id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
139k
cpes
sequencelengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
CVE-2024-45526
An issue was discovered in OPC Foundation OPCFoundation/UA-.NETStandard through 1.5.374.78. A remote attacker can send requests with invalid credentials and cause the server performance to degrade gradually.
[ "cpe:2.3:a:opcfoundation:ua-.netstandard:*:*:*:*:*:*:*:*" ]
null
5.3
null
null
CVE-2021-32518
QSAN Storage Manager - UNIX Symbolic Link (Symlink) Following
A vulnerability in share_link in QSAN Storage Manager allows remote attackers to create a symbolic link then access arbitrary files. The referred vulnerability has been solved with the updated version of QSAN Storage Manager v3.3.3.
[ "cpe:2.3:a:qsan:storage_manager:*:*:*:*:*:*:*:*" ]
null
7.5
null
null
GHSA-j77p-6wx9-cjqq
vBulletin 5.5.4 through 5.6.2 allows remote command execution via crafted subWidgets data in an ajax/render/widget_tabbedcontainer_tab_panel request. NOTE: this issue exists because of an incomplete fix for CVE-2019-16759.
[]
null
9.8
null
null
CVE-2012-4994
SQL injection vulnerability in admin/admin.php in LimeSurvey before 1.91+ Build 120224 allows remote authenticated users to execute arbitrary SQL commands via the id parameter in a browse action. NOTE: some of these details are obtained from third party information.
[ "cpe:2.3:a:limesurvey:limesurvey:*:*:*:*:*:*:*:*", "cpe:2.3:a:limesurvey:limesurvey:1.01:*:*:*:*:*:*:*", "cpe:2.3:a:limesurvey:limesurvey:1.50:*:*:*:*:*:*:*", "cpe:2.3:a:limesurvey:limesurvey:1.52:*:*:*:*:*:*:*", "cpe:2.3:a:limesurvey:limesurvey:1.53\\+:*:*:*:*:*:*:*", "cpe:2.3:a:limesurvey:limesurvey:1.70\\+:*:*:*:*:*:*:*", "cpe:2.3:a:limesurvey:limesurvey:1.71\\+:*:*:*:*:*:*:*", "cpe:2.3:a:limesurvey:limesurvey:1.72:*:*:*:*:*:*:*", "cpe:2.3:a:limesurvey:limesurvey:1.80\\+:*:*:*:*:*:*:*", "cpe:2.3:a:limesurvey:limesurvey:1.81\\+:*:*:*:*:*:*:*", "cpe:2.3:a:limesurvey:limesurvey:1.82\\+:*:*:*:*:*:*:*", "cpe:2.3:a:limesurvey:limesurvey:1.85:*:*:*:*:*:*:*", "cpe:2.3:a:limesurvey:limesurvey:1.86:*:*:*:*:*:*:*", "cpe:2.3:a:limesurvey:limesurvey:1.87\\+:*:*:*:*:*:*:*", "cpe:2.3:a:limesurvey:limesurvey:1.90\\+:*:*:*:*:*:*:*" ]
null
null
null
6.5
PYSEC-2016-19
null
Buffer overflow in the ImagingPcdDecode function in PcdDecode.c in Pillow before 3.1.1 and Python Imaging Library (PIL) 1.1.7 and earlier allows remote attackers to cause a denial of service (crash) via a crafted PhotoCD file.
[]
null
null
null
null
CVE-2023-0817
Buffer Over-read in gpac/gpac
Buffer Over-read in GitHub repository gpac/gpac prior to v2.3.0-DEV.
[ "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*" ]
null
null
7.3
null
CVE-2024-36814
An arbitrary file read vulnerability in Adguard Home before v0.107.52 allows authenticated attackers to access arbitrary files as root on the underlying Operating System via placing a crafted file into a readable directory.
[ "cpe:2.3:a:adguard:adguard_home:*:*:*:*:*:*:*:*" ]
null
4.9
null
null
GHSA-29jf-w9mr-r2xp
In Philips' IntelliSpace Cardiovascular (ISCV) products (ISCV Version 2.x or prior and Xcelera Version 4.1 or prior), an attacker with escalated privileges could access folders which contain executables where authenticated users have write permissions, and could then execute arbitrary code with local administrative permissions.
[]
null
7.8
null
null
GHSA-gwgr-rxcg-c2cg
Out of bounds reads while parsing NAN beacons attributes and OUIs due to improper length of field check in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking
[]
null
null
null
null
CVE-2023-52687
crypto: safexcel - Add error handling for dma_map_sg() calls
In the Linux kernel, the following vulnerability has been resolved: crypto: safexcel - Add error handling for dma_map_sg() calls Macro dma_map_sg() may return 0 on error. This patch enables checks in case of the macro failure and ensures unmapping of previously mapped buffers with dma_unmap_sg(). Found by Linux Verification Center (linuxtesting.org) with static analysis tool SVACE.
[]
null
5.5
null
null
GHSA-64rv-h943-wm6q
The Access Control issues include allowing a regular user to view a restricted incident, user role escalation to admin, users adding themselves as a participant in a restricted incident, and users able to view restricted incidents via the search feature. If your install has followed the secure deployment guidelines the risk of this is lowered, as this may only be exploited by an authenticated user.
