id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
4.89k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2025-30999 | WordPress WP Shopify <= 1.5.3 - Local File Inclusion Vulnerability | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Fahad Mahmood WP Shopify allows PHP Local File Inclusion. This issue affects WP Shopify: from n/a through 1.5.3. | []
| null | 7.5 | null | null |
CVE-2000-0978 | bbd server in Big Brother System and Network Monitor before 1.5c2 allows remote attackers to execute arbitrary commands via the "&" shell metacharacter. | [
"cpe:2.3:a:bb4:big_brother_network_monitor:1.5c2:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
CVE-2000-0005 | HP-UX aserver program allows local users to gain privileges via a symlink attack. | [
"cpe:2.3:o:hp:hp-ux:7.00:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:7.02:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:7.04:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:7.06:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:7.08:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:8.00:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:8.01:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:8.02:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:8.04:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:8.05:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:8.06:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:8.07:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:8.08:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:8.09:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:9.00:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:9.01:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:9.03:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:9.04:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:9.05:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:9.06:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:9.07:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:9.08:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:9.09:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:9.10:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:10.00:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:10.01:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:10.08:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:10.09:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:10.10:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:10.16:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:10.20:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:10.24:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:10.30:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:10.34:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:aserver:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:9000:7_800:*:*:*:*:*:*:*"
]
| null | null | null | 7.2 |
|
CVE-2007-5707 | OpenLDAP before 2.3.39 allows remote attackers to cause a denial of service (slapd crash) via an LDAP request with a malformed objectClasses attribute. NOTE: this has been reported as a double free, but the reports are inconsistent. | [
"cpe:2.3:a:openldap:openldap:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:1.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:1.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:1.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:1.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:1.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:1.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:1.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:1.2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:1.2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:1.2.11:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:1.2.12:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:1.2.13:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.0.11_9:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.0.11_11:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.0.11_11s:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.0.21:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.0.22:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.0.23:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.0.24:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.0.25:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.0.26:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.0.27:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.1.12:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.1.13:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.1.14:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.1.15:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.1.16:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.1.17:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.1.18:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.1.19:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.1.20:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.1.21:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.1.22:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.1.23:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.1.24:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.1.25:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.1.26:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.1.27:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.1.28:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.1.29:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.1.30:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.1_.20:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.2.11:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.2.12:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.2.13:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.2.14:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.2.15:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.2.16:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.2.17:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.2.18:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.2.19:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.2.20:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.2.21:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.2.22:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.2.23:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.2.24:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.2.25:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.2.26:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.2.27:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.2.28_r2:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.2.29_rev_1.134:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.3.27_2.20061018:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.3.28_2.20061022:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.3.28_20061022:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.3.28_e1.0.0:*:*:*:*:*:*:*"
]
| null | null | null | 7.1 |
|
CVE-2018-17616 | This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of onBlur events. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-6334. | [
"cpe:2.3:a:foxitsoftware:phantompdf:*:*:*:*:*:*:*:*",
"cpe:2.3:a:foxitsoftware:reader:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
]
| null | null | 8.8 | 6.8 |
|
GHSA-v92f-jx6p-73rx | Improper Control of Generation of Code ('Code Injection') in jai-ext | ImpactPrograms using jt-jiffle, and allowing Jiffle script to be provided via network request, are susceptible to a Remote Code Execution as the Jiffle script is compiled into Java code via Janino, and executed. In particular, this affects the downstream GeoServer project.PatchesVersion 1.2.22 will contain a patch that disables the ability to inject malicious code into the resulting script.WorkaroundsNegate the ability to compile Jiffle scripts from the final application, by removing janino-x.y.z.jar from the classpath.ReferencesNone. | []
| null | 9.8 | null | null |
GHSA-3vvf-jcfx-25cj | This vulnerability allows remote attackers to execute arbitrary code on affected installations of OpenText Brava! Desktop Build 16.6.4.55. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of CGM files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-13679. | []
| null | 7.8 | null | null |
|
CVE-2015-1776 | Apache Hadoop 2.6.x encrypts intermediate data generated by a MapReduce job and stores it along with the encryption key in a credentials file on disk when the Intermediate data encryption feature is enabled, which allows local users to obtain sensitive information by reading the file. | [
"cpe:2.3:a:apache:hadoop:2.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:hadoop:2.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:hadoop:2.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:hadoop:2.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:hadoop:2.6.4:*:*:*:*:*:*:*"
]
| null | null | 6.2 | 2.1 |
|
GHSA-6qcx-qr4g-4fx9 | Go before 1.15.15 and 1.16.x before 1.16.7 has a race condition that can lead to a net/http/httputil ReverseProxy panic upon an ErrAbortHandler abort. | []
| null | 5.9 | null | null |
|
GHSA-fw3p-p4px-mp7p | IBM Jazz Team Server 6.0.6, 6.0.6.1, 7.0, 7.0.1, and 7.0.2 could allow a remote attacker to obtain sensitive information, caused by the failure to set the HTTPOnly flag. A remote attacker could exploit this vulnerability to obtain sensitive information from the cookie. IBM X-Force ID: 194891. | []
| null | 5.3 | null | null |
|
GHSA-q63r-mw4c-62hc | SQL injection vulnerability in default.php in MMSLamp allows remote attackers to execute arbitrary SQL commands via the idpro parameter in a prodotti_dettaglio action. | []
| null | null | null | null |
|
CVE-2021-34555 | OpenDMARC 1.4.1 and 1.4.1.1 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a multi-value From header field. | [
"cpe:2.3:a:trusteddomain:opendmarc:1.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:trusteddomain:opendmarc:1.4.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*"
]
| null | 7.5 | null | 5 |
|
CVE-2021-21478 | SAP Web Dynpro ABAP allow an attacker to redirect users to a malicious site due to Reverse Tabnabbing vulnerabilities. | [
"cpe:2.3:a:sap:web_dynpro_abap:-:*:*:*:*:*:*:*"
]
| null | null | 4.7 | null |
|
GHSA-3g5h-5mpr-m5qx | SQL injection exists in Scriptzee Hotel Booking Engine 1.0 via the hotels h_room_type parameter. | []
| null | null | null | null |
|
ICSA-19-318-05 | ABB Power Generation Information Manager (PGIM) and Plant Connect | The affected product is vulnerable to authentication bypass, which may allow an attacker to remotely bypass authentication and extract credentials from the affected device.CVE-2019-18250 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). | []
| null | null | 9.8 | null |
CVE-2025-27427 | Apache ActiveMQ Artemis: Address routing-type can be updated by user without the createAddress permission | A vulnerability exists in Apache ActiveMQ Artemis whereby a user with the createDurableQueue or createNonDurableQueue permission on an address can augment the routing-type supported by that address even if said user doesn't have the createAddress permission for that particular address. When combined with the send permission and automatic queue creation a user could successfully send a message with a routing-type not supported by the address when that message should actually be rejected on the basis that the user doesn't have permission to change the routing-type of the address.
