id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
139k
cpes
sequencelengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
CVE-2009-3508
Multiple directory traversal vulnerabilities in MUJE CMS 1.0.4.34 allow remote attackers to include and execute arbitrary local files via a .. (dot dot) in the (1) _class parameter to admin.php and the (2) url parameter to install/install.php; and allow remote authenticated administrators to read arbitrary files via a .. (dot dot) in the (3) _htmlfile parameter to admin.php.
[ "cpe:2.3:a:fcgphilipp:mujecms:1.0.4.34:*:*:*:*:*:*:*" ]
null
null
null
6
GHSA-6m97-8hch-4h66
Another vulnerability in the Android media framework (n/a). Product: Android. Versions: 7.0, 7.1.1, 7.1.2, 8.0. Android ID: A-64836894.
[]
null
null
7.5
null
GHSA-94p3-q55j-7qf5
silex SX-2000WG devices with firmware before 1.5.4 allow remote attackers to cause a denial of service (connectivity outage) via crafted data in the Options field of a TCP header, a different vulnerability than CVE-2014-3890.
[]
null
null
null
null
GHSA-r464-cmf2-6xc5
Input validation issue in Buffalo BBR-4HG and and BBR-4MG broadband routers with firmware 1.00 to 1.48 and 2.00 to 2.07 allows an attacker to cause the device to become unresponsive via unspecified vectors.
[]
null
null
4.5
null
CVE-2022-0896
Improper Neutralization of Special Elements Used in a Template Engine in microweber/microweber
Improper Neutralization of Special Elements Used in a Template Engine in GitHub repository microweber/microweber prior to 1.3.
[ "cpe:2.3:a:microweber:microweber:*:*:*:*:*:*:*:*" ]
null
null
7.1
null
GHSA-w9p9-gj6c-h5c7
The ium (aka net.ium.mobile.android) application 3.3.4 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[]
null
null
null
null
CVE-2022-47132
A Cross-Site Request Forgery (CSRF) in Academy LMS before v5.10 allows attackers to arbitrarily add Administrator users.
[ "cpe:2.3:a:creativeitem:academy_lms:*:*:*:*:*:*:*:*" ]
null
8.8
null
null
GHSA-9p8w-rwvc-4f9w
Cross-zone scripting vulnerability in the DOM templates (domplates) used by the console.log function in the Firebug extension before 1.04 for Mozilla Firefox allows remote attackers to bypass zone restrictions, read arbitrary file:// URIs, or execute arbitrary code in the browser chrome by overwriting the toString function via a certain function declaration, related to incorrect identification of anonymous JavaScript functions, a different issue than CVE-2007-1878.
[]
null
null
null
null
GHSA-jx6w-5q44-8g67
An attacker can gain VxWorks Shell after login due to hard-coded credentials on a KUKA KR C4 control software for versions prior to 8.7 or any product running KSS.
[]
null
8.8
null
null
GHSA-77r4-738q-2mfm
In wlan driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service in wlan services.
[]
null
5.5
null
null
CVE-2025-31460
WordPress OmniLeads Scripts and Tags Manager plugin <= 1.3 - CSRF to Stored XSS vulnerability
Cross-Site Request Forgery (CSRF) vulnerability in danielmuldernl OmniLeads Scripts and Tags Manager allows Stored XSS. This issue affects OmniLeads Scripts and Tags Manager: from n/a through 1.3.
[]
null
7.1
null
null
GHSA-rh22-qpv4-cr2w
SQL injection vulnerability in show_search_result.php in i-netsolution Job Search Engine allows remote attackers to execute arbitrary SQL commands via the keyword parameter.
[]
null
null
null
null
CVE-2024-34699
GZ::CTF allows unprivileged user can perform XSS attacks by constructing malicious team names.
GZ::CTF is a capture the flag platform. Prior to 0.20.1, unprivileged user can perform cross-site scripting attacks on other users by constructing malicious team names. This problem has been fixed in `v0.20.1`.
[]
null
6.5
null
null
CVE-2024-50407
WordPress Namaste! LMS plugin <= 2.6.2 - Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Kiboko Labs Namaste! LMS allows Reflected XSS.This issue affects Namaste! LMS: from n/a through 2.6.2.
[ "cpe:2.3:a:kibokolabs:namaste\\!_lms:*:*:*:*:*:wordpress:*:*" ]
null
7.1
null
null
GHSA-c474-f694-3xx6
A CWE-248: Uncaught Exception vulnerability exists in Modicon M580, Modicon M340, Modicon BMxCRA and 140CRA modules (all firmware versions), which could cause a Denial of Service attack on the PLC when upgrading the firmware with a missing web server image inside the package using FTP protocol.
[]
null
null
null
null
CVE-2008-1917
Multiple cross-site scripting (XSS) vulnerabilities in AMFPHP 1.2 allow remote attackers to inject arbitrary web script or HTML via the (1) class parameter to (a) methodTable.php, (b) code.php, and (c) details.php in browser/; and the (2) location parameter to browser/code.php. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
[ "cpe:2.3:a:amfphp:amfphp:1.2:*:*:*:*:*:*:*" ]
null
null
null
4.3
GHSA-mjh3-g7qw-vgfv
Cross-site scripting (XSS) vulnerability in the jQuery Countdown module 7.x-1.x before 7.x-1.1 for Drupal allows remote authenticated users with the "access administration pages" permission to inject arbitrary web script or HTML via unspecified vectors.
[]
null
null
null
null
CVE-2023-28295
Microsoft Publisher Remote Code Execution Vulnerability
Microsoft Publisher Remote Code Execution Vulnerability
[ "cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:*:*", "cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:publisher:2013:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:publisher:2016:*:*:*:*:*:*:*" ]
null
7.8
null
null
CVE-2016-2336
Type confusion exists in two methods of Ruby's WIN32OLE class, ole_invoke and ole_query_interface. Attacker passing different type of object than this assumed by developers can cause arbitrary code execution.
[ "cpe:2.3:a:ruby-lang:ruby:2.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:ruby-lang:ruby:2.3.0:*:*:*:*:*:*:*" ]
null
null
9.8
7.5
CVE-2003-1133
Rit Research Labs The Bat! 1.0.11 through 2.0 creates new accounts with insecure ACLs, which allows local users to read other users' email messages.
