id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
139k
cpes
sequencelengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
GHSA-6xpw-chm5-x9v3
A flaw was found in X.Org Server before xorg-x11-server 1.20.9. An Out-Of-Bounds access in XkbSetNames function may lead to a privilege escalation vulnerability. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
[]
null
7.8
null
null
GHSA-h9c4-jhjv-59f6
SQL injection vulnerability in Merchantsadd.asp in ASPReferral 5.3 allows remote attackers to execute arbitrary SQL commands via the AccountID parameter.
[]
null
null
null
null
GHSA-5gx5-pfq3-g683
Open redirect vulnerability in IBM FileNet Workplace 4.0.2 before 4.0.2.14 allows remote authenticated users to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors.
[]
null
null
6.8
null
GHSA-qqrx-6w8f-8vrm
SQL injection vulnerability in PHPGurukul Student Record System 4.0 allows remote attackers to execute arbitrary SQL statements, via the sid parameter to edit-sub.php.
[]
null
9.8
null
null
CVE-2017-12470
Integer overflow in the ndn_parse_sequence function in CCN-lite before 2.00 allows context-dependent attackers to have unspecified impact via vectors involving the typ and vallen variables.
[ "cpe:2.3:a:ccn-lite:ccn-lite:*:*:*:*:*:*:*:*" ]
null
null
9.8
7.5
RHSA-2009:1692
Red Hat Security Advisory: rhev-hypervisor security and bug fix update
kernel: flood ping cause out-of-iommu error and panic when mtu larger than 1500 kernel: KVM: x86 emulator: limit instructions to 15 bytes
[ "cpe:/o:redhat:enterprise_linux:5::hypervisor" ]
null
null
null
null
GHSA-j9q2-q6gv-w438
An issue was discovered in Digi ConnectPort LTS before 1.4.12. A Directory Traversal vulnerability exists in WebFS. This allows an attacker on the local area network to manipulate URLs to include traversal sequences, potentially leading to unauthorized access to data.
[]
null
8.8
null
null
GHSA-vwqh-cmvp-6694
ChakraCore RCE Vulnerability
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8280, CVE-2018-8290, CVE-2018-8294.
[]
null
null
7.5
null
GHSA-x8jq-4625-39qf
The Facebook Messenger app for iOS 227.0 and prior and Android 228.1.0.10.116 and prior user interface does not properly represent URI messages to the user, which results in URI spoofing via specially crafted messages.
[]
null
6.5
null
null
CVE-2012-5955
Unspecified vulnerability in the IBM HTTP Server component 5.3 in IBM WebSphere Application Server (WAS) for z/OS allows remote attackers to execute arbitrary commands via unknown vectors.
[ "cpe:2.3:a:ibm:http_server:5.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:-:-:*:*:*:z\\/os:*:*" ]
null
null
null
10
CVE-2020-28103
cscms v4.1 allows for SQL injection via the "page_del" function.
[ "cpe:2.3:a:chshcms:cscms:4.1:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
GHSA-54v6-gcmf-jwgg
Vulnerability in the Oracle Hospitality OPERA 5 Property Services product of Oracle Hospitality Applications (component: OXI). The supported version that is affected is 5.6. Difficult to exploit vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle Hospitality OPERA 5 Property Services. While the vulnerability is in Oracle Hospitality OPERA 5 Property Services, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Hospitality OPERA 5 Property Services accessible data as well as unauthorized update, insert or delete access to some of Oracle Hospitality OPERA 5 Property Services accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Hospitality OPERA 5 Property Services. CVSS 3.1 Base Score 7.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:L/A:L).
[]
null
7.2
null
null
CVE-2008-6979
Cross-site scripting (XSS) vulnerability in as_archives.php in phpAdultSite CMS, possibly 2.3.2, allows remote attackers to inject arbitrary web script or HTML via the results_per_page parameter to index.php. NOTE: some of these details are obtained from third party information. NOTE: this issue might be resultant from a separate SQL injection vulnerability.
[ "cpe:2.3:a:phpadultsite:phpadultsite_cms:2.3.2:*:*:*:*:*:*:*" ]
null
null
null
4.3
ICSA-22-349-16
Siemens APOGEE and TALON
A low privilege authenticated attacker with network access to the integrated web server could download sensitive information from the device containing user account credentials.
[]
null
8.8
null
null
CVE-2005-0364
Unknown vulnerability in BIND 9.2.0 in HP-UX B.11.00, B.11.11, and B.11.23 allows remote attackers to cause a denial of service.
[ "cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*", "cpe:2.3:o:hp:hp-ux:11.11:*:*:*:*:*:*:*", "cpe:2.3:o:hp:hp-ux:11.23:*:ia64_64-bit:*:*:*:*:*" ]
null
null
null
5
CVE-2017-17747
Weak access controls in the Device Logout functionality on the TP-Link TL-SG108E v1.0.0 allow remote attackers to call the logout functionality, triggering a denial of service condition.