[]
null
null
null
null
RHSA-2017:1256
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.15 update on RHEL 5
Resteasy: Yaml unmarshalling vulnerable to RCE
[ "cpe:/a:redhat:jboss_enterprise_application_platform:6::el5" ]
null
null
8.1
null
GHSA-534q-9f5r-pv5m
Cross-site scripting (XSS) vulnerability in the preview form in Stephen Ostermiller Contact Form before 2.00.02 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors that contain an apostrophe.
[]
null
null
null
null
GHSA-h558-fg72-4xph
CORE/HDD/src/wlan_hdd_hostapd.c in the Qualcomm Wi-Fi driver in Android before 2016-07-05 on Nexus 7 (2013) devices mishandles userspace data copying, which allows attackers to gain privileges via a crafted application, aka Android internal bug 27725204 and Qualcomm internal bug CR561022.
[]
null
null
7.8
null
CVE-2008-5847
Constructr CMS 3.02.5 and earlier stores passwords in cleartext in a MySQL database, which allows context-dependent attackers to obtain sensitive information by reading the hash column.
[ "cpe:2.3:a:constructr:constructr-cms:*:*:*:*:*:*:*:*", "cpe:2.3:a:constructr:constructr-cms:3.00.0:alpha:*:*:*:*:*:*", "cpe:2.3:a:constructr:constructr-cms:3.00.1:alpha:*:*:*:*:*:*", "cpe:2.3:a:constructr:constructr-cms:3.00.2:alpha:*:*:*:*:*:*", "cpe:2.3:a:constructr:constructr-cms:3.01.0:beta:*:*:*:*:*:*", "cpe:2.3:a:constructr:constructr-cms:3.01.1:beta:*:*:*:*:*:*", "cpe:2.3:a:constructr:constructr-cms:3.01.2:beta:*:*:*:*:*:*", "cpe:2.3:a:constructr:constructr-cms:3.01.3:beta:*:*:*:*:*:*", "cpe:2.3:a:constructr:constructr-cms:3.01.4:beta:*:*:*:*:*:*", "cpe:2.3:a:constructr:constructr-cms:3.01.5:beta:*:*:*:*:*:*", "cpe:2.3:a:constructr:constructr-cms:3.01.6:beta:*:*:*:*:*:*", "cpe:2.3:a:constructr:constructr-cms:3.01.7:beta:*:*:*:*:*:*", "cpe:2.3:a:constructr:constructr-cms:3.01.8:beta:*:*:*:*:*:*", "cpe:2.3:a:constructr:constructr-cms:3.01.9:beta:*:*:*:*:*:*", "cpe:2.3:a:constructr:constructr-cms:3.02.0:*:*:*:*:*:*:*", "cpe:2.3:a:constructr:constructr-cms:3.02.1:*:*:*:*:*:*:*", "cpe:2.3:a:constructr:constructr-cms:3.02.2:*:*:*:*:*:*:*", "cpe:2.3:a:constructr:constructr-cms:3.02.3:*:*:*:*:*:*:*", "cpe:2.3:a:constructr:constructr-cms:3.02.4:*:*:*:*:*:*:*" ]
null
null
null
2.6
GHSA-724g-4hc2-8gf6
Finjan Vital Security Appliance 5100/8100 NG 8.3.5 stores passwords in plaintext in a backup file, which allows local users to gain privileges. NOTE: the vendor has notified CVE that this issue was fixed in 8.3.6.
[]
null
null
null
null
GHSA-p3r9-vhxm-75g7
Improper access control in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.
[]
null
7.2
null
null
RHSA-2021:3926
Red Hat Security Advisory: OpenShift Container Platform 4.8.17 security and bug fix update
coreos-installer: incorrect signature verification on gzip-compressed install images
[ "cpe:/a:redhat:openshift:4.8::el7", "cpe:/a:redhat:openshift:4.8::el8" ]
null
7.5
null
null
CVE-2013-4013
IBM Maximo Asset Management 6.2 through 6.2.8, 7.1 through 7.1.1.12, and 7.5 before 7.5.0.2 allows remote attackers to obtain sensitive information via unspecified vectors.
[ "cpe:2.3:a:ibm:maximo_asset_management:7.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:7.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:7.1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:7.1.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:7.1.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:7.1.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:7.1.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:7.1.1.8:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:7.1.1.9:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:7.1.1.10:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:7.1.1.11:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:6.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:6.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:6.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:6.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:6.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:6.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:6.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:6.2.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:6.2.7:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:7.5.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:7.5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:7.5.0.2:*:*:*:*:*:*:*" ]
null
null
null
5
CVE-2021-39025
IBM Guardium Data Encryption (GDE) 4.0.0.0 and 5.0.0.0 could disclose internal IP address information when the web backend is down. IBM X-Force 213863.
[ "cpe:2.3:a:ibm:guardium_data_encryption:4.0.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:guardium_data_encryption:5.0.0.0:*:*:*:*:*:*:*" ]
null
null
5.3
null
GHSA-r857-4vmh-q8gw
Multiple exploitable buffer overflow vulnerabilities exist in the PubNub message handler for the "cc" channel of Insteon Hub running firmware version 1012. Specially crafted commands sent through the PubNub service can cause a stack-based buffer overflow overwriting arbitrary data. An attacker should send an authenticated HTTP request to trigger this vulnerability. In cmd s_sonos, at 0x9d01ddd4, the value for the `s_sonos_cmd` key is copied using `strcpy` to the buffer at `$sp+0x290`.This buffer is 32 bytes large, sending anything longer will cause a buffer overflow.