This issue affects Apache ActiveMQ Artemis from 2.0.0 through 2.39.0.
Users are recommended to upgrade to version 2.40.0 which fixes the issue. | []
| 2.3 | null | null | null |
GHSA-cppr-qmr8-4r9j | Null pointer dereference in some Zoom Workplace Apps for Windows may allow an authenticated user to conduct a denial of service via network access. | []
| null | 6.5 | null | null |
|
RHSA-2017:3470 | Red Hat Security Advisory: qemu-kvm-rhev security and bug fix update | Qemu: qemu-nbd crashes due to undefined I/O coroutine Qemu: qemu-nbd: server breaks with SIGPIPE upon client abort Qemu: exec: oob access during dma operation Qemu: i386: multiboot OOB access while loading kernel image Qemu: cirrus: OOB access issue in mode4and5 write functions | [
"cpe:/a:redhat:openstack:9::el7"
]
| null | null | 4.4 | null |
GHSA-ccx9-5rv5-mwfr | Cross-Site Request Forgery (CSRF) vulnerability in Dylan James Zephyr Project Manager plugin <= 3.3.93 versions. | []
| null | 5.4 | null | null |
|
CVE-2024-44289 | A privacy issue was addressed with improved private data redaction for log entries. This issue is fixed in macOS Ventura 13.7.1, macOS Sonoma 14.7.1. An app may be able to read sensitive location information. | [
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*"
]
| null | 7.5 | null | null |
|
CVE-2001-0010 | Buffer overflow in transaction signature (TSIG) handling code in BIND 8 allows remote attackers to gain root privileges. | [
"cpe:2.3:a:isc:bind:8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:8.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:8.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:8.2.2:p1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:8.2.2:p2:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:8.2.2:p3:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:8.2.2:p4:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:8.2.2:p5:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:8.2.2:p6:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:8.2.2:p7:*:*:*:*:*:*"
]
| null | null | null | 10 |
|
GHSA-7qr6-vjfq-429r | In the Linux kernel, the following vulnerability has been resolved:fs/erofs/fileio: call erofs_onlinefolio_split() after bio_add_folio()If bio_add_folio() fails (because it is full),
erofs_fileio_scan_folio() needs to submit the I/O request via
erofs_fileio_rq_submit() and allocate a new I/O request with an empty
`struct bio`. Then it retries the bio_add_folio() call.However, at this point, erofs_onlinefolio_split() has already been
called which increments `folio->private`; the retry will call
erofs_onlinefolio_split() again, but there will never be a matching
erofs_onlinefolio_end() call. This leaves the folio locked forever
and all waiters will be stuck in folio_wait_bit_common().This bug has been added by commit ce63cb62d794 ("erofs: support
unencoded inodes for fileio"), but was practically unreachable because
there was room for 256 folios in the `struct bio` - until commit
9f74ae8c9ac9 ("erofs: shorten bvecs[] for file-backed mounts") which
reduced the array capacity to 16 folios.It was now trivial to trigger the bug by manually invoking readahead
from userspace, e.g.:posix_fadvise(fd, 0, st.st_size, POSIX_FADV_WILLNEED);This should be fixed by invoking erofs_onlinefolio_split() only after
bio_add_folio() has succeeded. This is safe: asynchronous completions
invoking erofs_onlinefolio_end() will not unlock the folio because
erofs_fileio_scan_folio() is still holding a reference to be released
by erofs_onlinefolio_end() at the end. | []
| null | null | null | null |
|
GHSA-f4j2-495p-326w | In Init of protocolnetadapter.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. | []
| null | 5.5 | null | null |
|
CVE-2008-2434 | The Trend Micro HouseCall ActiveX control 6.51.0.1028 and 6.6.0.1278 in Housecall_ActiveX.dll allows remote attackers to download an arbitrary library file onto a client system via a "custom update server" argument. NOTE: this can be leveraged for code execution by writing to a Startup folder. | [
"cpe:2.3:a:trend_micro:housecall:6.6:*:server:*:*:*:*:*",
"cpe:2.3:a:trend_micro:housecall:6.6.0.1278:*:*:*:*:*:*:*",
"cpe:2.3:a:trend_micro:housecall:6.51.0.1028:*:*:*:*:*:*:*"
]
| null | null | null | 9.3 |
|
GHSA-h4j5-2v82-4354 | The domain designer component of TIBCO Software Inc.'s TIBCO JasperReports Server, TIBCO JasperReports Server Community Edition, TIBCO JasperReports Server for ActiveMatrix BPM, TIBCO Jaspersoft for AWS with Multi-Tenancy, and TIBCO Jaspersoft Reporting and Analytics for AWS contains a vulnerability which may allow, in the context of a non-default permissions configuration, persisted cross-site scripting (XSS) attacks. Affected releases include TIBCO Software Inc.'s TIBCO JasperReports Server: versions up to and including 6.2.4; 6.3.0; 6.3.2; 6.3.3; 6.4.0; 6.4.2, TIBCO JasperReports Server Community Edition: versions up to and including 6.4.2, TIBCO JasperReports Server for ActiveMatrix BPM: versions up to and including 6.4.2, TIBCO Jaspersoft for AWS with Multi-Tenancy: versions up to and including 6.4.2, TIBCO Jaspersoft Reporting and Analytics for AWS: versions up to and including 6.4.2. | []
| null | null | 5.4 | null |
|
CVE-2008-4028 | Microsoft Office Word 2000 SP3, 2002 SP3, 2003 SP3, and 2007 Gold and SP1; Outlook 2007 Gold and SP1; Word Viewer 2003 Gold and SP3; Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats Gold and SP1; Office 2004 and 2008 for Mac; and Open XML File Format Converter for Mac allow remote attackers to execute arbitrary code via crafted control words related to multiple Drawing Object tags in (1) an RTF file or (2) a rich text e-mail message, which triggers incorrect memory allocation and a heap-based buffer overflow, aka "Word RTF Object Parsing Vulnerability," a different vulnerability than CVE-2008-4030. | [