[ "cpe:2.3:o:tp-link:tl-sg108e_firmware:1.0.0:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:tl-sg108e:1.0:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:tl-sg108e:2.0:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:tl-sg108e:3.0:*:*:*:*:*:*:*" ]
null
null
6.5
2.7
GHSA-m92j-2253-xfcr
phpLD 2-151.2.0 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by libs/smarty/Smarty_Compiler.class.php and certain other files.
[]
null
null
null
null
GHSA-hjcp-j389-59ff
Regular Expression Denial of Service in marked
Versions 0.3.3 and earlier of `marked` are affected by a regular expression denial of service ( ReDoS ) vulnerability when passed inputs that reach the `em` inline rule.RecommendationUpdate to version 0.3.4 or later.
[]
null
null
7.5
null
CVE-2023-24838
HGiga PowerStation - Information Leakage
HGiga PowerStation has a vulnerability of Information Leakage. An unauthenticated remote attacker can exploit this vulnerability to obtain the administrator's credential. This credential can then be used to login PowerStation or Secure Shell to achieve remote code execution.
[ "cpe:2.3:o:hgiga:powerstation_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hgiga:powerstation:-:*:*:*:*:*:*:*" ]
null
9.8
null
null
GHSA-gwg5-3r5x-cw74
NSA Ghidra through 9.0.4, when experimental mode is enabled, allows arbitrary code execution if the Read XML Files feature of Bit Patterns Explorer is used with a modified XML document. This occurs in Features/BytePatterns/src/main/java/ghidra/bitpatterns/info/FileBitPatternInfoReader.java. An attack could start with an XML document that was originally created by DumpFunctionPatternInfoScript but then directly modified by an attacker (for example, to make a java.lang.Runtime.exec call).
[]
null
9.8
null
null
GHSA-qqr5-9q23-995q
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Theme Freesia Edge allows Stored XSS.This issue affects Edge: from n/a through 2.0.9.
[]
null
6.5
null
null
GHSA-6j3q-9gv6-564j
SQL injection vulnerability in game_play.php in the FB Gorilla plugin for WordPress allows remote attackers to execute arbitrary SQL commands via the id parameter.
[]
null
null
null
null
GHSA-jx5w-px6r-88w4
When a parent page loaded a child in an iframe with `unsafe-inline`, the parent Content Security Policy could have overridden the child Content Security Policy. This vulnerability affects Firefox < 122, Firefox ESR < 115.7, and Thunderbird < 115.7.
[]
null
6.5
null
null
CVE-2024-47428
Substance3D - Painter | Out-of-bounds Write (CWE-787)
Substance3D - Painter versions 10.1.0 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[ "cpe:2.3:a:adobe:substance_3d_painter:*:*:*:*:*:*:*:*" ]
null
7.8
null
null
CVE-2019-14980
In ImageMagick 7.x before 7.0.8-42 and 6.x before 6.9.10-42, there is a use after free vulnerability in the UnmapBlob function that allows an attacker to cause a denial of service by sending a crafted file.
[ "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*" ]
null
6.5
null
4.3
GHSA-w943-j99v-c4q3
client/cl_parse.c in the id3 Quake 3 Engine 1.32c and the Icculus Quake 3 Engine (ioquake3) revision 810 and earlier allows remote malicious servers to overwrite arbitrary write-protected cvars variables on the client, such as cl_allowdownload for Automatic Downloading and fs_homepath for the quake3 path, via a string of cvar names and values sent from the server. NOTE: this can be combined with another vulnerability to overwrite arbitrary files.
[]
null
null
null
null
CVE-2023-1385
Improper JPAKE implementation allows offline PIN brute-forcing due to the initialization of random values to a known value, which leads to unauthorized authentication to amzn.lightning services. This issue affects: Amazon Fire TV Stick 3rd gen versions prior to 6.2.9.5. Insignia TV with FireOS 7.6.3.3.
[ "cpe:2.3:o:amazon:fire_os:*:*:*:*:*:*:*:*", "cpe:2.3:h:amazon:fire_tv_stick_3rd_gen:-:*:*:*:*:*:*:*", "cpe:2.3:h:bestbuy:insignia_tv:-:*:*:*:*:*:*:*" ]
null
7.1
null
null
CVE-2022-43042
GPAC 2.1-DEV-rev368-gfd054169b-master was discovered to contain a heap buffer overflow via the function FixSDTPInTRAF at isomedia/isom_intern.c.
[ "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*" ]
null
7.8
null
null
GHSA-98j9-86q7-c5r2
In The Sleuth Kit (TSK) through 4.6.4, hfs_cat_traverse in tsk/fs/hfs.c does not properly determine when a key length is too large, which allows attackers to cause a denial of service (SEGV on unknown address with READ memory access in a tsk_getu16 call in hfs_dir_open_meta_cb in tsk/fs/hfs_dent.c).
