending malicious requests to the device, which could allow the attacker to bypass access restrictions. A successful attack could allow the attacker to view sensitive information, including device call logs that contain names, usernames, and phone numbers of users of the device. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-phone-logs-2O7f7ExM ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-phone-logs-2O7f7ExM"]
[]
null
null
5.3
null
CVE-2008-4823
Cross-site scripting (XSS) vulnerability in Adobe Flash Player 9.0.124.0 and earlier allows remote attackers to inject arbitrary web script or HTML via vectors related to loose interpretation of an ActionScript attribute.
[ "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:7.0.69.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.16:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.16:*:windows:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.18d60:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.20:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.20.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.28:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.28.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.28.0:*:mac_os_x:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.31:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.31.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.45.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.47.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.48.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.112.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*" ]
null
null
null
4.3
GHSA-c747-j5gc-vwh7
The CiyaShop - Multipurpose WooCommerce Theme theme for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 4.19.0 via deserialization of untrusted input in the 'add_ciyashop_wishlist' and 'ciyashop_get_compare' functions. This makes it possible for unauthenticated attackers to inject a PHP Object. No known POP chain is present in the vulnerable software, which means this vulnerability has no impact unless another plugin or theme containing a POP chain is installed on the site. If a POP chain is present via an additional plugin or theme installed on the target system, it may allow the attacker to perform actions like delete arbitrary files, retrieve sensitive data, or execute code depending on the POP chain present.
[]
null
9.8
null
null
GHSA-8rgr-7c79-w295
Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
[]
null
7.8
null
null
CVE-2012-5589
The MultiLink module 6.x-2.x before 6.x-2.7 and 7.x-2.x before 7.x-2.7 for Drupal does not properly check node permissions when generating an in-content link, which allows remote authenticated users with text-editing permissions to read arbitrary node titles via a generated link.
[ "cpe:2.3:a:netgenius:multilink:6.x-2.0:*:*:*:*:*:*:*", "cpe:2.3:a:netgenius:multilink:6.x-2.1:*:*:*:*:*:*:*", "cpe:2.3:a:netgenius:multilink:6.x-2.2:*:*:*:*:*:*:*", "cpe:2.3:a:netgenius:multilink:6.x-2.3:*:*:*:*:*:*:*", "cpe:2.3:a:netgenius:multilink:6.x-2.4:*:*:*:*:*:*:*", "cpe:2.3:a:netgenius:multilink:6.x-2.5:*:*:*:*:*:*:*", "cpe:2.3:a:netgenius:multilink:6.x-2.6:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:-:*:*:*:*:*:*:*", "cpe:2.3:a:netgenius:multilink:7.x-2.x:dev:*:*:*:*:*:*" ]
null
null
null
3.5
CVE-2004-2552
Buffer overflow in XBoard 4.2.7 and earlier might allow local users to execute arbitrary code via a long -icshost command line argument. NOTE: since the program is not setuid and not normally called from remote programs, there may not be a typical attack vector for the issue that crosses privilege boundaries. Therefore this may not be a vulnerability.
[ "cpe:2.3:a:tim_mann:xboard:4.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:tim_mann:xboard:4.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:tim_mann:xboard:4.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:tim_mann:xboard:4.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:tim_mann:xboard:4.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:tim_mann:xboard:4.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:tim_mann:xboard:4.2.7:*:*:*:*:*:*:*" ]
null
null
null
4.6
CVE-2023-31455
Pexip Infinity before 31.2 has Improper Input Validation for RTCP, allowing remote attackers to trigger an abort.
[ "cpe:2.3:a:pexip:pexip_infinity:*:*:*:*:*:*:*:*" ]
null
7.5
null
null
GHSA-h3cc-g2jj-55gh
In the COVIDSafe application through 1.0.21 for Android, unsafe use of the Bluetooth transport option in the GATT connection allows attackers to trick the application into establishing a connection over Bluetooth BR/EDR transport, which reveals the public Bluetooth address of the victim's phone without authorisation, bypassing the Bluetooth address randomisation protection in the user's phone.
[]
null
null
null
null
GHSA-2p6g-86q5-vxxh
IBM MQ Appliance 9.3 LTS, 9.3 CD, and 9.4 LTS web console could allow an authenticated user to cause a denial-of-service when trace is enabled due to information being written into memory outside of the intended buffer size.
