id
stringlengths
12
47
title
stringlengths
0
256
βŒ€
description
stringlengths
3
139k
cpes
sequencelengths
0
5.42k
cvss_v4_0
float64
0
10
βŒ€
cvss_v3_1
float64
0
10
βŒ€
cvss_v3_0
float64
0
10
βŒ€
cvss_v2_0
float64
0
10
βŒ€
CVE-2021-25120
Easy Social Feed < 6.2.7 - Reflected Cross-Site Scripting
The Easy Social Feed Free and Pro WordPress plugins before 6.2.7 do not sanitise some of their parameters used via AJAX actions before outputting them back in the response, leading to Reflected Cross-Site Scripting issues
[ "cpe:2.3:a:easysocialfeed:easy_social_feed:*:*:*:*:pro:wordpress:*:*", "cpe:2.3:a:easysocialfeed:easy_social_feed:*:*:*:*:free:wordpress:*:*" ]
null
6.1
null
4.3
CVE-2019-10369
A missing permission check in Jenkins JClouds Plugin 2.14 and earlier in BlobStoreProfile.DescriptorImpl#doTestConnection and JCloudsCloud.DescriptorImpl#doTestConnection allowed users with Overall/Read access to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
[ "cpe:2.3:a:jenkins:jclouds:*:*:*:*:*:jenkins:*:*" ]
null
6.5
null
4
CVE-2007-5113
report.cgi in Google Urchin allows remote attackers to bypass authentication and obtain sensitive information (web server logs) via certain modified query parameters, as demonstrated using the profile, rid, prefs, n, vid, bd, ed, dt, and gtype parameters, a different vulnerability than CVE-2007-5112.
[ "cpe:2.3:a:roi_revolution:urchin:*:*:*:*:*:*:*:*" ]
null
null
null
5
CVE-2023-32861
In display, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08059081; Issue ID: ALPS08059081.
[ "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*" ]
null
6.7
null
null
RHSA-2025:1611
Red Hat Security Advisory: nodejs:22 security update
undici: Undici Uses Insufficiently Random Values nodejs: Node.js Worker Thread Exposure via Diagnostics Channel nodejs: GOAWAY HTTP/2 frames cause memory leak outside heap
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
5.3
7.7
null
GHSA-49w4-256x-6pj9
An XSS issue was discovered in upcoming_events.php in the Upcoming Events plugin before 1.33 for MyBB via a crafted name for an event.
[]
null
null
6.1
null
CVE-2023-1821
Inappropriate implementation in WebShare in Google Chrome prior to 112.0.5615.49 allowed a remote attacker to potentially hide the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Low)
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*" ]
null
6.5
null
null
GHSA-9jhf-qw2w-cpxx
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Sajid Javed Top Bar – PopUps – by WPOptin allows PHP Local File Inclusion.This issue affects Top Bar – PopUps – by WPOptin: from n/a through 2.0.1.
[]
null
7.5
null
null
GHSA-fx63-vgj4-88r8
Dovecot accepts dot LF DOT LF symbol as end of DATA command. RFC requires that it should always be CR LF DOT CR LF. This causes Dovecot to convert single mail with LF DOT LF in middle, into two emails when relaying to SMTP. Dovecot will split mail with LF DOT LF into two mails. Upgrade to latest released version. No publicly available exploits are known.
[]
null
5.3
null
null
CVE-2020-28974
A slab-out-of-bounds read in fbcon in the Linux kernel before 5.9.7 could be used by local attackers to read privileged information or potentially crash the kernel, aka CID-3c4e0dff2095. This occurs because KD_FONT_OP_COPY in drivers/tty/vt/vt.c can be used for manipulations such as font height.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" ]
null
5
null
6.1
GHSA-67g7-384p-p2gv
Passing an attacker controlled size when creating an IOBuf could cause integer overflow, leading to an out of bounds write on the heap with the possibility of remote code execution. This issue affects versions of folly prior to v2021.07.22.00. This issue affects HHVM versions prior to 4.80.5, all versions between 4.81.0 and 4.102.1, all versions between 4.103.0 and 4.113.0, and versions 4.114.0, 4.115.0, 4.116.0, 4.117.0, 4.118.0 and 4.118.1.
[]
null
9.8
null
null
GHSA-x955-r3qp-hgr4
Buffer overflow in the Microsoft HeartbeatCtl ActiveX control in HRTBEAT.OCX allows remote attackers to execute arbitrary code via the Host argument to an unspecified method.
[]
null
null
null
null
GHSA-4x6g-xmp8-726r
A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to bypass authorization and access system files. This vulnerability is due to improper access control in the web-based management interface of an affected device. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected device. A successful exploit could allow the attacker to list, download, and delete certain files that they should not have access to. Cisco plans to release software updates that address this vulnerability. https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-access-contol-EeufSUCx ["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-access-contol-EeufSUCx"]
[]
null
8.8
null
null
GHSA-89r2-jh3p-h38p
The Brizy – Page Builder plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 2.4.39 via the 'id'. This makes it possible for authenticated attackers, with contributor-level access and above, to upload files to arbitrary locations on the server
[]
null
4.3
null
null
CVE-2024-41603
Spina CMS v2.18.0 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via the URI /admin/layout.
[ "cpe:2.3:a:denkgroot:spina:2.18.0:*:*:*:*:*:*:*" ]
null
9.6
null
null
GHSA-24w6-g9p2-j9c7
Buffer Overflow in httpd in EpiCentro E_7.3.2+ allows attackers to execute code remotely via a specially crafted GET request without a leading "/" and without authentication.
[]
null
null
9.8
null
GHSA-hfr9-gm39-p2g7
Transient DOS in WLAN Host and Firmware when large number of open authentication frames are sent with an invalid transaction sequence number.