[]
null
null
6.5
null
CVE-2018-9527
In vorbis_book_decodev_set of codebook.c there is a possible out of bounds write due to missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android. Versions: Android-7.0 Android-7.1.1 Android-7.1.2 Android-8.0 Android-8.1 Android-9. Android ID: A-112159345
[ "cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*" ]
null
null
7.8
9.3
CVE-2012-3998
Multiple SQL injection vulnerabilities in Sticky Notes before 0.2.27052012.5 allow remote attackers to execute arbitrary SQL commands via the (1) paste id in admin/modules/mod_pastes.php or (2) show.php, (3) user id to admin/modules/mod_users.php, (4) project to list.php, or (5) session id to show.php.
[ "cpe:2.3:a:sayakbanerjee:sticky_notes:*:*:*:*:*:*:*:*", "cpe:2.3:a:sayakbanerjee:sticky_notes:0.2.27052012.4:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-37r4-cw3g-gh25
An Allocation of Resources Without Limits or Throttling and a Missing Release of Memory after Effective Lifetime vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a locally authenticated low privileged attacker to cause a Denial of Sevice (DoS). In a high-scaled BGP routing environment with rib-sharding enabled, two issues may occur when executing a specific CLI command. One is a memory leak issue with rpd where the leak rate is not constant, and the other is a temporary spike in rpd memory usage during command execution. This issue affects: Juniper Networks Junos OS 19.4 versions prior to 19.4R3-S9; 20.2 versions prior to 20.2R3-S5; 20.3 versions prior to 20.3R3-S2; 20.4 versions prior to 20.4R3-S1; 21.1 versions prior to 21.1R3; 21.2 versions prior to 21.2R1-S2, 21.2R2-S1, 21.2R3; 21.3 versions prior to 21.3R2. Juniper Networks Junos OS Evolved All versions prior to 20.4R3-S1-EVO; 21.1-EVO version 21.1R1-EVO and later versions; 21.2-EVO versions prior to 21.2R1-S2-EVO, 21.2R3-EVO; 21.3-EVO versions prior to 21.3R2-EVO. This issue does not affect Juniper Networks Junos OS versions prior to 19.2R1.
[]
null
5.5
null
null
GHSA-r68q-m8c2-v4c3
Secure Boot Security Feature Bypass Vulnerability
[]
null
4.1
null
null
CVE-2019-15298
A problem was found in Centreon Web through 19.04.3. An authenticated command injection is present in the page include/configuration/configObject/traps-mibs/formMibs.php. This page is called from the Centreon administration interface. This is the mibs management feature that contains a file filing form. At the time of submission of a file, the mnftr parameter is sent to the page and is not filtered properly. This allows one to inject Linux commands directly.
[ "cpe:2.3:a:centreon:centreon_web:*:*:*:*:*:*:*:*" ]
null
8.8
null
6.5
GHSA-7fhh-6v34-9fp2
IBM Daeja ViewONE Virtual 5.0 through 5.0.6 could expose internal parameters to ViewONE clients that could be used in further attacks against the system. IBM X-Force ID: 159521.
[]
null
5.3
null
null
CVE-2021-27617
The Integration Builder Framework of SAP Process Integration versions - 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50, does not sufficiently validate an XML document uploaded from local source. An attacker can craft a malicious XML which when uploaded and parsed by the application, could lead to Denial-of-service conditions due to consumption of a large amount of system memory, thus highly impacting system availability.
[ "cpe:2.3:a:sap:netweaver_process_integration:7.10:*:*:*:*:*:*:*", "cpe:2.3:a:sap:netweaver_process_integration:7.11:*:*:*:*:*:*:*", "cpe:2.3:a:sap:netweaver_process_integration:7.20:*:*:*:*:*:*:*", "cpe:2.3:a:sap:netweaver_process_integration:7.30:*:*:*:*:*:*:*", "cpe:2.3:a:sap:netweaver_process_integration:7.31:*:*:*:*:*:*:*", "cpe:2.3:a:sap:netweaver_process_integration:7.40:*:*:*:*:*:*:*", "cpe:2.3:a:sap:netweaver_process_integration:7.50:*:*:*:*:*:*:*" ]
null
null
4.9
null
GHSA-9284-5mwp-2g62
Multiple SQL injection vulnerabilities in adminquery.php in Traidnt Up 2.0 allow remote attackers to execute arbitrary SQL commands via (1) trupuser and (2) truppassword cookies to uploadcp/index.php.
[]
null
null
null
null
CVE-2023-41670
WordPress Use Memcached Plugin <= 1.0.5 is vulnerable to Cross Site Request Forgery (CSRF)
Cross-Site Request Forgery (CSRF) vulnerability in Palasthotel (in person: Edward Bock) Use Memcached plugin <= 1.0.4 versions.