[ "cpe:2.3:a:ritlabs:the_bat:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ritlabs:the_bat:1.5:*:*:*:*:*:*:*", "cpe:2.3:a:ritlabs:the_bat:1.011:*:*:*:*:*:*:*", "cpe:2.3:a:ritlabs:the_bat:1.14:*:*:*:*:*:*:*", "cpe:2.3:a:ritlabs:the_bat:1.15:*:*:*:*:*:*:*", "cpe:2.3:a:ritlabs:the_bat:1.015:*:*:*:*:*:*:*", "cpe:2.3:a:ritlabs:the_bat:1.17:*:*:*:*:*:*:*", "cpe:2.3:a:ritlabs:the_bat:1.18:*:*:*:*:*:*:*", "cpe:2.3:a:ritlabs:the_bat:1.19:*:*:*:*:*:*:*", "cpe:2.3:a:ritlabs:the_bat:1.21:*:*:*:*:*:*:*", "cpe:2.3:a:ritlabs:the_bat:1.22:*:*:*:*:*:*:*", "cpe:2.3:a:ritlabs:the_bat:1.028:*:*:*:*:*:*:*", "cpe:2.3:a:ritlabs:the_bat:1.029:*:*:*:*:*:*:*", "cpe:2.3:a:ritlabs:the_bat:1.31:*:*:*:*:*:*:*", "cpe:2.3:a:ritlabs:the_bat:1.031:*:*:*:*:*:*:*", "cpe:2.3:a:ritlabs:the_bat:1.32:*:*:*:*:*:*:*", "cpe:2.3:a:ritlabs:the_bat:1.032:*:*:*:*:*:*:*", "cpe:2.3:a:ritlabs:the_bat:1.33:*:*:*:*:*:*:*", "cpe:2.3:a:ritlabs:the_bat:1.34:*:*:*:*:*:*:*", "cpe:2.3:a:ritlabs:the_bat:1.035:*:*:*:*:*:*:*", "cpe:2.3:a:ritlabs:the_bat:1.35:*:*:*:*:*:*:*", "cpe:2.3:a:ritlabs:the_bat:1.036:*:*:*:*:*:*:*", "cpe:2.3:a:ritlabs:the_bat:1.36:*:*:*:*:*:*:*", "cpe:2.3:a:ritlabs:the_bat:1.037:*:*:*:*:*:*:*", "cpe:2.3:a:ritlabs:the_bat:1.39:*:*:*:*:*:*:*", "cpe:2.3:a:ritlabs:the_bat:1.039:*:*:*:*:*:*:*", "cpe:2.3:a:ritlabs:the_bat:1.041:*:*:*:*:*:*:*", "cpe:2.3:a:ritlabs:the_bat:1.41:*:*:*:*:*:*:*", "cpe:2.3:a:ritlabs:the_bat:1.42:*:*:*:*:*:*:*", "cpe:2.3:a:ritlabs:the_bat:1.42f:*:*:*:*:*:*:*", "cpe:2.3:a:ritlabs:the_bat:1.043:*:*:*:*:*:*:*", "cpe:2.3:a:ritlabs:the_bat:1.43:*:*:*:*:*:*:*", "cpe:2.3:a:ritlabs:the_bat:1.44:*:*:*:*:*:*:*", "cpe:2.3:a:ritlabs:the_bat:1.45:*:*:*:*:*:*:*", "cpe:2.3:a:ritlabs:the_bat:1.46:*:*:*:*:*:*:*", "cpe:2.3:a:ritlabs:the_bat:1.47:*:*:*:*:*:*:*", "cpe:2.3:a:ritlabs:the_bat:1.48:*:*:*:*:*:*:*", "cpe:2.3:a:ritlabs:the_bat:1.49:*:*:*:*:*:*:*", "cpe:2.3:a:ritlabs:the_bat:1.51:*:*:*:*:*:*:*", "cpe:2.3:a:ritlabs:the_bat:1.52:*:*:*:*:*:*:*", "cpe:2.3:a:ritlabs:the_bat:1.53d:*:*:*:*:*:*:*", "cpe:2.3:a:ritlabs:the_bat:1.101:*:*:*:*:*:*:*", "cpe:2.3:a:ritlabs:the_bat:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:ritlabs:the_bat:2.0.1:*:*:*:*:*:*:*" ]
null
null
null
2.1
CVE-2022-28412
Car Driving School Managment System v1.0 was discovered to contain a SQL injection vulnerability via /cdsms/classes/Master.php?f=delete_package.
[ "cpe:2.3:a:car_driving_school_management_system_project:car_driving_school_management_system:1.0:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
GHSA-h7mg-mmcf-cc8c
Auth. (admin+) Stored Cross-site Scripting (XSS) vulnerability in PI Websolution Product page shipping calculator for WooCommerce plugin <= 1.3.20 versions.
[]
null
4.8
null
null
GHSA-259v-fw35-w989
golang/go in 1.0.2 fixes all.bash on shared machines. dotest() in src/pkg/debug/gosym/pclntab_test.go creates a temporary file with predicable name and executes it as shell script.
[]
null
null
null
null
GHSA-3r84-hhrv-2935
In createQuickShareAction of SaveImageInBackgroundTask.java, there is a possible way to trigger a background activity launch due to an unsafe PendingIntent. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
[]
null
7.8
null
null
CVE-2020-21603
libde265 v1.0.4 contains a heap buffer overflow in the put_qpel_0_0_fallback_16 function, which can be exploited via a crafted a file.
[ "cpe:2.3:a:struktur:libde265:1.0.4:*:*:*:*:*:*:*" ]
null
6.5
null
4.3
GHSA-vc6m-jrww-32fp
The System Configuration Protocol (SCP) core messaging interface in Cisco Prime Network Registrar 8.2 before 8.2.3.1 and 8.3 before 8.3.2 allows remote attackers to obtain sensitive information via crafted SCP messages, aka Bug ID CSCuv35694.
[]
null
null
7.5
null
CVE-2023-3208
RoadFlow Visual Process Engine .NET Core Mvc Login sql injection
A vulnerability, which was classified as critical, has been found in RoadFlow Visual Process Engine .NET Core Mvc 2.13.3. Affected by this issue is some unknown functionality of the file /Log/Query?appid=0B736354-9473-4D66-B9C0-15CAC149EB05&tabid=tab_0B73635494734D66B9C015CAC149EB05 of the component Login. The manipulation of the argument sidx/sord leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-231230 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
[ "cpe:2.3:a:roadflow:roadflow:2.13.3:*:*:*:*:*:*:*" ]
null
6.3
6.3
6.5
GHSA-5c92-xf29-3c94
Memory leak in Xen 3.3 through 4.8.x allows guest OS users to cause a denial of service (ARM or x86 AMD host OS memory consumption) by continually rebooting, because certain cleanup is skipped if no pass-through device was ever assigned, aka XSA-207.