"cpe:2.3:a:microsoft:office:2004:*:mac:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2008:*:mac:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_compatibility_pack_for_word_excel_ppt_2007:*:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_compatibility_pack_for_word_excel_ppt_2007:*:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_word_viewer:2003:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_word_viewer:2003:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:open_xml_file_format_converter:*:*:mac:*:*:*:*:*",
"cpe:2.3:a:microsoft:works:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_outlook:2007:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_outlook:2007:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_word:2000:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_word:2002:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_word:2003:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_word:2007:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2000:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2003:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:xp:sp3:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:office_system:*:2007:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:office_system:sp1:2007:*:*:*:*:*:*"
]
| null | null | null | 9.3 |
|
RHSA-2019:0739 | Red Hat Security Advisory: Red Hat OpenShift Container Platform 3.11 jenkins-2-plugins security update | jenkins-plugin-script-security: Sandbox Bypass in Script Security Plugin (SECURITY-1292) jenkins-plugin-script-security: Sandbox Bypass in Script Security Plugin (SECURITY-1320) jenkins-plugin-script-security: sandbox bypass in script security plugin jenkins-plugin-workflow-cps: Sandbox bypass in Pipeline: Groovy Plugin (SECURITY-1336(2)) jenkins-matrix-project-plugin: sandbox bypass in matrix project plugin jenkins-job-dsl-plugin: Script security sandbox bypass in Job DSL Plugin (SECURITY-1342) | [
"cpe:/a:redhat:openshift:3.11::el7"
]
| null | null | 8.8 | null |
GHSA-x6w3-cv3w-952r | Sudo 1.5 in Debian Linux 2.1 and Red Hat 6.0 allows local users to determine the existence of arbitrary files by attempting to execute the target filename as a program, which generates a different error message when the file does not exist. | []
| null | null | null | null |
|
CVE-2020-28931 | Lack of an anti-CSRF token in the entire administrative interface in EPSON EPS TSE Server 8 (21.0.11) allows an unauthenticated attacker to force an administrator to execute external POST requests by visiting a malicious website. | [
"cpe:2.3:o:epson:eps_tse_server_8_firmware:21.0.11:*:*:*:*:*:*:*",
"cpe:2.3:h:epson:eps_tse_server_8:-:*:*:*:*:*:*:*"
]
| null | 8.8 | null | 6.8 |
|
CVE-2008-3153 | SQL injection vulnerability in Triton CMS Pro allows remote attackers to execute arbitrary SQL commands via the X-Forwarded-For HTTP header. | [
"cpe:2.3:a:tritoncms:triton_cms_pro:*:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
CVE-2015-0271 | The log-viewing function in the Red Hat redhat-access-plugin before 6.0.3 for OpenStack Dashboard (horizon) allows remote attackers to read arbitrary files via a crafted path. | [
"cpe:2.3:a:redhat:openstack:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openstack:6.0:*:*:*:*:*:*:*"
]
| null | null | null | 4 |
|
CVE-2023-50651 | TOTOLINK X6000R v9.4.0cu.852_B20230719 was discovered to contain a remote command execution (RCE) vulnerability via the component /cgi-bin/cstecgi.cgi. | [
"cpe:2.3:o:totolink:x6000r_firmware:9.4.0cu.852_b20230719:*:*:*:*:*:*:*",
"cpe:2.3:h:totolink:x6000r:-:*:*:*:*:*:*:*"
]
| null | 9.8 | null | null |
|
CVE-2025-0442 | Inappropriate implementation in Payments in Google Chrome prior to 132.0.6834.83 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium) | []
| null | 6.5 | null | null |
|
GHSA-p82g-wxxj-p2ff | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Detlef Beyer SVT Simple allows Reflected XSS.This issue affects SVT Simple: from n/a through 1.0.1. | []
| null | 7.1 | null | null |
|
CVE-2015-10090 | Landing Pages Plugin cross site scripting | A vulnerability, which was classified as problematic, has been found in Landing Pages Plugin up to 1.8.7 on WordPress. Affected by this issue is some unknown functionality. The manipulation leads to cross site scripting. The attack may be launched remotely. Upgrading to version 1.8.8 is able to address this issue. The name of the patch is c8e22c1340c11fedfb0a0a67ea690421bdb62b94. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-222320. | [
"cpe:2.3:a:inboundnow:landing-pages:*:*:*:*:*:wordpress:*:*"
]
| null | 3.5 | 3.5 | 4 |
CVE-2018-18361 | An issue was discovered in nc-cms through 2017-03-10. index.php?action=edit_html allows XSS via the name parameter, as demonstrated by a value beginning with home_content and containing a crafted SRC attribute of an IMG element. | [
"cpe:2.3:a:nconsulting:nc-cms:*:*:*:*:*:*:*:*"
]
| null | null | 6.1 | 4.3 |
|
ICSA-18-275-03 | Entes EMG 12 | The application uses a web interface where it is possible for an attacker to bypass authentication with a specially crafted URL. This could allow for remote code execution. CVE-2018-14826 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). An information exposure through query strings vulnerability in the web interface has been identified, which may allow an attacker to impersonate a legitimate user and execute arbitrary code.CVE-2018-14822 has been assigned to this vulnerability. A CVSS v3 base score of 9.1 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N). | []
| null | null | 9.1 | null |