[ "cpe:2.3:a:palasthotel:use_memcached:*:*:*:*:*:wordpress:*:*" ]
null
5.4
null
null
CVE-2020-5281
LDAP connector injection in Perun
In Perun before version 3.9.1, VO or group manager can modify configuration of the LDAP extSource to retrieve all from Perun LDAP. Issue is fixed in version 3.9.1 by sanitisation of the input.
[ "cpe:2.3:a:cesnet:perun:*:*:*:*:*:*:*:*" ]
null
6.2
null
null
CVE-2019-15698
In Octopus Deploy 2019.7.3 through 2019.7.9, in certain circumstances, an authenticated user with VariableView permissions could view sensitive values. This is fixed in 2019.7.10.
[ "cpe:2.3:a:octopus:octopus_server:*:*:*:*:*:*:*:*" ]
null
null
4.3
4
GHSA-hp7f-c7cj-cfg9
The HYPERVISOR_xen_version hypercall in Xen 3.2.x through 4.5.x does not properly initialize data structures, which allows local guest users to obtain sensitive information via unspecified vectors.
[]
null
null
null
null
CVE-2021-3114
In Go before 1.14.14 and 1.15.x before 1.15.7, crypto/elliptic/p224.go can generate incorrect outputs, related to an underflow of the lowest limb during the final complete reduction in the P-224 field.
[ "cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:cloud_insights_telegraf_agent:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*" ]
null
6.5
null
6.4
RHSA-2002:181
Red Hat Security Advisory: mailman security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as" ]
null
null
null
null
GHSA-qfr3-29w6-hwpg
Typo3 Exception Handler XSS
Cross-site scripting (XSS) vulnerability in the Exception Handler in TYPO3 4.4.x before 4.4.15, 4.5.x before 4.5.15, 4.6.x before 4.6.8, and 4.7 allows remote attackers to inject arbitrary web script or HTML via exception messages.
[]
null
null
null
null
GHSA-j6qq-7xp7-c5p5
When opening a website using the `firefox://` protocol handler, SameSite cookies were not properly respected. This vulnerability affects Firefox < 123.
[]
null
8.3
null
null
CVE-2021-42776
CloverDX Server before 5.11.2 and and 5.12.x before 5.12.1 allows XXE during configuration import.
[ "cpe:2.3:a:cloverdx:cloverdx:*:*:*:*:*:*:*:*", "cpe:2.3:a:cloverdx:cloverdx:5.12.0:*:*:*:*:*:*:*", "cpe:2.3:a:cloverdx:cloverdx:5.12.1:*:*:*:*:*:*:*" ]
null
7.7
null
6.8
GHSA-xr4f-2rrr-cm48
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in bPlugins LLC Icons Font Loader allows SQL Injection.This issue affects Icons Font Loader: from n/a through 1.1.2.
[]
null
8.8
null
null
CVE-2023-6892
The EAN for WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'alg_wc_ean_product_meta' shortcode in all versions up to, and including, 4.8.7 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[ "cpe:2.3:a:wpfactory:ean_for_woocommerce:*:*:*:*:*:wordpress:*:*" ]
null
6.4
null
null
GHSA-67hw-m5xj-prxg
Elipse E3 3.x and earlier allows remote attackers to cause a denial of service (application crash and plant outage) via a rapid series of HTTP requests to index.html on TCP port 1681.
[]
null
null
null
null
GHSA-gh6h-7xpj-3cm5
An issue was discovered in ROS2 (Robot Operating System 2) Humble Hawksbill in ROS_VERSION 2 and ROS_PYTHON_VERSION 3 where the system transmits messages in plaintext, allowing attackers to access sensitive information via a man-in-the-middle attack.
[]
null
null
null
null
GHSA-8745-gh37-x9mm
Heap-based buffer overflow in IrfanView before 4.27 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PSD image with RLE compression.
[]
null
null
null
null
GHSA-j5jp-jf25-8www
IrfanView DXF File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of DXF files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24618.
[]
null
null
7.8
null
GHSA-h72p-r49x-6h8h
Windows graphics on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, Windows Server 2016, Microsoft Office Word Viewer, Microsoft Office 2007 Service Pack 3 , and Microsoft Office 2010 Service Pack 2 allows an attacker to execute remote code by the way it handles embedded fonts, aka "Win32k Graphics Remote Code Execution Vulnerability". This CVE ID is unique from CVE-2017-8683.
[]
null
null
8.8
null
CVE-2000-0575
SSH 1.2.27 with Kerberos authentication support stores Kerberos tickets in a file which is created in the current directory of the user who is logging in, which could allow remote attackers to sniff the ticket cache if the home directory is installed on NFS.