[]
null
9.9
null
null
GHSA-9jmq-68m9-2x2j
In the module "Account Manager | Sales Representative & Dealers | CRM" (prestasalesmanager) up to 9.0 from Presta World for PrestaShop, a guest can download personal information without restriction by performing a path traversal attack.
[]
null
7.5
null
null
RHSA-2015:1636
Red Hat Security Advisory: net-snmp security update
net-snmp: snmp_pdu_parse() incompletely parsed varBinds left in list of variables net-snmp: Heap corruption in snmp_pdu_parse function in snmplib/snmp_api.c
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation", "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
6.5
null
CVE-2021-30521
Heap buffer overflow in Autofill in Google Chrome on Android prior to 91.0.4472.77 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*" ]
null
8.8
null
6.8
GHSA-26r7-84w5-c8mf
irfanView 4.56 contains an error processing parsing files of type .pcx. Which leads to out-of-bounds writing at i_view32+0xdb60.
[]
null
null
null
null
RHSA-2020:3841
Red Hat Security Advisory: OpenShift Container Platform 4.5.13 jenkins security update
jetty: double release of resource can lead to information disclosure jenkins: user-specified tooltip values leads to stored cross-site scripting jenkins: stored XSS vulnerability in project naming strategy jenkins: stored XSS vulnerability in 'trigger builds remotely'
[ "cpe:/a:redhat:openshift:4.5::el7" ]
null
5.4
null
null
GHSA-p8rx-xh76-m952
In OpenEMR, versions 4.2.0 to 6.0.0 are vulnerable to Reflected Cross-Site-Scripting (XSS) due to user input not being validated properly. An attacker could trick a user to click on a malicious url and execute malicious code.
[]
null
6.1
null
null
GHSA-4hgh-2v7g-hc3q
SolarWinds Serv-U is submitting an HTTP request when changing or updating the attributes for File Share or File request.? Part of the URL of the request discloses sensitive data.
[]
null
7.5
null
null
CVE-2023-26768
Buffer Overflow vulnerability found in Liblouis v.3.24.0 allows a remote attacker to cause a denial of service via the compileTranslationTable.c and lou_setDataPath functions.
[ "cpe:2.3:a:liblouis:liblouis:3.24.0:*:*:*:*:*:*:*" ]
null
7.5
null
null
CVE-2019-1123
A remote code execution vulnerability exists in the way that DirectWrite handles objects in memory, aka 'DirectWrite Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-1117, CVE-2019-1118, CVE-2019-1119, CVE-2019-1120, CVE-2019-1121, CVE-2019-1122, CVE-2019-1124, CVE-2019-1127, CVE-2019-1128.
[ "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*" ]
null
null
8.8
9.3
CVE-2014-0900
The Device Administrator code in Android before 4.4.1_r1 might allow attackers to spoof device administrators and consequently bypass MDM restrictions by leveraging failure to update the mAdminMap data structure.
[ "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*" ]
null
null
8.8
6.5
GHSA-frqg-qr33-mvr2
SourceCodester (rems) Employee Management System 1.0 is vulnerable to Cross Site Scripting (XSS) in add_employee.php via the First Name and Address text fields.
[]
null
6.1
null
null
CVE-2021-44920
An invalid memory address dereference vulnerability exists in gpac 1.1.0 in the dump_od_to_saf.isra function, which causes a segmentation fault and application crash.
[ "cpe:2.3:a:gpac:gpac:1.1.0:*:*:*:*:*:*:*" ]
null
5.5
null
4.3
CVE-2015-0140
An unspecified ActiveX control in IBM SPSS Statistics 22.0 through FP1 on 32-bit platforms allows remote attackers to execute arbitrary code via a crafted HTML document.
[ "cpe:2.3:a:ibm:spss_statistics:22.0:*:*:*:*:*:*:*" ]
null
null
null
6.8
CVE-2023-35720
ASUS RT-AX92U lighttpd mod_webdav.so SQL Injection Information Disclosure Vulnerability
ASUS RT-AX92U lighttpd mod_webdav.so SQL Injection Information Disclosure Vulnerability. This vulnerability allows network-adjacent attackers to disclose sensitive information on affected ASUS RT-AX92U routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the mod_webdav.so module. When parsing a request, the process does not properly validate a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to disclose information in the context of root. Was ZDI-CAN-16078.
[ "cpe:2.3:o:asus:rt-ax92u_firmware:3.0.0.4.386.46061:*:*:*:*:*:*:*" ]
null
null
6.5
null
GHSA-33fr-rpxm-q4fp
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Gopi Ramasamy Email download link.This issue affects Email download link: from n/a through 3.7.
[]
null
5.3
null
null
CVE-2014-2684
The GenericConsumer class in the Consumer component in ZendOpenId before 2.0.2 and the Zend_OpenId_Consumer class in Zend Framework 1 before 1.12.4 does not verify that the openid_op_endpoint value identifies the same Identity Provider as the provider used in the association handle, which allows remote attackers to bypass authentication and spoof arbitrary OpenID identities by using a malicious OpenID Provider that generates OpenID tokens with arbitrary identifier and claimed_id values.