[]
null
null
5.5
null
GHSA-cpqg-cv2f-q5p4
Vulnerability in the Oracle SOA Suite component of Oracle Fusion Middleware (subcomponent: Health Care FastPath). Supported versions that are affected are 11.1.1.7.0, 11.1.1.9.0, 12.1.3.0.0, 12.2.1.2.0 and 12.2.1.3.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle SOA Suite. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle SOA Suite accessible data. CVSS 3.0 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).
[]
null
null
4.3
null
CVE-2023-28141
NTFS Junction
An NTFS Junction condition exists in the Qualys Cloud Agent for Windows platform in versions before 4.8.0.31. Attackers may write files to arbitrary locations via a local attack vector. This allows attackers to assume the privileges of the process, and they may delete or otherwise on unauthorized files, allowing for the potential modification or deletion of sensitive files limited only to that specific directory/file object. This vulnerability is bounded to the time of installation/uninstallation and can only be exploited locally. At the time of this disclosure, versions before 4.0 are classified as End of Life.
[ "cpe:2.3:a:qualys:cloud_agent:*:*:*:*:*:windows:*:*" ]
null
6.7
null
null
GHSA-qw9h-4855-wwrh
A denial of service vulnerability was reported in Lenovo System Update versions prior to 5.07.0088 that could allow configuration files to be written to non-standard locations.
[]
null
null
null
null
CVE-1999-0963
FreeBSD mount_union command allows local users to gain root privileges via a symlink attack.
[ "cpe:2.3:o:freebsd:freebsd:2.2:*:*:*:*:*:*:*" ]
null
null
null
7.2
GHSA-w3wx-pfgj-qgv3
An exploitable use-after-free vulnerability exists in WebKitGTK browser version 2.30.1 x64. A specially crafted HTML web page can cause a use-after-free condition, resulting in a remote code execution. The victim needs to visit a malicious web site to trigger this vulnerability.
[]
null
8.8
null
null
CVE-2009-4805
Multiple SQL injection vulnerabilities in EZ-Blog Beta 1, when magic_quotes_gpc is disabled, allow remote attackers to execute arbitrary SQL commands via (1) the storyid parameter to public/view.php or (2) the kill parameter to admin/remove.php.
[ "cpe:2.3:a:will_kraft:ez-blog:-:beta1:*:*:*:*:*:*" ]
null
null
null
6.8
GHSA-qp5q-3jm8-4774
In GNU Binutils 2.30, there's an integer overflow in the function load_specific_debug_section() in objdump.c, which results in `malloc()` with 0 size. A crafted ELF file allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact.
[]
null
null
7.8
null
CVE-2021-35645
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
[ "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*" ]
null
4.9
null
null
GHSA-qwg8-7mc5-hgvx
A vulnerability was found in SourceCodester Drag and Drop Image Upload 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /upload.php. The manipulation leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
[]
5.3
6.3
null
null
CVE-2007-4619
Multiple integer overflows in Free Lossless Audio Codec (FLAC) libFLAC before 1.2.1, as used in Winamp before 5.5 and other products, allow user-assisted remote attackers to execute arbitrary code via a malformed FLAC file that triggers improper memory allocation, resulting in a heap-based buffer overflow.
[ "cpe:2.3:a:flac:libflac:*:*:*:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:*:*:*:*:*:*:*:*" ]
null
null
null
9.3
GHSA-7g38-2ph5-vm4v
Untrusted search path vulnerability in metadata/loader.c in Mono 2.8 and earlier allows local users to gain privileges via a Trojan horse shared library in the current working directory.
[]
null
null
null
null
CVE-2015-2368
Untrusted search path vulnerability in Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8.1, Windows Server 2012 R2, and Windows RT 8.1 allows local users to gain privileges via a Trojan horse DLL in the current working directory, aka "Windows DLL Remote Code Execution Vulnerability."
[ "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:datacenter:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:essentials:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:standard:*:*:*" ]
null
null
null
6.9
CVE-2023-42685
In wifi service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed
[ "cpe:2.3:o:google:android:10.0:-:*:*:*:*:*:*", "cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:sc7731e:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:sc9832e:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t310:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*" ]
null
7.8
null
null
CVE-2020-5885
On versions 15.0.0-15.1.0.1, 14.1.0-14.1.2.3, 13.1.0-13.1.3.3, and 12.1.0-12.1.5.1, BIG-IP systems set up for connection mirroring in a high availability (HA) pair transfer sensitive cryptographic objects over an insecure communications channel. This is a control plane issue which is exposed only on the network used for connection mirroring.
[ "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*" ]
null
9.1
null
6.4
GHSA-pp63-cgj5-h996
A buffer overflow issue was addressed with improved memory handling. This issue is fixed in macOS Monterey 12.3, Safari 15.4, watchOS 8.5, iTunes 12.12.3 for Windows, iOS 15.4 and iPadOS 15.4, tvOS 15.4. Processing maliciously crafted web content may lead to arbitrary code execution.
[]
null
8.8
null
null
CVE-2007-3689
The Print module before 4.7-1.0 and 5.x before 5.x-1.2 for Drupal allows remote attackers to read restricted posts in (1) Organic Groups, (2) Taxonomy Access Control, (3) Taxonomy Access Lite, and other unspecified node access modules, via modified URL arguments.
[ "cpe:2.3:a:drupal:print_module:*:*:*:*:*:*:*:*" ]
null
null
null
7.8
CVE-2024-38471
Multiple TP-LINK products allow a network-adjacent attacker with an administrative privilege to execute arbitrary OS commands by restoring a crafted backup file. The affected device, with the initial configuration, allows login only from the LAN port or Wi-Fi.
[ "cpe:2.3:o:tp-link:archer_ax3000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:archer_axe75_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:archer_ax5400_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:archer_axe5400_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:archer_airr5_firmware:*:*:*:*:*:*:*:*" ]
null
6.8
null
null
GHSA-xfrc-7mj2-5xh9
Undefined Behavior in zencashjs
Versions of `zencashjs` prior to 1.2.0 may cause loss of funds when used with cryptocurrency wallets. The package relies on a string comparison of the first two characters of a Horizen address to determine the destination address type of a transaction (P2PKH or P2SH). Due to the base58 address prefixes chosen in Horizen there exists the possibility of a clash of address prefixes for testnet P2PKH and mainnet P2SH addresses, testnet P2PKH addresses start with “zt” while a subset of mainnet P2SH addresses can also start with “zt”. The package interprets transactions sent to a “zt” P2SH address on mainnet as P2PKH transactions erroneously. Any funds sent to a mainnet P2SH multisignature address starting with “zt” will be sent to the wrong address and be lost.RecommendationUpgrade to version 1.2.0 or later.