[ "cpe:2.3:a:ssh:ssh:1.2.27:*:*:*:*:*:*:*" ]
null
null
null
7.2
GHSA-mvfm-jv7j-j8f4
A vulnerability has been identified in Solid Edge SE2021 (All versions < SE2021MP8). The affected application contains a use-after-free vulnerability while parsing OBJ files. An attacker could leverage this vulnerability to execute code in the context of the current process (ZDI-CAN-13771).
[]
null
null
null
null
CVE-2017-18854
NETGEAR ReadyNAS 6.6.1 and earlier is affected by command injection.
[ "cpe:2.3:o:netgear:readynas_os_firmware:*:*:*:*:*:*:*:*" ]
null
null
6.7
null
GHSA-92r5-r4ww-c543
TOTOLINK A6000R V1.0.1-B20201211.2000 was discovered to contain a command injection vulnerability via the modifyOne parameter in the enable_wsh function.
[]
null
8
null
null
GHSA-77j7-vm29-rwwv
A vulnerability in Outline.cc for Poppler prior to 23.06.0 allows a remote attacker to cause a Denial of Service (DoS) (crash) via a crafted PDF file in OutlineItem::open.
[]
null
5.5
null
null
CVE-2022-27962
Bluecms 1.6 has a SQL injection vulnerability at cooike.
[ "cpe:2.3:a:bluecms_project:bluecms:1.6:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
GHSA-96mx-v7cp-x9cq
An issue was discovered on Samsung mobile devices with P(9.0) software. The Motion photo player allows attackers to bypass the Secure Folder feature to view images. The Samsung ID is SVE-2019-14653 (August 2019).
[]
null
null
null
null
CVE-2021-3807
Inefficient Regular Expression Complexity in chalk/ansi-regex
ansi-regex is vulnerable to Inefficient Regular Expression Complexity
[ "cpe:2.3:a:ansi-regex_project:ansi-regex:*:*:*:*:*:node.js:*:*", "cpe:2.3:a:ansi-regex_project:ansi-regex:3.0.0:*:*:*:*:node.js:*:*", "cpe:2.3:a:ansi-regex_project:ansi-regex:5.0.0:*:*:*:*:node.js:*:*", "cpe:2.3:a:ansi-regex_project:ansi-regex:6.0.0:*:*:*:*:node.js:*:*", "cpe:2.3:a:oracle:communications_cloud_native_core_policy:1.15.0:*:*:*:*:*:*:*" ]
null
null
7.5
null
CVE-2002-2195
Buffer overflow in the version update check for Winamp 2.80 and earlier allows remote attackers who can spoof www.winamp.com to execute arbitrary code via a long server response.
[ "cpe:2.3:a:nullsoft:winamp:2.60:*:lite:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:2.61:*:full:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:2.62:*:standard:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:2.64:*:standard:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:2.65:*:*:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:2.70:*:*:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:2.70:*:full:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:2.71:*:*:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:2.72:*:*:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:2.73:*:*:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:2.73:*:full:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:2.74:*:*:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:2.75:*:*:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:2.76:*:*:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:2.78:*:*:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:2.79:*:*:*:*:*:*:*", "cpe:2.3:a:nullsoft:winamp:2.80:*:*:*:*:*:*:*" ]
null
null
null
5
CVE-2018-15382
Cisco HyperFlex Software Static Signing Key Vulnerability
A vulnerability in Cisco HyperFlex Software could allow an unauthenticated, remote attacker to generate valid, signed session tokens. The vulnerability is due to a static signing key that is present in all Cisco HyperFlex systems. An attacker could exploit this vulnerability by accessing the static signing key from one HyperFlex system and using it to generate valid, signed session tokens for another HyperFlex system. A successful exploit could allow the attacker to access the HyperFlex Web UI of a system for which they are not authorized.
[ "cpe:2.3:o:cisco:hyperflex_hx_data_platform:3.0\\(1a\\):*:*:*:*:*:*:*" ]
null
null
8.6
7.5
CVE-2001-1349
Sendmail before 8.11.4, and 8.12.0 before 8.12.0.Beta10, allows local users to cause a denial of service and possibly corrupt the heap and gain privileges via race conditions in signal handlers.
[ "cpe:2.3:a:sendmail:sendmail:8.10:*:*:*:*:*:*:*", "cpe:2.3:a:sendmail:sendmail:8.10.1:*:*:*:*:*:*:*", "cpe:2.3:a:sendmail:sendmail:8.10.2:*:*:*:*:*:*:*", "cpe:2.3:a:sendmail:sendmail:8.11.0:*:*:*:*:*:*:*", "cpe:2.3:a:sendmail:sendmail:8.11.1:*:*:*:*:*:*:*", "cpe:2.3:a:sendmail:sendmail:8.11.2:*:*:*:*:*:*:*", "cpe:2.3:a:sendmail:sendmail:8.11.3:*:*:*:*:*:*:*", "cpe:2.3:a:sendmail:sendmail:8.12:beta7:*:*:*:*:*:*" ]
null
null
null
3.7
GHSA-v28g-xr7w-fvp4
An integer overflow was found in QEMU 4.0.1 through 4.2.0 in the way it implemented ATI VGA emulation. This flaw occurs in the ati_2d_blt() routine in hw/display/ati-2d.c while handling MMIO write operations through the ati_mm_write() callback. A malicious guest could abuse this flaw to crash the QEMU process, resulting in a denial of service.