[]
null
7.5
null
null
GHSA-fmmm-45rf-qf3m
An issue has been discovered in Bento4 1.5.1-624. A SEGV can occur in AP4_Mpeg2TsAudioSampleStream::WriteSample in Core/Ap4Mpeg2Ts.cpp, a different vulnerability than CVE-2018-14532.
[]
null
null
8.8
null
CVE-2017-20039
SICUNET Access Controller hard-coded password
A vulnerability was found in SICUNET Access Controller 0.32-05z. It has been classified as very critical. This affects an unknown part. The manipulation leads to weak authentication. It is possible to initiate the attack remotely.
[ "cpe:2.3:a:sicunet:access_control:0.32-05z:*:*:*:*:*:*:*" ]
null
9.8
null
null
CVE-2025-3000
PyTorch torch.jit.script memory corruption
A vulnerability classified as critical has been found in PyTorch 2.6.0. This affects the function torch.jit.script. The manipulation leads to memory corruption. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used.
[]
4.8
5.3
5.3
4.3
GHSA-p824-48mj-5qcc
The com.ibm.CORBA.iiop.ClientDelegate class in IBM SDK, Java Technology Edition 6 before SR16 FP25 (6.0.16.25), 6 R1 before SR8 FP25 (6.1.8.25), 7 before SR9 FP40 (7.0.9.40), 7 R1 before SR3 FP40 (7.1.3.40), and 8 before SR3 (8.0.3.0) uses the invoke method of the java.lang.reflect.Method class in an AccessController doPrivileged block, which allows remote attackers to call setSecurityManager and bypass a sandbox protection mechanism via vectors related to a Proxy object instance implementing the java.lang.reflect.InvocationHandler interface. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-3009.
[]
null
null
8.1
null
GHSA-7x9m-x8x2-59rx
ftpd in IBM AIX 5.1, 5.2 and 5.3 allows remote authenticated users to cause a denial of service (port exhaustion and memory consumption) by using all ephemeral ports.
[]
null
null
null
null
GHSA-8hch-7jrh-5gj5
Unspecified vulnerability in the Open Database Connectivity (ODBC) component in 7T Interactive Graphical SCADA System (IGSS) before 9.0.0.11143 allows remote attackers to execute arbitrary code via a crafted packet to TCP port 20222, which triggers memory corruption related to an "invalid structure being used."
[]
null
null
null
null
CVE-2020-29054
An issue was discovered on CDATA 72408A, 9008A, 9016A, 92408A, 92416A, 9288, 97016, 97024P, 97028P, 97042P, 97084P, 97168P, FD1002S, FD1104, FD1104B, FD1104S, FD1104SN, FD1108S, FD1204S-R2, FD1204SN, FD1204SN-R2, FD1208S-R2, FD1216S-R1, FD1608GS, FD1608SN, FD1616GS, FD1616SN, and FD8000 devices. Attackers can use "show system infor" to discover cleartext TELNET credentials.
[ "cpe:2.3:o:cdatatec:72408a_firmware:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:72408a_firmware:2.4.03_000:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:72408a_firmware:2.4.04_001:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:72408a_firmware:2.4.05_000:*:*:*:*:*:*:*", "cpe:2.3:h:cdatatec:72408a:-:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:9008a_firmware:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:9008a_firmware:2.4.03_000:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:9008a_firmware:2.4.04_001:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:9008a_firmware:2.4.05_000:*:*:*:*:*:*:*", "cpe:2.3:h:cdatatec:9008a:-:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:9016a_firmware:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:9016a_firmware:2.4.03_000:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:9016a_firmware:2.4.04_001:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:9016a_firmware:2.4.05_000:*:*:*:*:*:*:*", "cpe:2.3:h:cdatatec:9016a:-:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:92408a_firmware:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:92408a_firmware:2.4.03_000:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:92408a_firmware:2.4.04_001:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:92408a_firmware:2.4.05_000:*:*:*:*:*:*:*", "cpe:2.3:h:cdatatec:92408a:-:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:92416a_firmware:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:92416a_firmware:2.4.03_000:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:92416a_firmware:2.4.04_001:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:92416a_firmware:2.4.05_000:*:*:*:*:*:*:*", "cpe:2.3:h:cdatatec:92416a:-:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:9288_firmware:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:9288_firmware:2.4.03_000:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:9288_firmware:2.4.04_001:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:9288_firmware:2.4.05_000:*:*:*:*:*:*:*", "cpe:2.3:h:cdatatec:9288:-:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:97016_firmware:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:97016_firmware:2.4.03_000:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:97016_firmware:2.4.04_001:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:97016_firmware:2.4.05_000:*:*:*:*:*:*:*", "cpe:2.3:h:cdatatec:97016:-:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:97024p_firmware:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:97024p_firmware:2.4.03_000:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:97024p_firmware:2.4.04_001:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:97024p_firmware:2.4.05_000:*:*:*:*:*:*:*", "cpe:2.3:h:cdatatec:97024p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:97028p_firmware:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:97028p_firmware:2.4.03_000:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:97028p_firmware:2.4.04_001:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:97028p_firmware:2.4.05_000:*:*:*:*:*:*:*", "cpe:2.3:h:cdatatec:97028p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:97042p_firmware:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:97042p_firmware:2.4.03_000:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:97042p_firmware:2.4.04_001:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:97042p_firmware:2.4.05_000:*:*:*:*:*:*:*", "cpe:2.3:h:cdatatec:97042p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:97084p_firmware:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:97084p_firmware:2.4.03_000:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:97084p_firmware:2.4.04_001:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:97084p_firmware:2.4.05_000:*:*:*:*:*:*:*", "cpe:2.3:h:cdatatec:97084p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:97168p_firmware:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:97168p_firmware:2.4.03_000:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:97168p_firmware:2.4.04_001:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:97168p_firmware:2.4.05_000:*:*:*:*:*:*:*", "cpe:2.3:h:cdatatec:97168p:-:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1002s_firmware:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1002s_firmware:2.4.03_000:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1002s_firmware:2.4.04_001:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1002s_firmware:2.4.05_000:*:*:*:*:*:*:*", "cpe:2.3:h:cdatatec:fd1002s:-:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1104_firmware:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1104_firmware:2.4.03_000:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1104_firmware:2.4.04_001:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1104_firmware:2.4.05_000:*:*:*:*:*:*:*", "cpe:2.3:h:cdatatec:fd1104:-:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1104b_firmware:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1104b_firmware:2.4.03_000:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1104b_firmware:2.4.04_001:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1104b_firmware:2.4.05_000:*:*:*:*:*:*:*", "cpe:2.3:h:cdatatec:fd1104b:-:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1104s_firmware:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1104s_firmware:2.4.03_000:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1104s_firmware:2.4.04_001:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1104s_firmware:2.4.05_000:*:*:*:*:*:*:*", "cpe:2.3:h:cdatatec:fd1104s:-:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1104sn_firmware:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1104sn_firmware:2.4.03_000:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1104sn_firmware:2.4.04_001:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1104sn_firmware:2.4.05_000:*:*:*:*:*:*:*", "cpe:2.3:h:cdatatec:fd1104sn:-:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1108s_firmware:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1108s_firmware:2.4.03_000:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1108s_firmware:2.4.04_001:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1108s_firmware:2.4.05_000:*:*:*:*:*:*:*", "cpe:2.3:h:cdatatec:fd1108s:-:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1204s-r2_firmware:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1204s-r2_firmware:2.4.03_000:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1204s-r2_firmware:2.4.04_001:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1204s-r2_firmware:2.4.05_000:*:*:*:*:*:*:*", "cpe:2.3:h:cdatatec:fd1204s-r2:-:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1204sn_firmware:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1204sn_firmware:2.4.03_000:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1204sn_firmware:2.4.04_001:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1204sn_firmware:2.4.05_000:*:*:*:*:*:*:*", "cpe:2.3:h:cdatatec:fd1204sn:-:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1204sn-r2_firmware:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1204sn-r2_firmware:2.4.03_000:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1204sn-r2_firmware:2.4.04_001:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1204sn-r2_firmware:2.4.05_000:*:*:*:*:*:*:*", "cpe:2.3:h:cdatatec:fd1204sn-r2:-:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1208s-r2_firmware:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1208s-r2_firmware:2.4.03_000:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1208s-r2_firmware:2.4.04_001:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1208s-r2_firmware:2.4.05_000:*:*:*:*:*:*:*", "cpe:2.3:h:cdatatec:fd1208s-r2:-:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1216s-r1_firmware:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1216s-r1_firmware:2.4.03_000:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1216s-r1_firmware:2.4.04_001:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1216s-r1_firmware:2.4.05_000:*:*:*:*:*:*:*", "cpe:2.3:h:cdatatec:fd1216s-r1:-:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1608gs_firmware:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1608gs_firmware:2.4.03_000:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1608gs_firmware:2.4.04_001:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1608gs_firmware:2.4.05_000:*:*:*:*:*:*:*", "cpe:2.3:h:cdatatec:fd1608gs:-:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1608sn_firmware:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1608sn_firmware:2.4.03_000:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1608sn_firmware:2.4.04_001:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1608sn_firmware:2.4.05_000:*:*:*:*:*:*:*", "cpe:2.3:h:cdatatec:fd1608sn:-:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1616gs_firmware:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1616gs_firmware:2.4.03_000:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1616gs_firmware:2.4.04_001:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1616gs_firmware:2.4.05_000:*:*:*:*:*:*:*", "cpe:2.3:h:cdatatec:fd1616gs:-:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1616sn_firmware:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1616sn_firmware:2.4.03_000:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1616sn_firmware:2.4.04_001:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd1616sn_firmware:2.4.05_000:*:*:*:*:*:*:*", "cpe:2.3:h:cdatatec:fd1616sn:-:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd8000_firmware:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd8000_firmware:2.4.03_000:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd8000_firmware:2.4.04_001:*:*:*:*:*:*:*", "cpe:2.3:o:cdatatec:fd8000_firmware:2.4.05_000:*:*:*:*:*:*:*", "cpe:2.3:h:cdatatec:fd8000:-:*:*:*:*:*:*:*" ]
null
9.8
null
5
GHSA-v32q-7ccf-r3m7
Vulnerability in the Oracle Communications Operations Monitor product of Oracle Communications (component: Mediation Engine). Supported versions that are affected are 3.4, 4.2, 4.3, 4.4 and 5.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Communications Operations Monitor. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Communications Operations Monitor, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Communications Operations Monitor accessible data as well as unauthorized read access to a subset of Oracle Communications Operations Monitor accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N).
[]
null
null
null
null
GHSA-2c5g-cwp8-gxcg
ImageMagick 7.0.8-50 Q16 has a heap-based buffer over-read at MagickCore/threshold.c in AdaptiveThresholdImage because a width of zero is mishandled.
[]
null
null
null
null
GHSA-rjp9-ghg2-39qp
Mozilla Firefox 3.0.x before 3.0.18 and 3.5.x before 3.5.8, and SeaMonkey before 2.0.3, does not properly restrict read access to object properties in showModalDialog, which allows remote attackers to bypass the Same Origin Policy and conduct cross-site scripting (XSS) attacks via crafted dialogArguments values.
[]
null
null
null
null
CVE-2024-26942
net: phy: qcom: at803x: fix kernel panic with at8031_probe
In the Linux kernel, the following vulnerability has been resolved: net: phy: qcom: at803x: fix kernel panic with at8031_probe On reworking and splitting the at803x driver, in splitting function of at803x PHYs it was added a NULL dereference bug where priv is referenced before it's actually allocated and then is tried to write to for the is_1000basex and is_fiber variables in the case of at8031, writing on the wrong address. Fix this by correctly setting priv local variable only after at803x_probe is called and actually allocates priv in the phydev struct.