[]
null
null
null
null
GHSA-7657-r953-54qx
IBM SAN Volume Controller, IBM Storwize, IBM Spectrum Virtualize and IBM FlashSystem products versions 7.5 through 8.2 could allow an authenticated user to download arbitrary files from the operating system. IBM X-Force ID: 148757.
[]
null
null
6.5
null
CVE-2020-22198
SQL Injection vulnerability in DedeCMS 5.7 via mdescription parameter to member/ajax_membergroup.php.
[ "cpe:2.3:a:dedecms:dedecms:5.7:-:*:*:*:*:*:*" ]
null
9.8
null
7.5
CVE-2006-5963
Directory traversal vulnerability in PentaZip 8.5.1.190 and PentaSuite-PRO 8.5.1.221 allows user-assisted remote attackers to extract files to arbitrary pathnames via a ../ (dot dot slash) in a filename.
[ "cpe:2.3:a:pentaware:pentasuite-pro:8.5.1.221:*:*:*:*:*:*:*", "cpe:2.3:a:pentaware:pentazip:8.5.1.190:*:*:*:*:*:*:*" ]
null
null
null
4.3
GHSA-93v6-3cxx-h8wc
An Improper Input Validation issue was discovered in ABB FOX515T release 1.0. An improper input validation vulnerability has been identified, allowing a local attacker to provide a malicious parameter to the script that is not validated by the application, This could enable the attacker to retrieve any file on the server.
[]
null
null
5.5
null
CVE-2007-0385
The faq section in PostNuke 0.764 allows remote attackers to obtain sensitive information (the full path) via "unvalidated output" in FAQ/index.php, possibly involving an undefined id_cat variable.
[ "cpe:2.3:a:postnuke_software_foundation:postnuke:0.764:*:*:*:*:*:*:*" ]
null
null
null
7.8
CVE-2022-26839
Delta Electronics DIAEnergie Incorrect Default Permissions
Delta Electronics DIAEnergie (All versions prior to 1.8.02.004) is vulnerable to an incorrect default permission in the DIAEnergie application, which may allow an attacker to plant new files (such as DLLs) or replace existing executable files.
[ "cpe:2.3:a:deltaww:diaenergie:*:*:*:*:*:*:*:*" ]
null
7.8
null
null
CVE-2015-1892
The Multicast DNS (mDNS) responder in IBM Security Access Manager for Web 7.x before 7.0.0 FP12 and 8.x before 8.0.1 FP1 inadvertently responds to unicast queries with source addresses that are not link-local, which allows remote attackers to cause a denial of service (traffic amplification) or obtain potentially sensitive information via port-5353 UDP packets.
[ "cpe:2.3:o:ibm:security_access_manager_for_web_7.0_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:security_access_manager_for_web_8.0_firmware:8.0.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:security_access_manager_for_web_8.0_firmware:8.0.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:security_access_manager_for_web_8.0_firmware:8.0.0.3:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:security_access_manager_for_web_8.0_firmware:8.0.0.4:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:security_access_manager_for_web_8.0_firmware:8.0.0.5:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:security_access_manager_for_web_8.0_firmware:8.0.1.0:*:*:*:*:*:*:*" ]
null
null
null
5
RHSA-2013:0642
Red Hat Security Advisory: tomcat5 security update
Web: Bypass of security constraints
[ "cpe:/a:redhat:jboss_enterprise_web_server:1.0.2" ]
null
null
null
null
GHSA-q6hx-x875-r6j4
RedwoodHQ 2.5.5 does not require any authentication for database operations, which allows remote attackers to create admin users via a con.automationframework users insert_one call.
[]
null
null
9.8
null
GHSA-g9m4-mjxc-rw4q
Cross-site scripting (XSS) vulnerability in frontend/x3/files/fileop.html in cPanel 11.0 through 11.24.7 allows remote attackers to inject arbitrary web script or HTML via the fileop parameter.
[]
null
null
null
null
CVE-2025-22727
WordPress MailChimp Subscribe Form plugin <= 4.1 - Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in PluginOps MailChimp Subscribe Forms allows Stored XSS. This issue affects MailChimp Subscribe Forms : from n/a through 4.1.
[]
null
6.5
null
null
GHSA-g36r-wf4f-vq9w
InstallHFZ.exe 6.5.201.0 in Pinnacle Hollywood Effects 6, a module in Pinnacle Systems Pinnacle Studio 12, allows remote attackers to cause a denial of service (application crash) via a crafted Hollywood FX Compressed Archive (.hfz) file.
[]
null
null
null
null
GHSA-2mpr-6qr3-q9cc
cgi-bin/postpf/cgi-bin/dynamic/config/config.html on Lexmark X94x before LC.BR.P142, X85x through LC4.BE.P487, X644 and X646 before LC2.MC.P374, X642 through LC2.MB.P318, W840 through LS.HA.P252, T64x before LS.ST.P344, X64xef through LC2.TI.P325, C935dn through LC.JO.P091, C920 through LS.TA.P152, C78x through LC.IO.P187, X78x through LC2.IO.P335, C77x through LC.CM.P052, X772 through LC2.TR.P291, C53x through LS.SW.P069, C52x through LS.FA.P150, 25xxN through LCL.CU.P114, N4000 through LC.MD.P119, N4050e through GO.GO.N206, N70xxe through LC.CO.N309, E450 through LM.SZ.P124, E350 through LE.PH.P129, and E250 through LE.PM.P126 printers allows remote attackers to remove the Password Protect administrative password via the vac.255.GENPASSWORD parameter.
[]
null
null
null
null
CVE-2024-37840
SQL injection vulnerability in processscore.php in Itsourcecode Learning Management System Project In PHP With Source Code v1.0 allows remote attackers to execute arbitrary SQL commands via the LessonID parameter.
[ "cpe:2.3:a:itsourcecode:learning_management_system_project_in_php:1.0:*:*:*:*:*:*:*" ]
null
8.8
null
null
RHSA-2024:1041
Red Hat Security Advisory: go-toolset-1.19-golang security update
golang: net/http/internal: Denial of Service (DoS) via Resource Consumption via HTTP requests golang: cmd/go: Protocol Fallback when fetching modules
[ "cpe:/a:redhat:devtools:2023::el7" ]
null
7.5
null
null
GHSA-9wgp-3xm8-wjwj
PhoneSystem Terminal in 3CX Phone System (Debian based installation) 16.0.0.1570 allows an authenticated attacker to run arbitrary commands with the phonesystem user privileges because of "<space><space> followed by <shift><enter>" mishandling.