[]
null
null
null
null
CVE-2023-52723
In KDE libksieve before 23.03.80, kmanagesieve/session.cpp places a cleartext password in server logs because a username variable is accidentally given a password value.
[ "cpe:2.3:a:kde:libksieve:-:*:*:*:*:*:*:*" ]
null
7.1
null
null
GHSA-mvqc-qf5q-pvwc
Reflected Cross-Site Scripting exists in the Java System Solutions SSO plugin 4.0.13.1 for BMC MyIT. A remote attacker can abuse this issue to inject client-side scripts into the "select_sso()" function. The payload is triggered when the victim opens a prepared /ux/jss-sso/arslogin?[XSS] link and then clicks the "Login" button.
[]
null
null
6.1
null
GHSA-jr3f-6386-c267
na-img-4.0.34.bin for the IP3 Networks NetAccess NA75 has a default username of admin and a default password of admin.
[]
null
null
null
null
CVE-2017-16818
RADOS Gateway in Ceph 12.1.0 through 12.2.1 allows remote authenticated users to cause a denial of service (assertion failure and application exit) by leveraging "full" (not necessarily admin) privileges to post an invalid profile to the admin API, related to rgw/rgw_iam_policy.cc, rgw/rgw_basic_types.h, and rgw/rgw_iam_types.h.
[ "cpe:2.3:a:redhat:ceph:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:27:*:*:*:*:*:*:*" ]
null
null
6.5
4
CVE-2023-27593
cilium-agent container can access the host via `hostPath` mount
Cilium is a networking, observability, and security solution with an eBPF-based dataplane. Prior to versions 1.11.15, 1.12.8, and 1.13.1, an attacker with access to a Cilium agent pod can write to `/opt/cni/bin` due to a `hostPath` mount of that directory in the agent pod. By replacing the CNI binary with their own malicious binary and waiting for the creation of a new pod on the node, the attacker can gain access to the underlying node. The issue has been fixed and the fix is available on versions 1.11.15, 1.12.8, and 1.13.1. Some workarounds are available. Kubernetes RBAC should be used to deny users and service accounts `exec` access to Cilium agent pods. In cases where a user requires `exec` access to Cilium agent pods, but should not have access to the underlying node, no workaround is possible.
[ "cpe:2.3:a:cilium:cilium:*:*:*:*:*:*:*:*" ]
null
4.4
null
null
RHSA-2017:1268
Red Hat Security Advisory: libtirpc security update
libntirpc: Memory leak when failing to parse XDR strings or bytearrays
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
7.5
null
CVE-2020-29482
An issue was discovered in Xen through 4.14.x. A guest may access xenstore paths via absolute paths containing a full pathname, or via a relative path, which implicitly includes /local/domain/$DOMID for their own domain id. Management tools must access paths in guests' namespaces, necessarily using absolute paths. oxenstored imposes a pathname limit that is applied solely to the relative or absolute path specified by the client. Therefore, a guest can create paths in its own namespace which are too long for management tools to access. Depending on the toolstack in use, a malicious guest administrator might cause some management tools and debugging operations to fail. For example, a guest administrator can cause "xenstore-ls -r" to fail. However, a guest administrator cannot prevent the host administrator from tearing down the domain. All systems using oxenstored are vulnerable. Building and using oxenstored is the default in the upstream Xen distribution, if the Ocaml compiler is available. Systems using C xenstored are not vulnerable.
[ "cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*" ]
null
6
null
4.9
GHSA-4gpg-v9hf-rg99
Catalyst IT Ltd Mahara CMS v19.10.2 was discovered to contain multiple cross-site scripting (XSS) vulnerabilities in the component groupfiles.php via the Number (Nombre) and Description (Descripción) parameters.
[]
null
null
null
null
GHSA-7xf4-wr6x-3r95
In the Linux kernel, the following vulnerability has been resolved:net: mctp: take ownership of skb in mctp_local_outputCurrently, mctp_local_output only takes ownership of skb on success, and we may leak an skb if mctp_local_output fails in specific states; the skb ownership isn't transferred until the actual output routing occurs.Instead, make mctp_local_output free the skb on all error paths up to the route action, so it always consumes the passed skb.