[ "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "cpe:2.3:a:linux:linux_kernel:-:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*" ]
null
5.5
null
null
CVE-2024-22734
An issue was discovered in AMCS Group Trux Waste Management Software before version 7.19.0018.26912, allows local attackers to obtain sensitive information via a static, hard-coded AES Key-IV pair in the TxUtilities.dll and TruxUser.cfg components.
[ "cpe:2.3:a:amcs:trux_waste_management_software:*:*:*:*:*:*:*:*" ]
null
6.2
null
null
GHSA-6484-844c-qmh4
Possible out of bounds write in a MT SMS/SS scenario due to improper validation of array index in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in APQ8009, APQ8017, APQ8053, APQ8096AU, APQ8098, MDM9150, MDM9205, MDM9206, MDM9607, MDM9615, MDM9625, MDM9635M, MDM9640, MDM9650, MDM9655, MSM8905, MSM8909, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8939, MSM8940, MSM8953, MSM8976, MSM8996AU, MSM8998, Nicobar, QCM2150, QCS605, QM215, SDA660, SDA845, SDM429, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, SDX20, SDX24, SDX55, SM6150, SM7150, SM8150, SM8250, Snapdragon_High_Med_2016, SXR1130, SXR2130
[]
null
null
null
null
CVE-2018-15142
Directory traversal in portal/import_template.php in versions of OpenEMR before 5.0.1.4 allows a remote attacker authenticated in the patient portal to execute arbitrary PHP code by writing a file with a PHP extension via the "docid" and "content" parameters and accessing it in the traversed directory.
[ "cpe:2.3:a:open-emr:openemr:*:*:*:*:*:*:*:*" ]
null
null
8.8
6.5
CVE-2012-2387
devotee 0.1 patch 2 uses a 32-bit seed for generating 48-bit random numbers, which makes it easier for remote attackers to obtain the secret monikers via a brute force attack.
[ "cpe:2.3:a:debian:devotee:0.1:*:*:*:*:*:*:*" ]
null
null
null
5
CVE-2023-23431
Some Honor products are affected by signature management vulnerability, successful exploitation could cause the forged system file overwrite the correct system file.
[ "cpe:2.3:o:hihonor:nth-an00_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hihonor:nth-an00:-:*:*:*:*:*:*:*" ]
null
7.3
null
null
RHSA-2019:0380
Red Hat Security Advisory: Red Hat Single Sign-On 7.2.6 security update
wildfly-core: Cross-site scripting (XSS) in JBoss Management Console undertow: Infoleak in some circumstances where Undertow can serve data from a random buffer dom4j: XML Injection in Class: Element. Methods: addElement, addAttribute which can impact the integrity of XML documents
[ "cpe:/a:redhat:jboss_single_sign_on:7.2" ]
null
null
5.3
null
CVE-2024-45076
IBM webMethods Integration code execution
IBM webMethods Integration 10.15 could allow an authenticated user to upload and execute arbitrary files which could be executed on the underlying operating system.
[ "cpe:2.3:a:softwareag:webmethods:10.15:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:webmethods_integration:10.15:*:*:*:*:*:*:*" ]
null
9.9
null
null
RHSA-2024:1328
Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.9.3 security and bug fix container updates
opentelemetry: DoS vulnerability in otelhttp opentelemetry-go-contrib: DoS vulnerability in otelgrpc due to unbound cardinality metrics helm: Dependency management path traversal helm: Missing YAML Content Leads To Panic
[ "cpe:/a:redhat:acm:2.9::el8" ]
null
7.5
null
null
GHSA-xj34-4cqx-j7ww
An issue was discovered in DESTOON B2B 7.0. CSRF exists via the admin.php URI in an action=add request.
[]
null
null
8.8
null
GHSA-9v82-hffq-chf3
Multiple exploitable buffer overflow vulnerabilities exist in the PubNub message handler for the "cc" channel of Insteon Hub running firmware version 1012. Specially crafted commands sent through the PubNub service can cause a stack-based buffer overflow overwriting arbitrary data. An attacker should send an authenticated HTTP request to trigger this vulnerability. In cmd sn_grp, at 0x9d0175f4, the value for the `gbt` key is copied using `strcpy` to the buffer at `$sp+0x280`.This buffer is 16 bytes large, sending anything longer will cause a buffer overflow.
[]
null
9.9
null
null
CVE-2009-3841
Unspecified vulnerability in HP Discovery & Dependency Mapping Inventory (DDMI) 2.5x, 7.5x, and 7.60 on Windows allows remote authenticated users to execute arbitrary code via unknown vectors.
[ "cpe:2.3:a:hp:discovery\\&dependency_mapping_inventory:2.50:*:*:*:*:*:*:*", "cpe:2.3:a:hp:discovery\\&dependency_mapping_inventory:2.51:*:*:*:*:*:*:*", "cpe:2.3:a:hp:discovery\\&dependency_mapping_inventory:2.52:*:*:*:*:*:*:*", "cpe:2.3:a:hp:discovery\\&dependency_mapping_inventory:7.50:*:*:*:*:*:*:*", "cpe:2.3:a:hp:discovery\\&dependency_mapping_inventory:7.51:*:*:*:*:*:*:*", "cpe:2.3:a:hp:discovery\\&dependency_mapping_inventory:7.60:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*" ]
null
null
null
9
GHSA-gmjr-7p9r-vx6p
The kernel-mode drivers in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 allow local users to gain privileges via a crafted application, aka "Win32k Elevation of Privilege Vulnerability," a different vulnerability than CVE-2016-3249, CVE-2016-3252, and CVE-2016-3286.