[]
null
5.3
null
null
GHSA-683p-wqpr-jwpc
ICE Hrm 26.2.0 is vulnerable to CSRF that leads to password reset via service.php.
[]
null
null
null
null
GHSA-32jx-cx53-vp3r
The Connexion Logs WordPress plugin through 3.0.2 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack
[]
null
4.3
null
null
GHSA-8cmw-hp26-wrpm
adts_decode_extradata in libavformat/adtsenc.c in FFmpeg 4.4 does not check the init_get_bits return value, which is a necessary step because the second argument to init_get_bits can be crafted.
[]
null
9.8
null
null
CVE-2023-5789
Dragon Path 707GR1 Ping Diagnostics cross site scripting
A vulnerability classified as problematic has been found in Dragon Path 707GR1 up to 20231022. Affected is an unknown function of the component Ping Diagnostics. The manipulation of the argument Host Address with the input >><img/src/onerror=alert(1)> leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-243594 is the identifier assigned to this vulnerability.
[ "cpe:2.3:o:dragonpath:router_707gr1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:airtel:dragon_path_707gr1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:airtel:dragon_path_707gr1:-:*:*:*:*:*:*:*" ]
null
2.4
2.4
3.3
GHSA-jq44-j55r-694j
libautotrace.a in AutoTrace 0.31.1 allows remote attackers to cause a denial of service (invalid write and SEGV), related to the ReadImage function in input-bmp.c.
[]
null
null
7.5
null
RHSA-2019:3467
Red Hat Security Advisory: dovecot security and bug fix update
dovecot: Improper certificate validation
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
null
7.7
null
GHSA-jrf6-frj2-w4m8
A stack-based buffer overflow vulnerability exists in the web interface Radio Scheduling functionality of Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3) v5.1.0 Build 20220926. A specially crafted series of HTTP requests can lead to remote code execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.This vulnerability refers specifically to the overflow that occurs via the `band` parameter at offset `0x422420` of the `httpd` binary shipped with v5.0.4 Build 20220216 of the EAP115.
[]
null
7.2
null
null
RHSA-2024:9302
Red Hat Security Advisory: emacs security update
emacs: Gnus treats inline MIME contents as trusted emacs: LaTeX preview is enabled by default for e-mail attachments emacs: Org mode considers contents of remote files to be trusted
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
7.8
null
null
GHSA-6wq5-2j9j-6rvr
In the Linux kernel, the following vulnerability has been resolved:USB: core: Fix deadlock in usb_deauthorize_interface()Among the attribute file callback routines in drivers/usb/core/sysfs.c, the interface_authorized_store() function is the only one which acquires a device lock on an ancestor device: It calls usb_deauthorize_interface(), which locks the interface's parent USB device.The will lead to deadlock if another process already owns that lock and tries to remove the interface, whether through a configuration change or because the device has been disconnected. As part of the removal procedure, device_del() waits for all ongoing sysfs attribute callbacks to complete. But usb_deauthorize_interface() can't complete until the device lock has been released, and the lock won't be released until the removal has finished.The mechanism provided by sysfs to prevent this kind of deadlock is to use the sysfs_break_active_protection() function, which tells sysfs not to wait for the attribute callback.Reported-and-tested by: Yue Sun <[email protected]> Reported by: xingwei lee <[email protected]>
[]
null
7.8
null
null
GHSA-jmqq-vjpq-9xcm
IBM Security Verify Bridge contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data. IBM X-Force ID: 196618.
[]
null
null
null
null
GHSA-cg6f-rpwc-7gcv
IBM FileNet Content Manager 5.2.1 and 5.5.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 142892.
[]
null
null
5.4
null
GHSA-m497-hq5x-6jcv
An issue was discovered in Mattermost Server before 4.3.0, 4.2.1, and 4.1.2. It allows an attacker to create a button that, when pressed by a user, launches an API request.
[]
null
null
null
null
CVE-2018-16744
An issue was discovered in mgetty before 1.2.1. In fax_notify_mail() in faxrec.c, the mail_to parameter is not sanitized. It could allow for command injection if untrusted input can reach it, because popen is used.