GHSA-p2hm-2cjf-f2wg | Use of Hard-coded Cryptographic Key vulnerability in Mitsubishi Electric GX Works3 all versions allows a remote unauthenticated attacker to disclose sensitive information. As a result, unauthorized users may view or execute programs illegally. | []
| null | 7.5 | null | null |
|
CVE-2020-36489 | Dropouts Technologies LLP Air Share v1.2 was discovered to contain a cross-site scripting (XSS) vulnerability in the devicename parameter. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the devicename information. | [
"cpe:2.3:a:dropouts:air_share:1.2:*:*:*:*:*:*:*"
]
| null | 5.4 | null | 3.5 |
|
RHSA-2019:3218 | Red Hat Security Advisory: kernel security and bug fix update | hardware: bluetooth: BR/EDR encryption key negotiation attacks (KNOB) | [
"cpe:/o:redhat:rhel_aus:7.3::server",
"cpe:/o:redhat:rhel_e4s:7.3::server",
"cpe:/o:redhat:rhel_tus:7.3::server"
]
| null | null | 7 | null |
GHSA-cw58-3hpw-976j | An authentication bypass vulnerability exists in the CiRpcAccepted() functionality of SoftEther VPN 4.41-9782-beta and 5.01.9674. A specially crafted network packet can lead to unauthorized access. An attacker can send a network request to trigger this vulnerability. | []
| null | 7.3 | null | null |
|
CVE-2018-19158 | ColossusCoinXT through 1.0.5 (a chain-based proof-of-stake cryptocurrency) allows a remote denial of service, exploitable by an attacker who acquires even a small amount of stake/coins in the system. The attacker sends invalid headers/blocks, which are stored on the victim's disk. | [
"cpe:2.3:a:colossusxt:colossuscoinxt:*:*:*:*:*:*:*:*"
]
| null | 7.5 | null | 5 |
|
CVE-2025-21539 | Vulnerability in the PeopleSoft Enterprise FIN eSettlements product of Oracle PeopleSoft (component: eSettlements). The supported version that is affected is 9.2. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise FIN eSettlements. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise FIN eSettlements accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise FIN eSettlements accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N). | [
"cpe:2.3:a:oracle:peoplesoft_enterprise_fin_esettlements:9.2:*:*:*:*:*:*:*"
]
| null | 5.4 | null | null |
|
CVE-2003-0961 | Integer overflow in the do_brk function for the brk system call in Linux kernel 2.4.22 and earlier allows local users to gain root privileges. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
]
| null | null | null | 7.2 |
|
CVE-2021-34954 | Foxit PDF Editor StrikeOut Annotation Use-After-Free Remote Code Execution Vulnerability | Foxit PDF Editor StrikeOut Annotation Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the handling of Annotation objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14355. | [
"cpe:2.3:a:foxit:pdf_editor:11.0.0.49893:*:*:*:*:*:*:*"
]
| null | null | 7.8 | null |
GHSA-rj36-vf3r-744c | In the Linux kernel, the following vulnerability has been resolved:dma-buf/dma-resv: check if the new fence is really laterPreviously when we added a fence to a dma_resv object we always
assumed the the newer than all the existing fences.With Jason's work to add an UAPI to explicit export/import that's not
necessary the case any more. So without this check we would allow
userspace to force the kernel into an use after free error.Since the change is very small and defensive it's probably a good
idea to backport this to stable kernels as well just in case others
are using the dma_resv object in the same way. | []
| null | null | null | null |
|
GHSA-3q7v-8c55-wjvj | The JScript scripting engine 5.1, 5.6, 5.7, and 5.8 in JScript.dll in Microsoft Windows, as used in Internet Explorer, does not properly load decoded scripts into memory before execution, which allows remote attackers to execute arbitrary code via a crafted web site that triggers memory corruption, aka "JScript Remote Code Execution Vulnerability." | []
| null | null | null | null |
|
CVE-2024-38971 | vaeThink 1.0.2 is vulnerable to stored Cross Site Scripting (XSS) in the system backend. | [
"cpe:2.3:a:vaethink:vaethink:1.0.2:*:*:*:*:*:*:*"
]
| null | 5.4 | null | null |
|
CVE-2015-0504 | Unspecified vulnerability in the Oracle Application Object Library component in Oracle E-Business Suite 12.0.6 and 12.1.3 allows remote attackers to affect integrity via unknown vectors related to Error Messages. | [
"cpe:2.3:a:oracle:e-business_suite:12.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:e-business_suite:12.1.3:*:*:*:*:*:*:*"
]
| null | null | null | 2.6 |
|
CVE-2014-8960 | Cross-site scripting (XSS) vulnerability in libraries/error_report.lib.php in the error-reporting feature in phpMyAdmin 4.1.x before 4.1.14.7 and 4.2.x before 4.2.12 allows remote authenticated users to inject arbitrary web script or HTML via a crafted filename. | [
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.1.12:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.1.13:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.1.14:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.1.14.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.1.14.2:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.1.14.3:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.1.14.4:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.1.14.5:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.1.14.6:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.2.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.2.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.2.11:*:*:*:*:*:*:*"
]
| null | null | null | 3.5 |
|