[]
null
null
7.8
null
ICSA-22-055-01
FATEK Automation FvDesigner
The affected product is vulnerable to a stack-based buffer overflow while processing project files, which may allow an attacker to execute arbitrary code.CVE-2022-25170 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). The affected product is vulnerable to an out-of-bounds write while processing project files, which allows an attacker to craft a project file that would allow arbitrary code execution.CVE-2022-23985 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). The affected product is vulnerable to an out-of-bounds read while processing project files, which allows an attacker to craft a project file that would allow arbitrary code execution.CVE-2022-21209 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).
[]
null
null
7.8
null
CVE-2019-20822
An issue was discovered in the 3D Plugin Beta for Foxit Reader and PhantomPDF before 9.7.0.29430. It has an out-of-bounds write via incorrect image data.
[ "cpe:2.3:a:foxitsoftware:3d:*:*:*:*:*:foxit_reader:*:*", "cpe:2.3:a:foxitsoftware:3d:*:*:*:*:*:phantompdf:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
GHSA-45mx-8q46-wr86
Open-AudIT Professional 2.1 allows XSS via the Name or Description field on the Credentials screen.
[]
null
null
5.4
null
GHSA-q5ch-j8vf-q4vm
LVRTC eParakstitajs 3.0 (1.3.0) and edoc-libraries-2.5.4_01 allow attackers to write to arbitrary files via crafted EDOC files.
[]
null
null
5.5
null
CVE-2018-3819
The fix in Kibana for ESA-2017-23 was incomplete. With X-Pack security enabled, Kibana versions before 6.1.3 and 5.6.7 have an open redirect vulnerability on the login page that would enable an attacker to craft a link that redirects to an arbitrary website.
[ "cpe:2.3:a:elastic:kibana:*:*:*:*:*:*:*:*" ]
null
null
6.1
5.8
CVE-2017-17854
kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (integer overflow and memory corruption) or possibly have unspecified other impact by leveraging unrestricted integer values for pointer arithmetic.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" ]
null
7.8
null
7.2
GHSA-ppq4-pxjf-2xx4
Heap-based buffer overflow in the php_quot_print_encode function in ext/standard/quot_print.c in PHP before 5.3.26 and 5.4.x before 5.4.16 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted argument to the quoted_printable_encode function.
[]
null
null
null
null
CVE-2022-20196
In gallery3d and photos, there is a possible permission bypass due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-201535148
[ "cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*" ]
null
5
null
1.9
RHSA-2024:2483
Red Hat Security Advisory: traceroute security update
traceroute: improper command line parsing
[ "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
5.5
null
null
RHSA-2013:0259
Red Hat Security Advisory: JBoss Enterprise Web Platform 5.2.0 security update
apache-cxf: SOAPAction spoofing on document literal web services apache-cxf: Bypass of security constraints on WS endpoints when using WSS4JInInterceptor
[ "cpe:/a:redhat:jboss_enterprise_web_platform:5::el4", "cpe:/a:redhat:jboss_enterprise_web_platform:5::el5", "cpe:/a:redhat:jboss_enterprise_web_platform:5::el6" ]
null
null
null
null
CVE-2017-6681
A vulnerability in the AutoVNF VNFStagingView class of Cisco Ultra Services Framework could allow an unauthenticated, remote attacker to execute a relative path traversal attack, enabling an attacker to read sensitive files on the system. More Information: CSCvc76662. Known Affected Releases: 21.0.0.
[ "cpe:2.3:a:cisco:ultra_services_framework:21.0.0:*:*:*:*:*:*:*" ]
null
null
7.5
5
CVE-2019-16214
Libra Core before 2019-09-03 has an erroneous regular expression for inline comments, which makes it easier for attackers to interfere with code auditing by using a nonstandard line-break character for a comment. For example, a Move module author can enter the // sequence (which introduces a single-line comment), followed by very brief comment text, the \r character, and code that has security-critical functionality. In many popular environments, this code is displayed on a separate line, and thus a reader may infer that the code is executed. However, the code is NOT executed, because language/compiler/ir_to_bytecode/src/parser.rs allows the comment to continue after the \r character.
[ "cpe:2.3:a:libra:libra_core:*:*:*:*:*:*:*:*" ]
null
5.7
null
3.5
CVE-2019-5348
A remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.
[ "cpe:2.3:a:hp:intelligent_management_center:*:*:*:*:*:*:*:*", "cpe:2.3:a:hp:intelligent_management_center:7.3:-:*:*:*:*:*:*", "cpe:2.3:a:hp:intelligent_management_center:7.3:e0503:*:*:*:*:*:*", "cpe:2.3:a:hp:intelligent_management_center:7.3:e0504:*:*:*:*:*:*", "cpe:2.3:a:hp:intelligent_management_center:7.3:e0504p02:*:*:*:*:*:*", "cpe:2.3:a:hp:intelligent_management_center:7.3:e0504p04:*:*:*:*:*:*", "cpe:2.3:a:hp:intelligent_management_center:7.3:e0506:*:*:*:*:*:*", "cpe:2.3:a:hp:intelligent_management_center:7.3:e0506p03:*:*:*:*:*:*", "cpe:2.3:a:hp:intelligent_management_center:7.3:e0506p07:*:*:*:*:*:*" ]
null
null
8.8
9
GHSA-q28w-9x9v-728m
In SkSampler::Fill of SkSampler.cpp, there is a possible out of bounds write due to an integer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-7.0 Android-7.1.1 Android-7.1.2 Android-8.0 Android-8.1 Android ID: A-78354855
[]
null
null
7.8
null
RHSA-2018:1098
Red Hat Security Advisory: firefox security update
firefox: Use-after-free in compositor potentially allows code execution
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
9.8
null
CVE-2012-1161
Moodle before 2.2.2: Course information leak via hidden courses being displayed in tag search results
[ "cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:15:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:16:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:17:*:*:*:*:*:*:*" ]
null
4.3
null
4
CVE-2019-10165
OpenShift Container Platform before version 4.1.3 writes OAuth tokens in plaintext to the audit logs for the Kubernetes API server and OpenShift API server. A user with sufficient privileges could recover OAuth tokens from these audit logs and use them to access other resources.