[ "cpe:2.3:a:zend:zendopenid:*:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zend_framework:*:*:*:*:*:*:*:*" ]
null
null
null
6.4
CVE-2013-0916
Use-after-free vulnerability in the Web Audio implementation in Google Chrome before 26.0.1410.43 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.2:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.3:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.4:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.5:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.6:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.7:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.8:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.9:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.10:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.11:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.12:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.14:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.15:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.16:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.17:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.18:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.19:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.20:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.21:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.22:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.23:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.24:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.25:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.26:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.27:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.28:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.29:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.30:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.31:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.32:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.33:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.34:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.35:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.36:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.37:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.38:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.39:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.40:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.41:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2019-5217
There is an information disclosure vulnerability on Mate 9 Pro Huawei smartphones versions earlier than LON-AL00B9.0.1.150 (C00E61R1P8T8). An attacker could view the photos after a series of operations without unlocking the screen lock. Successful exploit could cause an information disclosure condition.
[ "cpe:2.3:o:huawei:mate_9_pro_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:mate_9_pro:-:*:*:*:*:*:*:*" ]
null
null
4.6
2.1
GHSA-v24x-73f9-v4j3
Memory corruption while parsing the memory map info in IOCTL calls.
[]
null
7.8
null
null
GHSA-5w8c-34c5-7jq9
An Improper Neutralization of Special Elements vulnerability in the download manager of Juniper Networks Junos OS on SRX Series and EX Series allows a locally authenticated attacker with low privileges to take full control over the device. One aspect of this vulnerability is that the attacker needs to be able to execute any of the "request ..." or "show system download ..." commands. This issue affects Juniper Networks Junos OS on SRX Series and EX Series: All versions prior to 19.2R1-S9, 19.2R3-S5; 19.3 versions prior to 19.3R3-S6; 19.4 versions prior to 19.4R3-S8; 20.1 versions prior to 20.1R3-S4; 20.2 versions prior to 20.2R3-S4; 20.3 versions prior to 20.3R3-S3; 20.4 versions prior to 20.4R3-S2, 20.4R3-S3; 21.1 versions prior to 21.1R3-S1; 21.2 versions prior to 21.2R2-S2, 21.2R3; 21.3 versions prior to 21.3R2, 21.3R3; 21.4 versions prior to 21.4R1-S1, 21.4R2.
[]
null
7.8
null
null
CVE-2017-17599
Advance Online Learning Management Script 3.1 has SQL Injection via the courselist.php subcatid or popcourseid parameter.
[ "cpe:2.3:a:advance_online_learning_management_script_project:advance_online_learning_management_script:3.1:*:*:*:*:*:*:*" ]
null
null
9.8
7.5
CVE-2021-41785
Foxit PDF Reader before 11.1 and PDF Editor before 11.1, and PhantomPDF before 10.1.6, allow attackers to trigger a use-after-free and execute arbitrary code because JavaScript is mishandled.
[ "cpe:2.3:a:foxit:pdf_editor:*:*:*:*:*:*:*:*", "cpe:2.3:a:foxit:pdf_reader:*:*:*:*:*:*:*:*", "cpe:2.3:a:foxit:phantompdf:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
7.8
null
null
CVE-2023-28746
Information exposure through microarchitectural state after transient execution from some register files for some Intel(R) Atom(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
[]
null
6.5
null
null
GHSA-w2xm-9v29-725f
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WPHocus My auctions allegro allows Reflected XSS. This issue affects My auctions allegro: from n/a through 3.6.18.
[]
null
7.1
null
null
GHSA-j234-73mf-fxmv
The User.offer_account_by_email WebService method in Bugzilla 2.x and 3.x before 3.4.13, 3.5.x and 3.6.x before 3.6.7, 3.7.x and 4.0.x before 4.0.3, and 4.1.x through 4.1.3, when createemailregexp is not empty, does not properly handle user_can_create_account settings, which allows remote attackers to create user accounts by leveraging a token contained in an e-mail message.
[]
null
null
null
null
GHSA-47fc-vmwq-366v
PyTorch vulnerable to arbitrary code execution
In PyTorch before trunk/89695, torch.jit.annotations.parse_type_line can cause arbitrary code execution because eval is used unsafely. The fix for this issue is available in version 1.13.1. There is a release checker in [issue #89855](https://github.com/pytorch/pytorch/issues/89855).
[]
9.3
9.8
null
null
GHSA-m2fw-cvrc-qphg
Missing Authorization vulnerability in WPWebinarSystem WebinarPress allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects WebinarPress: from n/a through 1.33.27.
[]
null
4.3
null
null
CVE-2018-7935
There is a vulnerability in 21.328.01.00.00 version of the E5573Cs-322. Remote attackers could exploit this vulnerability to make the network where the E5573Cs-322 is running temporarily unavailable.
[ "cpe:2.3:o:huawei:e5573cs-322_firmware:21.328.01.00.00:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:e5573cs-322:-:*:*:*:*:*:*:*" ]
null
5.3
null
null
CVE-2002-0867
Microsoft Virtual Machine (VM) up to and including build 5.0.3805 allows remote attackers to cause a denial of service (crash) in Internet Explorer via invalid handle data in a Java applet, aka "Handle Validation Flaw."