[ "cpe:2.3:a:mgetty_project:mgetty:*:*:*:*:*:*:*:*" ]
null
null
7.8
4.6
RHSA-2024:0193
Red Hat Security Advisory: OpenShift Container Platform 4.13.29 bug fix and security update
mongo-go-driver: specific cstrings input may not be properly validated golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)
[ "cpe:/a:redhat:openshift:4.13::el8", "cpe:/a:redhat:openshift:4.13::el9" ]
null
7.5
null
null
CVE-2017-14985
Cross-site scripting (XSS) vulnerability in the EyesOfNetwork web interface (aka eonweb) 5.1-0 allows remote authenticated users to inject arbitrary web script or HTML via the url parameter to module/module_frame/index.php.
[ "cpe:2.3:a:eyesofnetwork:eyesofnetwork:5.1-0:*:*:*:*:*:*:*" ]
null
null
5.4
3.5
GHSA-37f6-m354-672c
The UsersWP WordPress plugin before 1.2.3.1 is missing access controls when updating a user avatar, and does not make sure file names for user avatars are unique, allowing a logged in user to overwrite another users avatar.
[]
null
4.3
null
null
CVE-2024-43594
Microsoft System Center Elevation of Privilege Vulnerability
Microsoft System Center Elevation of Privilege Vulnerability
[ "cpe:2.3:a:microsoft:system_center_2019:*:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:system_center_2022:*:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:system_center_2025:*:*:*:*:*:*:*:*" ]
null
7.3
null
null
GHSA-jf9v-x358-cxmx
Multiple stack-based buffer overflows in Invensys Wonderware Information Server 3.1, 4.0, and 4.0 SP1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via two unspecified ActiveX controls.
[]
null
null
null
null
CVE-2024-5244
TP-Link Omada ER605 Reliance on Security Through Obscurity Vulnerability
TP-Link Omada ER605 Reliance on Security Through Obscurity Vulnerability. This vulnerability allows network-adjacent attackers to access or spoof DDNS messages on affected installations of TP-Link Omada ER605 routers. Authentication is not required to exploit this vulnerability. However, devices are vulnerable only if configured to use the Comexe DDNS service. The specific flaw exists within the cmxddnsd executable. The issue results from reliance on obscurity to secure network data. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of root. Was ZDI-CAN-22439.
[ "cpe:2.3:a:tp_link:omada_er605:2.6_2.2.2_build_20231017:*:*:*:*:*:*:*" ]
null
null
5
null
CVE-2017-11413
Fiyo CMS 2.0.7 has SQL injection in dapur/apps/app_article/controller/comment_status.php via $_GET['id'].
[ "cpe:2.3:a:fiyo:fiyo_cms:2.0.7:*:*:*:*:*:*:*" ]
null
null
9.8
7.5
GHSA-f39x-gx7x-wwfj
Processing of user-defined mail search expressions is not limited. Availability of OX App Suite could be reduced due to high processing load. Please deploy the provided updates and patch releases. Processing time of mail search expressions now gets monitored, and the related request is terminated if a resource threshold is reached. No publicly available exploits are known.
[]
null
6.5
null
null
CVE-2022-3563
Linux Kernel BlueZ mgmt-tester.c read_50_controller_cap_complete null pointer dereference
A vulnerability classified as problematic has been found in Linux Kernel. Affected is the function read_50_controller_cap_complete of the file tools/mgmt-tester.c of the component BlueZ. The manipulation of the argument cap_len leads to null pointer dereference. It is recommended to apply a patch to fix this issue. VDB-211086 is the identifier assigned to this vulnerability.
[ "cpe:2.3:a:bluez:bluez:*:*:*:*:*:*:*:*" ]
null
3.5
null
null
GHSA-6f9w-r8mj-4h2w
Mesa Labs AmegaView Versions 3.0 uses default cookies that could be set to bypass authentication to the web application, which may allow an attacker to gain access.
[]
null
null
null
null
CVE-2010-3584
Unspecified vulnerability in the Oracle VM component in Oracle VM 2.2.1 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to ovs-agent. NOTE: the previous information was obtained from the October 2010 CPU. Oracle has not commented on claims from a third party researcher that this is related to the storage of passwords and password hashes in cleartext in files with insecure permissions.