[ "cpe:2.3:a:redhat:openshift_container_platform:*:*:*:*:*:*:*:*" ]
null
null
2.3
null
GHSA-mgwp-rqvp-7867
Multiple cross-site scripting (XSS) vulnerabilities in Geeklog 1.3.7 allow remote attackers to inject arbitrary web script or HTML via the (1) cid parameter to comment.php, (2) uid parameter to profiles.php, (3) uid to users.php, and (4) homepage field.
[]
null
null
null
null
CVE-2025-24281
This issue was addressed with improved data protection. This issue is fixed in macOS Sequoia 15.4. An app may be able to access sensitive user data.
[]
null
5.5
null
null
CVE-2024-50355
LibreNMS has a Persistent XSS from Insecure Input Sanitization Affects Multiple Endpoints
LibreNMS is an open-source, PHP/MySQL/SNMP-based network monitoring system. User with Admin role can edit the Display Name of a device, the application did not properly sanitize the user input in the device Display Name, if java script code is inside the name of the device Display Name, its can be trigger from different sources. This vulnerability is fixed in 24.10.0.
[ "cpe:2.3:a:librenms:librenms:*:*:*:*:*:*:*:*" ]
null
4.8
null
null
GHSA-9jv6-m6hq-4qf7
An LDAP injection vulnerability in the login page of Gladinet CentreStack v13.12.9934.54690 allows attackers to access sensitive data or execute arbitrary commands via a crafted payload injected into the username field.
[]
null
9.8
null
null
GHSA-6w4f-6fr3-4c72
Atlas Copco Power Focus 6000 web server uses a small amount of session ID numbers. An attacker could enter a session ID number to retrieve data for an active user’s session.
[]
null
9.4
null
null
CVE-2008-1355
Cross-site scripting (XSS) vulnerability in index.php in Jeebles Technology Jeebles Directory 2.9.60 allows remote attackers to inject arbitrary web script or HTML via the path parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
[ "cpe:2.3:a:jeeblestechnology:jeebles_directory:2.9.60:*:*:*:*:*:*:*" ]
null
null
null
4.3
CVE-2025-23996
WordPress AnyRoad plugin <= 1.3.2 - Cross Site Request Forgery (CSRF) vulnerability
Cross-Site Request Forgery (CSRF) vulnerability in anyroad.com AnyRoad allows Cross Site Request Forgery. This issue affects AnyRoad: from n/a through 1.3.2.
[]
null
4.3
null
null
CVE-2021-45717
An issue was discovered in the rusqlite crate 0.25.x before 0.25.4 and 0.26.x before 0.26.2 for Rust. commit_hook has a use-after-free.
[ "cpe:2.3:a:rusqlite_project:rusqlite:*:*:*:*:*:rust:*:*" ]
null
7.5
null
5
RHSA-2006:0132
Red Hat Security Advisory: Updated kernel packages available for Red Hat Enterprise Linux 4 Update 3
security flaw
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
GHSA-4fwh-62fj-p4ww
Privilege escalation flaws were found in the Red Hat initialization scripts of PostgreSQL. An attacker with access to the postgres user account could use these flaws to obtain root access on the server machine.
[]
null
null
6.7
null
CVE-2020-14506
Philips Clinical Collaboration Platform, Versions 12.2.1 and prior. The product receives input or data, but it does not validate or incorrectly validates that the input has the properties required to process the data safely and correctly.
[ "cpe:2.3:a:philips:clinical_collaboration_platform:*:*:*:*:*:*:*:*" ]
null
4.3
null
4.3
GHSA-3p87-gqw8-4pf2
Showdoc CSRF Vulnerability
`server/index.php?s=/api/teamMember/save` in ShowDoc 2.4.2 has a CSRF that can add members to a team.
[]
null
null
6.5
null
GHSA-8cpj-pr98-pf24
Sourcecodester Simple Library Management System 1.0 is affected by Insecure Permissions via Books > New Book , http://<site>/lms/index.php?page=books.
[]
null
null
null
null
CVE-2008-1163
SQL injection vulnerability in index.php in phpArcadeScript 1.0 through 3.0 RC2 allows remote attackers to execute arbitrary SQL commands via the userid parameter in a profile action.
[ "cpe:2.3:a:phparcadescript:phparcadescript:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:phparcadescript:phparcadescript:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:phparcadescript:phparcadescript:3.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:phparcadescript:phparcadescript:3.0:rc2:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2009-3377
Multiple unspecified vulnerabilities in liboggz before cf5feeaab69b05e24, as used in Mozilla Firefox 3.5.x before 3.5.4, allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unknown vectors.
[ "cpe:2.3:a:mozilla:firefox:3.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.5.3:*:*:*:*:*:*:*" ]
null
null
null
10
GHSA-8g3x-8p3x-3f3c
Microsoft Internet Explorer 7 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Memory Corruption Vulnerability," as exploited in the wild in August 2015.