[ "cpe:2.3:a:microsoft:virtual_machine:2000:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:virtual_machine:3000:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:virtual_machine:3100:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:virtual_machine:3188:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:virtual_machine:3200:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:virtual_machine:3300:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:virtual_machine:3802:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:virtual_machine:3805:*:*:*:*:*:*:*" ]
null
null
null
5
CVE-2007-5944
Cross-site scripting (XSS) vulnerability in Servlet Engine / Web Container in IBM WebSphere Application Server (WAS) 5.1.1.4 through 5.1.1.16 allows remote attackers to inject arbitrary web script or HTML via the Expect HTTP header. NOTE: this might be the same issue as CVE-2006-3918, but there are insufficient details to be sure.
[ "cpe:2.3:a:ibm:websphere_application_server:5.1.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:5.1.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:5.1.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:5.1.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:5.1.1.8:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:5.1.1.9:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:5.1.1.10:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:5.1.1.11:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:5.1.1.12:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:5.1.1.13:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:5.1.1.14:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:5.1.1.15:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:5.1.1.16:*:*:*:*:*:*:*" ]
null
null
null
4.3
CVE-2005-2746
Mail.app in Mail for Apple Mac OS X 10.3.9 and 10.4.2 includes message contents when using auto-reply rules, which could cause Mail.app to include decrypted message contents for encrypted messages.
[ "cpe:2.3:o:apple:mac_os_x:10.3.9:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.4.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.3.9:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.4.2:*:*:*:*:*:*:*" ]
null
null
null
5
CVE-2014-5164
The rlc_decode_li function in epan/dissectors/packet-rlc.c in the RLC dissector in Wireshark 1.10.x before 1.10.9 initializes a certain structure member only after this member is used, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
[ "cpe:2.3:a:wireshark:wireshark:1.10.0:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.10.1:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.10.2:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.10.3:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.10.4:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.10.5:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.10.6:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.10.7:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.10.8:*:*:*:*:*:*:*" ]
null
null
null
5
GHSA-94hw-5cx8-g994
An issue in Clementine v.1.3.1 allows a local attacker to execute arbitrary code via a crafted DLL file.
[]
null
7.3
null
null
GHSA-7xr5-w5mj-r2jm
A vulnerability has been identified in SIPLUS TIM 1531 IRC (6AG1543-1MX00-7XE0) (All versions < V2.4.8), TIM 1531 IRC (6GK7543-1MX00-0XE0) (All versions < V2.4.8). Casting an internal value could lead to floating point exception under certain circumstances. This could allow an attacker to cause a denial of service condition on affected devices.
[]
null
6.5
null
null
CVE-2020-20675
Nuishop v2.3 contains a SQL injection vulnerability in /goods/getGoodsListByConditions/.
[ "cpe:2.3:a:nuishop:nuishop:2.3:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
GHSA-wpgr-xfg9-fg2p
An elevation of privilege vulnerability in the MediaTek camera driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: N/A. Android ID: A-28470975. References: M-ALPS02696367.
[]
null
null
7
null
CVE-2006-0677
telnetd in Heimdal 0.6.x before 0.6.6 and 0.7.x before 0.7.2 allows remote unauthenticated attackers to cause a denial of service (server crash) via unknown vectors that trigger a null dereference.
[ "cpe:2.3:a:kth:heimdal:0.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:kth:heimdal:0.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:kth:heimdal:0.6.3:*:*:*:*:*:*:*", "cpe:2.3:a:kth:heimdal:0.6.4:*:*:*:*:*:*:*", "cpe:2.3:a:kth:heimdal:0.6.5:*:*:*:*:*:*:*", "cpe:2.3:a:kth:heimdal:0.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:kth:heimdal:0.7.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:kth:heimdal:0.7.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:kth:heimdal:0.7.1.3:*:*:*:*:*:*:*" ]
null
null
null
7.8
GHSA-8pmh-46hf-c4rr
Buffer Overflow vulnerability in FFmpeg 4.2 in the build_diff_map function in libavfilter/vf_fieldmatch.c, which could let a remote malicious user cause a Denial of Service.
[]
null
null
null
null
GHSA-r255-vm29-9xg5
A slab-out-of-bound read problem was found in brcmf_get_assoc_ies in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux Kernel. This issue could occur when assoc_info->req_len data is bigger than the size of the buffer, defined as WL_EXTRA_BUF_MAX, leading to a denial of service.
[]
null
7.1
null
null
CVE-2023-23723
WordPress WordPress Email Marketing Plugin – WP Email Capture Plugin <= 3.9.3 is vulnerable to Cross Site Scripting (XSS)
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Winwar Media WP Email Capture plugin <= 3.9.3 versions.
[ "cpe:2.3:a:winwar:wp_email_capture:*:*:*:*:*:wordpress:*:*" ]
null
5.9
null
null
CVE-2018-8890
An information disclosure vulnerability in the Management Console of BlackBerry UEM 12.8.0 and 12.8.1 could allow an attacker to take over a UEM user's session and perform administrative actions in the context of the user.
[ "cpe:2.3:a:blackberry:unified_endpoint_manager:12.8.0:-:*:*:*:*:*:*", "cpe:2.3:a:blackberry:unified_endpoint_manager:12.8.1:*:*:*:*:*:*:*" ]
null
7.5
null
5
GHSA-q3rp-jgjj-hj8w
Improper Access Control in GitHub repository openemr/openemr prior to 7.0.1.