[]
null
8.8
null
null
CVE-2013-0513
IBM Security AppScan Enterprise 5.6 and 8.x before 8.7 and IBM Rational Policy Tester 5.6 and 8.x before 8.5.0.4 create a service that lacks " (double quote) characters in the service path, which allows local users to gain privileges via a Trojan horse program, related to an "Unquoted Service Path Enumeration" vulnerability.
[ "cpe:2.3:a:ibm:security_appscan:5.6.0.0:-:enterprise:*:*:*:*:*", "cpe:2.3:a:ibm:security_appscan:8.0.0.0:-:enterprise:*:*:*:*:*", "cpe:2.3:a:ibm:security_appscan:8.0.0.1:-:enterprise:*:*:*:*:*", "cpe:2.3:a:ibm:security_appscan:8.0.0.2:-:enterprise:*:*:*:*:*", "cpe:2.3:a:ibm:security_appscan:8.0.1.0:-:enterprise:*:*:*:*:*", "cpe:2.3:a:ibm:security_appscan:8.0.1.1:-:enterprise:*:*:*:*:*", "cpe:2.3:a:ibm:security_appscan:8.0.11:-:enterprise:*:*:*:*:*", "cpe:2.3:a:ibm:security_appscan:8.5.0.0:-:enterprise:*:*:*:*:*", "cpe:2.3:a:ibm:security_appscan:8.5.0.1:-:enterprise:*:*:*:*:*", "cpe:2.3:a:ibm:security_appscan:8.6.0.0:-:enterprise:*:*:*:*:*", "cpe:2.3:a:ibm:security_appscan:8.6.0.1:-:enterprise:*:*:*:*:*", "cpe:2.3:a:ibm:security_appscan:8.6.0.2:-:enterprise:*:*:*:*:*", "cpe:2.3:a:ibm:rational_policy_tester:5.6.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_policy_tester:8.0.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_policy_tester:8.0.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_policy_tester:8.0.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_policy_tester:8.0.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_policy_tester:8.0.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_policy_tester:8.5.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_policy_tester:8.5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_policy_tester:8.5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_policy_tester:8.5.0.3:*:*:*:*:*:*:*" ]
null
null
null
7.2
GHSA-fq2g-9m6v-c9hw
An issue was discovered in Bitdefender BOX firmware versions before 2.1.37.37-34 that allows an attacker to pass arbitrary code to the BOX appliance via the web API. In order to exploit this vulnerability, an attacker needs presence in Bitdefender BOX setup network and Bitdefender BOX be in setup mode.
[]
null
7.8
null
null
CVE-2023-47488
Cross Site Scripting vulnerability in Combodo iTop v.3.1.0-2-11973 allows a local attacker to obtain sensitive information via a crafted script to the attrib_manager_id parameter in the General Information page and the id parameter in the contact page.
[ "cpe:2.3:a:combodo:itop:3.1.0-2-11973:*:*:*:*:*:*:*" ]
null
6.1
null
null
PYSEC-2021-263
null
TensorFlow is an end-to-end open source platform for machine learning. In affected versions if the arguments to `tf.raw_ops.RaggedGather` don't determine a valid ragged tensor code can trigger a read from outside of bounds of heap allocated buffers. The [implementation](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/kernels/ragged_gather_op.cc#L70) directly reads the first dimension of a tensor shape before checking that said tensor has rank of at least 1 (i.e., it is not a scalar). Furthermore, the implementation does not check that the list given by `params_nested_splits` is not an empty list of tensors. We have patched the issue in GitHub commit a2b743f6017d7b97af1fe49087ae15f0ac634373. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
[]
null
null
null
null
CVE-2023-38218
Incorrect Authorization - Customer account takeover
Adobe Commerce versions 2.4.7-beta1 (and earlier), 2.4.6-p2 (and earlier), 2.4.5-p4 (and earlier) and 2.4.4-p5 (and earlier) are affected by an Incorrect Authorization . An authenticated attacker can exploit this to achieve information exposure and privilege escalation.
[ "cpe:2.3:a:adobe:commerce:2.3.7:-:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.3.7:p1:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.3.7:p2:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.3.7:p3:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.3.7:p4:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.3.7:p4-ext1:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.3.7:p4-ext2:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.3.7:p4-ext3:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.3.7:p4-ext4:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.0:-:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.0:ext-1:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.0:ext-2:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.0:ext-3:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.0:ext-4:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.1:-:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.1:ext-1:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.1:ext-2:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.1:ext-3:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.1:ext-4:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.2:-:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.2:ext-1:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.2:ext-2:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.2:ext-3:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.2:ext-4:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.3:-:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.3:ext-1:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.3:ext-2:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.3:ext-3:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.3:ext-4:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.4:-:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.4:p1:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.4:p2:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.4:p3:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.4:p4:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.4:p5:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.5:-:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.5:p1:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.5:p2:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.5:p3:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.5:p4:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.5:p5:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.6:-:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.6:p1:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.6:p2:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.7:b1:*:*:*:*:*:*", "cpe:2.3:a:adobe:magento:2.4.4:-:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.4:p1:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.4:p2:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.4:p3:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.5:-:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.5:p1:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.5:p2:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.5:p3:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.5:p4:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.6:-:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.6:p1:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.6:p2:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.7:b1:*:*:open_source:*:*:*" ]
null
8.8
null
null
GHSA-chhc-4m43-hfhm
Multiple unspecified vulnerabilities in Google V8 before 3.23.17.18, as used in Google Chrome before 33.0.1750.149, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
[]
null
null
null
null
GHSA-xmfr-f53v-mxcp