GHSA-xhg9-xwch-vr7x | quiche vulnerable to unbounded storage of information related to connection ID retirement | ImpactCloudflare quiche was discovered to be vulnerable to unbounded storage of information related to connection ID retirement, which could lead to excessive resource consumption. Each QUIC connection possesses a set of connection Identifiers (IDs); see [RFC 9000 Section 5.1](https://datatracker.ietf.org/doc/html/rfc9000#section-5.1). Endpoints declare the number of active connection IDs they are willing to support using the active_connection_id_limit transport parameter. The peer can create new IDs using a NEW_CONNECTION_ID frame but must stay within the active ID limit. This is done by retirement of old IDs, the endpoint sends NEW_CONNECTION_ID includes a value in the retire_prior_to field, which elicits a RETIRE_CONNECTION_ID frame as confirmation. An unauthenticated remote attacker can exploit the vulnerability by sending NEW_CONNECTION_ID frames and manipulating the connection (e.g. by restricting the peer's congestion window size) so that RETIRE_CONNECTION_ID frames can only be sent at a slower rate than they are received, leading to storage of information related to connection IDs in an unbounded queue.PatchesQuiche versions 0.19.2 and 0.20.1 are the earliest to address this problem. There is no workaround for affected versions. | []
| null | 3.7 | null | null |
GHSA-qjqh-pp4q-mrg7 | D-link DIR-816 A2_v1.10CNB04.img reboots the router without authentication via /goform/doReboot. No authentication is required, and reboot is executed when the function returns at the end. | []
| null | 7.5 | null | null |
|
GHSA-rpv2-g4pc-wp72 | Magento Open Source allows XML Injection | Adobe Commerce versions 2.4.6-p1 (and earlier), 2.4.5-p3 (and earlier) and 2.4.4-p4 (and earlier) are affected by a XML Injection (aka Blind XPath Injection) vulnerability that could lead in minor arbitrary file system read. Exploitation of this issue does not require user interaction. | []
| 2.7 | 5.3 | null | null |
GHSA-994m-2xmx-fwhg | Fwmon before 1.0.10 allows remote attackers to cause a denial of service (crash) by causing the kernel to return a large packet. | []
| null | null | null | null |
|
GHSA-r8mp-h8qj-rxw2 | A vulnerability has been identified in Tecnomatix Plant Simulation (All versions < V16.0.5). The PlantSimCore.dll library lacks proper validation of user-supplied data when parsing SPP files. This could result in a stack based buffer overflow, a different vulnerability than CVE-2021-27398. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-13279) | []
| null | null | null | null |
|
CVE-2015-6379 | The XML parser in the management interface in Cisco Adaptive Security Appliance (ASA) Software 8.4 allows remote authenticated users to cause a denial of service (device crash) via a crafted XML document, aka Bug ID CSCut14223. | [
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.0:*:*:*:*:*:*:*"
]
| null | null | null | 6.8 |
|
GHSA-vxcj-679q-r6q8 | **VERSION NOT SUPPORTED WHEN ASSIGNED** A vulnerability could cause TCM modules to reset when under high network load in TCM v10.4.x and in system v10.3.x. This vulnerability was discovered and remediated in version v10.5.x on August 13, 2009. TCMs from v10.5.x and on will no longer exhibit this behavior. | []
| null | null | null | null |
|
GHSA-rr34-f794-39mj | A vulnerability in the DHCP service of Cisco Industrial Network Director could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition. The vulnerability is due to improper handling of DHCP lease requests. An attacker could exploit this vulnerability by sending malicious DHCP lease requests to an affected application. A successful exploit could allow the attacker to cause the DHCP service to terminate, resulting in a DoS condition. | []
| null | null | 4.3 | null |
|
RHSA-2024:4014 | Red Hat Security Advisory: ghostscript security update | ghostscript: OPVP device arbitrary code execution via custom Driver library | [
"cpe:/a:redhat:rhel_e4s:9.0::appstream"
]
| null | 8.8 | null | null |
GHSA-9fvj-4grr-mv9j | An improper check or handling of exceptional conditions in NPU driver prior to SMR Jan-2022 Release 1 allows arbitrary memory write and code execution. | []
| null | 7.8 | null | null |
|
GHSA-hhmm-3887-jfh7 | Windows Internet Information Services Cachuri Module Denial of Service Vulnerability. | []
| null | 7.5 | null | null |
|
CVE-2018-11213 | An issue was discovered in libjpeg 9a. The get_text_gray_row function in rdppm.c allows remote attackers to cause a denial of service (Segmentation fault) via a crafted file. | [
"cpe:2.3:a:ijg:libjpeg:9a:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"
]
| null | null | 6.5 | 4.3 |
|
ICSA-24-284-17 | Rockwell Automation Verve Asset Manager | An improper authorization vulnerability exists in the affected products that could allow an unauthorized user to sign in. While removal of all role mappings is unlikely, it could occur in the case of unexpected or accidental removal by the administrator. If exploited, an unauthorized user could access data they previously had but should no longer have access to. | []
| null | 6.8 | null | null |
CVE-2021-38318 | 3D Cover Carousel <= 1.0 Reflected Cross-Site Scripting | The 3D Cover Carousel WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the id parameter in the ~/cover-carousel.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 1.0. | [
"cpe:2.3:a:3d_cover_carousel_project:3d_cover_carousel:*:*:*:*:*:wordpress:*:*"
]
| null | 6.1 | null | null |
GHSA-f2pg-7264-3hcf | In Continuous Delivery for Puppet Enterprise (CD4PE) before 3.4.0, changes to resources or classes containing Sensitive parameters can result in the Sensitive parameters ending up in the impact analysis report. | []
| null | null | null | null |
|