[ "cpe:2.3:a:oracle:vm:2.2.1:*:*:*:*:*:*:*" ]
null
null
null
4.3
GHSA-rvmr-97cf-9f3m
Failure to initialize memory in SEV Firmware may allow a privileged attacker to access stale data from other guests.
[]
null
6
null
null
GHSA-gjc9-rhv5-87jw
Adobe Acrobat and Reader versions 2018.011.20063 and earlier, 2017.011.30102 and earlier, and 2015.006.30452 and earlier have a heap overflow vulnerability. Successful exploitation could lead to arbitrary code execution.
[]
null
null
7.8
null
CVE-2023-6148
Possible XSS vulnerability in Jenkins Plugin for Qualys Policy Compliance
Qualys Jenkins Plugin for Policy Compliance prior to version and including 1.0.5 was identified to be affected by a security flaw, which was missing a permission check while performing a connectivity check to Qualys Cloud Services. This allowed any user with login access and access to configure or edit jobs to utilize the plugin to configure a potential rouge endpoint via which it was possible to control response for certain request which could be injected with XSS payloads leading to XSS while processing the response data
[ "cpe:2.3:a:qualys:policy_compliance:*:*:*:*:*:jenkins:*:*" ]
null
5.7
null
null
CVE-2016-10120
Firejail uses 0777 permissions when mounting (1) /dev, (2) /dev/shm, (3) /var/tmp, or (4) /var/lock, which allows local users to gain privileges.
[ "cpe:2.3:a:firejail_project:firejail:-:*:*:*:*:*:*:*" ]
null
null
7.8
7.2
GHSA-p9wj-4c56-234q
Datto ALTO and SIRIS devices allow remote attackers to obtain sensitive information about data, software versions, configuration, and virtual machines via a request to a Web Virtual Directory.
[]
null
null
5.3
null
CVE-2005-2105
Cisco IOS 12.2T through 12.4 allows remote attackers to bypass Authentication, Authorization, and Accounting (AAA) RADIUS authentication, if the fallback method is set to none, via a long username.
[ "cpe:2.3:o:cisco:ios:12.2\\(2\\)xr:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(4\\)xr:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2t:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xb:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xc:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xd:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xe:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xf:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xg:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xh:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xi:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xj:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xk:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xl:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xm:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xq:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xr:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xt:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xw:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2ya:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2yb:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2yc:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2yd:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2yf:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2yg:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2yh:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2yj:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2yl:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2ym:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2yn:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2yp:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2yq:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2yr:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2yt:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2yu:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2yv:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2yw:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2yy:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2zb:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2zc:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2zd:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2ze:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2zf:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2zg:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2zh:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2zj:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2zl:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2zn:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2zo:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2zp:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3b:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3bc:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3bw:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3ja:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3t:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3xa:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3xb:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3xc:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3xd:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3xe:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3xf:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3xg:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3xh:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3xi:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3xj:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3xk:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3xl:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3xm:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3xn:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3xq:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3xr:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3xs:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3xt:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3xu:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3xw:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3xx:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3xy:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3ya:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3yb:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3yd:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3yf:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3yg:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3yh:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3yi:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3yj:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3yk:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3yl:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3yn:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3yq:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3yr:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.3ys:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2025-5534
ESV Bible Shortcode for WordPress <= 1.0.2 - Authenticated (Contributor+) Stored Cross-Site Scripting
The ESV Bible Shortcode for WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'esv' shortcode in all versions up to, and including, 1.0.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
6.4
null
null
RHSA-2025:1262
Red Hat Security Advisory: kernel security update
kernel: media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb", "cpe:/a:redhat:enterprise_linux:9::nfv", "cpe:/a:redhat:enterprise_linux:9::realtime", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
7.3
null
null
CVE-2025-1938
Memory safety bugs present in Firefox 135, Thunderbird 135, Firefox ESR 128.7, and Thunderbird 128.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 136, Firefox ESR < 128.8, Thunderbird < 136, and Thunderbird < 128.8.