Vulnerability in the Oracle Outside In Technology component of Oracle Fusion Middleware (subcomponent: Outside In Filters). The supported version that is affected is 8.5.3.0. Easily exploitable vulnerability allows low privileged attacker with access to the physical communication segment attached to the hardware where the Oracle Outside In Technology executes to compromise Oracle Outside In Technology. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Outside In Technology. Note: Outside In Technology is a suite of software development kits (SDKs). The protocol and CVSS score depend on the software that uses the Outside In Technology code. The CVSS score assumes that the software passes data received over a network directly to Outside In Technology code, but if data is not received over a network the CVSS score may be lower. CVSS 3.0 Base Score 5.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
[]
null
null
5.7
null
GHSA-7f33-f4f5-xwgw
In-band key negotiation issue in AWS S3 Crypto SDK for golang
SummaryThe golang AWS S3 Crypto SDK is impacted by an issue that can result in loss of confidentiality and message forgery. The attack requires write access to the bucket in question, and that the attacker has access to an endpoint that reveals decryption failures (without revealing the plaintext) and that when encrypting the GCM option was chosen as content cipher.Risk/SeverityThe vulnerability pose insider risks/privilege escalation risks, circumventing KMS controls for stored data.ImpactThis advisory describes the plaintext revealing vulnerabilities in the golang AWS S3 Crypto SDK, with a similar issue in the non "strict" versions of C++ and Java S3 Crypto SDKs being present as well.V1 prior to 1.34.0 of the S3 crypto SDK does not authenticate the algorithm parameters for the data encryption key.An attacker with write access to the bucket can use this in order to change the encryption algorithm of an object in the bucket, which can lead to problems depending on the supported algorithms. For example, a switch from AES-GCM to AES-CTR in combination with a decryption oracle can reveal the authentication key used by AES-GCM as decrypting the GMAC tag leaves the authentication key recoverable as an algebraic equation.By default, the only available algorithms in the SDK are AES-GCM and AES-CBC. Switching the algorithm from AES-GCM to AES-CBC can be used as way to reconstruct the plaintext through an oracle endpoint revealing decryption failures, by brute forcing 16 byte chunks of the plaintext. Note that the plaintext needs to have some known structure for this to work, as a uniform random 16 byte string would be the same as a 128 bit encryption key, which is considered cryptographically safe.The attack works by taking a 16 byte AES-GCM encrypted block guessing 16 bytes of plaintext, constructing forgery that pretends to be PKCS5 padded AES-CBC, using the ciphertext and the plaintext guess and that will decrypt to a valid message if the guess was correct.To understand this attack, we have to take a closer look at both AES-GCM and AES-CBC: AES-GCM encrypts using a variant of CTR mode, i.e. `C_i = AES-Enc(CB_i) ^ M_i`. AES-CBC on the other hand *decrypts* via `M_i = AES-Dec(C_i) ^ C_{i-1}`, where `C_{-1} = IV`. The padding oracle can tell us if, after switching to CBC mode, the plaintext recovered is padded with a valid PKCS5 padding.Since `AES-Dec(C_i ^ M_i) = CB_i`, if we set `IV' = CB_i ^ 0x10*[16]`, where `0x10*[16]` is the byte `0x10` repeated 16 times, and `C_0' = C_i ^ M_i'` the resulting one block message `(IV', C_0')` will have valid PKCS5 padding if our guess `M_i'` for `M_i` was correct, since the decrypted message consists of 16 bytes of value `0x10`, the PKCS5 padded empty string.Note however, that an incorrect guess might also result in a valid padding, if the AES decryption result randomly happens to end in `0x01`, `0x0202`, or a longer valid padding. In order to ensure that the guess was indeed correct, a second check using `IV'' = IV' ^ (0x00*[15] || 0x11)` with the same ciphertext block has to be performed. This will decrypt to 15 bytes of value `0x10` and one byte of value `0x01` if our initial guess was correct, producing a valid padding. On an incorrect guess, this second ciphertext forgery will have an invalid padding with a probability of 1:2^128, as one can easily see.This issue is fixed in V2 of the API, by using the `KMS+context` key wrapping scheme for new files, authenticating the algorithm. Old files encrypted with the `KMS` key wrapping scheme remain vulnerable until they are reencrypted with the new scheme.MitigationUsing the version 2 of the S3 crypto SDK will not produce vulnerable files anymore. Old files remain vulnerable to this problem if they were originally encrypted with GCM mode and use the `KMS` key wrapping option.Proof of conceptA [Proof of concept](https://github.com/sophieschmieg/exploits/tree/master/aws_s3_crypto_poc) is available in a separate github repository.This particular issue is described in [combined_oracle_exploit.go](https://github.com/sophieschmieg/exploits/blob/master/aws_s3_crypto_poc/exploit/combined_oracle_exploit.go):
[]
null
2.5
null
null
GHSA-9324-v825-64hv
Cross-site scripting (XSS) vulnerability in the embedded HTTP server in the Service Console in IBM Tivoli Monitoring 6.2.2 before 6.2.2-TIV-ITM-FP0009 and 6.3.2 before 6.2.3-TIV-ITM-FP0001 allows remote attackers to inject arbitrary web script or HTML via a crafted URI.
[]
null
null
null
null
CVE-2017-3280
Vulnerability in the Oracle Partner Management component of Oracle E-Business Suite (subcomponent: User Interface). Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5 and 12.2.6. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Partner Management. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Partner Management, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Partner Management accessible data. CVSS v3.0 Base Score 4.7 (Integrity impacts).
[ "cpe:2.3:a:oracle:partner_management:12.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:partner_management:12.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:partner_management:12.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:partner_management:12.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:partner_management:12.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:partner_management:12.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:partner_management:12.2.6:*:*:*:*:*:*:*" ]
null
null
4.7
4.3
GHSA-9qq8-fg73-j2ww
Cross-site scripting (XSS) vulnerability in divers.php in Vincent Leclercq News 5.2 allows remote attackers to inject arbitrary web script or HTML via the (1) id and (2) disabled parameters.
[]
null
null
null
null
CVE-2020-35521
A flaw was found in libtiff. Due to a memory allocation failure in tif_read.c, a crafted TIFF file can lead to an abort, resulting in denial of service.
[ "cpe:2.3:a:libtiff:libtiff:*:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*" ]
null
5.5
null
4.3
GHSA-p8hc-mqcm-847r
Unspecified vulnerability in the Java SE, Java SE Embedded component in Oracle Java SE Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality and integrity via unknown vectors related to Libraries.
[]
null
null
null
null
GHSA-7m3g-723h-4hwc
Cross-site request forgery (CSRF) vulnerability on ReadyNet WRT300N-DD devices with firmware 1.0.26 allows remote attackers to hijack the authentication of arbitrary users.
[]
null
null
8.8
null
CVE-2024-13048
Ashlar-Vellum Cobalt XE File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability
Ashlar-Vellum Cobalt XE File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ashlar-Vellum Cobalt. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of XE files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24844.
[ "cpe:2.3:a:ashlar:cobalt:1204.90:*:*:*:*:*:*:*" ]
null
null
7.8
null
GHSA-5fqj-9cqv-7vh5
An improper authorization of using debugging command in Secure Folder prior to SMR Oct-2020 Release 1 allows unauthorized access to contents in Secure Folder via debugging command.