GHSA-xc8j-2crr-pqj3 | Multiple PHP remote file inclusion vulnerabilities in openMairie openPlanning 1.00, when register_globals is enabled, allow remote attackers to execute arbitrary PHP code via a URL in the path_om parameter to (1) categorie.class.php, (2) profil.class.php, (3) collectivite.class.php, (4) ressource.class.php, (5) droit.class.php, (6) utilisateur.class.php, and (7) planning.class.php in obj/. | []
| null | null | null | null |
|
CVE-2024-10600 | Tongda OA 2017 submenu.php sql injection | A vulnerability, which was classified as critical, was found in Tongda OA 2017 up to 11.6. Affected is an unknown function of the file pda/appcenter/submenu.php. The manipulation of the argument appid leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. | [
"cpe:2.3:a:tongda:oa_2017:*:*:*:*:*:*:*:*",
"cpe:2.3:a:tongda2000:office_anywhere:*:*:*:*:*:*:*:*",
"cpe:2.3:a:tongda2000:office_anywhere:2017:*:*:*:*:*:*:*"
]
| 6.9 | 7.3 | 7.3 | 7.5 |
CVE-2019-9812 | Given a compromised sandboxed content process due to a separate vulnerability, it is possible to escape that sandbox by loading accounts.firefox.com in that process and forcing a log-in to a malicious Firefox Sync account. Preference settings that disable the sandbox are then synchronized to the local machine and the compromised browser would restart without the sandbox if a crash is triggered. This vulnerability affects Firefox ESR < 60.9, Firefox ESR < 68.1, and Firefox < 69. | [
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*"
]
| null | 9.3 | null | 5.8 |
|
CVE-2013-1331 | Buffer overflow in Microsoft Office 2003 SP3 and Office 2011 for Mac allows remote attackers to execute arbitrary code via crafted PNG data in an Office document, leading to improper memory allocation, aka "Office Buffer Overflow Vulnerability." | [
"cpe:2.3:a:microsoft:office:2003:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2011:*:*:*:*:macos:*:*"
]
| null | 7.8 | null | 9.3 |
|
ICSA-22-069-05 | Siemens Simcenter STAR-CCM+ Viewer | The starview+.exe contains a memory corruption vulnerability while parsing specially crafted .SCE files. This could allow an attacker to execute code in the context of the current process. | []
| null | 7.8 | null | null |
GHSA-j8m5-chrv-m4wv | Cross-Site Request Forgery (CSRF) vulnerability in Roland Barker, xnau webdesign Participants Database plugin <= 2.4.5 leads to list column update. | []
| null | 4.3 | null | null |
|
CVE-2024-20710 | Adobe Substance 3D Stager v2.1.1 Vulnerability I | Adobe Substance 3D Stager versions 2.1.3 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [
"cpe:2.3:a:adobe:substance_3d_stager:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
]
| null | 5.5 | null | null |
GHSA-j9h7-v335-8gcp | A CWE-334: Small Space of Random Values vulnerability exists in Modicon M221 (all references, all versions) that could allow the attacker to break the encryption keys when the attacker has captured the traffic between EcoStruxure Machine - Basic software and Modicon M221 controller. | []
| null | null | null | null |
|
GHSA-rv89-xjc2-9wp5 | Race condition in IBM Web Content Manager (WCM) 7.0.0.1 before CF003 allows remote authenticated users to cause a denial of service (infinite recursive query) via unspecified vectors, related to a StackOverflowError exception. | []
| null | null | null | null |
|
CVE-2009-1838 | The garbage-collection implementation in Mozilla Firefox before 3.0.11, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.17 sets an element's owner document to null in unspecified circumstances, which allows remote attackers to execute arbitrary JavaScript with chrome privileges via a crafted event handler, related to an incorrect context for this event handler. | [
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.9:rc:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.9_rc:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0:preview_release:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.6:*:linux:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0:beta_1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.21:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0_.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0_.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0_.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0_.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0_.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0_.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0_.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0_8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0:alpha:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0:beta5:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0beta5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0:*:alpha:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0:*:beta:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0:*:dev:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0:alpha:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.99:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1:alpha:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.5:1.1.10:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.5:beta:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0_.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0_.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0_.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0_.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0_.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0_.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0_.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0_8:*:*:*:*:*:*:*"
]
| null | null | null | 9.3 |
|
GHSA-62gv-4jrq-r6pg | Rejected reason: Not used | []
| null | null | null | null |
|