[]
null
8.8
null
null
RHSA-2017:0338
Red Hat Security Advisory: java-1.6.0-ibm security update
SSL/TLS: Birthday attack against 64-bit block ciphers (SWEET32) OpenJDK: incorrect ECDSA signature extraction from the DER input (Libraries, 8168714) OpenJDK: DSA implementation timing attack (Libraries, 8168728) OpenJDK: ECDSA implementation timing attack (Libraries, 8168724) OpenJDK: incorrect URL parsing in URLStreamHandler (Networking, 8167223) OpenJDK: URLClassLoader insufficient access control checks (Networking, 8151934) OpenJDK: untrusted input deserialization in RMI registry and DCG (RMI, 8156802) OpenJDK: LdapLoginModule incorrect userDN extraction (JAAS, 8161743) OpenJDK: imageio PNGImageReader failed to honor ignoreMetadata for iTXt and zTXt chunks (2D, 8166988) JDK: unspecified vulnerability fixed in 6u141, 7u131, and 8u121 (Deployment) OpenJDK: integer overflow in SocketOutputStream boundary check (Networking, 8164147) OpenJDK: insufficient protected field access checks in atomic field updaters (Libraries, 8165344)
[ "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server", "cpe:/a:redhat:rhel_extras:6" ]
null
null
8.8
null
CVE-2021-23277
Improper Neutralization of Directives in Dynamically Evaluated Code
Eaton Intelligent Power Manager (IPM) prior to 1.69 is vulnerable to unauthenticated eval injection vulnerability. The software does not neutralize code syntax from users before using in the dynamic evaluation call in loadUserFile function under scripts/libs/utils.js. Successful exploitation can allow attackers to control the input to the function and execute attacker controlled commands.
[ "cpe:2.3:a:eaton:intelligent_power_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:eaton:intelligent_power_manager_virtual_appliance:*:*:*:*:*:*:*:*", "cpe:2.3:a:eaton:intelligent_power_protector:*:*:*:*:*:*:*:*" ]
null
8.3
null
null
CVE-2022-29349
kkFileView v4.0.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the url parameter at /controller/OnlinePreviewController.java.
[ "cpe:2.3:a:keking:kkfileview:4.0.0:*:*:*:*:*:*:*" ]
null
6.1
null
4.3
CVE-2024-10070
ESAFENET CDG PolicyPushControlAction.java actionPolicyPush sql injection
A vulnerability classified as critical has been found in ESAFENET CDG 5. This affects the function actionPolicyPush of the file /com/esafenet/policy/action/PolicyPushControlAction.java. The manipulation of the argument policyId leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
[ "cpe:2.3:a:esafenet:cdg:5:*:*:*:*:*:*:*" ]
5.3
6.3
6.3
6.5
GHSA-qp2g-vj63-24p5
In btor2parser/btor2parser.c in Boolector Btor2Tools before 2019-01-15, opening a specially crafted input file leads to an out of bounds write in pusht_bfr.
[]
null
null
5.5
null
GHSA-hjg5-r3cj-8vc3
S4CORE (Manage Purchase Contracts App) - versions 102, 103, 104, 105, 106, 107, does not perform necessary authorization checks for an authenticated user. This could allow an attacker to perform unintended actions resulting in escalation of privileges which has low impact on confidentiality and integrity with no impact on availibility of the system.
[]
null
5.4
null
null
RHSA-2021:2591
Red Hat Security Advisory: edk2 security update
edk2: possible heap corruption with LzmaUefiDecompressGetInfo
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
6.7
null
null
GHSA-xx9q-52r9-4c2h
Cross-site scripting (XSS) vulnerability in home.php in PHP Invoice 2.2 allows remote attackers to inject arbitrary web script or HTML via the alert parameter.
[]
null
null
null
null
GHSA-627q-g293-49q7
Abort caused by allocating a vector that is too large in Tensorflow
ImpactDuring shape inference, TensorFlow can [allocate a large vector](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/framework/shape_inference.cc#L788-L790) based on a value from a tensor controlled by the user:PatchesWe have patched the issue in GitHub commit [1361fb7e29449629e1df94d44e0427ebec8c83c7](https://github.com/tensorflow/tensorflow/commit/1361fb7e29449629e1df94d44e0427ebec8c83c7).The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.For more informationPlease consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
[]
null
6.5
null
null
GHSA-rwcg-8fg6-7ch4
Multiple vulnerabilities in the restricted shell of Cisco Evolved Programmable Network Manager (EPNM), Cisco Identity Services Engine (ISE), and Cisco Prime Infrastructure could allow an authenticated, local attacker to escape the restricted shell and gain root privileges on the underlying operating system. For more information about these vulnerabilities, see the Details section of this advisory.
[]
null
7.8
null
null
GHSA-rj6p-76qv-532q
Session fixation vulnerability in Unit4 Polska TETA Web (formerly TETA Galactica) 22.62.3.4 and earlier allows remote attackers to hijack web sessions via a session id.
[]
null
null
9.8
null
RHSA-2017:0127
Red Hat Security Advisory: runc security and bug fix update
docker: insecure opening of file-descriptor allows privilege escalation
[ "cpe:/a:redhat:rhel_extras_other:7" ]
null
7.5
null
null
CVE-2014-9164
Adobe Flash Player before 13.0.0.259 and 14.x through 16.x before 16.0.0.235 on Windows and OS X and before 11.2.202.425 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2014-0587.
[ "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
null
null
null
10
GHSA-77hf-23pq-2g7c
Code injection in Apache NiFi and NiFi Registry
The optional ShellUserGroupProvider in Apache NiFi 1.10.0 to 1.16.2 and Apache NiFi Registry 0.6.0 to 1.16.2 does not neutralize arguments for group resolution commands, allowing injection of operating system commands on Linux and macOS platforms. The ShellUserGroupProvider is not included in the default configuration. Command injection requires ShellUserGroupProvider to be one of the enabled User Group Providers in the Authorizers configuration. Command injection also requires an authenticated user with elevated privileges. Apache NiFi requires an authenticated user with authorization to modify access policies in order to execute the command. Apache NiFi Registry requires an authenticated user with authorization to read user groups in order to execute the command. The resolution removes command formatting based on user-provided arguments.
[]
null
8.8
null
null
CVE-2002-1068
The web server for D-Link DP-300 print server allows remote attackers to cause a denial of service (hang) via a large HTTP POST request.