[]
null
5.5
null
null
CVE-2022-38044
Windows CD-ROM File System Driver Remote Code Execution Vulnerability
Windows CD-ROM File System Driver Remote Code Execution Vulnerability
[ "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_11:22h2:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_11:22h2:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*" ]
null
7.8
null
null
GHSA-jx2r-9qhf-j88m
The web server on the Digital Alert Systems DASDEC EAS device before 2.0-2 and the Monroe Electronics R189 One-Net EAS device before 2.0-2 allows remote attackers to obtain sensitive configuration and status information by reading log files.
[]
null
null
null
null
RHSA-2014:1101
Red Hat Security Advisory: kernel security and bug fix update
kernel: net: rds: dereference of a NULL device in rds_ib_laddr_check() kernel: ath9k: tid->sched race in ath_tx_aggr_sleep() kernel: net: rds: dereference of a NULL device in rds_iw_laddr_check() Kernel: net: mac80211: crash dues to AP powersave TX vs. wakeup race kernel: net: ping: refcount issue in ping_init_sock() function
[ "cpe:/o:redhat:rhel_eus:6.4::computenode", "cpe:/o:redhat:rhel_eus:6.4::server" ]
null
null
null
null
CVE-2024-48534
A reflected cross-site scripting (XSS) vulnerability on the Camp Details module of eSoft Planner 3.24.08271-USA allows attackers to execute arbitrary code in the context of a user's browser via injecting a crafted payload.
[]
null
5.4
null
null
GHSA-9w4v-2x3h-wxmw
Potential security vulnerabilities have been identified in HP Support Assistant. These vulnerabilities include privilege escalation, compromise of integrity, allowed communication with untrusted clients, and unauthorized modification of files.
[]
null
7.8
null
null
CVE-2022-20645
Cisco Security Manager Cross-Site Scripting Vulnerabilities
Multiple vulnerabilities in the web-based management interface of Cisco Security Manager could allow an unauthenticated, remote attacker to conduct cross-site scripting attacks against a user of the interface. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by persuading a user to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information.
[ "cpe:2.3:a:cisco:security_manager:*:*:*:*:*:*:*:*" ]
null
6.1
null
null
CVE-2024-33406
SQL injection vulnerability in /model/delete_student_grade_subject.php in campcodes Complete Web-Based School Management System 1.0 allows attacker to execute arbitrary SQL commands via the index parameter.
[ "cpe:2.3:a:campcodes:complete_web-based_school_management_system:1.0:*:*:*:*:*:*:*" ]
null
7.3
null
null
CVE-2024-44727
Sourcecodehero Event Management System1.0 is vulnerable to SQL Injection via the parameter 'username' in /event/admin/login.php.
[ "cpe:2.3:a:sourcecodehero:event_management_system:*:*:*:*:*:*:*:*", "cpe:2.3:a:angeljudesuarez:event_management_system:1.0:*:*:*:*:*:*:*" ]
null
7.4
null
null
GHSA-4cf4-xjp3-c6w3
SceneKit in Apple OS X before 10.10.5 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via unspecified vectors.
[]
null
null
null
null
GHSA-6398-vm89-wp76
Cross-site request forgery (CSRF) vulnerability in the Localization client 5.x before 5.x-1.1 and 6.x before 6.x-1.6 and the Localization server 5.x before 5.x-1.0-alpha5 and 6.x before 6.x-alpha2, modules for Drupal, allows remote attackers to perform unauthorized actions as administrators via unspecified vectors related to the "local translation submission interface."
[]
null
null
null
null
RHSA-2020:2404
Red Hat Security Advisory: bind security update
bind: BIND does not sufficiently limit the number of fetches performed when processing referrals bind: A logic error in code which checks TSIG validity can be used to trigger an assertion failure in tsig.c
[ "cpe:/a:redhat:rhel_e4s:8.0::appstream", "cpe:/o:redhat:rhel_e4s:8.0::baseos" ]
null
7.5
null
null
GHSA-qphr-636v-599x
Unrestricted file upload vulnerability in image.php in PHPizabi 0.848b C1 HFP1 allows remote attackers to execute arbitrary code by uploading a file with an executable extension from the event page, then accessing it via a direct request to the file in system/cache/pictures.
[]
null
null
null
null
GHSA-8297-wvjg-5vxg
Weak Password Reset Rules vulnerabilities where found providing a potiential for the storage of weak passwords that could facilitate unauthorized admin/application access.  Affected products:ABB ASPECT - Enterprise v3.07.02; NEXUS Series v3.07.02; MATRIX Series v3.07.02
[]
9.3
9.4
null
null
CVE-2024-39591
Missing Authorization check in SAP Document Builder
SAP Document Builder does not perform necessary authorization checks for one of the function modules resulting in escalation of privileges causing low impact on confidentiality of the application.
[ "cpe:2.3:a:sap:document_builder:s4fnd_102:*:*:*:*:*:*:*", "cpe:2.3:a:sap:document_builder:s4fnd_103:*:*:*:*:*:*:*", "cpe:2.3:a:sap:document_builder:s4fnd_104:*:*:*:*:*:*:*", "cpe:2.3:a:sap:document_builder:s4fnd_105:*:*:*:*:*:*:*", "cpe:2.3:a:sap:document_builder:s4fnd_106:*:*:*:*:*:*:*", "cpe:2.3:a:sap:document_builder:s4fnd_107:*:*:*:*:*:*:*", "cpe:2.3:a:sap:document_builder:s4fnd_108:*:*:*:*:*:*:*", "cpe:2.3:a:sap:document_builder:sap_bs_fnd_702:*:*:*:*:*:*:*", "cpe:2.3:a:sap:document_builder:sap_bs_fnd_731:*:*:*:*:*:*:*", "cpe:2.3:a:sap:document_builder:sap_bs_fnd_746:*:*:*:*:*:*:*", "cpe:2.3:a:sap:document_builder:sap_bs_fnd_747:*:*:*:*:*:*:*", "cpe:2.3:a:sap:document_builder:sap_bs_fnd_748:*:*:*:*:*:*:*" ]
null
4.3
null
null
CVE-2018-18717
An issue was discovered in Eleanor CMS through 2015-03-19. XSS exists via the ajax.php?direct=admin&file=autocomplete&query=[XSS] URI.