CVE-2015-0655 | Cross-site scripting (XSS) vulnerability in Unified Web Interaction Manager in Cisco Unified Web and E-Mail Interaction Manager allows remote attackers to inject arbitrary web script or HTML via vectors related to a POST request, aka Bug ID CSCus74184. | [
"cpe:2.3:a:cisco:unified_web_and_e-mail_interaction_manager:-:*:*:*:*:*:*:*"
]
| null | null | null | 4.3 |
|
GHSA-8hh4-32mr-38xc | A vulnerability classified as critical was found in Digiwin ERP 5.0.1. Affected by this vulnerability is an unknown functionality of the file /Api/TinyMce/UploadAjaxAPI.ashx. The manipulation of the argument File leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | []
| 5.3 | 6.3 | null | null |
|
GHSA-c339-mwfc-fmr2 | Openshift Hive Exposes VCenter Credentials via ClusterProvision | A flaw was found in Hive, a component of Multicluster Engine (MCE) and Advanced Cluster Management (ACM). This vulnerability causes VCenter credentials to be exposed in the ClusterProvision object after provisioning a VSphere cluster. Users with read access to ClusterProvision objects can extract sensitive credentials even if they do not have direct access to Kubernetes Secrets. This issue can lead to unauthorized VCenter access, cluster management, and privilege escalation. | []
| null | 8.2 | null | null |
GHSA-8pwj-qgrj-p95h | The kernel in Amazon Web Services FreeRTOS before 10.4.3 has insufficient bounds checking during management of heap memory. | []
| null | null | null | null |
|
GHSA-v5mp-683j-2r34 | Rejected reason: Not used | []
| null | null | null | null |
|
CVE-2025-26640 | Windows Digital Media Elevation of Privilege Vulnerability | Use after free in Windows Digital Media allows an authorized attacker to elevate privileges locally. | []
| null | 7 | null | null |
GHSA-78jw-247w-7prv | IBM Notes is susceptible to a stack based buffer overflow vulnerability in lasr.dll in Micro Focus KeyView. This could allow a remote unauthenticated attacker to crash the application or execute arbitrary code via a crafted Lotus Ami Pro file. This is different from the vulnerability described in CVE-2022-44751. | []
| null | 7.8 | null | null |
|
CVE-2002-0630 | The Telnet service for Polycom ViewStation before 7.2.4 allows remote attackers to cause a denial of service (crash) via long or malformed ICMP packets. | [
"cpe:2.3:h:polycom:viewstation_128:6.5.1:*:*:*:*:*:*:*",
"cpe:2.3:h:polycom:viewstation_128:7.2:*:*:*:*:*:*:*",
"cpe:2.3:h:polycom:viewstation_512:6.5.1:*:*:*:*:*:*:*",
"cpe:2.3:h:polycom:viewstation_512:7.2:*:*:*:*:*:*:*",
"cpe:2.3:h:polycom:viewstation_dcp:6.5.1:*:*:*:*:*:*:*",
"cpe:2.3:h:polycom:viewstation_dcp:7.2:*:*:*:*:*:*:*",
"cpe:2.3:h:polycom:viewstation_fx_vs4000:4.1.5:*:*:*:*:*:*:*",
"cpe:2.3:h:polycom:viewstation_h.323:6.5.1:*:*:*:*:*:*:*",
"cpe:2.3:h:polycom:viewstation_h.323:7.2:*:*:*:*:*:*:*",
"cpe:2.3:h:polycom:viewstation_mp:6.5.1:*:*:*:*:*:*:*",
"cpe:2.3:h:polycom:viewstation_mp:7.2:*:*:*:*:*:*:*",
"cpe:2.3:h:polycom:viewstation_sp_384:6.5.1:*:*:*:*:*:*:*",
"cpe:2.3:h:polycom:viewstation_sp_384:7.2:*:*:*:*:*:*:*",
"cpe:2.3:h:polycom:viewstation_v.35:6.5.1:*:*:*:*:*:*:*",
"cpe:2.3:h:polycom:viewstation_v.35:7.2:*:*:*:*:*:*:*"
]
| null | null | null | 5 |
|
PYSEC-2022-67 | null | Tensorflow is an Open Source Machine Learning Framework. An attacker can craft a TFLite model that would cause an integer overflow in `TfLiteIntArrayCreate`. The `TfLiteIntArrayGetSizeInBytes` returns an `int` instead of a `size_t. An attacker can control model inputs such that `computed_size` overflows the size of `int` datatype. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range. | []
| null | null | null | null |
GHSA-jfjv-fh74-wcf5 | An issue was discovered in Das U-Boot through 2019.07. There is a stack-based buffer overflow in this nfs_handler reply helper function: nfs_mount_reply. | []
| null | null | null | null |
|
CVE-2019-12103 | The web-based configuration interface of the TP-Link M7350 V3 with firmware before 190531 is affected by a pre-authentication command injection vulnerability. | [
"cpe:2.3:o:tp-link:m7350_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:m7350:v3:*:*:*:*:*:*:*"
]
| null | null | 9.8 | 10 |
|
RHSA-2005:057 | Red Hat Security Advisory: gpdf security update | security flaw security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
]
| null | null | null | null |
GHSA-hfgr-rp42-29cp | A vulnerability was found in SourceCodester Judging Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file summary_results.php. The manipulation of the argument main_event_id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-223549 was assigned to this vulnerability. | []
| null | 9.8 | null | null |
|
GHSA-xg8v-m2mh-45m6 | PsiTransfer: Violation of the integrity of file distribution | **Summary**
The absence of restrictions on the endpoint, which allows you to create a path for uploading a file in a file distribution, allows an attacker to add arbitrary files to the distribution.**Details**
Vulnerable endpoint: POST /files**PoC**Create a file distribution.
<img width="1434" alt="Снимок экрана 2024-03-17 в 21 27 30" src="https://github.com/psi-4ward/psitransfer/assets/163760990/4634a6f7-6e7d-486e-9929-76156aaa1340">Go to the link address (id of the file distribution is needed by an attacker to upload files there).
<img width="1426" alt="Снимок экрана 2024-03-17 в 21 27 35" src="https://github.com/psi-4ward/psitransfer/assets/163760990/a57c910c-69e2-4b07-985d-b0a46c69891a">Send a POST /files. As the value of the Upload-Metadata header we specify the sid parameter with the id of the file distribution obtained in the second step. In the response from the server in the Location header we get the path for uploading a new file to the file distribution.