[ "cpe:2.3:h:d-link:dp-303:*:*:*:*:*:*:*:*" ]
null
null
null
5
GHSA-7hgh-752m-38mj
A Server Side Request Forgery (SSRF) vulnerability could lead to remote code execution for authenticated administrators. This issue was introduced in version 2.2.0 of Hipchat Server and version 3.0.0 of Hipchat Data Center. Versions of Hipchat Server starting with 2.2.0 and before 2.2.6 are affected by this vulnerability. Versions of Hipchat Data Center starting with 3.0.0 and before 3.1.0 are affected.
[]
null
null
7.2
null
CVE-2012-3481
Integer overflow in the ReadImage function in plug-ins/common/file-gif-load.c in the GIF image format plug-in in GIMP 2.8.x and earlier allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted height and len properties in a GIF image file, which triggers a heap-based buffer overflow. NOTE: some of these details are obtained from third party information.
[ "cpe:2.3:a:gimp:gimp:*:*:*:*:*:*:*:*" ]
null
null
null
6.8
GHSA-4rpr-3cr6-vg8r
Adobe After Effects version 18.4.1 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious SVG file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required in that the victim must open a specially crafted file to exploit this vulnerability.
[]
null
7.8
null
null
CVE-2025-22300
WordPress PixelYourSite plugin <= 10.0.1.2 - Cross Site Request Forgery (CSRF) vulnerability
Cross-Site Request Forgery (CSRF) vulnerability in PixelYourSite PixelYourSite – Your smart PIXEL (TAG) Manager allows Cross Site Request Forgery.This issue affects PixelYourSite – Your smart PIXEL (TAG) Manager: from n/a through 10.0.1.2.
[]
null
5.4
null
null
GHSA-qr3x-g7qc-8233
Adobe Acrobat and Reader versions 2019.008.20081 and earlier, 2019.008.20080 and earlier, 2019.008.20081 and earlier, 2017.011.30106 and earlier version, 2017.011.30105 and earlier version, 2015.006.30457 and earlier, and 2015.006.30456 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
[]
null
null
5.5
null
CVE-2023-29530
Laminas Diactoros vulnerable to HTTP Multiline Header Termination
Laminas Diactoros provides PSR HTTP Message implementations. In versions 2.18.0 and prior, 2.19.0, 2.20.0, 2.21.0, 2.22.0, 2.23.0, 2.24.0, and 2.25.0, users who create HTTP requests or responses using laminas/laminas-diactoros, when providing a newline at the start or end of a header key or value, can cause an invalid message. This can lead to denial of service vectors or application errors. The problem has been patched in following versions 2.18.1, 2.19.1, 2.20.1, 2.21.1, 2.22.1, 2.23.1, 2.24.1, and 2.25.1. As a workaround, validate HTTP header keys and/or values, and if using user-supplied values, filter them to strip off leading or trailing newline characters before calling `withHeader()`.
[ "cpe:2.3:a:getlaminas:laminas-diactoros:*:*:*:*:*:*:*:*", "cpe:2.3:a:getlaminas:laminas-diactoros:2.19.0:*:*:*:*:*:*:*", "cpe:2.3:a:getlaminas:laminas-diactoros:2.20.0:*:*:*:*:*:*:*", "cpe:2.3:a:getlaminas:laminas-diactoros:2.21.0:*:*:*:*:*:*:*", "cpe:2.3:a:getlaminas:laminas-diactoros:2.22.0:*:*:*:*:*:*:*", "cpe:2.3:a:getlaminas:laminas-diactoros:2.23.0:*:*:*:*:*:*:*", "cpe:2.3:a:getlaminas:laminas-diactoros:2.24.0:*:*:*:*:*:*:*", "cpe:2.3:a:getlaminas:laminas-diactoros:2.25.0:*:*:*:*:*:*:*", "cpe:2.3:a:guzzlephp:psr-7:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*" ]
null
7.5
null
null
CVE-2023-45057
WordPress Hitsteps Web Analytics Plugin <= 5.86 is vulnerable to Cross Site Scripting (XSS)
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Hitsteps Web Analytics plugin <=Β 5.86 versions.
[ "cpe:2.3:a:hitsteps:web_analytics:*:*:*:*:*:*:*:*" ]
null
5.9
null
null
GHSA-595r-2p8v-2w88
The WebContentsImpl::FocusLocationBarByDefault function in content/browser/web_contents/web_contents_impl.cc in Google Chrome before 50.0.2661.75 mishandles focus for certain about:blank pages, which allows remote attackers to spoof the address bar via a crafted URL.
[]
null
null
4.3
null
GHSA-3f3f-5w2h-wvgq
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in WS Form WS Form LITE – Drag & Drop Contact Form Builder for WordPress.This issue affects WS Form LITE – Drag & Drop Contact Form Builder for WordPress: from n/a through 1.9.170.
[]
null
7.6
null
null
GHSA-3rrm-g9g7-qh35
Multiple SQL injection vulnerabilities in Fortibus CMS 4.0.0 allow remote attackers to execute arbitrary SQL commands via (1) the username or password to logon.asp, (2) WeeklyNotesDisplay.asp, or (3) the Search page.
[]
null
null
null
null
GHSA-fqc4-8m96-pvh3
The (1) phrafx and (2) phgrafx-startup programs in QNX realtime operating system (RTOS) 4.25 and 6.1.0 do not properly drop privileges before executing the system command, which allows local users to execute arbitrary commands by modifying the PATH environment variable to reference a malicious crttrap program.
[]
null
null
null
null
GHSA-8pc2-wcc6-jg3p
Planning Analytics Cartridge for Cloud Pak for Data 4.0 exposes sensitive information in logs which could lead an attacker to exploit this vulnerability to conduct further attacks. IBM X-Force ID: 247896.
[]
null
6.5
null
null