[]
null
6.5
null
null
GHSA-w338-c5qq-hv3p
The web console for Mimosa B5, B5c, and C5x firmware through 2.8.0.2 is vulnerable to stored XSS in the set_banner() function of /var/www/core/controller/index.php. An unauthenticated attacker may set the contents of the /mnt/jffs2/banner.txt file, stored on the device's filesystem, to contain arbitrary JavaScript. The file contents are then used as part of a welcome/banner message presented to unauthenticated users who visit the login page for the web console. This vulnerability does not occur in the older 1.5.x firmware versions.
[]
null
null
null
null
GHSA-r864-28pw-8682
Harbor fails to validate the user permissions when updating p2p preheat policies
Harbor fails to validate the user permissions when updating p2p preheat policies. By sending a request to update a p2p preheat policy with an id that belongs to a project that the currently authenticated user doesn't have access to, the attacker could modify p2p preheat policies configured in other projects.
[]
null
7.4
null
null
CVE-2025-20994
Improper handling of insufficient permission in SyncClientProvider in Samsung Internet installed on non-Samsung Device prior to version 28.0.0.59 allows local attackers to access read and write arbitrary files.
[]
null
4.5
null
null
CVE-2010-0887
Unspecified vulnerability in the New Java Plug-in component in Oracle Java SE and Java for Business JDK and JRE 6 Update 18 and 19 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
[ "cpe:2.3:a:sun:java:6:18:business:*:*:*:*:*", "cpe:2.3:a:sun:java:6:18:se:*:*:*:*:*", "cpe:2.3:a:sun:java:6:19:business:*:*:*:*:*", "cpe:2.3:a:sun:java:6:19:se:*:*:*:*:*" ]
null
null
null
10
CVE-2024-21767
Commend WS203VICM Improper Access Control
A remote attacker may be able to bypass access control of Commend WS203VICM by creating a malicious request.
[ "cpe:2.3:o:commend:ws203vicm_firmware:*:*:*:*:*:*:*:*" ]
null
9.4
null
null
CVE-2023-42788
An improper neutralization of special elements used in an os command ('OS Command Injection') vulnerability [CWE-78] in FortiManager & FortiAnalyzer version 7.4.0, version 7.2.0 through 7.2.3, version 7.0.0 through 7.0.8, version 6.4.0 through 6.4.12 and version 6.2.0 through 6.2.11 may allow a local attacker with low privileges to execute unauthorized code via specifically crafted arguments to a CLI command
[ "cpe:2.3:a:fortinet:fortianalyzer:*:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortianalyzer:7.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortimanager:7.4.0:*:*:*:*:*:*:*" ]
null
7.6
null
null
CVE-2024-12359
code-projects Admin Dashboard vendor_management.php cross site scripting
A vulnerability was found in code-projects Admin Dashboard 1.0. It has been declared as problematic. This vulnerability affects unknown code of the file /vendor_management.php. The manipulation of the argument username leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The initial researcher advisory mentions contradicting product names.
[ "cpe:2.3:a:code-projects:admin_dashboard:*:*:*:*:*:*:*:*", "cpe:2.3:a:code-projects:admin_dashboard:1.0:*:*:*:*:*:*:*" ]
5.3
3.5
3.5
4
RHSA-2024:6166
Red Hat Security Advisory: krb5 security update
krb5: GSS message token handling krb5: GSS message token handling
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
6.5
null
null
GHSA-9mj2-qfmh-p7h9
ABBYY network license server in ABBYY FineReader 15 before Release 4 (aka 15.0.112.2130) allows escalation of privileges by local users via manipulations involving files and using symbolic links.
[]
null
null
null
null
GHSA-v555-pg2x-h7pp
A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface of an affected device. The vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
[]
null
null
null
null
CVE-2022-2399
Use after free in WebGPU in Google Chrome prior to 100.0.4896.88 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" ]
null
8.8
null
null
PYSEC-2025-55
null
vLLM is an inference and serving engine for large language models (LLMs). Version 0.8.0 up to but excluding 0.9.0 have a Denial of Service (ReDoS) that causes the vLLM server to crash if an invalid regex was provided while using structured output. This vulnerability is similar to GHSA-6qc9-v4r8-22xg/CVE-2025-48942, but for regex instead of a JSON schema. Version 0.9.0 fixes the issue.
[]
null
null
null
null
GHSA-93p8-27wh-j7p2
Secure Boot Security Feature Bypass Vulnerability
[]
null
8
null
null