[]
null
null
6.3
null
CVE-2019-19823
A certain router administration interface (that includes Realtek APMIB 0.11f for Boa 0.94.14rc21) stores cleartext administrative passwords in flash memory and in a file. This affects TOTOLINK A3002RU through 2.0.0, A702R through 2.1.3, N301RT through 2.1.6, N302R through 3.4.0, N300RT through 3.4.0, N200RE through 4.0.0, N150RT through 3.4.0, and N100RE through 3.4.0; Rutek RTK 11N AP through 2019-12-12; Sapido GR297n through 2019-12-12; CIK TELECOM MESH ROUTER through 2019-12-12; KCTVJEJU Wireless AP through 2019-12-12; Fibergate FGN-R2 through 2019-12-12; Hi-Wifi MAX-C300N through 2019-12-12; HCN MAX-C300N through 2019-12-12; T-broad GN-866ac through 2019-12-12; Coship EMTA AP through 2019-12-12; and IO-Data WN-AC1167R through 2019-12-12.
[ "cpe:2.3:o:totolink:a3002ru_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:totolink:a3002ru:-:*:*:*:*:*:*:*", "cpe:2.3:o:totolink:a702r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:totolink:a702r:-:*:*:*:*:*:*:*", "cpe:2.3:o:totolink:n302r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:totolink:n302r:-:*:*:*:*:*:*:*", "cpe:2.3:o:totolink:n300rt_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:totolink:n300rt:-:*:*:*:*:*:*:*", "cpe:2.3:o:totolink:n200re_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:totolink:n200re:-:*:*:*:*:*:*:*", "cpe:2.3:o:totolink:n150rt_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:totolink:n150rt:-:*:*:*:*:*:*:*", "cpe:2.3:o:totolink:n100re_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:totolink:n100re:-:*:*:*:*:*:*:*", "cpe:2.3:o:realtek:rtk_11n_ap_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:realtek:rtk_11n_ap:-:*:*:*:*:*:*:*", "cpe:2.3:o:sapido:gr297n_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:sapido:gr297n:-:*:*:*:*:*:*:*", "cpe:2.3:o:ciktel:mesh_router_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ciktel:mesh_router:-:*:*:*:*:*:*:*", "cpe:2.3:o:kctvjeju:wireless_ap_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:kctvjeju:wireless_ap:-:*:*:*:*:*:*:*", "cpe:2.3:o:fg-products:fgn-r2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:fg-products:fgn-r2:-:*:*:*:*:*:*:*", "cpe:2.3:o:hiwifi:max-c300n_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hiwifi:max-c300n:-:*:*:*:*:*:*:*", "cpe:2.3:o:tbroad:gn-866ac_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:tbroad:gn-866ac:-:*:*:*:*:*:*:*", "cpe:2.3:o:coship:emta_ap_firmwre:*:*:*:*:*:*:*:*", "cpe:2.3:h:coship:emta_ap:-:*:*:*:*:*:*:*", "cpe:2.3:o:iodata:wn-ac1167r_firmwre:*:*:*:*:*:*:*:*", "cpe:2.3:h:iodata:wn-ac1167r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hcn_max-c300n_project:hcn_max-c300n_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hcn_max-c300n_project:hcn_max-c300n:-:*:*:*:*:*:*:*", "cpe:2.3:o:totolink:n301rt_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:totolink:n301rt:-:*:*:*:*:*:*:*" ]
null
7.5
null
5
CVE-2008-6725
Multiple SQL injection vulnerabilities in CMScout 2.06 allow remote authenticated users to execute arbitrary SQL commands via the id parameter to (1) index.php in a mythings page (mythings.php) and (2) the users page in admin.php.
[ "cpe:2.3:a:cmscout:cmscout:2.06:*:*:*:*:*:*:*" ]
null
null
null
6
CVE-2019-20396
A segmentation fault is present in yyparse in libyang before v1.0-r1 due to a malformed pattern statement value during lys_parse_path parsing.
[ "cpe:2.3:a:cesnet:libyang:0.11:r1:*:*:*:*:*:*", "cpe:2.3:a:cesnet:libyang:0.11:r2:*:*:*:*:*:*", "cpe:2.3:a:cesnet:libyang:0.12:r1:*:*:*:*:*:*", "cpe:2.3:a:cesnet:libyang:0.12:r2:*:*:*:*:*:*", "cpe:2.3:a:cesnet:libyang:0.13:r1:*:*:*:*:*:*", "cpe:2.3:a:cesnet:libyang:0.13:r2:*:*:*:*:*:*", "cpe:2.3:a:cesnet:libyang:0.14:r1:*:*:*:*:*:*", "cpe:2.3:a:cesnet:libyang:0.15:r1:*:*:*:*:*:*", "cpe:2.3:a:cesnet:libyang:0.16:r1:*:*:*:*:*:*", "cpe:2.3:a:cesnet:libyang:0.16:r2:*:*:*:*:*:*", "cpe:2.3:a:cesnet:libyang:0.16:r3:*:*:*:*:*:*" ]
null
6.5
null
4.3
GHSA-g2vh-rcx2-8pp8
Unspecified vulnerability in Record Management Services (RMS) before VMS83A_RMS-V1100 for HP OpenVMS on the Alpha platform allows local users to gain privileges via unknown vectors.
[]
null
null
null
null
CVE-2018-12841
Adobe Acrobat and Reader versions 2018.011.20063 and earlier, 2017.011.30102 and earlier, and 2015.006.30452 and earlier have a double free vulnerability. Successful exploitation could lead to arbitrary code execution.