[]
null
null
null
null
GHSA-xg7j-mpg2-2hvw
A vulnerability was found in Axiomatic Bento4. It has been rated as problematic. This issue affects the function AP4_StsdAtom of the file Ap4StsdAtom.cpp of the component MP4fragment. The manipulation leads to null pointer dereference. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-212003.
[]
null
5.5
null
null
CVE-2015-7093
Safari in Apple iOS before 9.2 allows remote attackers to spoof a URL in the user interface via a crafted web site.
[ "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*" ]
null
null
null
4.3
CVE-2022-42307
An issue was discovered in Veritas NetBackup through 10.0.0.1 and related Veritas products. The NetBackup Primary server is vulnerable to an XML External Entity (XXE) Injection attack through the DiscoveryService service.
[ "cpe:2.3:a:veritas:netbackup:*:*:*:*:*:*:*:*" ]
null
5.3
null
null
GHSA-9ph3-qv2x-wrgr
Adobe Premiere Rush version 1.5.16 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious WAV file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.
[]
null
null
null
null
CVE-2014-9796
app/aboot/aboot.c in the Qualcomm components in Android before 2016-07-05 on Nexus 5 and 7 (2013) devices does not validate the page size in the kernel header, which allows attackers to bypass intended access restrictions via a crafted boot image, aka Android internal bug 28820722 and Qualcomm internal bug CR684756.
[ "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*" ]
null
null
7.8
9.3
GHSA-xv3j-5xmw-q95p
ACEweb Online Portal 3.5.065 was discovered to contain a SQL injection vulnerability via the criteria parameter in showschedule.awp.
[]
null
9.8
null
null
CVE-2008-3007
Argument injection vulnerability in a URI handler in Microsoft Office XP SP3, 2003 SP2 and SP3, 2007 Office System Gold and SP1, and Office OneNote 2007 Gold and SP1 allow remote attackers to execute arbitrary code via a crafted onenote:// URL, aka "Uniform Resource Locator Validation Error Vulnerability."
[ "cpe:2.3:a:microsoft:office:2003:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2003:sp3:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2007:*:gold:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2007:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:xp:sp3:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office_onenote:2007:gold:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office_onenote:2007:sp1:*:*:*:*:*:*" ]
null
null
null
9.3
GHSA-f636-m6gc-99ch
Macro Expert through 4.9.4 allows BUILTIN\Users:(OI)(CI)(M) access to the "%PROGRAMFILES(X86)%\GrassSoft\Macro Expert" folder and thus an unprivileged user can escalate to SYSTEM by replacing the MacroService.exe binary.
[]
null
7.8
null
null
GHSA-pvm6-2fcg-75wj
Pingtel xpressa SIP-based voice-over-IP phone 1.2.5 through 1.2.7.4 does not "time out" an inactive administrator session, which could allow other users to perform administrator actions if the administrator does not explicitly end the authentication.
[]
null
null
null
null
GHSA-cc8x-chx9-c63q
In BIND 9.16.19, 9.17.16. Also, version 9.16.19-S1 of BIND Supported Preview Edition When a vulnerable version of named receives a query under the circumstances described above, the named process will terminate due to a failed assertion check. The vulnerability affects only BIND 9 releases 9.16.19, 9.17.16, and release 9.16.19-S1 of the BIND Supported Preview Edition.
[]
null
null
null
null
CVE-2017-12958
There is an illegal address access in the function output_hex() in data/data-out.c of the libpspp library in GNU PSPP before 1.0.1 that will lead to remote denial of service.
[ "cpe:2.3:a:gnu:pspp:0.11.0:*:*:*:*:*:*:*" ]
null
null
7.5
5
GHSA-g7v5-wcvq-8p7g
A vulnerability classified as problematic has been found in Linking. This affects an unknown part of the component New Windows Macro. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
[]
null
5.4
null
null
CVE-2002-2036
Sun Ray Server Software (SRSS) 1.3, when Non-Smartcard Mobility (NSCM) is enabled, allows remote attackers to login as another user by running dtlogin from a system that supports the XDMCP client.
[ "cpe:2.3:a:sun:ray_server_software:1.3:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2021-30454
An issue was discovered in the outer_cgi crate before 0.2.1 for Rust. A user-provided Read instance receives an uninitialized memory buffer from KeyValueReader.
[ "cpe:2.3:a:outer_cgi_project:outer_cgi:*:*:*:*:*:rust:*:*" ]
null
9.8
null
7.5
CVE-2019-5859
Insufficient filtering in URI schemes in Google Chrome on Windows prior to 76.0.3809.87 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
8.8
null
6.8
GHSA-j2rp-v8r4-pg82
Heap-based buffer overflow in OtsAV DJ trial version 1.85.64.0, Radio trial version 1.85.64.0, TV trial version 1.85.64.0, and Free version 1.77.001 allows remote attackers to execute arbitrary code via a long playlist in an Ots File List (.ofl) file.