[ "cpe:2.3:a:eleanor-cms:eleanor_cms:*:*:*:*:*:*:*:*" ]
null
null
4.8
3.5
GHSA-mx4g-vhmg-3rf6
The patch for CVE-2020-17380/CVE-2020-25085 was found to be ineffective, thus making QEMU vulnerable to the out-of-bounds read/write access issues previously found in the SDHCI controller emulation code. This flaw allows a malicious privileged guest to crash the QEMU process on the host, resulting in a denial of service or potential code execution. QEMU up to (including) 5.2.0 is affected by this.
[]
null
5.7
null
null
GHSA-rv62-hr8r-jr2p
The Plumtree portal in BEA AquaLogic Interaction 5.0.2 through 5.0.4 and 6.0.1.218452 allows remote attackers to obtain version numbers and internal hostnames by reading comments in the HTML source of any page.
[]
null
null
null
null
GHSA-hp4r-wh6m-675v
A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiWLM version 8.6.0 through 8.6.5 and 8.5.0 through 8.5.4 allows attacker to execute unauthorized code or commands via specifically crafted http get request parameters.
[]
null
9.8
null
null
GHSA-2797-h4gc-wv56
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley MicroStation CONNECT 10.16.02.034. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of DXF files. Crafted data in a DXF file can trigger a read past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-16341.
[]
null
7.8
null
null
GHSA-687w-xp39-q584
An issue was discovered in slicer69 doas before 6.2 on certain platforms other than OpenBSD. On platforms without strtonum(3), sscanf was used without checking for error cases. Instead, the uninitialized variable errstr was checked and in some cases returned success even if sscanf failed. The result was that, instead of reporting that the supplied username or group name did not exist, it would execute the command as root.
[]
null
9.8
null
null
CVE-2014-0184
Red Hat CloudForms 3.0 Management Engine (CFME) before 5.2.4.2 logs the root password when deploying a VM, which allows local users to obtain sensitive information by reading the evm.log file.
[ "cpe:2.3:a:redhat:cloudforms_3.0_management_engine:*:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:cloudforms_3.0_management_engine:5.2:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:cloudforms_3.0_management_engine:5.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:cloudforms_3.0_management_engine:5.2.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:cloudforms_3.0_management_engine:5.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:cloudforms_3.0_management_engine:5.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:cloudforms_3.0_management_engine:5.2.3.2:*:*:*:*:*:*:*" ]
null
null
null
4.9
CVE-2008-4722
Unspecified vulnerability in Sun Integrated Lights-Out Manager (ILOM) 2.0.1.5 through 2.0.4.26 allows remote authenticated users to (1) access the service processor (SP) and cause a denial of service (shutdown or reboot), or (2) access the host operating system and have an unspecified impact, via unknown vectors.
[ "cpe:2.3:a:sun:integrated_lights-out_manager:*:*:*:*:*:*:*:*", "cpe:2.3:h:sun:blade_6000_modular_system_with_chassis:*:*:*:*:*:*:*:*", "cpe:2.3:h:sun:blade_6048_modular_system_with_chassis:*:*:*:*:*:*:*:*", "cpe:2.3:h:sun:blade_8000_modular_system:*:*:*:*:*:*:*:*", "cpe:2.3:h:sun:blade_8000p_modular_system:*:*:*:*:*:*:*:*", "cpe:2.3:h:sun:blade_t6320_server_module:*:*:*:*:*:*:*:*", "cpe:2.3:h:sun:blade_x6220_with_server_module_software:*:*:*:*:*:*:*:*", "cpe:2.3:h:sun:blade_x6250_with_server_module_software:*:*:*:*:*:*:*:*", "cpe:2.3:h:sun:blade_x6450_with_server_module_software:*:*:*:*:*:*:*:*", "cpe:2.3:h:sun:blade_x8400:*:*:*:*:*:*:*:*", "cpe:2.3:h:sun:blade_x8420:*:*:*:*:*:*:*:*", "cpe:2.3:h:sun:blade_x8440:*:*:*:*:*:*:*:*", "cpe:2.3:h:sun:blade_x8450:*:*:*:*:*:*:*:*", "cpe:2.3:h:sun:fire_x2250_server:*:*:*:*:*:*:*:*", "cpe:2.3:h:sun:fire_x4100_server:*:*:*:*:*:*:*:*", "cpe:2.3:h:sun:fire_x4100m2_server:*:*:*:*:*:*:*:*", "cpe:2.3:h:sun:fire_x4140_server:*:*:*:*:*:*:*:*", "cpe:2.3:h:sun:fire_x4150_server:*:*:*:*:*:*:*:*", "cpe:2.3:h:sun:fire_x4200_server:*:*:*:*:*:*:*:*", "cpe:2.3:h:sun:fire_x4200m2_server:*:*:*:*:*:*:*:*", "cpe:2.3:h:sun:fire_x4240_server:*:*:*:*:*:*:*:*", "cpe:2.3:h:sun:fire_x4250_server:*:*:*:*:*:*:*:*", "cpe:2.3:h:sun:fire_x4440_server:*:*:*:*:*:*:*:*", "cpe:2.3:h:sun:fire_x4450_server:*:*:*:*:*:*:*:*", "cpe:2.3:h:sun:fire_x4500_server:*:*:*:*:*:*:*:*", "cpe:2.3:h:sun:fire_x4540_server:*:*:*:*:*:*:*:*", "cpe:2.3:h:sun:fire_x4600_server:*:*:*:*:*:*:*:*", "cpe:2.3:h:sun:fire_x4600m2_server:*:*:*:*:*:*:*:*", "cpe:2.3:h:sun:netra:*:7.1.6:*:*:*:*:*:*", "cpe:2.3:h:sun:netra:*:7.1.4a:*:*:*:*:*:*", "cpe:2.3:h:sun:netra_x4200m2_server:*:*:*:*:*:*:*:*", "cpe:2.3:h:sun:netra_x4250_server:*:*:*:*:*:*:*:*", "cpe:2.3:h:sun:netra_x4450:*:*:*:*:*:*:*:*", "cpe:2.3:h:sun:sparc_enterprise_server_t5120:*:*:*:*:*:*:*:*", "cpe:2.3:h:sun:sparc_enterprise_server_t5140:*:*:*:*:*:*:*:*", "cpe:2.3:h:sun:sparc_enterprise_server_t5220:*:*:*:*:*:*:*:*", "cpe:2.3:h:sun:sparc_enterprise_server_t5240:*:*:*:*:*:*:*:*", "cpe:2.3:h:sun:sparc_enterprise_server_t5440:*:*:*:*:*:*:*:*" ]
null
null
null
9