[ "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
null
7.8
9.3
CVE-2004-0181
The JFS file system code in Linux 2.4.x has an information leak in which in-memory data is written to the device for the JFS file system, which allows local users to obtain sensitive information by reading the raw device.
[ "cpe:2.3:o:linux:linux_kernel:2.4.0:*:*:*:*:*:*:*" ]
null
null
null
2.1
GHSA-5xqg-qxfr-gqgc
This vulnerability allows local attackers to disclose sensitive information on affected installations of Parallels Desktop 15.1.5-47309. An attacker must first obtain the ability to execute high-privileged code on the target guest system in order to exploit this vulnerability. The specific flaw exists within the IDE virtual device. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to escalate privileges and execute arbitrary code in the context of the hypervisor. Was ZDI-CAN-13189.
[]
null
null
null
null
GHSA-jr5j-7wx2-g59m
Uncontrolled search path element in the Intel(R) oneAPI Deep Neural Network (oneDNN) before version 2022.1 may allow an authenticated user to potentially enable escalation of privilege via local access.
[]
null
7.3
null
null
CVE-2024-43449
Windows USB Video Class System Driver Elevation of Privilege Vulnerability
Windows USB Video Class System Driver Elevation of Privilege Vulnerability
[ "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*" ]
null
6.8
null
null
GHSA-7cr2-q6gp-v63x
EMC Avamar Server and Avamar Virtual Edition before 7.0 on Data Store Gen3, Gen4, and Gen4s platforms do not properly determine authorization for calls to Java RMI methods, which allows remote authenticated users to execute arbitrary code via unspecified vectors.
[]
null
null
null
null
CVE-2021-32069
The AWV component of Mitel MiCollab before 9.3 could allow an attacker to perform a Man-In-the-Middle attack due to improper TLS negotiation. A successful exploit could allow an attacker to view and modify data.
[ "cpe:2.3:a:mitel:micollab:*:*:*:*:*:-:*:*" ]
null
4.8
null
5.8
CVE-2016-1000138
Reflected XSS in wordpress plugin indexisto v1.0.5
[ "cpe:2.3:a:indexisto_project:indexisto:*:*:*:*:*:wordpress:*:*" ]
null
null
6.1
4.3
CVE-2008-2312
Network Preferences in Apple Mac OS X 10.4.11 stores PPP passwords in cleartext in a world-readable file, which allows local users to obtain sensitive information by reading this file.
[ "cpe:2.3:o:apple:mac_os_x:10.4.11:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.4.11:*:*:*:*:*:*:*" ]
null
null
null
4.9
GHSA-vpmp-m797-5jx8
An issue was discovered in eClinicalWorks Patient Portal 7.0 build 13. This is a blind SQL injection within the messageJson.jsp, which can only be exploited by authenticated users via an HTTP POST request and which can be used to dump database data out to a malicious server, using an out-of-band technique such as select_loadfile().
[]
null
null
8.8
null
RHSA-2020:2212
Red Hat Security Advisory: ruby security update
ruby: HTTP response splitting in WEBrick ruby: Buffer under-read in String#unpack
[ "cpe:/o:redhat:rhel_aus:7.4::server", "cpe:/o:redhat:rhel_e4s:7.4::server", "cpe:/o:redhat:rhel_tus:7.4::server" ]
null
null
4.8
null
CVE-2019-1640
Cisco Webex Network Recording Player Arbitrary Code Execution Vulnerabilities
A vulnerability in the Cisco Webex Network Recording Player for Microsoft Windows and the Cisco Webex Player for Microsoft Windows could allow an attacker to execute arbitrary code on an affected system. The vulnerability exist because the affected software improperly validates Advanced Recording Format (ARF) and Webex Recording Format (WRF) files. An attacker could exploit this vulnerability by sending a user a malicious ARF or WRF file via a link or email attachment and persuading the user to open the file with the affected software. Successful exploitation could allow the attacker to execute arbitrary code on the affected system.
[ "cpe:2.3:a:cisco:webex_meetings_online:1.3.33:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:webex_meetings_online:1.3.39:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:webex_meetings_online:t32.9:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:webex_meetings_online:t33.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:webex_meetings_online:t33.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:webex_meetings_server:3.0mr2:p1:*:*:*:*:*:*", "cpe:2.3:a:cisco:webex_meetings_server:t31:sp3:*:*:*:*:*:*" ]
null
null
7.8
null
GHSA-93ww-rwv5-gjg4
Windows DWM Core Library Elevation of Privilege Vulnerability
[]
null
7.8
null
null
GHSA-v9xr-r3xx-x9gc
In Mosquitto before 2.0.16, excessive memory is allocated based on malicious initial packets that are not CONNECT packets.
[]
null
5.8
null
null
CVE-2019-12564
In DouCo DouPHP v1.5 Release 20190516, remote attackers can view the database backup file via a brute-force guessing approach for data/backup/DyyyymmddThhmmss.sql filenames.
[ "cpe:2.3:a:douco:douphp:1.5:20190516:*:*:*:*:*:*" ]
null
null
9.8
5
GHSA-942p-539x-69rq
IBM CloudPak for Multicloud Monitoring 2.0 and 2.3 has a few containers running in privileged mode which is vulnerable to host information leakage or destruction if unauthorized access to these containers could execute arbitrary commands. IBM X-Force ID: 211048.