[]
null
null
null
null
GHSA-7g36-rwff-h8xw
A vulnerability, which was classified as critical, has been found in TOTOLINK EX1800T 9.1.0cu.2112_B20220316. This issue affects the function setRptWizardCfg of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument loginpass leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
[]
8.7
8.8
null
null
CVE-2018-18985
Tridium Niagara Enterprise Security 2.3u1, all versions prior to 2.3.118.6, Niagara AX 3.8u4, all versions prior to 3.8.401.1, Niagara 4.4u2, all versions prior to 4.4.93.40.2, and Niagara 4.6, all versions prior to 4.6.96.28.4 a cross-site scripting vulnerability has been identified that may allow a remote attacker to inject code to some web pages affecting confidentiality.
[ "cpe:2.3:a:tridium:niagara:*:*:*:*:*:*:*:*", "cpe:2.3:a:tridium:niagara:4.4u2:*:*:*:*:*:*:*", "cpe:2.3:a:tridium:niagara_ax_framework:*:*:*:*:*:*:*:*", "cpe:2.3:a:tridium:niagara_ax_framework:3.8u4:*:*:*:*:*:*:*", "cpe:2.3:a:tridium:niagara_enterprise_security:*:*:*:*:*:*:*:*", "cpe:2.3:a:tridium:niagara_enterprise_security:2.3u1:*:*:*:*:*:*:*" ]
null
null
5.4
3.5
CVE-2017-18806
Certain NETGEAR devices are affected by command injection. This affects WAC510 before 1.3.0.10, WAC120 before 2.1.4, WNDAP620 before 2.1.3, WND930 before 2.1.2, WN604 before 3.3.7, WNDAP660 before 3.7.4.0, WNDAP350 before 3.7.4.0, WNAP320 before 3.7.4.0, WNAP210v2 before 3.7.4.0, and WNDAP360 before 3.7.4.0.
[ "cpe:2.3:o:netgear:wac510_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:wac510:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:wac120_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:wac120:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:wndap620_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:wndap620:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:wnd930_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:wnd930:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:wn604_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:wn604:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:wndap660_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:wndap660:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:wndap350_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:wndap350:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:wnap320_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:wnap320:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:wnap210_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:wnap210:v2:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:wndap360_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:wndap360:-:*:*:*:*:*:*:*" ]
null
null
6.7
null
CVE-2014-0528
Double free vulnerability in Adobe Reader and Acrobat 10.x before 10.1.10 and 11.x before 11.0.07 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors.
[ "cpe:2.3:a:adobe:acrobat_reader:10.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:10.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:10.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:10.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:10.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:10.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:10.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:10.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:10.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:10.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:10.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:10.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:10.1.8:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:10.1.9:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:11.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:11.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:11.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:11.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:11.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:11.0.5:-:*:*:*:windows:*:*", "cpe:2.3:a:adobe:acrobat_reader:11.0.6:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.1.8:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:10.1.9:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:11.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:11.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:11.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:11.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:11.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:11.0.5:-:*:*:*:windows:*:*", "cpe:2.3:a:adobe:acrobat:11.0.6:*:*:*:*:*:*:*" ]
null
null
null
10
GHSA-w584-h26p-3h6h
In modem, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is no needed for exploitation. Patch ID: MOLY01267281; Issue ID: MSV-1477.
[]
null
7.5
null
null
GHSA-qfxm-h9jr-5w92
elog 3.1.1 allows remote attackers to post data as any username in the logbook.
[]
null
7.5
null
null
CVE-2013-0740
Open redirect vulnerability in Dell OpenManage Server Administrator (OMSA) before 7.3.0 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the file parameter to HelpViewer.
[ "cpe:2.3:a:dell:openmanage_server_administrator:*:*:*:*:*:*:*:*", "cpe:2.3:a:dell:openmanage_server_administrator:7.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:dell:openmanage_server_administrator:7.0.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:dell:openmanage_server_administrator:7.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:dell:openmanage_server_administrator:7.1.0.1:*:*:*:*:*:*:*" ]
null
null
null
5.8
GHSA-h7pm-jwh4-cx4r
Missing Authorization vulnerability in VIICTORY MEDIA LLC Z Y N I T H allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Z Y N I T H: from n/a through 7.4.9.
[]
null
6.5
null
null
CVE-2022-47880
An Information disclosure vulnerability in /be/rpc.php in Jedox GmbH Jedox 2020.2.5 allow remote, authenticated users with permissions to modify database connections to disclose a connections' cleartext password via the 'test connection' function.
[ "cpe:2.3:a:jedox:jedox:2020.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:jedox:jedox_cloud:-:*:*:*:*:*:*:*" ]
null
6.8
null
null
GHSA-7hpp-vhg4-3j5w
The Scheduled Announcements Widget WordPress plugin before 1.0 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
[]
null
5.4
null
null