<img width="1403" alt="Снимок экрана 2024-03-17 в 21 28 09" src="https://github.com/psi-4ward/psitransfer/assets/163760990/8b839fb8-2c0b-432f-8503-e4c42a840056">Send a PATCH /files/{{id}} request with arbitrary content in the request body. Id is taken from the previous step.
<img width="1067" alt="Снимок экрана 2024-03-17 в 21 28 51" src="https://github.com/psi-4ward/psitransfer/assets/163760990/c5b2acf3-fdf1-4780-8c63-61a7f19338df">Result:
<img width="1432" alt="Снимок экрана 2024-03-17 в 21 29 05" src="https://github.com/psi-4ward/psitransfer/assets/163760990/c49b17c8-e1d2-4894-b6e2-f50b9663fca7">
<img width="1424" alt="Снимок экрана 2024-03-17 в 21 29 15" src="https://github.com/psi-4ward/psitransfer/assets/163760990/e4a1e07d-3e77-4f61-a4e7-ceee4a5a7b8e">**Impact**
The vulnerability allows an attacker to influence those users who come to the file distribution after him and slip the victim files with a malicious or phishing signature. | []
| null | 6.5 | null | null |
GHSA-34rp-625w-j33p | StarWind SAN & NAS build 1578 and StarWind Command Center Build 6864 Update Manager allows authentication with JTW token which is signed with any key. An attacker could use self-signed JTW token to bypass authentication resulting in escalation of privileges. | []
| null | 9.8 | null | null |
|
CVE-2025-4089 | Due to insufficient escaping of special characters in the "copy as cURL" feature, an attacker could trick a user into using this command, potentially leading to local code execution on the user's system. This vulnerability affects Firefox < 138 and Thunderbird < 138. | []
| null | 5.1 | null | null |
|
GHSA-j6hc-65ch-6v6p | The LearnPress – WordPress LMS Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Course, Lesson, and Quiz title and content in all versions up to, and including, 4.2.6.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with LP Instructor-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | []
| null | 4.4 | null | null |
|
CVE-2024-42484 | ESP-NOW OOB Vulnerability In Group Type Message | ESP-NOW Component provides a connectionless Wi-Fi communication protocol. An Out-of-Bound (OOB) vulnerability was discovered in the implementation of the ESP-NOW group type message because there is no check for the addrs_num field of the group type message. This can result in memory corruption related attacks. Normally there are two fields in the group information that need to be checked, i.e., the addrs_num field and the addrs_list fileld. Since we only checked the addrs_list field, an attacker can send a group type message with an invalid addrs_num field, which will cause the message handled by the firmware to be much larger than the current buffer, thus causing a memory corruption issue that goes beyond the payload length. | [
"cpe:2.3:a:espressif:esp-now:*:*:*:*:*:*:*:*"
]
| null | 6.5 | null | null |
CVE-2022-38539 | Archery v1.7.5 to v1.8.5 was discovered to contain a SQL injection vulnerability via the where parameter at /archive/apply. | [
"cpe:2.3:a:archerydms:archery:*:*:*:*:*:*:*:*"
]
| null | 9.8 | null | null |
|
GHSA-cw8p-532r-7gqx | MariaDB Server v10.7 and below was discovered to contain a global buffer overflow in the component decimal_bin_size, which is exploited via specially crafted SQL statements. | []
| null | 7.5 | null | null |
|
CVE-2021-44154 | An issue was discovered in Reprise RLM 14.2. By using an admin account, an attacker can write a payload to /goform/edit_opt, which will then be triggered when running the diagnostics (via /goform/diagnostics_doit), resulting in a buffer overflow. | [
"cpe:2.3:a:reprisesoftware:reprise_license_manager:14.2:*:*:*:*:*:*:*"
]
| null | 7.2 | null | 6.5 |
|
GHSA-qc53-6pcv-3q2p | An issue was discovered in Insyde InsydeH2O kernel 5.2 before version 05.29.50, kernel 5.3 before version 05.38.50, kernel 5.4 before version 05.46.50, kernel 5.5 before version 05.54.50, kernel 5.6 before version 05.61.50, and kernel 5.7 before version 05.70.50. In VariableRuntimeDxe driver, VariableServicesSetVariable () can be called by gRT_>SetVariable () or the SmmSetSensitiveVariable () or SmmInternalSetVariable () from SMM. In VariableServicesSetVariable (), it uses StrSize () to get variable name size, uses StrLen () to get variable name length and uses StrCmp () to compare strings. These actions may cause a buffer over-read. | []
| null | 7.5 | null | null |
|
CVE-2006-3417 | Tor client before 0.1.1.20 prefers entry points based on is_fast or is_stable flags, which could allow remote attackers to be preferred over nodes that are identified as more trustworthy "entry guard" (is_guard) systems by directory authorities. | [
"cpe:2.3:a:tor:tor:0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.2_pre13:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.2_pre14:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.2_pre15:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.2_pre16:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.2_pre17:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.2_pre18:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.2_pre19:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.2_pre20:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.2_pre21:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.2_pre22:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.2_pre23:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.2_pre24:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.2_pre25:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.2_pre26:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.2_pre27:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.9.4:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.9.5:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.9.6:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.9.7:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.9.8:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.9.9:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.9.10:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.1_alpha:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.2_alpha:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.3_alpha:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.4_alpha:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.5_alpha:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.6_alpha:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.7_alpha:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.8_alpha:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.9_alpha:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.10_alpha:*:*:*:*:*:*:*"
]
| null | null | null | 6.4 |
|
CVE-2018-20962 | The Backpack\CRUD Backpack component before 3.4.9 for Laravel allows XSS via the select field type. | [
"cpe:2.3:a:backpackforlaravel:backpack\\\\crud:*:*:*:*:*:*:*:*"
]
| null | null | 6.1 | 4.3 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.