[]
null
8.1
null
null
CVE-2020-20908
Akaunting v1.3.17 was discovered to contain a stored cross-site scripting (XSS) vulnerability which allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the Company Name input field.
[ "cpe:2.3:a:akaunting:akaunting:*:*:*:*:*:*:*:*" ]
null
5.4
null
3.5
GHSA-p3gg-w5rj-m5rv
Missing Authorization vulnerability in Drupal Open Social allows Forceful Browsing.This issue affects Open Social: from 11.8.0 before 12.3.10, from 12.4.0 before 12.4.9.
[]
null
5.3
null
null
GHSA-8x5g-gv52-3m86
There is a Cross Site Scripting (XSS) vulnerability in "cid" parameter of preview.php in PHPJabbers Time Slots Booking Calendar v3.3.
[]
null
6.1
null
null
GHSA-h6g3-qwxm-h5gj
A denial of service vulnerability exists in the cgiserver.cgi JSON command parser functionality of reolink RLC-410W v3.0.0.136_20121102. A specially-crafted HTTP request can lead to a reboot. GetRec param is not object. An attacker can send an HTTP request to trigger this vulnerability.
[]
null
6.5
null
null
CVE-2024-31634
Cross Site Scripting (XSS) vulnerability in Xunruicms versions 4.6.3 and before, allows remote attacker to execute arbitrary code via the Security.php file in the catalog \XunRuiCMS\dayrui\Fcms\Library.
[]
null
6.1
null
null
GHSA-w993-vwc7-h8jx
Vulnerability in the Oracle Business Intelligence Enterprise Edition product of Oracle Analytics (component: Analytics Web General). Supported versions that are affected are 6.4.0.0.0 and 12.2.1.4.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Business Intelligence Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Business Intelligence Enterprise Edition accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).
[]
null
6.5
null
null
CVE-2005-4026
search.php in Geeklog 1.4.x before 1.4.0rc1, and 1.3.x before 1.3.11sr3, allows remote attackers to obtain sensitive information via invalid (1) datestart and (2) dateend parameters, which leaks the web server path in an error message.
[ "cpe:2.3:a:geeklog:geeklog:*:*:*:*:*:*:*:*", "cpe:2.3:a:geeklog:geeklog:1.3.11:rc1:*:*:*:*:*:*", "cpe:2.3:a:geeklog:geeklog:1.3.11:sr1:*:*:*:*:*:*", "cpe:2.3:a:geeklog:geeklog:1.3.11:sr2:*:*:*:*:*:*", "cpe:2.3:a:geeklog:geeklog:1.4.0:beta1:*:*:*:*:*:*" ]
null
null
null
5
CVE-2023-0600
WP Visitor Statistics (Real Time Traffic) < 6.9 - Unauthenticated SQLi
The WP Visitor Statistics (Real Time Traffic) WordPress plugin before 6.9 does not escape user input which is concatenated to an SQL query, allowing unauthenticated visitors to conduct SQL Injection attacks.
[ "cpe:2.3:a:plugins-market:wp_visitor_statistics:*:*:*:*:*:wordpress:*:*" ]
null
9.8
null
null
GHSA-5cqp-j54f-r2jc
Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2014-1769, CVE-2014-1785, CVE-2014-2753, CVE-2014-2755, CVE-2014-2760, CVE-2014-2761, CVE-2014-2772, and CVE-2014-2776.
[]
null
null
null
null
CVE-2021-35607
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
[ "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*" ]
null
6.5
null
null
GHSA-r7q2-qf8r-5h57
WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 10.6 and Windows, Apple Safari before 4.1 on Mac OS X 10.4, and Google Chrome before 5.0.375.70 does not properly handle a transformation of a text node that has the IBM1147 character set, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted HTML document containing a BR element, related to a "type checking issue."
[]
null
null
null
null
CVE-2025-0278
An internal path disclosure vulnerability affects HCL Traveler
HCL Traveler is affected by an internal path disclosure in a Windows application when the application inadvertently reveals internal file paths, in error messages, debug logs, or responses to user requests.
[]
null
4.3
null
null
CVE-1999-0657
WinGate is being used.
[]
null
null
null
0
GHSA-hw9h-77p4-296j
TCExam before 14.1.2 has XSS via an ff_ or xl_ field.
[]
null
null
6.1
null
RHSA-2021:4151
Red Hat Security Advisory: python27:2.7 security update
python: Unsafe use of eval() on data retrieved via HTTP in the test suite python-jinja2: ReDoS vulnerability in the urlize filter python-babel: Relative path traversal allows attacker to load arbitrary locale files and execute arbitrary code python-pygments: Infinite loop in SML lexer may lead to DoS python: Web cache poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a semicolon in query parameters python-pygments: ReDoS in multiple lexers python-lxml: Missing input sanitization for formaction HTML5 attributes may lead to XSS python-babel: Relative path traversal allows attacker to load arbitrary locale files and execute arbitrary code
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.8
null
null
RHSA-2018:2707
Red Hat Security Advisory: flash-plugin security update
flash-plugin: Information Disclosure vulnerability (APSB18-31)
[ "cpe:/a:redhat:rhel_extras:6" ]
null
null
6.5
null
RHSA-2019:0188
Red Hat Security Advisory: kernel-rt security and bug fix update
kernel: Use-after-free due to race condition in AF_PACKET implementation
[ "cpe:/a:redhat:rhel_extras_rt:7" ]
null
null
7
null